50 results on '"Khairallah, Mustafa"'
Search Results
2. Lightweight Leakage-Resilient PRNG from TBCs Using Superposition
3. Lightweight Leakage-Resilient PRNG from TBCs Using Superposition
4. Hardware Design Space Exploration of a Selection of NIST Lightweight Cryptography Candidates
5. Remus: Lighweight AEAD from Ideal Ciphers
6. Analysis of Lightweight BC-Based AEAD
7. Arguments for Tweakable Block Cipher-Based Cryptography
8. Romulus: Lighweight AEAD from Tweakable Block Ciphers
9. On the Cost of ASIC Hardware Crackers
10. Hardware Performance of the CB3 Algorithm
11. Introduction and Background
12. Hardware Implementation of Masked SKINNY SBox with Application to AEAD
13. CCA Security with Short AEAD Tags
14. DEFAULT: Cipher Level Resistance Against Differential Fault Attack
15. On the Cost of ASIC Hardware Crackers: A SHA-1 Case Study
16. Conclusions
17. Hardware Implementation of Masked SKINNY SBox with Application to AEAD
18. Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers
19. Arguments for Tweakable Block Cipher-Based Cryptography
20. Remus: Lighweight AEAD from Ideal Ciphers
21. Romulus: Lighweight AEAD from Tweakable Block Ciphers
22. Hardware Design Space Exploration of a Selection of NIST Lightweight Cryptography Candidates
23. On the Cost of ASIC Hardware Crackers
24. Hardware Performance of the $$\Theta $$CB3 Algorithm
25. Conclusions
26. Introduction and Background
27. Analysis of Lightweight BC-Based AEAD
28. Differential Fault Attack Resistant Hardware Design Automation
29. On the Cost of ASIC Hardware Crackers: A SHA-1 Case Study
30. On Hardware Implementation of Tang-Maitra Boolean Functions
31. Security is an architectural design constraint
32. Looting the LUTs: FPGA Optimization of AES and AES-like Ciphers for Authenticated Encryption
33. Exploring Integrity of AEADs with Faults: Definitions and Constructions
34. On Hardware Implementation of Tang-Maitra Boolean Functions
35. Security of COFB against Chosen Ciphertext Attacks
36. Duel of the titans : the Romulus and Remus families of lightweight AEAD algorithms
37. A Countermeasure Against Statistical Ineffective Fault Analysis
38. Weak Keys in the Rekeying Paradigm: Application to COMET and mixFeed
39. On Comparison of Countermeasures against Statistical Ineffective Fault Attacks
40. Recruiting Fault Tolerance Techniques for Microprocessor Security
41. SoK
42. On Misuse of Nonce-Misuse Resistance : Adapting Differential Fault Attacks on (few) CAESAR Winners
43. Crack me if you can: hardware acceleration bridging the gap between practical and theoretical cryptanalysis?
44. A Hardware-Efficient Implementation of CLOC for On-chip Authenticated Encryption
45. Protecting block ciphers against differential fault attacks without re-keying
46. DFARPA: Differential fault attack resistant physical design automation
47. Tile-based modular architecture for accelerating homomorphic function evaluation on FPGA
48. Reusable Processor Verification Methodology Based on UVM
49. New polynomial basis versatile multiplier over GF(2m) for low-power on-chip crypto-systems
50. FPGA implementation of high speed XTS-AES for data storage devices.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.