Rajat Sadhukhan
Rajat Sadhukhan
Indian Institute of Technology Roorkee, India
Verified email at
Cited by
Cited by
Building PUF based authentication and key exchange protocol for IoT without explicit CRPs in verifier database
U Chatterjee, V Govindan, R Sadhukhan, D Mukhopadhyay, ...
IEEE transactions on dependable and secure computing 16 (3), 424-437, 2018
Generating secure hardware using chatgpt resistant to cwes
M Nair, R Sadhukhan, D Mukhopadhyay
Cryptology ePrint Archive, 2023
An evaluation of lightweight block ciphers for resource-constrained applications: Area, performance, and security
R Sadhukhan, S Patranabis, A Ghoshal, D Mukhopadhyay, V Saraswat, ...
Journal of Hardware and Systems Security 1, 203-218, 2017
Lightweight and side-channel secure 4x4 S-boxes from cellular automata rules
A Ghoshal, R Sadhukhan, S Patranabis, N Datta, S Picek, ...
Cryptology ePrint Archive, 2018
DFARPA: Differential fault attack resistant physical design automation
M Khairallah, R Sadhukhan, R Samanta, J Breier, S Bhasin, ...
2018 Design, Automation & Test in Europe Conference & Exhibition (DATE …, 2018
Count your toggles: A new leakage model for pre-silicon power analysis of crypto designs
R Sadhukhan, P Mathew, DB Roy, D Mukhopadhyay
Journal of Electronic Testing 35, 605-619, 2019
PUFSSL: an OpenSSL extension for PUF based authentication
U Chatterjee, R Sadhukhan, V Govindan, D Mukhopadhyay, ...
2018 IEEE 23rd International Conference on Digital Signal Processing (DSP), 1-5, 2018
Lightweight Design Choices for LED-like Block Ciphers
S Sarkar, H Syed, R Sadhukhan, D Mukhopadhyay
Progress in Cryptology–INDOCRYPT 2017: 18th International Conference on …, 2017
PUF+ IBE: blending physically unclonable functions with identity based encryption for authentication and key exchange in IoTs
U Chatterjee, V Govindan, R Sadhukhan, D Mukhopadhyay, ...
Cryptology ePrint Archive, 2017
Stupify: a hardware countermeasure of kracks in wpa2 using physically unclonable functions
U Chatterjee, R Sadhukhan, D Mukhopadhyay, R Subhra Chakraborty, ...
Companion Proceedings of the Web Conference 2020, 217-221, 2020
How Hardened is Your Hardware? Guiding ChatGPT to Generate Secure Hardware Resistant to CWEs
M Nair, R Sadhukhan, D Mukhopadhyay
International Symposium on Cyber Security, Cryptology, and Machine Learning …, 2023
Shortest path to secured hardware: domain oriented masking with high-level-synthesis
R Sadhukhan, S Saha, D Mukhopadhyay
2021 58th ACM/IEEE Design Automation Conference (DAC), 223-228, 2021
N Datta, A Ghoshal, D Mukhopadhyay, S Patranabis, S Picek, ...
Submission to the NIST Lightweight Cryptography Competition, 2019
Light but tight: Lightweight composition of serialized s-boxes with diffusion layers for strong ciphers
R Sadhukhan, A Chakraborty, N Datta, S Patranabis, D Mukhopadhyay
International Conference on Security, Privacy, and Applied Cryptography …, 2022
Power efficiency of s-boxes: From a machine-learning-based tool to a deterministic model
R Sadhukhan, N Datta, D Mukhopadhyay
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 27 (12 …, 2019
United we stand: A threshold signature scheme for identifying outliers in PLCs
U Chatterjee, P Santikellur, R Sadhukhan, V Govindan, D Mukhopadhyay, ...
Proceedings of the 56th Annual Design Automation Conference 2019, 1-2, 2019
A machine learning based approach to predict power efficiency of S-boxes
R Sadhukhan, N Datta, D Mukhopadhyay
2019 32nd International Conference on VLSI Design and 2019 18th …, 2019
Netlist Whisperer: AI and NLP Fight Circuit Leakage!
M Nair, R Sadhukhan, H Pearce, D Mukhopadhyay, R Karri
Proceedings of the 2023 Workshop on Attacks and Solutions in Hardware …, 2023
A Classical and Machine Learning-Based Reliability Analysis on Catalan Object Encryption Scheme
R Sadhukhan
IEEE Transactions on Reliability 71 (2), 1022-1032, 2022
VALIANT: An EDA Flow for Side-channel Leakage Evaluation and Tailored Protection
R Sadhukhan, S Saha, S Paria, S Bhunia, D Mukhopadhyay
IEEE Transactions on Computers, 2023
The system can't perform the operation now. Try again later.
Articles 1–20