default search action
Debrup Chakraborty
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j21]Debrup Chakraborty, Avishek Majumder, Subhabrata Samajder:
Making searchable symmetric encryption schemes smaller and faster. Int. J. Inf. Sec. 24(1): 10 (2025) - 2024
- [i22]Debrup Chakraborty, Sebati Ghosh, Cuauhtemoc Mancillas-López, Palash Sarkar:
Fast Low Level Disk Encryption Using FPGAs. CoRR abs/2408.14113 (2024) - [i21]Debrup Chakraborty, Sebati Ghosh, Cuauhtemoc Mancillas-López, Palash Sarkar:
Fast Low Level Disk Encryption Using FPGAs. IACR Cryptol. ePrint Arch. 2024: 1336 (2024) - [i20]Debrup Chakraborty, Avishek Majumder, Subhabrata Samajder:
Making Searchable Symmetric Encryption Schemes Smaller and Faster. IACR Cryptol. ePrint Arch. 2024: 1483 (2024) - 2023
- [j20]Debrup Chakraborty, Avijit Dutta, Samir Kundu:
Designing tweakable enciphering schemes using public permutations. Adv. Math. Commun. 17(4): 771-798 (2023) - [j19]Debrup Chakraborty, Samir Kundu:
On the security of TrCBC. Inf. Process. Lett. 179: 106320 (2023) - 2022
- [j18]Debrup Chakraborty, Sebati Ghosh, Cuauhtemoc Mancillas López, Palash Sarkar:
${\sf {FAST}}$: Disk encryption and beyond. Adv. Math. Commun. 16(1): 185-230 (2022) - [i19]Debrup Chakraborty, Samir Kundu:
{\sf TrCBC} is Insecure. IACR Cryptol. ePrint Arch. 2022: 476 (2022) - 2021
- [i18]Debrup Chakraborty, Avijit Dutta, Samir Kundu:
Designing Tweakable Enciphering Schemes Using Public Permutations. IACR Cryptol. ePrint Arch. 2021: 128 (2021)
2010 – 2019
- 2019
- [i17]Arun Thundyill Saseendran, Lovish Setia, Viren Chhabria, Debrup Chakraborty, Aneek Barman Roy:
Impact of Data Pruning on Machine Learning Algorithm Performance. CoRR abs/1901.10539 (2019) - 2018
- [j17]Debrup Chakraborty, Cuauhtemoc Mancillas López, Palash Sarkar:
Disk encryption: do we need to preserve length? J. Cryptogr. Eng. 8(1): 49-69 (2018) - [e1]Debrup Chakraborty, Tetsu Iwata:
Progress in Cryptology - INDOCRYPT 2018 - 19th International Conference on Cryptology in India, New Delhi, India, December 9-12, 2018, Proceedings. Lecture Notes in Computer Science 11356, Springer 2018, ISBN 978-3-030-05377-2 [contents] - 2017
- [j16]Debrup Chakraborty, Sebati Ghosh, Palash Sarkar:
A Fast Single-Key Two-Level Universal Hash Function. IACR Trans. Symmetric Cryptol. 2017(1): 106-128 (2017) - [i16]Debrup Chakraborty, Sebati Ghosh, Palash Sarkar:
Evaluating Bernstein-Rabin-Winograd Polynomials. IACR Cryptol. ePrint Arch. 2017: 328 (2017) - [i15]Debrup Chakraborty, Sebati Ghosh, Cuauhtemoc Mancillas López, Palash Sarkar:
FAST: Disk Encryption and Beyond. IACR Cryptol. ePrint Arch. 2017: 849 (2017) - 2016
- [j15]Debrup Chakraborty, Palash Sarkar:
On modes of operations of a block cipher for authentication and authenticated encryption. Cryptogr. Commun. 8(4): 455-511 (2016) - [j14]Sandra Diaz-Santiago, Lil María Rodríguez-Henríquez, Debrup Chakraborty:
A cryptographic study of tokenization systems. Int. J. Inf. Sec. 15(4): 413-432 (2016) - [i14]Debrup Chakraborty, Sebati Ghosh, Palash Sarkar:
A Fast Single-Key Two-Level Universal Hash Function. IACR Cryptol. ePrint Arch. 2016: 1103 (2016) - 2015
- [j13]Debrup Chakraborty, Vicente Hernandez-Jimenez, Palash Sarkar:
Another look at XCB. Cryptogr. Commun. 7(4): 439-468 (2015) - [j12]Debrup Chakraborty, Cuauhtemoc Mancillas-López, Palash Sarkar:
STES: A Stream Cipher Based Low Cost Scheme for Securing Stored Data. IEEE Trans. Computers 64(9): 2691-2707 (2015) - [j11]Debrup Chakraborty, Mridul Nandi:
Attacks on the Authenticated Encryption Mode of Operation PAE. IEEE Trans. Inf. Theory 61(10): 5636-5642 (2015) - [i13]Debrup Chakraborty, Cuauhtemoc Mancillas-López, Palash Sarkar:
