Mustafa Khairallah
Citeras av
Citeras av
A Comprehensive Performance Analysis of Hardware Implementations of CAESAR Candidates
S Kumar, J Haj-Yahya, M Khairallah, MA Elmohr, A Chattopadhyay, 2017
A countermeasure against statistical ineffective fault analysis
J Breier, M Khairallah, X Hou, Y Liu
IEEE Transactions on Circuits and Systems II: Express Briefs 67 (12), 3322-3326, 2020
Protecting block ciphers against differential fault attacks without re-keying
A Baksi, S Bhasin, J Breier, M Khairallah, T Peyrin
2018 IEEE International Symposium on Hardware Oriented Security and Trust …, 2018
Romulus v1
T Iwata, M Khairallah, K Minematsu, T Peyrin
Submission to NIST Lightweight Cryptography Project, 2019
Looting the LUTs: FPGA optimization of AES and AES-like ciphers for authenticated encryption
M Khairallah, A Chattopadhyay, T Peyrin
International Conference on Cryptology in India, 282-301, 2017
Remus v1
T Iwata, M Khairallah, K Minematsu, T Peyrin
Submission to NIST Lightweight Cryptography Project, 2019
Duel of the titans: The Romulus and Remus families of lightweight AEAD algorithms
T Iwata, M Khairallah, K Minematsu, T Peyrin
IACR Transactions on Symmetric Cryptology, 43-120, 2020
Thank Goodness It’s Friday (TGIF) v1. 0
T Iwata, M Khairallah, K Minematsu, T Peyrin, Y Sasaki, SM Sim, L Sun
Submission to NIST LwC Standardization Process (Round 1), 2019
DFARPA: Differential fault attack resistant physical design automation
M Khairallah, R Sadhukhan, R Samanta, J Breier, S Bhasin, ...
2018 Design, Automation & Test in Europe Conference & Exhibition (DATE …, 2018
Forgery Attack on SNEIKEN.
M Khairallah
IACR Cryptology ePrint Archive 2019, 408, 2019
SoK: On DFA Vulnerabilities of Substitution-Permutation Networks
M Khairallah, X Hou, Z Najm, J Breier, S Bhasin, T Peyrin
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
Security is an architectural design constraint
P Ravi, Z Najm, S Bhasin, M Khairallah, SS Gupta, A Chattopadhyay
Microprocessors and Microsystems 68, 17-27, 2019
Weak Keys in the Rekeying Paradigm: Application to COMET and mixFeed
M Khairallah
IACR Transactions on Symmetric Cryptology, 272-289, 2019
On Misuse of Nonce-Misuse Resistance: Adapting Differential Fault Attacks on (few) CAESAR Winners
M Khairallah, S Bhasin, A Chattopadhyay
2019 IEEE 8th International Workshop on Advances in Sensors and Interfaces …, 2019
Forgery Attack on mixFeed in the Nonce-Misuse Scenario.
M Khairallah
IACR Cryptology ePrint Archive 2019, 457, 2019
Differential Fault Attack Resistant Hardware Design Automation
M Khairallah, J Breier, S Bhasin, A Chattopadhyay
Automated Methods in Cryptographic Fault Analysis, 209-219, 2019
On Hardware Implementation of Tang-Maitra Boolean Functions
M Khairallah, A Chattopadhyay, B Mandal, S Maitra
International Workshop on the Arithmetic of Finite Fields, 111-127, 2018
On Comparison of Countermeasures against Statistical Ineffective Fault Attacks
M Khairallah, S Bhasin, KM Abdellatif
2019 31st International Conference on Microelectronics (ICM), 122-125, 2019
Tile-Based Modular Architecture for Accelerating Homomorphic Function Evaluation on FPGA
M Khairallah, M Ghoneima
2016 IEEE 59th Midwest Symposium on Circuits and Systems, 16-19 October 2016 …, 2016
FPGA implementation of high speed XTS-AES for data storage devices
M Elmoghany, M Diab, M Kassem, M Khairallah, O El Shahat, W Sharkasy
2011 International Conference for Internet Technology and Secured …, 2011
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20