{"id":19,"date":"2020-04-20T16:00:13","date_gmt":"2020-04-20T20:00:13","guid":{"rendered":"https:\/\/carleton.ca\/mtaha\/?page_id=19"},"modified":"2021-03-04T11:05:31","modified_gmt":"2021-03-04T16:05:31","slug":"publications","status":"publish","type":"page","link":"https:\/\/carleton.ca\/mtaha\/publications\/","title":{"rendered":"Publications"},"content":{"rendered":"

An up-to-date publication records with citations by Google Scholar https:\/\/goo.gl\/1pvfNV <\/a><\/p>\n

<\/a>Journal Articles:<\/h4>\n
    \n
  1. A. Monfared, M. Taha<\/strong>, A. Reyhani-Masoleh, \u2018Secure and E\ufb03cient Exponentiation Architectures Using Gaussian Normal Basis\u2019, Accepted for publication in the IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.<\/li>\n
  2. A. Reyhani-Masoleh, M. Taha<\/strong>, D. Ashmawy, \u2018New Low-Area Designs for the AES Forward, Inverse and Combined S-boxes,\u2019 IEEE Transactions on Computers vol.69, no.12 pp.1757-1773, 2019.
    \n[
    Paper<\/a>]<\/li>\n
  3. A. Reyhani-Masoleh, M. Taha<\/strong>, D. Ashmawy \u2018Smashing the implementation records of AES S-box,\u2019 IACR Transactions on Cryptographic Hardware and Embedded Systems, vol. 2018, pp. 298-336, May 2018.
    \n[
    Paper<\/a>]<\/li>\n
  4. A Shahverdi, M. Taha<\/b>, T Eisenbarth `Lightweight Side Channel Resistance: Threshold Implementations of SIMON,’ IEEE Transactions on Computers, vol.66, no.4, pp.661-671, 2017.
    \n[
    Paper<\/a>]<\/li>\n
  5. S Mavoungou, G Kaddoum, M. Taha<\/b>, G Matar `Survey on Threats and Attacks on Mobile Networks,’ IEEE Access, vol.4, pp.4543-4572, 2016.
    \n[
    Paper<\/a>]<\/li>\n
  6. H. Eldib, C. Wang, M. Taha<\/b>, P. Schaumont, `Quantitative Masking Strength: Quantifying the Power Side-Channel Resistance of Software Code,’ IEEE Transactions on Computer Aided Design of Integrated Circuits and Systems, vol.34, no.10, pp.1558-1568, 2015.
    \n[
    Paper<\/a>]<\/li>\n
  7. M. Taha<\/b>, P. Schaumont, `Key Updating for Leakage Resiliency With Application to AES Modes of Operation,’ IEEE Transactions on Information Forensics and Security, vol.10, no.3, pp.519-528, 2015.
    \n[
    Paper<\/a>]<\/li>\n<\/ol>\n

