What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Mostafizar Rahman
Google Scholar
12
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tches
AETHER: An Ultra-High Throughput and Low Energy Authenticated Encryption Scheme.
Subhadeep Banik
Andrea Caforio
Tatsuya Ishikawa
Takanori Isobe
Mostafizar Rahman
Kosei Sakamoto
2025
journals/cic
Exploring SHA Instructions and Its Application to AES-based Schemes.
Takuro Shiraya
Subhadeep Banik
Tatsuya Ishikawa
Ryoma Ito
Mostafizar Rahman
Kosei Sakamoto
Atsushi Tanaka
Shion Utsumi
Takanori Isobe
2024
journals/tches
Gleeok: A Family of Low-Latency PRFs and its Applications to Authenticated Encryption.
Ravi Anand
Subhadeep Banik
Andrea Caforio
Tatsuya Ishikawa
Takanori Isobe
Fukang Liu
Kazuhiko Minematsu
Mostafizar Rahman
Kosei Sakamoto
2024
journals/cic
On the Key-Commitment Properties of Forkcipher-based AEADs.
Mostafizar Rahman
Samir Kundu
Takanori Isobe
2024
journals/tosc
Key Committing Attacks against AES-based AEAD Schemes.
Patrick Derbez
Pierre-Alain Fouque
Takanori Isobe
Mostafizar Rahman
André Schrottenloher
2023
journals/tosc
Revisiting Yoyo Tricks on AES.
Sandip Kumar Mondal
Mostafizar Rahman
Santanu Sarkar
Avishek Adhikari
2023
conf/acisp
Ghidle: Efficient Large-State Block Ciphers for Post-quantum Security.
Motoki Nakahashi
Rentaro Shiba
Ravi Anand
Mostafizar Rahman
Kosei Sakamoto
Fukang Liu
Takanori Isobe
2023
conf/acns
Divide and Rule: DiFA - Division Property Based Fault Attacks on PRESENT and GIFT.
Anup Kumar Kundu
Shibam Ghosh
Dhiman Saha
Mostafizar Rahman
2021
journals/tosc
Boomeyong: Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES and Pholkos.
Mostafizar Rahman
Dhiman Saha
Goutam Paul
2020
conf/africacrypt
Cryptanalysis of FlexAEAD.
Mostafizar Rahman
Dhiman Saha
Goutam Paul
2019
conf/acns
Cryptanalysis of ForkAES.
Subhadeep Banik
Jannis Bossert
Amit Jana
Eik List
Stefan Lucks
Willi Meier
Mostafizar Rahman
Dhiman Saha
Yu Sasaki
2018
journals/tosc
New Yoyo Tricks with AES-based Permutations.
Dhiman Saha
Mostafizar Rahman
Goutam Paul
Coauthors
Amit Jana
(1)
André Schrottenloher
(1)
Andrea Caforio
(2)
Anup Kumar Kundu
(1)
Atsushi Tanaka
(1)
Avishek Adhikari
(1)
Dhiman Saha
(5)
Eik List
(1)
Fukang Liu
(2)
Goutam Paul
(3)
Jannis Bossert
(1)
Kazuhiko Minematsu
(1)
Kosei Sakamoto
(4)
Mostafizar Rahman
(12)
Motoki Nakahashi
(1)
Patrick Derbez
(1)
Pierre-Alain Fouque
(1)
Ravi Anand
(2)
Rentaro Shiba
(1)
Ryoma Ito
(1)
Samir Kundu
(1)
Sandip Kumar Mondal
(1)
Santanu Sarkar
(1)
Shibam Ghosh
(1)
Shion Utsumi
(1)
Stefan Lucks
(1)
Subhadeep Banik
(4)
Takanori Isobe
(6)
Takuro Shiraya
(1)
Tatsuya Ishikawa
(3)
Willi Meier
(1)
Yu Sasaki
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to