Santosh Ghosh

1.5k total citations
58 papers, 817 citations indexed

About

Santosh Ghosh is a scholar working on Artificial Intelligence, Hardware and Architecture and Computer Vision and Pattern Recognition. According to data from OpenAlex, Santosh Ghosh has authored 58 papers receiving a total of 817 indexed citations (citations by other indexed papers that have themselves been cited), including 53 papers in Artificial Intelligence, 36 papers in Hardware and Architecture and 25 papers in Computer Vision and Pattern Recognition. Recurrent topics in Santosh Ghosh's work include Cryptographic Implementations and Security (52 papers), Physical Unclonable Functions (PUFs) and Hardware Security (33 papers) and Chaos-based Image/Signal Encryption (25 papers). Santosh Ghosh is often cited by papers focused on Cryptographic Implementations and Security (52 papers), Physical Unclonable Functions (PUFs) and Hardware Security (33 papers) and Chaos-based Image/Signal Encryption (25 papers). Santosh Ghosh collaborates with scholars based in United States, India and Belgium. Santosh Ghosh's co-authors include Debayan Das, Shreyas Sen, Arijit Raychowdhury, Josef Danial, Ingrid Verbauwhede, Debdeep Mukhopadhyay, Dipanwita RoyChowdhury, Mayukh Nath, Baibhab Chatterjee and Shovan Maity and has published in prestigious journals such as SHILAP Revista de lepidopterología, IEEE Access and IEEE Journal of Solid-State Circuits.

In The Last Decade

Santosh Ghosh

54 papers receiving 798 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Santosh Ghosh United States 17 678 497 252 181 149 58 817
Michael Tunstall United Kingdom 11 702 1.0× 458 0.9× 224 0.9× 157 0.9× 203 1.4× 31 846
Aydın Aysu United States 15 503 0.7× 266 0.5× 174 0.7× 131 0.7× 125 0.8× 64 702
Jakub Breier Singapore 14 483 0.7× 332 0.7× 148 0.6× 138 0.8× 161 1.1× 58 613
Kris Tiri United States 16 1.2k 1.8× 1.1k 2.2× 501 2.0× 267 1.5× 130 0.9× 24 1.4k
A. Hodjat United States 12 639 0.9× 312 0.6× 385 1.5× 69 0.4× 88 0.6× 24 746
Siavash Bayat-Sarmadi Iran 16 503 0.7× 153 0.3× 128 0.5× 145 0.8× 54 0.4× 40 715
Jens-Peter Kaps United States 14 495 0.7× 338 0.7× 310 1.2× 147 0.8× 58 0.4× 45 751
Paolo Maistri France 12 578 0.9× 368 0.7× 244 1.0× 124 0.7× 101 0.7× 44 670
Maria Eichlseder Austria 11 455 0.7× 232 0.5× 240 1.0× 54 0.3× 108 0.7× 31 545
Thomas Korak Austria 10 353 0.5× 332 0.7× 135 0.5× 138 0.8× 139 0.9× 15 487

Countries citing papers authored by Santosh Ghosh

Since Specialization
Citations

This map shows the geographic impact of Santosh Ghosh's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Santosh Ghosh with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Santosh Ghosh more than expected).

Fields of papers citing papers by Santosh Ghosh

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Santosh Ghosh. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Santosh Ghosh. The network helps show where Santosh Ghosh may publish in the future.

