Selected Publications
Applied Cryptology
- Debrup Chakraborty, Cuauhtemoc Mancillas-Lopez, Palash
Sarkar, ``Disk Encryption: Do We Need to Preserve Length?".
Preprint available as: IACR Cryptology ePrint Archive: Report
2015/594. [pdf]
- Sandra Diaz-Santiago and Lil Maria Rodriguez-Henriquez and
Debrup Chakraborty, ``A Cryptographic Study of Tokenization
Systems".
International Journal of Information Security, (to
appear), [link]
Preprint available as: IACR Cryptology ePrint Archive: Report
2014/602. [pdf]
- Debrup Chakraborty, Palash Sarkar, ``On Modes of
Operations of a Block Cipher for Authentication and
Authenticated Encryption",
Cryptography and Communications,
(to appear), [link]
Preprint available as: IACR Cryptology ePrint Archive: Report
2014/627. [pdf]
- Debrup Chakraborty, Mridul Nandi, ``Attacks on the
Authenticated Encryption Mode of Operation PAE", IEEE Transactions on Information
Theory, vol. 61, no. 10, pp. 5636-5642, 2015. [link]
Preprint available as [pdf]
- Debrup Chakraborty, Vicente Hernandez Jimenez, Palash
Sarkar, ``Another Look at XCB", Cryptography and Communications, vol 7, issue 4,
pp. 439-468, 2015. [link]
A slightly different version available as: IACR Cryptology
ePrint Archive: Report 2013/823. [pdf]
- Debrup Chakraborty, Cuauhtemoc Mancillas-Lopez, Palash
Sarkar, ``STES: A Stream Cipher Based Low Cost Scheme for
Securing Stored Data", IEEE
Transactions on Computers, vol. 64, no. 9, pp.
2691--2707, 2015. [link]
A slightly different version available as: IACR Cryptology
ePrint Archive: Report 2013/347. [pdf]
- Lil Maria Rodriguez Henriquez, Debrup Chakraborty,
``RDAS: A Symmetric Key Scheme for Authenticated Query
Processing in Outsourced Databases", Proceedings of Security
& Trust Management, STM 2013, Lecture Notes in
Computer Science, vol. 8203, pp. 115--130, Egham, United
Kingdom, 2013.
An extended version available as: IACR Cryptology ePrint
Archive: Report 2013/814. [pdf]
- Debrup Chakraborty, Cuauhtemoc Mancillas-Lopez, Francisco
Rodriguez-Henriquez, Palash Sarkar, ``Efficient Hardware
Implementations of BRW Polynomials and Tweakable Enciphering
Schemes", IEEE Transactions on
Computers, vol 62, no. 2, pp. 279-294, 2013.
A slightly different version is available as: IACR
Cryptology ePrint Archive: Report 2011/161. [pdf]
- Sandra Diaz-Santiago and Debrup Chakraborty, "On Securing
Communications from Profilers", Proceedings of International Conference on
Security and Cryptography, Secrypt 2012,
pp.154-162, Rome, Italy, 2012. (won the best paper award)
A slightly different version is available as: IACR Cryptology
ePrint Archive: Report 2012/124, [pdf]
- Debrup Chakraborty, Cuauhtemoc Mancillas-Lopez, ``Double
Ciphertext Mode: A Proposal for Secure Backup", International Journal of Applied
Cryptography, vol 2, no. 3, pp. 271-287, 2012.
A slightly different version is available as: IACR
Cryptology ePrint Archive: Report 2010/369. [pdf]
- Cuauhtemoc Mancillas-Lopez, Debrup Chakraborty and Francisco
Rodriguez-Henriquez, ``Reconfigurable Hardware Implementations
of Tweakable Enciphering Schemes", IEEE Transactions on Computers,
vol. 59, no. 11, pp. 1547-1561, November 2010. [pdf]
An initial version appeared as: “Efficient
Implementations of Some Tweakable
Enciphering Schemes in Reconfigurable Hardware”, Proceedings
of Indocrypt 2007,
Lecture Notes in Computer Science 4859, pp.
414-424, 2007.
