Zobrazeno 1 - 10
of 35
pro vyhledávání: '"Mustafa Khairallah"'
Autor:
Chandranan Dhar, Jordan Ethan, Ravindra Jejurikar, Mustafa Khairallah, Eik List, Sougata Mandal
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2024, Iss 2 (2024)
During recent years, research on authenticated encryption has been thriving through two highly active and practically motivated research directions: provable leakage resilience and key- or context-commitment security. However, the intersection of bot
Externí odkaz:
https://doaj.org/article/8e1541836cb34ba290ba0b2e4a2cd773
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2022, Iss 4 (2022)
Implementation-based attacks are major concerns for modern cryptography. For symmetric-key cryptography, a significant amount of exploration has taken place in this regard for primitives such as block ciphers. Concerning symmetric-key operating modes
Externí odkaz:
https://doaj.org/article/8b95226507fe4eb98f3fdfb8437758d7
Autor:
Mustafa Khairallah
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2022, Iss 1 (2022)
COFB is a lightweight Authenticated Encryption with Associated Data (AEAD) mode based on block ciphers. It was proposed in CHES 2017 and is the basis for GIFT-COFB, a finalist in the NIST lightweight standardization project. It comes with provable se
Externí odkaz:
https://doaj.org/article/789f5c3cdecc490fab7c67b43e45e465
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2020, Iss 1 (2020)
In this article, we propose two new families of very lightweight and efficient authenticated encryption with associated data (AEAD) modes, Romulus and Remus, that provide security beyond the birthday bound with respect to the block-length n. The form
Externí odkaz:
https://doaj.org/article/cba48237bc37410b9ac3901ae8a125fd
Autor:
Mustafa Khairallah
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2019, Iss 4 (2020)
In this paper, we study a group of AEAD schemes that use rekeying as a technique to increase efficiency by reducing the state size of the algorithm. We provide a unified model to study the behavior of the keys used in these schemes, called Rekey-and-
Externí odkaz:
https://doaj.org/article/cb4fd406ef97445bab25cb71aab7b21e
Publikováno v:
IEEE Transactions on Circuits and Systems II: Express Briefs. 67:3322-3326
Current state-of-the-art countermeasures against Fault Injection Attacks (FIA) provide good protection against analysis methods that require the differences in the correct and faulty ciphertext to derive the secret information, such as Differential F
Autor:
Mustafa Khairallah, Shivam Bhasin
Publikováno v:
Security, Privacy, and Applied Cryptography Engineering ISBN: 9783031228285
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::0bd7cd49a4c298eb1e415c3ab3644848
https://doi.org/10.1007/978-3-031-22829-2_3
https://doi.org/10.1007/978-3-031-22829-2_3
Autor:
Mustafa Khairallah
Publikováno v:
Computer Architecture and Design Methodologies ISBN: 9789811663437
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::73f83a7f51555fe6530b07bc336a893d
https://doi.org/10.1007/978-981-16-6344-4
https://doi.org/10.1007/978-981-16-6344-4
Autor:
Mustafa Khairallah
Publikováno v:
Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers ISBN: 9789811663437
Remus can be seen as a more aggressive brother of Romulus. It is a family of authenticated encryption with associated data (AEAD) schemes based on a tweakable block cipher (TBC) Skinny. Remus consists of two families, a nonce-based AE (NAE) Remus-N a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d6a007f154c920c9866358a09159bc17
https://doi.org/10.1007/978-981-16-6344-4_7
https://doi.org/10.1007/978-981-16-6344-4_7
Autor:
Mustafa Khairallah
Publikováno v:
Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers ISBN: 9789811663437
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::011b50bda5c2b154b8f719278c431ff4
https://doi.org/10.1007/978-981-16-6344-4_8
https://doi.org/10.1007/978-981-16-6344-4_8