Disk Encryption: Do We Need to Preserve Length? IACR Cryptol. ePrint Arch. 2015: 594 (2015) - 2014
- [c19]Sandra Diaz-Santiago, Lil María Rodríguez-Henríquez, Debrup Chakraborty:
A Cryptographic Study of Tokenization Systems. SECRYPT 2014: 393-398 - [c18]Lil María Rodríguez-Henríquez, Debrup Chakraborty:
Using Bitmaps for Executing Range Queries in Encrypted Databases. SECRYPT 2014: 432-438 - [i12]Sandra Diaz-Santiago, Lil María Rodríguez-Henríquez, Debrup Chakraborty:
A Cryptographic Study of Tokenization Systems. IACR Cryptol. ePrint Arch. 2014: 602 (2014) - [i11]Debrup Chakraborty, Palash Sarkar:
On Modes of Operations of a Block Cipher for Authentication and Authenticated Encryption. IACR Cryptol. ePrint Arch. 2014: 627 (2014) - 2013
- [j10]Debrup Chakraborty, Cuauhtemoc Mancillas-López, Francisco Rodríguez-Henríquez, Palash Sarkar:
Efficient Hardware Implementations of BRW Polynomials and Tweakable Enciphering Schemes. IEEE Trans. Computers 62(2): 279-294 (2013) - [c17]Lil María Rodríguez-Henríquez, Debrup Chakraborty:
RDAS: A Symmetric Key Scheme for Authenticated Query Processing in Outsourced Databases. STM 2013: 115-130 - [i10]Debrup Chakraborty, Cuauhtemoc Mancillas-López, Palash Sarkar:
STES: A Stream Cipher Based Low Cost Scheme for Securing Stored Data. IACR Cryptol. ePrint Arch. 2013: 347 (2013) - [i9]Lil María Rodríguez-Henríquez, Debrup Chakraborty:
RDAS: A Symmetric Key Scheme for Authenticated Query Processing in Outsourced Databases. IACR Cryptol. ePrint Arch. 2013: 814 (2013) - [i8]Debrup Chakraborty, Vicente Hernandez-Jimenez, Palash Sarkar:
Another Look at XCB. IACR Cryptol. ePrint Arch. 2013: 823 (2013) - 2012
- [j9]Debrup Chakraborty, Cuauhtemoc Mancillas-López:
Double ciphertext mode: a proposal for secure backup. Int. J. Appl. Cryptogr. 2(3): 271-287 (2012) - [c16]Sandra Díaz-Santiago, Debrup Chakraborty:
Encryption Schemes Secure Against Profiling Adversaries. ICETE (Selected Papers) 2012: 172-191 - [c15]Sandra Diaz-Santiago, Debrup Chakraborty:
On Securing Communication from Profilers. SECRYPT 2012: 154-162 - [i7]Sandra Diaz-Santiago, Debrup Chakraborty:
On Securing Communication From Profilers. IACR Cryptol. ePrint Arch. 2012: 124 (2012) - 2011
- [c14]Eduardo Vázquez-Santacruz, Debrup Chakraborty:
An Ensemble of Degraded Neural Networks. MCPR 2011: 278-287 - [i6]Debrup Chakraborty, Cuauhtemoc Mancillas-López, Francisco Rodríguez-Henríquez, Palash Sarkar:
Efficient Hardware Implementations of BRW Polynomials and Tweakable Enciphering Schemes. IACR Cryptol. ePrint Arch. 2011: 161 (2011) - 2010
- [j8]Cuauhtemoc Mancillas-López, Debrup Chakraborty, Francisco Rodríguez-Henríquez:
Reconfigurable Hardware Implementations of Tweakable Enciphering Schemes. IEEE Trans. Computers 59(11): 1547-1561 (2010) - [c13]Rene Henriquez Garcia, Ivan Cabrera, Debrup Chakraborty:
On implementation of a practical crypto-system in the limited access model. CCE 2010: 418-423 - [i5]Debrup Chakraborty, Cuauhtemoc Mancillas-López:
Double Ciphertext Mode : A Proposal for Secure Backup. IACR Cryptol. ePrint Arch. 2010: 369 (2010)
2000 – 2009
- 2009
- [c12]Debrup Chakraborty:
Neural Network Ensembles from Training Set Expansions. CIARP 2009: 629-636 - [c11]Cuauhtemoc Mancillas-López, Debrup Chakraborty, Francisco Rodríguez-Henríquez:
On Some Weaknesses in the Disk Encryption Schemes EME and EME2. ICISS 2009: 265-279 - [p1]Debrup Chakraborty, Francisco Rodríguez-Henríquez:
Block Cipher Modes of Operation from a Hardware Implementation Perspective. Cryptographic Engineering 2009: 321-363 - 2008