- Cuauhtemoc
Mancillas-Lopez, Debrup Chakraborty and Francisco
Rodriguez-Henriquez, ``On some weaknesses in the disc
encryption schemes EME and EME2", Proceedings of the International Conference on
Information Systems Security, ICISS 2009, Lecture Notes in Computer
Science 5905, pp. 265-279, Kolkata, India, 2009. [pdf]
- Debrup
Chakraborty and Mridul Nandi, `` An improved security bound
for HCTR", Proceedings of
Fast Software Encryption 2008, Lecture Notes in Computer
Science 5086, pp. 289-302, Laussane, Switzerland,
2008. [pdf]
- Debrup
Chakraborty and Palash Sarkar,`` HCH: A new
tweakable enciphering scheme using the hash-encrypt-hash
approach", IEEE Transactions
on Information Theory, vol. 54, no. 4, pp. 1683-1699,
April 2008. [pdf]
An initial
version appeared as: Debrup Chakraborty and Palash
Sarkar, ``HCH: A new tweakable enciphering scheme using the
hash-encrypt-hash approach", Proceedings of Indocrypt 2006, Lecture Notes in Computer
Science 4329, pp. 287-302, Kolkata, India, 2006.
- Debrup
Chakraborty and Palash Sarkar, ``A general construction of
tweakable block ciphers and different modes of operation", IEEE Transactions on Information
Theory, vol. 54, no. 5, pp. 1991-2006, May 2008. [pdf]
An initial
version appeared as: Debrup Chakraborty and Palash Sarkar, ``A
general construction of tweakable block ciphers and different
modes of operation", Proceedings
of INSCRYPT 2006, Lecture
Notes in Computer Science 4318, pp. 88-102, Bejing,
China, 2006.
- Debrup
Chakraborty and Palash Sarkar, ``A new mode of encryption
providing a tweakable strong pseudo-random permutation",
Proceedings of Fast Software
Encryption 2006, Lecture
Notes in Computer
Science 4047, pp. 293-309, Graz, Austria, 2006. [pdf]
Neural Networks
- Eduardo Vazquez-Santacruz and Debrup Chakraborty, `` An
Ensemble of Degraded Neural Networks", in proceedings of Mexican Conference on Pattern
Recognition, MCPR
2011,
Lecture Notes in Computer
Science 5718, pp.278-287, Cancun, Mexico, 2011. [pdf]
- Debrup Chakraborty, ``Neural Network Ensembles from Training
Set Expansions", in proceedings of Iberoamerican Congress on Pattern
Recognition, CIARP
2009, Lecture Notes
in Computer Science 5856, pp. 629-636, Guadalajara,
Mexico, 2009. [pdf]
- Debrup Chakraborty and N.R. Pal, ``Selecting useful groups of
features in a connectionist Framework", IEEE Transactions on Neural Networks, vol
19, no 3, pp. 381-396, March 2008. [pdf]
- Debrup Chakraborty and Nikhil R. Pal, ``Strict Generalization
in MLP networks", Proceedings
of IFSA 2007, Lecture
Notes in Artificial Intelligence 4529, pp.
722-731, Cancun, Mexico, 2007. [pdf]
- Debrup Chakraborty and N.R. Pal, ``Expanding the training set
for better generalization in MLP", Proceedings of International Conference on
Communication, Devices and Intelligent Systems, pp.
454-457, Kolkata, India, 2004.
- Debrup Chakraborty and N.R. Pal, ``A neuro-fuzzy scheme for
simultaneous feature selection and fuzzy rule-based
classification", IEEE
Transactions on Neural Networks, vol. 15, no. 1, pp.
110-123, 2004. [pdf]
- Debrup Chakraborty and N.R. Pal, ``A novel training scheme for
training multilayered perceptrons to realize proper
generalization and incremental learning", IEEE Transactions on Neural
Networks, vol. 14, no. 1, pp. 1-14, 2003. [pdf]
- Debrup Chakraborty and N.R. Pal, ``Integrated feature analysis
and fuzzy rule-based system identification in a neuro-fuzzy
framework", IEEE Transactions
on Systems Man Cybernetics B, vol. 31, no. 3, pp.
391-400, 2001. [pdf]
Others
- Antonio Lopez Jaimes, Carlos A. Coello Coello and Debrup
Chakraborty, ``Objective Reduction Using a Feature Selection
Technique", in proceedings
of 2008 Genetic and Evolutionary Computation Conference
(GECCO'2008), pp. 673-680, ACM Press, Atlanta, USA,
July 2008. [pdf]
- Debrup Chakraborty, ``Some experiments on music
classification", Proceedings
of ICAPR 2007, pp. 396-400, World Scientific, Kolkata,
India 2007.
- N.R. Pal and Debrup Chakraborty, ``Some new features for
protein fold prediction", Proceedings
of ICONIP/ICANN 03,
Lecture Notes in Computer Science 2714, pp. 1176-1183,
Istanbul,Turkey, 2003. [pdf]
- N.R. Pal and Debrup Chakraborty, ``Mountain and Subtractive
Clustering Algorithms: Improvements and Generalizations",
International Journal of
Intelligent Systems, vol. 15, no. 4, pp. 329-324,
2000.