关注
Mostafizar Rahman
Mostafizar Rahman
University of Hyogo, Japan
在 isical.ac.in 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Grover on katan: Quantum resource estimation
M Rahman, G Paul
IEEE Transactions on Quantum Engineering 3, 1-9, 2022
192022
Boomeyong: Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES and Pholkos
M Rahman, D Saha, G Paul
IACR Transactions on Symmetric Cryptology, 137-169, 2021
182021
Quantum Attacks on HCTR and its Variants
M Rahman, G Paul
IEEE Transactions on Quantum Engineering 1, 1-8, 2020
15*2020
Cryptanalysis of forkaes
S Banik, J Bossert, A Jana, E List, S Lucks, W Meier, M Rahman, D Saha, ...
Applied Cryptography and Network Security: 17th International Conference …, 2019
142019
New Yoyo Tricks with AES-based Permutations
D Saha, M Rahman, G Paul
IACR Transactions on Symmetric Cryptology, 102-127, 2018
92018
Grover on Present: Quantum Resource Estimation
M Rahman, G Paul
Cryptology ePrint Archive, 2021
32021
Key Committing Attacks against AES-based AEAD Schemes
P Derbez, PA Fouque, T Isobe, M Rahman, A Schrottenloher
IACR Transactions on Symmetric Cryptology 2024 (1), 135-157, 2024
22024
DEEPAND: In-Depth Modeling of Correlated AND Gates for NLFSR-based Lightweight Block Ciphers
A Jana, M Rahman, D Saha
Cryptology ePrint Archive, 2022
22022
Iterated Truncated Differential for Internal Keyed Permutation of FlexAEAD.
M Rahman, D Saha, G Paul
IACR Cryptol. ePrint Arch. 2019, 539, 2019
22019
Revisiting the Boomerang Attack from a Perspective of 3-differential
L Wang, L Song, B Wu, M Rahman, T Isobe
IEEE Transactions on Information Theory, 2023
12023
Ghidle: Efficient Large-State Block Ciphers for Post-quantum Security
M Nakahashi, R Shiba, R Anand, M Rahman, K Sakamoto, F Liu, T Isobe
Australasian Conference on Information Security and Privacy, 403-430, 2023
12023
Divide and Rule: DiFA-Division Property Based Fault Attacks on PRESENT and GIFT
AK Kundu, S Ghosh, D Saha, M Rahman
International Conference on Applied Cryptography and Network Security, 89-116, 2023
12023
Key Committing Security Analysis of AEGIS
T Isobe, M Rahman
Cryptology ePrint Archive, 2023
12023
Cryptanalysis of FlexAEAD
M Rahman, D Saha, G Paul
Progress in Cryptology-AFRICACRYPT 2020: 12th International Conference on …, 2020
12020
Gleeok: A Family of Low-Latency PRFs and its Applications to Authenticated Encryption
R Anand, S Banik, A Caforio, T Ishikawa, T Isobe, F Liu, K Minematsu, ...
IACR Transactions on Cryptographic Hardware and Embedded Systems 2024 (2 …, 2024
2024
Revisiting Yoyo Tricks on AES
SK Mondal, M Rahman, S Sarkar, A Adhikari
IACR Transactions on Symmetric Cryptology 2023 (4), 28-57, 2023
2023
Yoyo cryptanalysis on Future
SK Mondal, M Rahman, S Sarkar, A Adhikari
Int. J. Applied Cryptography 4 (3/4), 2023
2023
Switching the Top Slice of the Sandwich with Extra Filling Yields a Stronger Boomerang for NLFSR-based Block Ciphers
A Jana, M Rahman, D Saha, G Paul
Cryptology ePrint Archive, 2023
2023
Cryptanalysis of Symmetric Key Schemes using Classical and Quantum Techniques
M Rahman
Indian Statistical Institute, Kolkata, 2022
2022
系统目前无法执行此操作,请稍后再试。
文章 1–19