- Cryptographic Implementations and Security
- Advanced Malware Detection Techniques
- Physical Unclonable Functions (PUFs) and Hardware Security
- Analog and Mixed-Signal Circuit Design
- Blind Source Separation Techniques
- VLSI and Analog Circuit Testing
- Chaos-based Image/Signal Encryption
- Security and Verification in Computing
- Coding theory and cryptography
- Advancements in Semiconductor Devices and Circuit Design
- Sparse and Compressive Sensing Techniques
- Quantum Computing Algorithms and Architecture
- Radiation Effects in Electronics
- EEG and Brain-Computer Interfaces
- Integrated Circuits and Semiconductor Failure Analysis
- Quantum Information and Cryptography
- Network Security and Intrusion Detection
- Quantum and electron transport phenomena
- Smart Grid Security and Resilience
- Internet Traffic Analysis and Secure E-voting
Télécom Paris
2020
TDF (France)
2020
Nanyang Technological University
2018-2019
National Institute of Technology Meghalaya
2015
Profiled side-channel attacks represent a practical threat to digital devices, thereby having the potential disrupt foundation of e-commerce, Internet Things (IoT), and smart cities.In profiled attack, adversary gains knowledge about target device by getting access cloned device.Though these two devices are different in realworld scenarios, yet, unfortunately, large part research works simplifies setting using only single for both profiling attacking.There, portability issue is conveniently...
Design and synthesis of quantum circuits have gained huge momentum during the last few years. With various physical constraint sone major issues is in making nearest neighbor complaint. The existing one two dimensional architectures for placement qubits does not scale well larger circuits. situation thus demands a faster approach to solve problem. To make circuit compliant, SWAP gates are inserted gate bring interacting adjacent. We proposed method with simple yet effective algorithm...
Electrocorticography (ECoG) is a type of electrophysiological monitoring useful for recording the activity from cerebral cortex. It has emerged as promising technique in brain-computer interfaces (BCI). Compression these signals essential saving power and bandwidth novel application scenarios Health-based IoT Body Area Networks. However, this task particularly challenging since, ECoG are not compressible either time domain or frequency domain. To that end, Block Sparse Bayesian Learning...
Compression of brain-computer interface (BCI) signals is significant to reduce transmission bandwidth cloud/remote servers and minimize storage cost. Precise reconstruction the compressed signal also crucial as these data are further used for spike detection and/or classification. The conventional compressive sensing (CS) techniques reconstruct BCI computationally expensive. There several existing CS reconstruction, including block-sparse Bayesian learning block-based CS, which work replace...
Cryptographic implementations need to be robust amidst the widespread use of crypto-libraries and attacks targeting their implementation, such as side-channel (SCA). Many certification schemes, Common Criteria FIPS 140, continue without addressing flaws. Research works mostly tackle sophisticated with simple use-cases, which is not reality where end-to-end evaluation trivial. In this study we used all due diligence assess invulnerability a given implementation from shoes an evaluator. work...