Mustafa Khairallah

Orcid: 0000-0002-2144-4829

According to our database1, Mustafa Khairallah authored at least 35 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Lightweight Leakage-Resilient PRNG from TBCs using Superposition.
IACR Cryptol. ePrint Arch., 2024

A note on -Tweakable HCTR: A BBB Secure Tweakable Enciphering Scheme-.
IACR Cryptol. ePrint Arch., 2024

Fast Parallelizable Misuse-Resistant Authenticated Encryption: Low Latency (Decryption-Fast) SIV.
IACR Cryptol. ePrint Arch., 2024

CCA Security with Short AEAD Tags.
IACR Cryptol. ePrint Arch., 2024

2023
CLRW1<sup>3</sup> is not Secure Beyond the Birthday Bound: Breaking TNT with O(2<sup>n/2</sup>) queries.
IACR Cryptol. ePrint Arch., 2023

Tight Security of TNT and Beyond: Attacks, Proofs and Possibilities for the Cascaded LRW Paradigm.
IACR Cryptol. ePrint Arch., 2023

2022
Exploring Integrity of AEADs with Faults: Definitions and Constructions.
IACR Cryptol. ePrint Arch., 2022

Hardware Implementation of Masked SKINNY SBox with Application to AEAD.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2022

2021
Security of COFB against Chosen Ciphertext Attacks.
IACR Cryptol. ePrint Arch., 2021

DEFAULT: Cipher Level Resistance Against Differential Fault Attack.
IACR Cryptol. ePrint Arch., 2021

On the Cost of ASIC Hardware Crackers: A SHA-1 Case Study.
Proceedings of the Topics in Cryptology - CT-RSA 2021, 2021

2020
Preliminary Hardware Benchmarking of a Group of Round 2 NIST Lightweight AEAD Candidates.
IACR Cryptol. ePrint Arch., 2020

Observations on the Tightness of the Security Bounds of GIFT-COFB and HyENA.
IACR Cryptol. ePrint Arch., 2020

2019
Weak Keys in the Rekeying Paradigm: Application to COMET and mixFeed.
IACR Trans. Symmetric Cryptol., 2019

Security is an architectural design constraint.
Microprocess. Microsystems, 2019

SoK : On DFA Vulnerabilities of Substitution-Permutation Networks.
IACR Cryptol. ePrint Arch., 2019

On Misuse of Nonce-Misuse Resistance: Adapting Differential Fault Attacks on (few) CAESAR Winners.
IACR Cryptol. ePrint Arch., 2019

Weak Keys in the Rekeying Paradigm: Attacks on COMET-128 and mixFeed.
IACR Cryptol. ePrint Arch., 2019

Forgery Attack on mixFeed in the Nonce-Misuse Scenario.
IACR Cryptol. ePrint Arch., 2019

Forgery Attack on SNEIKEN.
IACR Cryptol. ePrint Arch., 2019

Duel of the Titans: The Romulus and Remus Families of Lightweight AEAD Algorithms.
IACR Cryptol. ePrint Arch., 2019

A Countermeasure Against Statistical Ineffective Fault Analysis.
IACR Cryptol. ePrint Arch., 2019

On Comparison of Countermeasures against Statistical Ineffective Fault Attacks.
Proceedings of the 31st International Conference on Microelectronics, 2019

Recruiting Fault Tolerance Techniques for Microprocessor Security.
Proceedings of the 28th IEEE Asian Test Symposium, 2019

2018
On Hardware Implementation of Tang-Maitra Boolean Functions.
IACR Cryptol. ePrint Arch., 2018

Protecting Block Ciphers against Differential Fault Attacks without Re-keying (Extended Version).
IACR Cryptol. ePrint Arch., 2018

Crack me if you can: hardware acceleration bridging the gap between practical and theoretical cryptanalysis?: a Survey.
Proceedings of the 18th International Conference on Embedded Computer Systems: Architectures, 2018

A Hardware-Efficient Implementation of CLOC for On-chip Authenticated Encryption.
Proceedings of the 2018 IEEE Computer Society Annual Symposium on VLSI, 2018

Protecting block ciphers against differential fault attacks without re-keying.
Proceedings of the 2018 IEEE International Symposium on Hardware Oriented Security and Trust, 2018

DFARPA: Differential fault attack resistant physical design automation.
Proceedings of the 2018 Design, Automation & Test in Europe Conference & Exhibition, 2018

2017
A Comprehensive Performance Analysis of Hardware Implementations of CAESAR Candidates.
IACR Cryptol. ePrint Arch., 2017

Looting the LUTs : FPGA Optimization of AES and AES-like Ciphers for Authenticated Encryption.
IACR Cryptol. ePrint Arch., 2017

2016
Tile-Based Modular Architecture for Accelerating Homomorphic Function Evaluation on FPGA.
IACR Cryptol. ePrint Arch., 2016

2015
New polynomial basis versatile multiplier over GF(2<sup>m</sup>) for low-power on-chip crypto-systems.
Proceedings of the 2015 IEEE International Symposium on Circuits and Systems, 2015

2011
FPGA implementation of high speed XTS-AES for data storage devices.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011


  Loading...