    <\/a>Peer Reviewed Conference and Workshop Proceedings:<\/h4>\n
      \n
    1. M. AbdelHafeez, M. Taha<\/strong>, E. Khaled, M. AbdelRaheem, \u2018A Study on Transmission Overhead of Post Quantum Cryptography Algorithms in Internet of Things Networks,\u2019 31st International Conference on Microelectronics (ICM), Cairo, Egypt, 2019, pp.113-117.
      \n[
      Paper<\/a>]<\/li>\n
    2. A. Reyhani-Masoleh, M. Taha<\/strong>, D. Ashmawy, \u2018New Area Record for the AES Combined S-Box\/Inverse S-Box,\u2019 IEEE 25th Symposium on Computer Arithmetic (ARITH), Amherst, MA, 2018, pp. 145-152.
      \n[
      Paper<\/a>]<\/li>\n
    3. M. Taha<\/b>, A. Reyhani-Masoleh, P. Schaumont `Stateless Leakage Resiliency from NLFSRs,’ IEEE International Symposium on Hardware-Oriented Security and Trust (HOST’17), May 2017.
      \n[
      Paper<\/a>, Presentation<\/a>] [nominated best paper<\/u>, acceptance rate 17%, received 6 reviews]<\/li>\n
    4. C. Chen, M Sinan Inci, M. Taha<\/b>, T. Eisenbarth, `SpecTre: A Tiny Side-Channel Resistant Speck Core for FPGAs,’ The 15th Smart Card Research and Advanced Application Conference (CARDIS’16), Cannes, France, Nov. 2016.
      \n[
      Paper<\/a>] [received 3 reviews]<\/li>\n
    5. M. Taha<\/b>, A. Reyhani-Masoleh, P. Schaumont `Keymill: Side-Channel Resilient Key Generator,’ Selected Areas in Cryptography (SAC’16), August 2016.
      \n[
      Paper<\/a>, Presentation<\/a>] [acceptance rate 28%, received 5 reviews]<\/li>\n
    6. L. Kong, G. Kaddoum, M. Taha<\/b>, `Performance Analysis of Physical Layer Security of Chaos-based Modulation Schemes,’ The 11th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob’15).
      \n[
      Paper<\/a>] [acceptance rate 30%, received 3 reviews]<\/li>\n
    7. X. Ye, C. Chan, M. Taha<\/b>, T. Eisenbarth, `Faster Leakage Detection and Exploitation,’ ACM 5th International Workshop on Trustworthy Embedded Devices (TrustED’15), Oct 2015.
      \n[
      Paper<\/a>] [received 3 reviews]<\/li>\n
    8. A. Shahverdi, M. Taha<\/b>, T. Eisenbarth, `Silent SIMON: A Threshold Implementation under 100 Slices,’ IEEE International Symposium on Hardware-Oriented Security and Trust (HOST’15), May 2015.
      \n[
      Paper<\/a>] [acceptance rate 24%, received 5 reviews and 17 citations]<\/li>\n
    9. M. Taha<\/b>, T. Eisenbarth, `Implementation Attacks on Post-Quantum Cryptographic Schemes,’ IEEE International Conference on Anti-Cybercrime (ICACC’15), November 2015.
      \n[
      Paper<\/a>] [received 3 reviews]<\/li>\n
    10. N. Ghalaty, B. Yuce, M. Taha<\/b>, P. Schaumont, `Differential Fault Intensity Analysis,’ 11th Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC’14), Busan, Korea, September 2014.
      \n[
      Paper<\/a>, Presentation<\/a>] [received 24 citations]<\/li>\n
    11. M. Taha<\/b>, P. Schaumont, `Side-Channel Countermeasure for SHA-3 at Almost-Zero Area Overhead,’ IEEE Symposium on Hardware Oriented Security and Trust (HOST’14), Arlington, VA, May 2014.
      \n[
      Paper<\/a>, Presentation<\/a>] [received 4 reviews]<\/li>\n
    12. H. Eldib, C. Wang, M. Taha<\/b>, P. Schaumont, `QMS: Evaluating the side-channel resistance of masked software from source code,’ The 51th Design Automation Conference (DAC’14), June 2014.
      \n[
      Paper<\/a>] [acceptance rate 22.1%, received 6 reviews and 19 citations]<\/li>\n
    13. M. Taha<\/b>, P. Schaumont, `Differential Power Analysis of MAC-Keccak at Any Key-Length,’ The 8th International Workshop on Security (IWSEC’13), Okinawa, Japan, November 2013.
      \n[
      Paper<\/a>, Presentation<\/a>] [acceptance rate 31%, received 3 reviews and 17 citations]<\/li>\n
    14. M .Taha<\/b>, P. Schaumont, `A Key Management Scheme for DPA-Protected Authenticated Encryption,’ Directions in Authenticated Ciphers (DIAC’13), August 2013.
      \n[
      Presentation<\/a>]<\/li>\n
    15. M. Taha<\/b>, P. Schaumont, `Side-Channel Analysis of MAC-Keccak,’ IEEE International Symposium on Hardware-Oriented Security and Trust (HOST’13), June 2013.
      \n[
      Paper<\/a>, Presentation<\/a>] [nominated best paper<\/u>, acceptance rate 30%, received 3 reviews and 21 citations]<\/li>\n
    16. M. Taha<\/b>, P. Schaumont, `A Novel Profiled Side-Channel Attack in Presence of High Algorithmic Noise,’ IEEE International Conference on Computer Design (ICCD’12), September 2012.
      \n[
      Paper<\/a>] [acceptance rate 25%, received 4 reviews]<\/li>\n
    17. S. Mane, M. Taha<\/b>, P. Schaumont, `Efficient and Side-Channel-Secure Block Cipher Implementation with Custom Instructions on FPGA,’ International Conference on Field Programmable Logic and Applications (FPL’12), August 2012.
      \n[
      Paper<\/a>] [acceptance rate 28%, received 4 reviews]<\/li>\n
    18. Y. Hasan, M. Taha<\/b>, S. Elsharif, A. Elaksher, `Integrated Intra-Vehicle – VANET System for Increasing Road Safety,’ the Global Knowledge Forum (NOOR’08), June 2008.<\/li>\n
    19. M. Taha<\/b>, Y. Hasan, `A Novel Headway-Based Vehicle-to-Vehicle Multi-Mode Broadcasting Protocol,’ IEEE Vehicular Technology Conference (VTC’08), September 2008.
      \n[
      Paper<\/a>]<\/li>\n
    20. M. Taha<\/b>, Y. Hasan, `VANET-DSRC Protocol for Reliable Broadcasting of Life Safety Messages,’ IEEE International Symposium on Signal Processing and Information Technology (ISSPIT-07), 2007.
      \n[
      Paper<\/a>] [received 56 citations]<\/li>\n<\/ol>\n