- [j7]Debrup Chakraborty, Palash Sarkar:
HCH: A New Tweakable Enciphering Scheme Using the Hash-Counter-Hash Approach. IEEE Trans. Inf. Theory 54(4): 1683-1699 (2008) - [j6]Debrup Chakraborty, Palash Sarkar:
A General Construction of Tweakable Block Ciphers and Different Modes of Operations. IEEE Trans. Inf. Theory 54(5): 1991-2006 (2008) - [j5]Debrup Chakraborty, Nikhil R. Pal:
Selecting Useful Groups of Features in a Connectionist Framework. IEEE Trans. Neural Networks 19(3): 381-396 (2008) - [c10]Debrup Chakraborty, Mridul Nandi:
An Improved Security Bound for HCTR. FSE 2008: 289-302 - [c9]Antonio López Jaimes, Carlos A. Coello Coello, Debrup Chakraborty:
Objective reduction using a feature selection technique. GECCO 2008: 673-680 - 2007
- [c8]Debrup Chakraborty, Nikhil R. Pal:
Strict Generalization in Multilayered Perceptron Networks. IFSA (1) 2007: 722-731 - [c7]Cuauhtemoc Mancillas-López, Debrup Chakraborty, Francisco Rodríguez-Henríquez:
Efficient Implementations of Some Tweakable Enciphering Schemes in Reconfigurable Hardware. INDOCRYPT 2007: 414-424 - [i4]Debrup Chakraborty, Palash Sarkar:
HCH: A New Tweakable Enciphering Scheme Using the Hash-Counter-Hash Approach. IACR Cryptol. ePrint Arch. 2007: 28 (2007) - [i3]Debrup Chakraborty, Palash Sarkar:
A General Construction of Tweakable Block Ciphers and Different Modes of Operations. IACR Cryptol. ePrint Arch. 2007: 29 (2007) - [i2]Cuauhtemoc Mancillas-López, Debrup Chakraborty, Francisco Rodríguez-Henríquez:
Reconfigurable Hardware Implementations of Tweakable Enciphering Schemes. IACR Cryptol. ePrint Arch. 2007: 437 (2007) - 2006
- [c6]Debrup Chakraborty, Palash Sarkar:
A General Construction of Tweakable Block Ciphers and Different Modes of Operations. Inscrypt 2006: 88-102 - [c5]Debrup Chakraborty, Palash Sarkar:
A New Mode of Encryption Providing a Tweakable Strong Pseudo-random Permutation. FSE 2006: 293-309 - [c4]Debrup Chakraborty, Palash Sarkar:
HCH: A New Tweakable Enciphering Scheme Using the Hash-Encrypt-Hash Approach. INDOCRYPT 2006: 287-302 - [i1]Debrup Chakraborty, Palash Sarkar:
A New Mode of Encryption Providing A Tweakable Strong Pseudo-Random. IACR Cryptol. ePrint Arch. 2006: 275 (2006) - 2004
- [j4]Debrup Chakraborty, Nikhil R. Pal:
A neuro-fuzzy scheme for simultaneous feature selection and fuzzy rule-based classification. IEEE Trans. Neural Networks 15(1): 110-123 (2004) - 2003
- [j3]Debrup Chakraborty, Nikhil R. Pal:
A novel training scheme for multilayered perceptrons to realize proper generalization and incremental learning. IEEE Trans. Neural Networks 14(1): 1-14 (2003) - [c3]Debrup Chakraborty, Nikhil R. Pal:
Two connectionist schemes for selecting groups of features (sensors). FUZZ-IEEE 2003: 161-166 - [c2]Nikhil R. Pal, Debrup Chakraborty:
Some New Features for Protein Fold Prediction. ICANN 2003: 1176-1183 - 2002
- [c1]Debrup Chakraborty, Nikhil R. Pal:
Designing Rule-Based Classifiers with On-Line Feature Selection: A Neuro-fuzzy Approach. AFSS 2002: 251-259 - 2001
- [j2]Debrup Chakraborty, Nikhil R. Pal:
Integrated feature analysis and fuzzy rule-based system identification in a neuro-fuzzy paradigm. IEEE Trans. Syst. Man Cybern. Part B 31(3): 391-400 (2001) - 2000
- [j1]Nikhil R. Pal, Debrup Chakraborty:
Mountain and subtractive clustering method: Improvements and generalizations. Int. J. Intell. Syst. 15(4): 329-341 (2000)
Coauthor Index
aka: Cuauhtemoc Mancillas López
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-19 20:44 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint