D-Index & Metrics Best Publications

D-Index & Metrics

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 35 Citations 5,811 249 World Ranking 5960 National Ranking 48

Research.com Recognitions

Awards & Achievements

2020 - ACM Senior Member

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • Cryptography
  • Algorithm

His primary scientific interests are in Embedded system, Cryptography, Field-programmable gate array, Computer security and Differential fault analysis. His Embedded system research includes elements of Physical unclonable function, Cryptanalysis, Arbiter, Scan chain and Side channel attack. The Cryptography study combines topics in areas such as Overhead, Computer engineering and Artificial intelligence.

Debdeep Mukhopadhyay has researched Field-programmable gate array in several fields, including Elliptic curve, Ring oscillator and Parallel computing. In the field of Computer security, his study on Threat model overlaps with subjects such as Incentive. Debdeep Mukhopadhyay interconnects Ciphertext, Theoretical computer science and Advanced Encryption Standard in the investigation of issues within Differential fault analysis.

His most cited work include:

  • Cryptography and Network Security (289 citations)
  • Differential fault analysis of the advanced encryption standard using a single fault (224 citations)
  • Adversarial Attacks and Defences: A Survey. (162 citations)

What are the main themes of his work throughout his whole career to date?

Debdeep Mukhopadhyay mainly focuses on Cryptography, Embedded system, Field-programmable gate array, Block cipher and Computer security. His Cryptography study introduces a deeper knowledge of Algorithm. The various areas that he examines in his Embedded system study include Exploit, Vulnerability and Implementation.

In his study, which falls under the umbrella issue of Field-programmable gate array, Elliptic curve is strongly linked to Elliptic curve cryptography. His Block cipher research integrates issues from Cache, Timing attack, Cryptanalysis and Cipher. The Hardware security module research Debdeep Mukhopadhyay does as part of his general Computer security study is frequently linked to other disciplines of science, such as Countermeasure, therefore creating a link between diverse domains of science.

He most often published in these fields:

  • Cryptography (26.68%)
  • Embedded system (24.35%)
  • Field-programmable gate array (19.95%)

What were the highlights of his more recent work (between 2018-2021)?

  • Block cipher (19.43%)
  • Cryptography (26.68%)
  • Embedded system (24.35%)

In recent papers he was focusing on the following fields of study:

His main research concerns Block cipher, Cryptography, Embedded system, Computer security and Side channel attack. The study incorporates disciplines such as Cipher, Computer engineering and Cache in addition to Block cipher. His work in Cryptography covers topics such as Scalar multiplication which are related to areas like Algorithm.

Debdeep Mukhopadhyay works in the field of Embedded system, focusing on Field-programmable gate array in particular. As part of the same scientific family, Debdeep Mukhopadhyay usually focuses on Field-programmable gate array, concentrating on Lookup table and intersecting with Parallel computing. His Computer security research is multidisciplinary, relying on both Electronic design automation and Cyber-physical system.

Between 2018 and 2021, his most popular works were:

  • Building PUF Based Authentication and Key Exchange Protocol for IoT Without Explicit CRPs in Verifier Database (50 citations)
  • High-Speed Implementation of ECC Scalar Multiplication in GF(p) for Generic Montgomery Curves (12 citations)
  • Lightweight Design-for-Security Strategies for Combined Countermeasures Against Side Channel and Fault Analysis in IoT Applications (7 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • Cryptography
  • Programming language

Debdeep Mukhopadhyay mainly investigates Block cipher, Embedded system, Fault injection, Key and Field-programmable gate array. The Block cipher study combines topics in areas such as Fault analysis, Combinational logic, Privilege and Cipher. His studies in Embedded system integrate themes in fields like Side channel attack and Implementation.

