default search action
Mustafa Khairallah
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Mustafa Khairallah:
CCA Security with Short AEAD Tags. IACR Commun. Cryptol. 1(1): 11 (2024) - [j7]Chandranan Dhar, Jordan Ethan, Ravindra Jejurikar, Mustafa Khairallah, Eik List, Sougata Mandal:
Context-Committing Security of Leveled Leakage-Resilient AEAD. IACR Trans. Symmetric Cryptol. 2024(2): 348-370 (2024) - [c18]Mustafa Khairallah, Srinivasan Yadhunathan, Shivam Bhasin:
Lightweight Leakage-Resilient PRNG from TBCs Using Superposition. COSADE 2024: 197-217 - [c17]Ashwin Jha, Mustafa Khairallah, Mridul Nandi, Abishanka Saha:
Tight Security of TNT and Beyond - Attacks, Proofs and Possibilities for the Cascaded LRW Paradigm. EUROCRYPT (1) 2024: 249-279 - [i24]Mustafa Khairallah:
CCA Security with Short AEAD Tags. IACR Cryptol. ePrint Arch. 2024: 23 (2024) - [i23]Mustafa Khairallah, Srinivasan Yadhunathan, Shivam Bhasin:
Lightweight Leakage-Resilient PRNG from TBCs using Superposition. IACR Cryptol. ePrint Arch. 2024: 218 (2024) - [i22]Mustafa Khairallah:
Fast Parallelizable Misuse-Resistant Authenticated Encryption: Low Latency (Decryption-Fast) SIV. IACR Cryptol. ePrint Arch. 2024: 550 (2024) - [i21]Mustafa Khairallah:
A note on -Tweakable HCTR: A BBB Secure Tweakable Enciphering Scheme-. IACR Cryptol. ePrint Arch. 2024: 600 (2024) - 2023
- [i20]Mustafa Khairallah:
CLRW13 is not Secure Beyond the Birthday Bound: Breaking TNT with O(2n/2) queries. IACR Cryptol. ePrint Arch. 2023: 1212 (2023) - [i19]Ashwin Jha, Mustafa Khairallah, Mridul Nandi, Abishanka Saha:
Tight Security of TNT and Beyond: Attacks, Proofs and Possibilities for the Cascaded LRW Paradigm. IACR Cryptol. ePrint Arch. 2023: 1272 (2023) - 2022
- [j6]Mustafa Khairallah:
Security of COFB against Chosen Ciphertext Attacks. IACR Trans. Symmetric Cryptol. 2022(1): 138-157 (2022) - [j5]Sayandeep Saha, Mustafa Khairallah, Thomas Peyrin:
Exploring Integrity of AEADs with Faults: Definitions and Constructions. IACR Trans. Symmetric Cryptol. 2022(4): 291-324 (2022) - [c16]Mustafa Khairallah, Shivam Bhasin:
Hardware Implementation of Masked SKINNY SBox with Application to AEAD. SPACE 2022: 50-69 - [i18]Sayandeep Saha, Mustafa Khairallah, Thomas Peyrin:
Exploring Integrity of AEADs with Faults: Definitions and Constructions. IACR Cryptol. ePrint Arch. 2022: 1055 (2022) - 2021
- [c15]Anubhab Baksi, Shivam Bhasin, Jakub Breier, Mustafa Khairallah, Thomas Peyrin, Sumanta Sarkar, Siang Meng Sim:
DEFAULT: Cipher Level Resistance Against Differential Fault Attack. ASIACRYPT (2) 2021: 124-156 - [c14]Anupam Chattopadhyay, Mustafa Khairallah, Gaëtan Leurent, Zakaria Najm, Thomas Peyrin, Vesselin Velichkov:
On the Cost of ASIC Hardware Crackers: A SHA-1 Case Study. CT-RSA 2021: 657-681 - [i17]Mustafa Khairallah:
Security of COFB against Chosen Ciphertext Attacks. IACR Cryptol. ePrint Arch. 2021: 648 (2021) - [i16]Anubhab Baksi, Shivam Bhasin, Jakub Breier, Mustafa Khairallah, Thomas Peyrin, Sumanta Sarkar, Siang Meng Sim:
