no code implementations • 13 Mar 2024 • Harshit Saurabh, Anupam Golder, Samarth Shivakumar Titti, Suparna Kundu, Chaoyun Li, Angshuman Karmakar, Debayan Das
Overall, using the \textit{combined CPA and LDA attack} model, the correct secret key byte is recovered with <50 traces collected using the ChipWhisperer platform.
no code implementations • 11 Nov 2022 • Kelvin Summoogum, Debayan Das, Parvati Jayakumar
To demonstrate the effectiveness of the filter, we train and evaluate a deep learning model on gait datasets collected from older adults with and without applying the filter.
no code implementations • 3 May 2018 • Baibhab Chatterjee, Debayan Das, Shovan Maity, Shreyas Sen
Traditional authentication in radio-frequency (RF) systems enable secure data communication within a network through techniques such as digital signatures and hash-based message authentication codes (HMAC), which suffer from key recovery attacks.
no code implementations • 2 May 2018 • Baibhab Chatterjee, Debayan Das, Shreyas Sen
Physical unclonable functions (PUF) in silicon exploit die-to-die manufacturing variations during fabrication for uniquely identifying each die.