His Fault injection study combines topics from a wide range of disciplines, such as Computer engineering, Redundancy, Exploit, Algorithm and Microcontroller. His work on Field-programmable gate array is being expanded to include thematically relevant topics such as Cryptographic primitive. His biological study spans a wide range of topics, including Software and Cryptography.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Cryptography and Network Security

Debdeep Mukhopadhyay;Behrouz A. Forouzan;Forouzan.
(2015)

1227 Citations

Differential fault analysis of the advanced encryption standard using a single fault

Michael Tunstall;Debdeep Mukhopadhyay;Subidh Ali.
international conference information security theory and practice (2011)

378 Citations

Adversarial Attacks and Defences: A Survey.

Anirban Chakraborty;Manaar Alam;Vishal Dey;Anupam Chattopadhyay.
arXiv: Learning (2018)

343 Citations

An Improved Fault Based Attack of the Advanced Encryption Standard

Debdeep Mukhopadhyay.
international conference on cryptology in africa (2009)

180 Citations

Secured Flipped Scan-Chain Model for Crypto-Architecture

G. Sengar;D. Mukhopadhyay;D.R. Chowdhury.
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (2007)

152 Citations

A Diagonal Fault Attack on the Advanced Encryption Standard.

Dhiman Saha;Debdeep Mukhopadhyay;Dipanwita Roy Chowdhury.
IACR Cryptology ePrint Archive (2009)

129 Citations

Building PUF Based Authentication and Key Exchange Protocol for IoT Without Explicit CRPs in Verifier Database

Urbi Chatterjee;Vidya Govindan;Rajat Sadhukhan;Debdeep Mukhopadhyay.
IEEE Transactions on Dependable and Secure Computing (2019)

110 Citations

A PUF-Based Secure Communication Protocol for IoT

Urbi Chatterjee;Rajat Subhra Chakraborty;Debdeep Mukhopadhyay.
ACM Transactions in Embedded Computing Systems (2017)

99 Citations

Improved Test Pattern Generation for Hardware Trojan Detection Using Genetic Algorithm and Boolean Satisfiability

Sayandeep Saha;Rajat Subhra Chakraborty;Srinivasa Shashank Nuthakki;Anshul.
cryptographic hardware and embedded systems (2015)

92 Citations

Curious Case of Rowhammer: Flipping Secret Exponent Bits Using Timing Analysis

Sarani Bhattacharya;Debdeep Mukhopadhyay.
cryptographic hardware and embedded systems (2016)

81 Citations

Best Scientists Citing Debdeep Mukhopadhyay

Sylvain Guilley

Sylvain Guilley

Télécom ParisTech

Publications: 31

Ingrid Verbauwhede

Ingrid Verbauwhede

KU Leuven

Publications: 18

Onur Mutlu

Onur Mutlu

ETH Zurich

Publications: 17

Patrick Schaumont

Patrick Schaumont

Worcester Polytechnic Institute

Publications: 17

Thomas Eisenbarth

Thomas Eisenbarth

University of Lübeck

Publications: 16

Prabhat Mishra

Prabhat Mishra

University of Florida

Publications: 16

Yier Jin

Yier Jin

University of Florida

Publications: 15

Chip-Hong Chang

Chip-Hong Chang

Nanyang Technological University

Publications: 15

Stefan Mangard

Stefan Mangard

Graz University of Technology

Publications: 13

Ramesh Karri

Ramesh Karri

New York University

Publications: 13

Swarup Bhunia

Swarup Bhunia

University of Florida

Publications: 12

Surya Nepal

Surya Nepal

Commonwealth Scientific and Industrial Research Organisation

Publications: 12

Kazuo Ohta

Kazuo Ohta

University of Electro-Communications

Publications: 11

Tim Güneysu

Tim Güneysu

Ruhr University Bochum

Publications: 10

Lejla Batina

Lejla Batina

Radboud University Nijmegen

Publications: 10

Berk Sunar

Berk Sunar

Worcester Polytechnic Institute

Publications: 10

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking d-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us
Something went wrong. Please try again later.