Differential fault intensity analysis NF Ghalaty, B Yuce, M Taha, P Schaumont 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, 49-58, 2014 | 160 | 2014 |
Survey on threats and attacks on mobile networks S Mavoungou, G Kaddoum, M Taha, G Matar IEEE Access 4, 4543-4572, 2016 | 125 | 2016 |
VANET-DSRC protocol for reliable broadcasting of life safety messages MMI Taha, YMY Hasan 2007 IEEE International Symposium on Signal Processing and Information …, 2007 | 96 | 2007 |
QMS: Evaluating the side-channel resistance of masked software from source code H Eldib, C Wang, M Taha, P Schaumont Proceedings of the 51st Annual Design Automation Conference, 1-6, 2014 | 58 | 2014 |
Key-Updating for Leakage Resiliency with Application to AES Modes of Operation M Taha, P Schaumont Information Forensics and Security, IEEE Transactions on 10 (3), 519-528, 2015 | 44 | 2015 |
Smashing the implementation records of AES S-box A Reyhani-Masoleh, M Taha, D Ashmawy IACR transactions on cryptographic hardware and embedded systems, 298-336, 2018 | 42 | 2018 |
Side-channel analysis of MAC-Keccak M Taha, P Schaumont 2013 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2013 | 39 | 2013 |
Lightweight Side Channel Resistance: Threshold Implementations of Simon A Shahverdi, M Taha, T Eisenbarth IEEE Transactions on Computers 66 (4), 661-671, 2017 | 36 | 2017 |
Quantitative masking strength: Quantifying the power side-channel resistance of software code H Eldib, C Wang, M Taha, P Schaumont IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2015 | 35 | 2015 |
Silent Simon: A Threshold Implementation under 100 Slices A Shahverdi, M Taha, T Eisenbarth IEEE International Symposium on Hardware-Oriented Security and Trust (HOST …, 2015 | 32 | 2015 |
Differential power analysis of MAC-Keccak at any key-length M Taha, P Schaumont International Workshop on Security, 68-82, 2013 | 29 | 2013 |
Implementation Attacks on Post-Quantum Cryptographic Schemes M Taha, T Eisenbarth IEEE International Conference on Anti-Cybercrime (ICACC-2015), to appear., 2015 | 20 | 2015 |
Side-channel countermeasure for SHA-3 at almost-zero area overhead M Taha, P Schaumont 2014 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2014 | 20 | 2014 |
New area record for the AES combined S-box/inverse S-box A Reyhani-Masoleh, M Taha, D Ashmawy 2018 IEEE 25th Symposium on Computer Arithmetic (ARITH), 145-152, 2018 | 18 | 2018 |
SpecTre: A tiny side-channel resistant SPECK core for FPGAs C Chen, MS Inci, M Taha, T Eisenbarth Smart Card Research and Advanced Applications: 15th International Conference …, 2017 | 16 | 2017 |
New low-area designs for the AES forward, inverse and combined S-boxes A Reyhani-Masoleh, M Taha, D Ashmawy IEEE Transactions on Computers 69 (12), 1757-1773, 2019 | 15 | 2019 |
Performance analysis of physical layer security of chaos-based modulation schemes L Kong, G Kaddoum, M Taha 2015 IEEE 11th international conference on wireless and mobile computing …, 2015 | 12 | 2015 |
Efficient and side-channel-secure block cipher implementation with custom instructions on FPGA S Mane, M Taha, P Schaumont 22nd International Conference on Field Programmable Logic and Applications …, 2012 | 10 | 2012 |
Broadcasting protocols in vehicular ad-hoc networks (vanets) MMI Taha Unpublished master's dissertation), Department of Electrical Engineering …, 2008 | 10 | 2008 |
Stateless leakage resiliency from nlfsrs M Taha, A Reyhani-Masoleh, P Schaumont 2017 IEEE International Symposium on Hardware Oriented Security and Trust …, 2017 | 7 | 2017 |