Personal information

Activities

Works (39)

On the security of TrCBC

Information Processing Letters
2023-01 | Journal article
Contributors: Debrup Chakraborty; Samir Kundu
Source: check_circle
Crossref

FAST: Disk encryption and beyond

Advances in Mathematics of Communications
2022 | Journal article
Part of ISSN: 1930-5346
Part of ISSN: 1930-5338
Source: Self-asserted source
Debrup Chakraborty

Disk encryption: do we need to preserve length?

Journal of Cryptographic Engineering
2018-04-03 | Journal article
Contributors: Debrup Chakraborty; Cuauhtemoc Mancillas López; Palash Sarkar
Source: check_circle
Crossref

A cryptographic study of tokenization systems

Int. J. Inf. Secur.
2016-01 | Journal article
Contributors: Sandra Díaz-Santiago; Lil María Rodríguez-Henríquez; Debrup Chakraborty
Source: Self-asserted source
Debrup Chakraborty via Crossref Metadata Search

Attacks on the Authenticated Encryption Mode of Operation <italic>PAE</italic>

IEEE Trans. Inform. Theory
2015-10 | Journal article
Contributors: Debrup Chakraborty; Mridul Nandi
Source: Self-asserted source
Debrup Chakraborty via Crossref Metadata Search
grade
Preferred source (of 2)‎

<monospace>STES</monospace>: A Stream Cipher Based Low Cost Scheme for Securing Stored Data

IEEE Trans. Comput.
2015-09-01 | Journal article
Contributors: Debrup Chakraborty; Cuauhtemoc Mancillas-Lopez; Palash Sarkar
Source: Self-asserted source
Debrup Chakraborty via Crossref Metadata Search

On modes of operations of a block cipher for authentication and authenticated encryption

Cryptogr. Commun.
2015-08 | Journal article
Contributors: Debrup Chakraborty; Palash Sarkar
Source: Self-asserted source
Debrup Chakraborty via Crossref Metadata Search

Another look at XCB

Cryptogr. Commun.
2015-02 | Journal article
Contributors: Debrup Chakraborty; Vicente Hernandez-Jimenez; Palash Sarkar
Source: Self-asserted source
Debrup Chakraborty via Crossref Metadata Search

Encryption Schemes Secure Against Profiling Adversaries

E-Business and Telecommunications
2014 | Other
Contributors: Sandra Díaz-Santiago; Debrup Chakraborty
Source: Self-asserted source
Debrup Chakraborty via Crossref Metadata Search

Efficient hardware implementations of BRW polynomials and tweakable enciphering schemes

IEEE Transactions on Computers
2013 | Journal article
DOI:

10.1109/TC.2011.227

Source: Self-asserted source
Debrup Chakraborty via Scopus - Elsevier

RDAS: A Symmetric Key Scheme for Authenticated Query Processing in Outsourced Databases

Security and Trust Management
2013 | Other
Contributors: Lil María Rodríguez-Henríquez; Debrup Chakraborty
Source: Self-asserted source
Debrup Chakraborty via Crossref Metadata Search

Double ciphertext mode: A proposal for secure backup

International Journal of Applied Cryptography
2012 | Journal article
DOI:

10.1504/IJACT.2012.045588

Source: Self-asserted source
Debrup Chakraborty via Scopus - Elsevier
grade
Preferred source (of 2)‎

On securing communication from profilers

SECRYPT 2012 - Proceedings of the International Conference on Security and Cryptography
2012 | Journal article
Source: Self-asserted source
Debrup Chakraborty via Scopus - Elsevier

An ensemble of degraded neural networks

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2011 | Journal article
DOI:

10.1007/978-3-642-21587-2_30

Source: Self-asserted source
Debrup Chakraborty via Scopus - Elsevier

On implementation of a practical crypto-system in the limited access model

Program and Abstract Book - 2010 7th International Conference on Electrical Engineering, Computing Science and Automatic Control, CCE 2010
2010 | Journal article
DOI:

10.1109/ICEEE.2010.5608627

Source: Self-asserted source
Debrup Chakraborty via Scopus - Elsevier

Reconfigurable hardware implementations of tweakable enciphering schemes

IEEE Transactions on Computers
2010 | Journal article
DOI:

10.1109/TC.2010.64

Source: Self-asserted source
Debrup Chakraborty via Scopus - Elsevier

Neural network ensembles from training set expansions

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2009 | Journal article
DOI:

10.1007/978-3-642-10268-4_74

Source: Self-asserted source
Debrup Chakraborty via Scopus - Elsevier

On some weaknesses in the disk encryption schemes EME and EME2

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2009 | Journal article
DOI:

10.1007/978-3-642-10772-6_20

Source: Self-asserted source
Debrup Chakraborty via Scopus - Elsevier

A general construction of tweakable block ciphers and different modes of operations

IEEE Transactions on Information Theory
2008 | Journal article
DOI:

10.1109/TIT.2008.920247

Source: Self-asserted source
Debrup Chakraborty via Scopus - Elsevier

An improved security bound for HCTR

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2008 | Journal article
DOI:

10.1007/978-3-540-71039-4_18

Source: Self-asserted source
Debrup Chakraborty via Scopus - Elsevier

HCH: A new tweakable enciphering scheme using the hash-counter-hash approach

IEEE Transactions on Information Theory
2008 | Journal article
DOI:

10.1109/TIT.2008.917623

Source: Self-asserted source
Debrup Chakraborty via Scopus - Elsevier

Objective reduction using a feature selection technique

GECCO'08: Proceedings of the 10th Annual Conference on Genetic and Evolutionary Computation 2008
2008 | Journal article
Source: Self-asserted source
Debrup Chakraborty via Scopus - Elsevier

Objective reduction using a feature selection technique

Proceedings of the 10th annual conference on Genetic and evolutionary computation - GECCO '08
2008 | Conference paper
Contributors: Antonio López Jaimes; Carlos A. Coello Coello; Debrup Chakraborty
Source: Self-asserted source
Debrup Chakraborty via Crossref Metadata Search

Selecting useful groups of features in a connectionist framework

IEEE Transactions on Neural Networks
2008 | Journal article
DOI:

10.1109/TNN.2007.910730

Source: Self-asserted source
Debrup Chakraborty via Scopus - Elsevier

Efficient implementations of some tweakable enciphering schemes in reconfigurable hardware

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2007 | Journal article
Source: Self-asserted source
Debrup Chakraborty via Scopus - Elsevier

Strict generalization in multilayered perceptron networks

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2007 | Journal article
Source: Self-asserted source
Debrup Chakraborty via Scopus - Elsevier

A general construction of tweakable block ciphers and different modes of operations

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2006 | Journal article
Source: Self-asserted source
Debrup Chakraborty via Scopus - Elsevier

A new mode of encryption providing a tweakable strong pseudo-random permutation

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2006 | Journal article
Source: Self-asserted source
Debrup Chakraborty via Scopus - Elsevier

A New Mode of Encryption Providing a Tweakable Strong Pseudo-random Permutation

Fast Software Encryption
2006 | Other
Contributors: Debrup Chakraborty; Palash Sarkar
Source: Self-asserted source
Debrup Chakraborty via Crossref Metadata Search

Some Experiments on Music Classification

Advances in Pattern Recognition
2006 | Conference paper
Contributors: Debrup Chakraborty
Source: Self-asserted source
Debrup Chakraborty via Crossref Metadata Search

A neuro-fuzzy scheme for simultaneous feature selection and fuzzy rule-based classification

IEEE Transactions on Neural Networks
2004 | Journal article
DOI:

10.1109/TNN.2003.820557

Source: Self-asserted source
Debrup Chakraborty via Scopus - Elsevier

A novel training scheme for multilayered perceptrons to realize proper generalization and incremental learning

IEEE Transactions on Neural Networks
2003 | Journal article
DOI:

10.1109/TNN.2002.806953

Source: Self-asserted source
Debrup Chakraborty via Scopus - Elsevier

Some new features for protein fold prediction

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2003 | Journal article
Source: Self-asserted source
Debrup Chakraborty via Scopus - Elsevier

Two connectionist schemes for selecting groups of features (sensors)

IEEE International Conference on Fuzzy Systems
2003 | Journal article
Source: Self-asserted source
Debrup Chakraborty via Scopus - Elsevier

Integrated feature analysis and fuzzy rule-based system identification in a neuro-fuzzy paradigm

IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
2001 | Journal article
DOI:

10.1109/3477.931526

Source: Self-asserted source
Debrup Chakraborty via Scopus - Elsevier

Mountain and subtractive clustering method: Improvements and generalizations

International Journal of Intelligent Systems
2000 | Journal article
DOI:

10.1002/(SICI)1098-111X(200004)15:4<329::AID-INT5>3.0.CO;2-9

Source: Self-asserted source
Debrup Chakraborty via Scopus - Elsevier

Mountain and subtractive clustering method: Improvements and generalizations

Int. J. Intell. Syst.
2000-04 | Journal article
Contributors: Nikhil R. Pal; Debrup Chakraborty
Source: Self-asserted source
Debrup Chakraborty via Crossref Metadata Search

Efficient Implementations of Some Tweakable Enciphering Schemes in Reconfigurable Hardware

Progress in Cryptology – INDOCRYPT 2007
Other
Contributors: Cuauhtemoc Mancillas-López; Debrup Chakraborty; Francisco Rodríguez-Henríquez
Source: Self-asserted source
Debrup Chakraborty via Crossref Metadata Search

Strict Generalization in Multilayered Perceptron Networks

Foundations of Fuzzy Logic and Soft Computing
Other
Contributors: Debrup Chakraborty; Nikhil R. Pal
Source: Self-asserted source
Debrup Chakraborty via Crossref Metadata Search