Co-authorship network of co-authors of Santosh Ghosh

This figure shows the co-authorship network connecting the top 25 collaborators of Santosh Ghosh. A scholar is included among the top collaborators of Santosh Ghosh based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Santosh Ghosh. Santosh Ghosh is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
2.
Mera, Jose Maria Bermudo, Angshuman Karmakar, Debayan Das, et al.. (2023). A 334 μW 0.158 mm2 ASIC for Post-Quantum Key-Encapsulation Mechanism Saber With Low-Latency Striding Toom–Cook Multiplication. IEEE Journal of Solid-State Circuits. 58(8). 2383–2398. 6 indexed citations
3.
Das, Debayan, et al.. (2023). Switch Capacitor-Based Time-Varying Transfer Function for FCN and CNN MLSCA-Resistant AES256 in 65-nm CMOS. IEEE Transactions on Circuits & Systems II Express Briefs. 71(1). 405–409. 1 indexed citations
4.
5.
Nath, Mayukh, et al.. (2023). Improved EM Side-Channel Analysis Attack Probe Detection Range Utilizing Coplanar Capacitive Asymmetry Sensing. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. 42(12). 4583–4596. 3 indexed citations
6.
Das, Debayan, Mayukh Nath, Baibhab Chatterjee, et al.. (2022). EM SCA White-Box Analysis-Based Reduced Leakage Cell Design and Presilicon Evaluation. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. 41(11). 4927–4938. 5 indexed citations
7.
Nath, Mayukh, et al.. (2022). Electromagnetic Analysis of Integrated On-Chip Sensing Loop for Side-Channel and Fault-Injection Attack Detection. IEEE Microwave and Wireless Components Letters. 32(6). 784–787. 10 indexed citations
8.
Das, Debayan, et al.. (2021). Syn-STELLAR: An EM/Power SCA-Resilient AES-256 With Synthesis-Friendly Signature Attenuation. IEEE Journal of Solid-State Circuits. 57(1). 167–181. 23 indexed citations
9.
Danial, Josef, et al.. (2021). EM-X-DL: Efficient Cross-device Deep Learning Side-channel Attack With Noisy EM Signatures. ACM Journal on Emerging Technologies in Computing Systems. 18(1). 1–17. 21 indexed citations
10.
LeMay, Michael, Sergej Deutsch, David Durham, et al.. (2021). Cryptographic Capability Computing. 253–267. 15 indexed citations
11.
Seo, Dong‐Hyun, Mayukh Nath, Debayan Das, Santosh Ghosh, & Shreyas Sen. (2021). Enhanced Detection Range for EM Side-channel Attack Probes utilizing Co-planar Capacitive Asymmetry Sensing. 1016–1019. 7 indexed citations
12.
Das, Debayan, Josef Danial, Shovan Maity, et al.. (2020). EM and Power SCA-Resilient AES-256 Through >350× Current-Domain Signature Attenuation and Local Lower Metal Routing. IEEE Journal of Solid-State Circuits. 56(1). 136–150. 36 indexed citations
13.
Ghosh, Santosh, Ingrid Verbauwhede, & Dipanwita RoyChowdhury. (2013). Core Based Architecture to Speed up Optimal Ate Pairing on FPGA Platform. Lecture notes in computer science. 4 indexed citations
14.
Alam, Monjur, Santosh Ghosh, Dipanwita Roy Chowdhury, & Indranil SenGupta. (2013). First-order DPA Vulnerability of Rijndael: Security and Area-delay Optimization Trade-off. International journal of network security. 15(3). 219–230. 2 indexed citations
15.
Ghosh, Santosh, Jeroen Delvaux, Leif Uhsadel, & Ingrid Verbauwhede. (2012). A Speed Area Optimized Embedded Co-processor for McEliece Cryptosystem. Lirias (KU Leuven). 102–108. 18 indexed citations
16.
Ghosh, Santosh, Debdeep Mukhopadhyay, & Dipanwita Roy Chowdhury. (2011). Fault Attack, Countermeasures on Pairing Based Cryptography.. International journal of network security. 12(1). 21–28. 3 indexed citations
17.
Ghosh, Santosh, Debdeep Mukhopadhyay, & Dipanwita RoyChowdhury. (2010). High Speed Flexible Pairing Cryptoprocessor on FPGA Platform. Lecture notes in computer science. 6487. 450–466.
18.
Bera, Parthasarathi, Pallab Dasgupta, & Santosh Ghosh. (2009). A Verification framework for Analyzing Security Implementations in an Enterprise LAN. 2470. 1008–1015. 6 indexed citations
19.
Alam, Monjur, et al.. (2007). An area optimized reconfigurable encryptor for AES-Rijndael. Design, Automation, and Test in Europe. 1116–1121. 13 indexed citations
20.
Alam, Monjur, et al.. (2007). An Area Optimized Reconfigurable Encryptor for AES-Rijndael. 1–6. 8 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026