header

 

Home | Biography | Research | Teaching | Students | Publications | Ongoing Projects | Cryptology Research Group

 

D-RoyChoudhury

 

Dipanwita Roy Chowdhury
Professor, 

Computer Science & Engineering

Current Students:

                     

Name of the Student                                         Working Area 

PhD

  1. Dhiman Saha :  Cryptanalysis of Hash Functions and Authenticated Encryptions
  2. Jimmy Jose : Cellular Automata Based Cryptographic Algorithms.
  3. Sukhendu Kuila :  Cryptanalysis of Hash Functions and Authenticated Encryptions

MS

  1. Shamit Ghosh :  Countermeasures Against Fault Attacks on Symmetric Key Ciphers
  2. Abhrajit Sengupta :  Different MAC Construction Techniques

 

 

 

Alumni :

 

Name of the Student                                       Thesis Title

PhD

  1. Subarna Bhattacharya :
  2. Debsmita Ghosh :
  3. Kolin Paul :
  4. C.V. Guru Rao :
  5. Debdeep Mukhopadhyay : Design and Analysis of Cellular Automata Based Cryptographic Algorithms. pdf
  6. Shibaji Banerjee :
  7. Mounita Saha :  Design and Analysis of Authenticated Key Establishment Protocols. pdf
  8. Rupsa Chakraborty : New techniques in testing and timing verification of aystem-on-chips.pdf
  9. Jaydeb Bhaumik : Design and implementation of error correcting codes and cryptographic crimitives.  pdf
  10. Santosh Ghosh :  Design and analysis of pairing based cryptographic hardware for prime fields. pdf
  11. Sourav Das : Security Analysis of Stream Ciphers.
  12. Sandip Karmakar : Analysis of Cellular Automata Based Cryptographic Algorithms.

 

MS                                           

  1. Debdeep Mukhopadhyay : Hardware for Cryptography. pdf
  2. Roshni Chatterjee :
  3. Santosh Ghosh : Implementation of Public Key Cryptosystems Resistant Against Side Channel Attacks.  pdf
  4. Manjur Alam : DPA-Resistant Reconfigurable AES-Rijndael.  pdf
  5. Debojyoti Bhattacharya :
  6. Dhiman Saha :  Enhanced Differential Power Attacks on Field Programmable Gate Array Implementations of Standard Block Ciphers. pdf
  7. Sandip Karmakar : Analysis of Cellular Automata Based Cryptographic Algorithms. pdf
  8. Debobrata Dey : Design and Analysis of Stream Cipher.
  9. Anup Bhattacharya : Security of Vehicular Networks Using Pairing.
  10. Pralay Biswas : Design of High speed Stream Cipher.

 

 

 

 

 

                                                      For suggestions and comments:  Prof. D. Roychowdhury

Last modified on Monday, January 31, 2011 5:30 PM