DEFAULT: Cipher Level Resistance Against Differential Fault Attack. IACR Cryptol. ePrint Arch. 2021: 712 (2021) - 2020
- [j4]Jakub Breier, Mustafa Khairallah, Xiaolu Hou, Yang Liu:
A Countermeasure Against Statistical Ineffective Fault Analysis. IEEE Trans. Circuits Syst. 67-II(12): 3322-3326 (2020) - [j3]Tetsu Iwata, Mustafa Khairallah, Kazuhiko Minematsu, Thomas Peyrin:
Duel of the Titans: The Romulus and Remus Families of Lightweight AEAD Algorithms. IACR Trans. Symmetric Cryptol. 2020(1): 43-120 (2020) - [i15]Mustafa Khairallah, Thomas Peyrin, Anupam Chattopadhyay:
Preliminary Hardware Benchmarking of a Group of Round 2 NIST Lightweight AEAD Candidates. IACR Cryptol. ePrint Arch. 2020: 1459 (2020) - [i14]Mustafa Khairallah:
Observations on the Tightness of the Security Bounds of GIFT-COFB and HyENA. IACR Cryptol. ePrint Arch. 2020: 1463 (2020)
2010 – 2019
- 2019
- [j2]Prasanna Ravi, Zakaria Najm, Shivam Bhasin, Mustafa Khairallah, Sourav Sen Gupta, Anupam Chattopadhyay:
Security is an architectural design constraint. Microprocess. Microsystems 68: 17-27 (2019) - [j1]Mustafa Khairallah:
Weak Keys in the Rekeying Paradigm: Application to COMET and mixFeed. IACR Trans. Symmetric Cryptol. 2019(4): 272-289 (2019) - [c13]Vinay B. Y. Kumar, Suman Deb, Rupesh Kumar, Mustafa Khairallah, Anupam Chattopadhyay, Avi Mendelson:
Recruiting Fault Tolerance Techniques for Microprocessor Security. ATS 2019: 80-85 - [c12]Mustafa Khairallah, Xiaolu Hou, Zakaria Najm, Jakub Breier, Shivam Bhasin, Thomas Peyrin:
SoK: On DFA Vulnerabilities of Substitution-Permutation Networks. AsiaCCS 2019: 403-414 - [c11]Mustafa Khairallah, Shivam Bhasin, Karim M. Abdellatif:
On Comparison of Countermeasures against Statistical Ineffective Fault Attacks. ICM 2019: 122-125 - [c10]Mustafa Khairallah, Shivam Bhasin, Anupam Chattopadhyay:
On Misuse of Nonce-Misuse Resistance : Adapting Differential Fault Attacks on (few) CAESAR Winners. IWASI 2019: 189-193 - [i13]Prasanna Ravi, Sourav Sen Gupta, Anupam Chattopadhyay, Mustafa Khairallah, Zakaria Najm, Shivam Bhasin:
Security is an Architectural Design Constraint. IACR Cryptol. ePrint Arch. 2019: 182 (2019) - [i12]Mustafa Khairallah, Xiaolu Hou, Zakaria Najm, Jakub Breier, Shivam Bhasin, Thomas Peyrin:
SoK : On DFA Vulnerabilities of Substitution-Permutation Networks. IACR Cryptol. ePrint Arch. 2019: 387 (2019) - [i11]Mustafa Khairallah:
Forgery Attack on SNEIKEN. IACR Cryptol. ePrint Arch. 2019: 408 (2019) - [i10]Mustafa Khairallah:
Forgery Attack on mixFeed in the Nonce-Misuse Scenario. IACR Cryptol. ePrint Arch. 2019: 457 (2019) - [i9]Jakub Breier, Mustafa Khairallah, Xiaolu Hou, Yang Liu:
A Countermeasure Against Statistical Ineffective Fault Analysis. IACR Cryptol. ePrint Arch. 2019: 515 (2019) - [i8]Mustafa Khairallah, Shivam Bhasin, Anupam Chattopadhyay:
On Misuse of Nonce-Misuse Resistance: Adapting Differential Fault Attacks on (few) CAESAR Winners. IACR Cryptol. ePrint Arch. 2019: 585 (2019) - [i7]Mustafa Khairallah:
Weak Keys in the Rekeying Paradigm: Attacks on COMET-128 and mixFeed. IACR Cryptol. ePrint Arch. 2019: 888 (2019) - [i6]Tetsu Iwata, Mustafa Khairallah, Kazuhiko Minematsu, Thomas Peyrin:
Duel of the Titans: The Romulus and Remus Families of Lightweight AEAD Algorithms. IACR Cryptol. ePrint Arch. 2019: 992 (2019) - 2018
- [c9]Mustafa Khairallah, Rajat Sadhukhan, Radhamanjari Samanta, Jakub Breier, Shivam Bhasin, Rajat Subhra Chakraborty, Anupam Chattopadhyay, Debdeep Mukhopadhyay:
DFARPA: Differential fault attack resistant physical design automation. DATE 2018: 1171-1174 - [c8]Anubhab Baksi, Shivam Bhasin, Jakub Breier, Mustafa Khairallah, Thomas Peyrin:
Protecting block ciphers against differential fault attacks without re-keying. HOST 2018: 191-194 - [c7]Mahmoud A. Elmohr, Sachin Kumar, Mustafa Khairallah, Anupam Chattopadhyay:
A Hardware-Efficient Implementation of CLOC for On-chip Authenticated Encryption. ISVLSI 2018: 311-315 - [c6]Mustafa Khairallah, Zakaria Najm, Anupam Chattopadhyay, Thomas Peyrin:
Crack me if you can: hardware acceleration bridging the gap between practical and theoretical cryptanalysis?: a Survey. SAMOS 2018: 167-172 - [c5]Mustafa Khairallah, Anupam Chattopadhyay, Bimal Mandal, Subhamoy Maitra:
On Hardware Implementation of Tang-Maitra Boolean Functions. WAIFI 2018: 111-127 - [i5]Anubhab Baksi, Shivam Bhasin, Jakub Breier, Mustafa Khairallah, Thomas Peyrin:
Protecting Block Ciphers against Differential Fault Attacks without Re-keying (Extended Version). IACR Cryptol. ePrint Arch. 2018: 85 (2018) - [i4]Mustafa Khairallah, Anupam Chattopadhyay, Bimal Mandal, Subhamoy Maitra:
On Hardware Implementation of Tang-Maitra Boolean Functions. IACR Cryptol. ePrint Arch. 2018: 667 (2018) - 2017
- [c4]Mustafa Khairallah, Anupam Chattopadhyay, Thomas Peyrin:
Looting the LUTs: FPGA Optimization of AES and AES-like Ciphers for Authenticated Encryption. INDOCRYPT 2017: 282-301 - [i3]Mustafa Khairallah, Anupam Chattopadhyay, Thomas Peyrin:
Looting the LUTs : FPGA Optimization of AES and AES-like Ciphers for Authenticated Encryption. IACR Cryptol. ePrint Arch. 2017: 1019 (2017) - [i2]Sachin Kumar, Jawad Haj-Yihia, Mustafa Khairallah, Anupam Chattopadhyay:
A Comprehensive Performance Analysis of Hardware Implementations of CAESAR Candidates. IACR Cryptol. ePrint Arch. 2017: 1261 (2017) - 2016
- [c3]Mustafa Khairallah, Maged Ghoneima:
Tile-based modular architecture for accelerating homomorphic function evaluation on FPGA. MWSCAS 2016: 1-4 - [i1]Mustafa Khairallah, Maged Ghoneima:
Tile-Based Modular Architecture for Accelerating Homomorphic Function Evaluation on FPGA. IACR Cryptol. ePrint Arch. 2016: 725 (2016) - 2015
- [c2]Mustafa Khairallah, Maged Ghoneima:
New polynomial basis versatile multiplier over GF(2m) for low-power on-chip crypto-systems. ISCAS 2015: 1438-1441 - 2011
- [c1]Mohamed Elmoghany, Mohamed Diab, Moustafa Kassem, Mustafa Khairallah, Omar El Shahat, Wael Sharkasy:
FPGA implementation of high speed XTS-AES for data storage devices. ICITST 2011: 25-28
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint