| Pqc acceleration using gpus: Frodokem, newhope, and kyber N Gupta, A Jati, AK Chauhan, A Chattopadhyay IEEE Transactions on Parallel and Distributed Systems 32 (3), 575-586, 2020 | 91 | 2020 |
| Lightweight hardware accelerator for post-quantum digital signature CRYSTALS-Dilithium N Gupta, A Jati, A Chattopadhyay, G Jha IEEE Transactions on Circuits and Systems I: Regular Papers 70 (8), 3234-3243, 2023 | 66 | 2023 |
| A configurable crystals-kyber hardware implementation with side-channel protection A Jati, N Gupta, A Chattopadhyay, SK Sanadhya ACM transactions on embedded computing systems 23 (2), 1-25, 2024 | 58 | 2024 |
| Threshold Implementations of : A Trade-Off Analysis A Jati, N Gupta, A Chattopadhyay, SK Sanadhya, D Chang IEEE Transactions on Information Forensics and Security 15, 2110-2120, 2019 | 37 | 2019 |
| Threshold implementations of GIFT: A trade-off analysis N Gupta, A Jati, SK Sanadhya, A Chattopadhyay, D Chang | 20 | 2021 |
| Rig: A Simple, Secure and Flexible Design for Password Hashing D Chang, A Jati, S Mishra, SK Sanadhya International Conference on Information Security and Cryptology, 361-381, 2014 | 20 | 2014 |
| SPQCop: Side-channel protected post-quantum cryptoprocessor A Jati, N Gupta, A Chattopadhyay, SK Sanadhya Cryptology ePrint Archive, 2019 | 18 | 2019 |
| MemEnc: A lightweight, low-power, and transparent memory encryption engine for IoT N Gupta, A Jati, A Chattopadhyay IEEE Internet of Things Journal 8 (9), 7182-7191, 2020 | 15 | 2020 |
| BAKSHEESH: similar yet different from GIFT A Baksi, J Breier, A Chattopadhyay, T Gerlich, S Guilley, N Gupta, T Isobe, ... Cryptology ePrint Archive, 2023 | 14 | 2023 |
| Ai attacks ai: Recovering neural network architecture from nvdla using ai-assisted side channel attack N Gupta, A Jati, A Chattopadhyay ACM Transactions on Embedded Computing Systems 24 (5), 1-29, 2025 | 13 | 2025 |
| SPF: A New Family of Efficient Format-Preserving Encryption Algorithms D Chang, M Ghosh, KC Gupta, A Jati, A Kumar, D Moon, IG Ray, ... International Conference on Information Security and Cryptology, 64-83, 2016 | 12 | 2016 |
| Cryptanalytic time–memory trade-off for password hashing schemes D Chang, A Jati, S Mishra, SK Sanadhya International Journal of Information Security 18 (2), 163-180, 2019 | 11 | 2019 |
| Ascon-sign V Srivastava, N Gupta, A Jati, A Baksi, J Breier, A Chattopadhyay, ... NIST PQC Additional Round 1, 2023 | 7 | 2023 |
| CRYSTALS-Dilithium on RISC-V processor: lightweight secure boot using post-quantum digital signature N Gupta, A Jati, A Chattopadhyay 2023 IEEE/ACM International Conference on Computer Aided Design (ICCAD), 1-7, 2023 | 5 | 2023 |
| eSPF: A Family of Format-Preserving Encryption Algorithms Using MDS Matrices D Chang, M Ghosh, A Jati, A Kumar, SK Sanadhya International Conference on Security, Privacy, and Applied Cryptography …, 2017 | 5 | 2017 |
| A generalized format preserving encryption framework using MDS matrices D Chang, M Ghosh, A Jati, A Kumar, SK Sanadhya Journal of Hardware and Systems Security 3 (1), 3-11, 2019 | 3 | 2019 |
| Exploiting the leakage: analysis of some authenticated encryption schemes D Chang, AK Chauhan, N Gupta, A Jati, SK Sanadhya International Conference on Security, Privacy, and Applied Cryptography …, 2016 | 2 | 2016 |
| Cryptographic module based approach for password hashing schemes D Chang, A Jati, S Mishra, SK Sanadhya International Conference on Passwords, 39-57, 2014 | 2 | 2014 |
| EFFLUX-F2: A high performance hardware security evaluation board A Jati, N Gupta, A Chattopadhyay, SK Sanadhya International Workshop on Constructive Side-Channel Analysis and Secure …, 2024 | 1 | 2024 |
| Breaking RSA Authentication on Zynq-7000 SoC and Beyond: Identification of Critical Security Flaw in FSBL Software P Ravi, A Jati, S Bhasin Cryptology ePrint Archive, 2023 | 1 | 2023 |