Follow
Sayandeep Saha
Sayandeep Saha
Postdoctoral Researcher, UCLouvain, Belgium
No verified email - Homepage
Title
Cited by
Cited by
Year
Improved Test Pattern Generation for Hardware Trojan Detection Using Genetic Algorithm and Boolean Satisfiability
S Saha, RS Chakraborty, SS Nuthakki, D Mukhopadhyay
Cryptographic Hardware and Embedded Systems--CHES 2015, 577-596, 2015
149*2015
Composite PUF: A New Design Paradigm for Physically Unclonable Functions on FPGA
HK Durga Prasad Sahoo, Sayandeep Saha, Debdeep Mukhopadhyay, Rajat Subhra ...
IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 2014
762014
Fault template attacks on block ciphers exploiting fault propagation
S Saha, A Bag, D Basu Roy, S Patranabis, D Mukhopadhyay
Advances in Cryptology–EUROCRYPT 2020: 39th Annual International Conference …, 2020
492020
ExpFault: an automated framework for exploitable fault characterization in block ciphers
S Saha, D Mukhopadhyay, P Dasgupta
IACR Transactions on Cryptographic Hardware and Embedded Systems, 242-276, 2018
42*2018
A framework to counter statistical ineffective fault analysis of block ciphers using domain transformation and error correction
S Saha, D Jap, DB Roy, A Chakraborty, S Bhasin, D Mukhopadhyay
IEEE Transactions on Information Forensics and Security 15, 1905-1919, 2019
41*2019
Fault attack on AES via hardware Trojan insertion by dynamic partial reconfiguration of FPGA over ethernet
AP Johnson, S Saha, RS Chakraborty, D Mukhopadhyay, S Gören
Proceedings of the 9th Workshop on Embedded Systems Security, 1-8, 2014
372014
Automatic characterization of exploitable faults: A machine learning approach
S Saha, D Jap, S Patranabis, D Mukhopadhyay, S Bhasin, P Dasgupta
IEEE Transactions on Information Forensics and Security 14 (4), 954-968, 2018
26*2018
Lopher: Sat-hardened logic embedding on block ciphers
A Saha, S Saha, S Chowdhury, D Mukhopadhyay, BB Bhattacharya
2020 57th ACM/IEEE Design Automation Conference (DAC), 1-6, 2020
252020
Breaking redundancy-based countermeasures with random faults and power side channel
S Saha, D Jap, J Breier, S Bhasin, D Mukhopadhyay, P Dasgupta
2018 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 15-22, 2018
24*2018
Deep-lock: Secure authorization for deep neural networks
M Alam, S Saha, D Mukhopadhyay, S Kundu
arXiv preprint arXiv:2008.05966, 2020
212020
Differential fault attack on SKINNY block cipher
N Vafaei, N Bagheri, S Saha, D Mukhopadhyay
Security, Privacy, and Applied Cryptography Engineering: 8th International …, 2018
182018
Testability based metric for hardware trojan vulnerability assessment
S Saha, RS Chakraborty, D Mukhopadhyay
2016 Euromicro Conference on Digital System Design (DSD), 503-510, 2016
152016
Dirmanto Jap, Debapriya Basu Roy, Avik Chakraborty, Shivam Bhasin, and Debdeep Mukhopadhyay. A framework to counter statistical ineffective fault analysis of block ciphers …
S Saha
IEEE Transactions on Information Forensics and Security 15, 1905-1919, 2020
142020
Divided we stand, united we fall: Security analysis of some SCA+ SIFA countermeasures against SCA-enhanced fault template attacks
S Saha, A Bag, D Jap, D Mukhopadhyay, S Bhasin
International Conference on the Theory and Application of Cryptology and …, 2021
11*2021
ALAFA: automatic leakage assessment for fault attack countermeasures
S Saha, SN Kumar, S Patranabis, D Mukhopadhyay, P Dasgupta
Proceedings of the 56th Annual Design Automation Conference 2019, 1-6, 2019
112019
Explframe: exploiting page frame cache for fault analysis of block ciphers
A Chakraborty, S Bhattacharya, S Saha, D Mukhopadhyay
2020 Design, Automation & Test in Europe Conference & Exhibition (DATE …, 2020
102020
Sidelobe level reduction of aperiodic planar array using an improved invasive weed optimization algorithm
SS R Bhattacharya, T K Bhattacharyya
Applied Electromagnetics Conference (AEMC), 2011 IEEE, 1-4, 2011
10*2011
Are randomized caches truly random? Formal analysis of randomized-partitioned caches
A Chakraborty, S Bhattacharya, S Saha, D Mukhopadhyay
2023 IEEE International Symposium on High-Performance Computer Architecture …, 2023
82023
Fault attack on SKINNY cipher
N Vafaei, S Saha, N Bagheri, D Mukhopadhyay
Journal of Hardware and Systems Security 4, 277-296, 2020
82020
Corruption exposes you: statistical key recovery from compound logic locking
A Kaur, S Saha, C Karfa, D Mukhopadhyay
2022 23rd International Symposium on Quality Electronic Design (ISQED), 1-6, 2022
72022
The system can't perform the operation now. Try again later.
Articles 1–20