An up-to-date publication records with citations by Google Scholar
Journal Articles:
- A. Monfared, M. Taha, A. Reyhani-Masoleh, 鈥楽ecure and E铿僣ient Exponentiation Architectures Using Gaussian Normal Basis鈥, Accepted for publication in the IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
- A. Reyhani-Masoleh, M. Taha, D. Ashmawy, 鈥楴ew Low-Area Designs for the AES Forward, Inverse and Combined S-boxes,鈥 IEEE Transactions on Computers vol.69, no.12 pp.1757-1773, 2019.
[] - A. Reyhani-Masoleh, M. Taha, D. Ashmawy 鈥楽mashing the implementation records of AES S-box,鈥 IACR Transactions on Cryptographic Hardware and Embedded Systems, vol. 2018, pp. 298-336, May 2018.
[] - A Shahverdi, M. Taha, T Eisenbarth `Lightweight Side Channel Resistance: Threshold Implementations of SIMON,’ IEEE Transactions on Computers, vol.66, no.4, pp.661-671, 2017.
[] - S Mavoungou, G Kaddoum, M. Taha, G Matar `Survey on Threats and Attacks on Mobile Networks,’ IEEE Access, vol.4, pp.4543-4572, 2016.
[] - H. Eldib, C. Wang, M. Taha, P. Schaumont, `Quantitative Masking Strength: Quantifying the Power Side-Channel Resistance of Software Code,’ IEEE Transactions on Computer Aided Design of Integrated Circuits and Systems, vol.34, no.10, pp.1558-1568, 2015.
[] - M. Taha, P. Schaumont, `Key Updating for Leakage Resiliency With Application to AES Modes of Operation,’ IEEE Transactions on Information Forensics and Security, vol.10, no.3, pp.519-528, 2015.
[]
Peer Reviewed Conference and Workshop Proceedings:
- M. AbdelHafeez, M. Taha, E. Khaled, M. AbdelRaheem, 鈥楢 Study on Transmission Overhead of Post Quantum Cryptography Algorithms in Internet of Things Networks,鈥 31st International Conference on Microelectronics (ICM), Cairo, Egypt, 2019, pp.113-117.
[] - A. Reyhani-Masoleh, M. Taha, D. Ashmawy, 鈥楴ew Area Record for the AES Combined S-Box/Inverse S-Box,鈥 IEEE 25th Symposium on Computer Arithmetic (ARITH), Amherst, MA, 2018, pp. 145-152.
[] - M. Taha, A. Reyhani-Masoleh, P. Schaumont `Stateless Leakage Resiliency from NLFSRs,’ IEEE International Symposium on Hardware-Oriented Security and Trust (HOST’17), May 2017.
[, ] [nominated best paper, acceptance rate 17%, received 6 reviews] - C. Chen, M Sinan Inci, M. Taha, T. Eisenbarth, `SpecTre: A Tiny Side-Channel Resistant Speck Core for FPGAs,’ The 15th Smart Card Research and Advanced Application Conference (CARDIS’16), Cannes, France, Nov. 2016.
[] [received 3 reviews] - M. Taha, A. Reyhani-Masoleh, P. Schaumont `Keymill: Side-Channel Resilient Key Generator,’ Selected Areas in Cryptography (SAC’16), August 2016.
[, ] [acceptance rate 28%, received 5 reviews] - L. Kong, G. Kaddoum, M. Taha, `Performance Analysis of Physical Layer Security of Chaos-based Modulation Schemes,’ The 11th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob’15).
[] [acceptance rate 30%, received 3 reviews] - X. Ye, C. Chan, M. Taha, T. Eisenbarth, `Faster Leakage Detection and Exploitation,’ ACM 5th International Workshop on Trustworthy Embedded Devices (TrustED’15), Oct 2015.
[] [received 3 reviews] - A. Shahverdi, M. Taha, T. Eisenbarth, `Silent SIMON: A Threshold Implementation under 100 Slices,’ IEEE International Symposium on Hardware-Oriented Security and Trust (HOST’15), May 2015.
[] [acceptance rate 24%, received 5 reviews and 17 citations] - M. Taha, T. Eisenbarth, `Implementation Attacks on Post-Quantum Cryptographic Schemes,’ IEEE International Conference on Anti-Cybercrime (ICACC’15), November 2015.
[] [received 3 reviews] - N. Ghalaty, B. Yuce, M. Taha, P. Schaumont, `Differential Fault Intensity Analysis,’ 11th Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC’14), Busan, Korea, September 2014.
[, ] [received 24 citations] - M. Taha, P. Schaumont, `Side-Channel Countermeasure for SHA-3 at Almost-Zero Area Overhead,’ IEEE Symposium on Hardware Oriented Security and Trust (HOST’14), Arlington, VA, May 2014.
[, ] [received 4 reviews] - H. Eldib, C. Wang, M. Taha, P. Schaumont, `QMS: Evaluating the side-channel resistance of masked software from source code,’ The 51th Design Automation Conference (DAC’14), June 2014.
[] [acceptance rate 22.1%, received 6 reviews and 19 citations] - M. Taha, P. Schaumont, `Differential Power Analysis of MAC-Keccak at Any Key-Length,’ The 8th International Workshop on Security (IWSEC’13), Okinawa, Japan, November 2013.
[, ] [acceptance rate 31%, received 3 reviews and 17 citations] - M .Taha, P. Schaumont, `A Key Management Scheme for DPA-Protected Authenticated Encryption,’ Directions in Authenticated Ciphers (DIAC’13), August 2013.
[] - M. Taha, P. Schaumont, `Side-Channel Analysis of MAC-Keccak,’ IEEE International Symposium on Hardware-Oriented Security and Trust (HOST’13), June 2013.
[, ] [nominated best paper, acceptance rate 30%, received 3 reviews and 21 citations] - M. Taha, P. Schaumont, `A Novel Profiled Side-Channel Attack in Presence of High Algorithmic Noise,’ IEEE International Conference on Computer Design (ICCD’12), September 2012.
[] [acceptance rate 25%, received 4 reviews] - S. Mane, M. Taha, P. Schaumont, `Efficient and Side-Channel-Secure Block Cipher Implementation with Custom Instructions on FPGA,’ International Conference on Field Programmable Logic and Applications (FPL’12), August 2012.
[] [acceptance rate 28%, received 4 reviews] - Y. Hasan, M. Taha, S. Elsharif, A. Elaksher, `Integrated Intra-Vehicle – VANET System for Increasing Road Safety,’ the Global Knowledge Forum (NOOR’08), June 2008.
- M. Taha, Y. Hasan, `A Novel Headway-Based Vehicle-to-Vehicle Multi-Mode Broadcasting Protocol,’ IEEE Vehicular Technology Conference (VTC’08), September 2008.
[] - M. Taha, Y. Hasan, `VANET-DSRC Protocol for Reliable Broadcasting of Life Safety Messages,’ IEEE International Symposium on Signal Processing and Information Technology (ISSPIT-07), 2007.
[] [received 56 citations]
Non-Refereed Contributions:
- Invited Talk: 鈥楲ightweight Leakage Resiliency for Symmetric Cryptography,鈥 Department of Electrical and Computer Engineering, Northeastern University, MA, USA. Hosted by Dr. Yunsi Fei.
[] - Invited Talk: 鈥楢dvances in the Side-Channel Analysis of Symmetric Cryptography,鈥 Department of Electrical and Computer Engineering at Worcester Polytechnic Institute (WPI), MA, USA. Hosted by Dr. Thomas Eisenbarth.
[] - Invited Talk: 鈥業ntroduction to Side-Channel Analysis,鈥 VT-MENA program at the Bradley Department of Electrical and Computer Engineering, Virginia Tech, VA, USA.
- Newsletter: 鈥楾he Birth of a New Hashing Standard: SHA-3,鈥 CESCA Newsletter, February 2013.
[reprint in ] - Poster: 鈥楽ide-Channel Analysis of MAC-Keccak,鈥 Annual Workshop of Virginia Tech鈥檚 Center for Embedded Systems for Critical Applications (CESCA), April 2013.
- Poster 鈥楢 Novel Pro铿乴ed Side-Channel Attack in Presence of High Algorithmic Noise,鈥 Workshop on Cryptographic Hardware and Embedded Systems (CHES鈥12), September 2012.
- Poster 鈥楬igh Dimensional Leakage Modeling of Combinational Logic Circuits,鈥 Annual Workshop of Virginia Tech鈥檚 Center for Embedded Systems for Critical Applications (CESCA), May 2012.