256 results on '"CHOWDHURY, DIPANWITA ROY"'
Search Results
52. Countermeasures of Side Channel Attacks on Symmetric Key Ciphers Using Cellular Automata
53. CSHR: Selection of Cryptographically Suitable Hybrid Cellular Automata Rule
54. An Integrated ECC-MAC Based on RS Code
55. coreBIST: A Cellular Automata Based Core for Self Testing System-on-Chips
56. An Improved Double Byte Error Correcting Code Using Cellular Automata
57. An Efficient n ×n Boolean Mapping Using Additive Cellular Automata
58. On the Security of Designing a Cellular Automata Based Stream Cipher
59. Characterization of a Class of Complemented Group Cellular Automata
60. Efficient FPGA Implementation of Montgomery Multiplier Using DSP Blocks
61. An Integrated Approach to Testing Embedded Cores and Interconnects Using Test Access Mechanism (TAM) Switch
62. Gain: Practical Key-Recovery Attacks on Round-reduced PAEQ
63. EnCash: An Authenticated Encryption Scheme Using Cellular Automata.
64. CASH: Cellular Automata Based Parameterized Hash
65. AEC: A Practical Scheme for Authentication with Error Correction
66. Parallel crypto-devices for GF(p) elliptic curve multiplication resistant against side channel attacks
67. Secured flipped scan-chain model for crypto-architecture
68. An efficient scan tree design for compact test pattern set
69. An integrated DFT solution for mixed-signal SOCs
70. Efficient FPGA Implementation of Montgomery Multiplier Using DSP Blocks
71. An Integrated ECC-MAC Based on RS Code
72. Design of fault-resilient S-boxes for AES-like block ciphers
73. Cellular-automata-array-based diagnosis of board level faults
74. An Integrated Approach to Testing Embedded Cores and Interconnects Using Test Access Mechanism (TAM) Switch
75. Theory and application of nongroup cellular automata for synthesis of easily testable finite state machines
76. CA-based byte error-correcting code
77. Design of CAECC - cellular automata based error correcting code
78. An Efficient Hardware Design for Combined AES and AEGIS
79. A Continuous Role-Based Authentication Scheme and Data Transmission Protocol for Implantable Medical Devices
80. Synthesis of Maximum Length Cellular Automata with Nonlinearity Injections.
81. An algebraic cryptanalysis tool for cube attack on symmetric ciphers
82. Internal differential fault analysis of parallelizable ciphers in the counter-mode
83. Investigating four neighbourhood cellular automata as better cryptographic primitives
84. Scan-based side channel attack on stream ciphers and its prevention
85. SymSum: Symmetric-Sum Distinguishers Against Round Reduced SHA3
86. Preventing fault attacks using fault randomisation with a case study on AES
87. SCARAB: A continuous authentication scheme for biomedical application
88. Design and Analysis of Some Cryptographically Robust Non-uniform Nonlinear Cellular Automata.
89. Preventing fault attack on stream cipher using randomization
90. Diagonal fault analysis of Gr⊘stl in dedicated MAC mode
91. Prevention of Fault Attacks in Cellular Automata Based Stream Ciphers.
92. An Efficient n ×n Boolean Mapping Using Additive Cellular Automata
93. An Improved Double Byte Error Correcting Code Using Cellular Automata
94. coreBIST: A Cellular Automata Based Core for Self Testing System-on-Chips
95. Differential Fault Analysis of MICKEY-128 2.0
96. A Scalable Method for Constructing Non-linear Cellular Automata with Period 2 n - 1.
97. Design and implementation of Cellular Automata based diffusion layer for SPN-type block cipher
98. Nimix:An involutary nonlinear vectorial boolean function
99. A Parallel Efficient Architecture for Large Cryptographically Robust n × k (k>n/2) Mappings
100. NOCAS : A Nonlinear Cellular Automata Based Stream Cipher
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.