关注
Mostafa Taha
Mostafa Taha
Assistant Professor in the Systems and Computer Engineering Dept. of Carleton University
在 sce.carleton.ca 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Differential fault intensity analysis
NF Ghalaty, B Yuce, M Taha, P Schaumont
2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, 49-58, 2014
1602014
Survey on threats and attacks on mobile networks
S Mavoungou, G Kaddoum, M Taha, G Matar
IEEE Access 4, 4543-4572, 2016
1252016
VANET-DSRC protocol for reliable broadcasting of life safety messages
MMI Taha, YMY Hasan
2007 IEEE International Symposium on Signal Processing and Information …, 2007
962007
QMS: Evaluating the side-channel resistance of masked software from source code
H Eldib, C Wang, M Taha, P Schaumont
Proceedings of the 51st Annual Design Automation Conference, 1-6, 2014
582014
Key-Updating for Leakage Resiliency with Application to AES Modes of Operation
M Taha, P Schaumont
Information Forensics and Security, IEEE Transactions on 10 (3), 519-528, 2015
442015
Smashing the implementation records of AES S-box
A Reyhani-Masoleh, M Taha, D Ashmawy
IACR transactions on cryptographic hardware and embedded systems, 298-336, 2018
422018
Side-channel analysis of MAC-Keccak
M Taha, P Schaumont
2013 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2013
392013
Lightweight Side Channel Resistance: Threshold Implementations of Simon
A Shahverdi, M Taha, T Eisenbarth
IEEE Transactions on Computers 66 (4), 661-671, 2017
362017
Quantitative masking strength: Quantifying the power side-channel resistance of software code
H Eldib, C Wang, M Taha, P Schaumont
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2015
352015
Silent Simon: A Threshold Implementation under 100 Slices
A Shahverdi, M Taha, T Eisenbarth
IEEE International Symposium on Hardware-Oriented Security and Trust (HOST …, 2015
322015
Differential power analysis of MAC-Keccak at any key-length
M Taha, P Schaumont
International Workshop on Security, 68-82, 2013
292013
Implementation Attacks on Post-Quantum Cryptographic Schemes
M Taha, T Eisenbarth
IEEE International Conference on Anti-Cybercrime (ICACC-2015), to appear., 2015
202015
Side-channel countermeasure for SHA-3 at almost-zero area overhead
M Taha, P Schaumont
2014 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2014
202014
New area record for the AES combined S-box/inverse S-box
A Reyhani-Masoleh, M Taha, D Ashmawy
2018 IEEE 25th Symposium on Computer Arithmetic (ARITH), 145-152, 2018
182018
SpecTre: A tiny side-channel resistant SPECK core for FPGAs
C Chen, MS Inci, M Taha, T Eisenbarth
Smart Card Research and Advanced Applications: 15th International Conference …, 2017
162017
New low-area designs for the AES forward, inverse and combined S-boxes
A Reyhani-Masoleh, M Taha, D Ashmawy
IEEE Transactions on Computers 69 (12), 1757-1773, 2019
152019
Performance analysis of physical layer security of chaos-based modulation schemes
L Kong, G Kaddoum, M Taha
2015 IEEE 11th international conference on wireless and mobile computing …, 2015
122015
Efficient and side-channel-secure block cipher implementation with custom instructions on FPGA
S Mane, M Taha, P Schaumont
22nd International Conference on Field Programmable Logic and Applications …, 2012
102012
Broadcasting protocols in vehicular ad-hoc networks (vanets)
MMI Taha
Unpublished master's dissertation), Department of Electrical Engineering …, 2008
102008
Stateless leakage resiliency from nlfsrs
M Taha, A Reyhani-Masoleh, P Schaumont
2017 IEEE International Symposium on Hardware Oriented Security and Trust …, 2017
72017
系统目前无法执行此操作,请稍后再试。
文章 1–20