Прати
Mustafa Khairallah
Mustafa Khairallah
Lund University
Верификована је имејл адреса на e.ntu.edu.sg
Наслов
Навело
Навело
Година
Romulus v1. 3
C Guo, T Iwata, M Khairallah, K Minematsu, T Peyrin
Submission to the NIST Lightweight Cryptography Project, 2021
93*2021
Duel of the titans: the romulus and remus families of lightweight AEAD algorithms
T Iwata, M Khairallah, K Minematsu, T Peyrin
IACR Transactions on Symmetric Cryptology, 43-120, 2020
762020
A countermeasure against statistical ineffective fault analysis
J Breier, M Khairallah, X Hou, Y Liu
IEEE Transactions on Circuits and Systems II: Express Briefs 67 (12), 3322-3326, 2020
472020
DEFAULT: Cipher level resistance against differential fault attack
A Baksi, S Bhasin, J Breier, M Khairallah, T Peyrin, S Sarkar, SM Sim
Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021
342021
A comprehensive performance analysis of hardware implementations of CAESAR candidates
S Kumar, J Haj-Yahya, M Khairallah, MA Elmohr, A Chattopadhyay
Cryptology ePrint Archive, 2017
332017
Protecting block ciphers against differential fault attacks without re-keying
A Baksi, S Bhasin, J Breier, M Khairallah, T Peyrin
2018 IEEE International Symposium on Hardware Oriented Security and Trust …, 2018
27*2018
DFARPA: Differential fault attack resistant physical design automation
M Khairallah, R Sadhukhan, R Samanta, J Breier, S Bhasin, ...
2018 Design, Automation & Test in Europe Conference & Exhibition (DATE …, 2018
25*2018
Looting the LUTs: FPGA optimization of AES and AES-like ciphers for authenticated encryption
M Khairallah, A Chattopadhyay, T Peyrin
Progress in Cryptology–INDOCRYPT 2017: 18th International Conference on …, 2017
242017
Preliminary hardware benchmarking of a group of round 2 nist lightweight aead candidates
M Khairallah, T Peyrin, A Chattopadhyay
Cryptology ePrint Archive, 2020
222020
Weak keys in the rekeying paradigm: application to COMET and mixFeed
M Khairallah
IACR Transactions on Symmetric Cryptology, 272-289, 2019
222019
Remus v1. 0
T Iwata, M Khairallah, K Minematsu, T Peyrin
Submission to NIST Lightweight Cryptography, 2019
21*2019
Thank goodness it’s friday (TGIF)
T Iwata, M Khairallah, K Minematsu, T Peyrin, Y Sasaki, SM Sim, L Sun
Submission to Round 1, 157, 2019
19*2019
New results on romulus
T Iwata, M Khairallah, K Minematsu, T Peyrin
NIST Lightweight Cryptography Workshop 2020, 2020
12*2020
Security is an architectural design constraint
P Ravi, Z Najm, S Bhasin, M Khairallah, SS Gupta, A Chattopadhyay
Microprocessors and microsystems 68, 17-27, 2019
122019
Security of COFB against chosen ciphertext attacks
M Khairallah
IACR Transactions on Symmetric Cryptology, 138-157, 2022
112022
SoK: On DFA Vulnerabilities of Substitution-Permutation Networks
M Khairallah, X Hou, Z Najm, J Breier, S Bhasin, T Peyrin
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
112019
Tight security of TNT and beyond: Attacks, proofs and possibilities for the cascaded LRW paradigm
A Jha, M Khairallah, M Nandi, A Saha
Annual International Conference on the Theory and Applications of …, 2024
92024
Observations on the Tightness of the Security Bounds of GIFT-COFB and HyENA
M Khairallah
Cryptology ePrint Archive, 2020
82020
On misuse of nonce-misuse resistance: Adapting differential fault attacks on (few) CAESAR winners
M Khairallah, S Bhasin, A Chattopadhyay
2019 IEEE 8th International Workshop on Advances in Sensors and Interfaces …, 2019
82019
Forgery attack on SNEIKEN
M Khairallah
Cryptology ePrint Archive, 2019
82019
Систем тренутно не може да изврши ову радњу. Пробајте поново касније.
Чланци 1–20