Selected Publications

Applied Cryptology

  1. Debrup Chakraborty, Sebati Ghosh,  Palash Sarkar, ``A Fast Single-Key Two-Level Universal Hash Function". IACR Transactions on Symmetric Cryptology, volume 2017, no. 1, pp. 106-128  [link]

  2. Debrup Chakraborty, Cuauhtemoc Mancillas-Lopez,  Palash Sarkar, ``Disk Encryption: Do We Need to Preserve Length?". Journal of Cryptographic Engineering (to appear) [link]
    Preprint available as: IACR Cryptology ePrint Archive: Report 2015/594. [pdf]

  3. Sandra Diaz-Santiago and Lil Maria Rodriguez-Henriquez and Debrup Chakraborty, ``A Cryptographic Study of Tokenization Systems". International Journal of Information Security,  vol. 15, no. 4, pp. 413-432, 2016 [link]
    Preprint available as: IACR Cryptology ePrint Archive: Report 2014/602. [pdf]

  4. Debrup Chakraborty,   Palash Sarkar, ``On Modes of Operations of a Block Cipher for Authentication and Authenticated Encryption",  Cryptography and Communications, vol 8, no. 4, pp. 455-511, 2016 , [link]
    Preprint available as: IACR Cryptology ePrint Archive: Report 2014/627. [pdf]

  5. Debrup Chakraborty,   Mridul Nandi, ``Attacks on the Authenticated Encryption Mode of Operation PAE", IEEE Transactions on Information Theory, vol. 61, no. 10, pp. 5636-5642, 2015. [link]
    Preprint available as [pdf]

  6. Debrup Chakraborty, Vicente Hernandez Jimenez,  Palash Sarkar, ``Another Look at XCB",  Cryptography and Communications, vol 7, issue 4, pp. 439-468, 2015. [link]
    A slightly different version available as: IACR Cryptology ePrint Archive: Report 2013/823. [pdf]

  7. Debrup Chakraborty, Cuauhtemoc Mancillas-Lopez,  Palash Sarkar, ``STES: A Stream Cipher Based Low Cost Scheme for Securing Stored Data", IEEE Transactions on Computers, vol. 64, no. 9, pp. 2691--2707, 2015. [link]
    A slightly different version available as: IACR Cryptology ePrint Archive: Report 2013/347. [pdf]

  8. Lil Maria Rodriguez Henriquez, Debrup Chakraborty, ``RDAS:  A Symmetric Key Scheme for Authenticated Query Processing in Outsourced Databases",  Proceedings of Security & Trust Management, STM 2013, Lecture Notes in Computer Science, vol. 8203, pp. 115--130, Egham, United Kingdom, 2013.[link]
    An extended version available as: IACR Cryptology ePrint Archive: Report 2013/814. [pdf]

  9. Debrup Chakraborty, Cuauhtemoc Mancillas-Lopez, Francisco Rodriguez-Henriquez, Palash Sarkar, ``Efficient Hardware Implementations of BRW Polynomials and Tweakable Enciphering Schemes", IEEE Transactions on Computers, vol 62, no. 2, pp. 279-294, 2013.[link]
      A slightly different version is available as: IACR Cryptology ePrint Archive: Report 2011/161. [pdf]

  10. Sandra Diaz-Santiago and Debrup Chakraborty, "On Securing Communications from Profilers", Proceedings of  International Conference on Security and Cryptography, Secrypt 2012, pp.154-162, Rome, Italy, 2012. (won the best paper award)
    A slightly different version is available as: IACR Cryptology ePrint Archive: Report 2012/124, [pdf]

  11. Debrup Chakraborty, Cuauhtemoc Mancillas-Lopez, ``Double Ciphertext Mode: A Proposal for Secure Backup",  International Journal of Applied Cryptography, vol 2, no. 3, pp. 271-287, 2012.[link]
      A slightly different version is available as: IACR Cryptology ePrint Archive: Report 2010/369. [pdf]

  12. Cuauhtemoc Mancillas-Lopez, Debrup Chakraborty and Francisco Rodriguez-Henriquez, ``Reconfigurable Hardware Implementations of Tweakable Enciphering Schemes",  IEEE Transactions on Computers, vol. 59, no. 11, pp. 1547-1561, November 2010. [link]
    An initial version appeared as:  “Efficient Implementations of Some Tweakable Enciphering Schemes in Reconfigurable Hardware”, Proceedings of Indocrypt 2007, Lecture Notes in Computer Science 4859, pp. 414-424, 2007.

  13. Cuauhtemoc Mancillas-Lopez, Debrup Chakraborty and Francisco Rodriguez-Henriquez, ``On some weaknesses in the disc encryption schemes EME and EME2", Proceedings of the International Conference on Information Systems Security, ICISS 2009, Lecture Notes in Computer Science 5905, pp. 265-279, Kolkata, India, 2009. [link]

  14. Debrup Chakraborty and Mridul Nandi, `` An improved security bound for HCTR", Proceedings of Fast Software Encryption 2008, Lecture Notes in Computer Science 5086, pp. 289-302, Laussane, Switzerland, 2008. [link]

  15. Debrup Chakraborty and Palash Sarkar,`` HCH: A new tweakable enciphering scheme using the hash-encrypt-hash approach", IEEE Transactions on Information Theory, vol. 54, no. 4, pp. 1683-1699, April 2008. [link]
    An initial version appeared as:  Debrup Chakraborty and Palash Sarkar, ``HCH: A new tweakable enciphering scheme using the hash-encrypt-hash approach",  Proceedings of Indocrypt 2006, Lecture Notes in Computer Science 4329, pp. 287-302, Kolkata, India, 2006.

  16. Debrup Chakraborty and Palash Sarkar, ``A general construction of tweakable block ciphers and different modes of operation", IEEE Transactions on Information Theory, vol. 54, no. 5, pp. 1991-2006, May 2008. [link]
    An initial version appeared as: Debrup Chakraborty and Palash Sarkar, ``A general construction of tweakable block ciphers and different modes of operation", Proceedings of INSCRYPT 2006, Lecture Notes in Computer Science 4318, pp. 88-102, Bejing, China, 2006.

  17. Debrup Chakraborty and Palash Sarkar, ``A new mode of encryption providing a tweakable strong pseudo-random permutation",  Proceedings of Fast Software Encryption 2006, Lecture Notes in Computer Science 4047, pp. 293-309, Graz, Austria, 2006. [link]

Neural Networks

  1. Eduardo Vazquez-Santacruz and Debrup Chakraborty, `` An Ensemble of Degraded Neural Networks", in proceedings of  Mexican Conference on Pattern Recognition, MCPR 2011,
    Lecture Notes in Computer Science 5718, pp.278-287, Cancun, Mexico, 2011. [pdf]

  2. Debrup Chakraborty, ``Neural Network Ensembles from Training Set Expansions", in proceedings of  Iberoamerican Congress on Pattern Recognition, CIARP 2009, Lecture Notes in Computer Science 5856, pp. 629-636, Guadalajara, Mexico, 2009. [pdf]

  3. Debrup Chakraborty and N.R. Pal, ``Selecting useful groups of features in a connectionist Framework",  IEEE Transactions on Neural Networks,  vol 19, no 3,  pp. 381-396, March 2008. [pdf]

  4. Debrup Chakraborty and Nikhil R. Pal, ``Strict Generalization in MLP networks",  Proceedings of IFSA 2007, Lecture Notes in Artificial Intelligence  4529, pp. 722-731, Cancun, Mexico, 2007. [pdf]

  5. Debrup Chakraborty and N.R. Pal, ``Expanding the training set for better generalization in MLP", Proceedings of International Conference on Communication, Devices and Intelligent Systems, pp. 454-457, Kolkata, India, 2004.

  6. Debrup Chakraborty and N.R. Pal, ``A neuro-fuzzy scheme for simultaneous feature selection and fuzzy rule-based classification",  IEEE Transactions on Neural Networks, vol. 15, no. 1, pp.
    110-123, 2004. [pdf]

  7. Debrup Chakraborty and N.R. Pal, ``A novel training scheme for training multilayered perceptrons to realize proper generalization and incremental learning", IEEE Transactions on Neural Networks, vol. 14, no. 1, pp. 1-14, 2003. [pdf]

  8. Debrup Chakraborty and N.R. Pal, ``Integrated feature analysis and fuzzy rule-based system identification in a neuro-fuzzy framework", IEEE Transactions on Systems Man Cybernetics B, vol. 31, no. 3, pp. 391-400, 2001. [pdf]

Others

  1. Antonio Lopez Jaimes, Carlos A. Coello Coello and Debrup Chakraborty, ``Objective Reduction Using a Feature Selection Technique", in proceedings of  2008 Genetic and Evolutionary Computation Conference (GECCO'2008), pp. 673-680, ACM Press, Atlanta, USA, July 2008. [pdf]

  2. Debrup Chakraborty, ``Some experiments on music classification", Proceedings of ICAPR 2007, pp. 396-400, World Scientific, Kolkata, India 2007.

  3. N.R. Pal and Debrup Chakraborty, ``Some new features for protein fold prediction", Proceedings of ICONIP/ICANN 03, Lecture Notes in Computer Science 2714, pp. 1176-1183, Istanbul,Turkey, 2003. [pdf]

  4. N.R. Pal and Debrup Chakraborty, ``Mountain and Subtractive Clustering Algorithms: Improvements and Generalizations",  International Journal of Intelligent Systems, vol. 15, no. 4, pp. 329-324, 2000.