Folgen
Mustafa Khairallah
Mustafa Khairallah
Seagate Research
Bestätigte E-Mail-Adresse bei e.ntu.edu.sg
Titel
Zitiert von
Zitiert von
Jahr
Romulus v1. 3
C Guo, T Iwata, M Khairallah, K Minematsu, T Peyrin
Submission to NIST Lightweight Cryptography, 2021
78*2021
Duel of the titans: the romulus and remus families of lightweight AEAD algorithms
T Iwata, M Khairallah, K Minematsu, T Peyrin
IACR Transactions on Symmetric Cryptology, 43-120, 2020
622020
A countermeasure against statistical ineffective fault analysis
J Breier, M Khairallah, X Hou, Y Liu
IEEE Transactions on Circuits and Systems II: Express Briefs 67 (12), 3322-3326, 2020
362020
A comprehensive performance analysis of hardware implementations of CAESAR candidates
S Kumar, J Haj-Yahya, M Khairallah, MA Elmohr, A Chattopadhyay
Cryptology ePrint Archive, 2017
322017
Protecting block ciphers against differential fault attacks without re-keying
A Baksi, S Bhasin, J Breier, M Khairallah, T Peyrin
2018 IEEE International Symposium on Hardware Oriented Security and Trust …, 2018
24*2018
DEFAULT: Cipher level resistance against differential fault attack
A Baksi, S Bhasin, J Breier, M Khairallah, T Peyrin, S Sarkar, SM Sim
Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021
232021
Looting the LUTs: FPGA optimization of AES and AES-like ciphers for authenticated encryption
M Khairallah, A Chattopadhyay, T Peyrin
Progress in Cryptology–INDOCRYPT 2017: 18th International Conference on …, 2017
232017
Preliminary hardware benchmarking of a group of round 2 nist lightweight aead candidates
M Khairallah, T Peyrin, A Chattopadhyay
Cryptology ePrint Archive, 2020
212020
Remus v1. 0
T Iwata, M Khairallah, K Minematsu, T Peyrin
Submission to NIST Lightweight Cryptography, 2019
20*2019
DFARPA: Differential fault attack resistant physical design automation
M Khairallah, R Sadhukhan, R Samanta, J Breier, S Bhasin, ...
2018 Design, Automation & Test in Europe Conference & Exhibition (DATE …, 2018
202018
Weak keys in the rekeying paradigm: application to COMET and mixfeed
M Khairallah
Cryptology ePrint Archive, 2019
192019
Thank goodness it’s friday (TGIF)
T Iwata, M Khairallah, K Minematsu, T Peyrin, Y Sasaki, SM Sim, L Sun
Submission to Round 1, 157, 2019
19*2019
Security of COFB against chosen ciphertext attacks
M Khairallah
IACR Transactions on Symmetric Cryptology, 138-157, 2022
102022
New results on romulus
T Iwata, M Khairallah, K Minematsu, T Peyrin
NIST Lightweight Cryptography Workshop 3, 2020
10*2020
Security is an architectural design constraint
P Ravi, Z Najm, S Bhasin, M Khairallah, SS Gupta, A Chattopadhyay
Microprocessors and microsystems 68, 17-27, 2019
102019
Forgery attack on SNEIKEN
M Khairallah
Cryptology ePrint Archive, 2019
82019
Hardware implementations of romulus: Exploring nonce misuse resistance and boolean masking
M Khairallah, S Bhasin
NIST Lightweight Cryptography Workshop, 2022
62022
AET-LR: rate-1 leakage-resilient AEAD based on the Romulus family
C Guo, M Khairallah, T Peyrin
NIST LWC Workshop, 2020
6*2020
SoK: On DFA Vulnerabilities of Substitution-Permutation Networks
M Khairallah, X Hou, Z Najm, J Breier, S Bhasin, T Peyrin
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
62019
On misuse of nonce-misuse resistance: Adapting differential fault attacks on (few) CAESAR winners
M Khairallah, S Bhasin, A Chattopadhyay
2019 IEEE 8th International Workshop on Advances in Sensors and Interfaces …, 2019
62019
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20