      <\/a>Non-Refereed Contributions:<\/h4>\n
        \n
      1. Invited Talk: \u2018Lightweight Leakage Resiliency for Symmetric Cryptography,\u2019 Department of Electrical and Computer Engineering, Northeastern University, MA, USA. Hosted by Dr. Yunsi Fei.
        \n[
        Talk<\/a>]<\/li>\n
      2. Invited Talk: \u2018Advances in the Side-Channel Analysis of Symmetric Cryptography,\u2019 Department of Electrical and Computer Engineering at Worcester Polytechnic Institute (WPI), MA, USA. Hosted by Dr. Thomas Eisenbarth.
        \n[
        Talk<\/a>]<\/li>\n
      3. Invited Talk: \u2018Introduction to Side-Channel Analysis,\u2019 VT-MENA program at the Bradley Department of Electrical and Computer Engineering, Virginia Tech, VA, USA.<\/li>\n
      4. Newsletter: \u2018The Birth of a New Hashing Standard: SHA-3,\u2019 CESCA Newsletter, February 2013.
        \n[reprint in
        EETimes<\/a>]<\/li>\n
      5. Poster: \u2018Side-Channel Analysis of MAC-Keccak,\u2019 Annual Workshop of Virginia Tech\u2019s Center for Embedded Systems for Critical Applications (CESCA), April 2013.<\/li>\n
      6. Poster \u2018A Novel Pro\ufb01led Side-Channel Attack in Presence of High Algorithmic Noise,\u2019 Workshop on Cryptographic Hardware and Embedded Systems (CHES\u201912), September 2012.<\/li>\n
      7. Poster \u2018High Dimensional Leakage Modeling of Combinational Logic Circuits,\u2019 Annual Workshop of Virginia Tech\u2019s Center for Embedded Systems for Critical Applications (CESCA), May 2012.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"

        An up-to-date publication records with citations by Google Scholar https:\/\/goo.gl\/1pvfNV Journal Articles: A. Monfared, M. Taha, A. Reyhani-Masoleh, \u2018Secure and E\ufb03cient Exponentiation Architectures Using Gaussian Normal Basis\u2019, Accepted for publication in the IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. A. Reyhani-Masoleh, M. Taha, D. Ashmawy, \u2018New Low-Area Designs for the AES Forward, […]<\/p>\n","protected":false},"author":5,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","_mi_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":"","_links_to":"","_links_to_target":""},"yoast_head":"\nPublications - Mostafa Taha<\/title>\n<meta name=\"description\" content=\"An up-to-date publication records with citations by Google Scholar https:\/\/goo.gl\/1pvfNV Journal Articles: A. Monfared, M. Taha, A. Reyhani-Masoleh,\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/carleton.ca\/mtaha\/publications\/\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/carleton.ca\/mtaha\/publications\/\",\"url\":\"https:\/\/carleton.ca\/mtaha\/publications\/\",\"name\":\"Publications - Mostafa Taha\",\"isPartOf\":{\"@id\":\"https:\/\/carleton.ca\/mtaha\/#website\"},\"datePublished\":\"2020-04-20T20:00:13+00:00\",\"dateModified\":\"2021-03-04T16:05:31+00:00\",\"description\":\"An up-to-date publication records with citations by Google Scholar https:\/\/goo.gl\/1pvfNV Journal Articles: A. Monfared, M. Taha, A. Reyhani-Masoleh,\",\"breadcrumb\":{\"@id\":\"https:\/\/carleton.ca\/mtaha\/publications\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/carleton.ca\/mtaha\/publications\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/carleton.ca\/mtaha\/publications\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/carleton.ca\/mtaha\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Publications\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/carleton.ca\/mtaha\/#website\",\"url\":\"https:\/\/carleton.ca\/mtaha\/\",\"name\":\"Mostafa Taha\",\"description\":\"ÐÓ°ÉÔ­´´ University\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/carleton.ca\/mtaha\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Publications - Mostafa Taha","description":"An up-to-date publication records with citations by Google Scholar https:\/\/goo.gl\/1pvfNV Journal Articles: A. Monfared, M. Taha, A. Reyhani-Masoleh,","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/carleton.ca\/mtaha\/publications\/","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/carleton.ca\/mtaha\/publications\/","url":"https:\/\/carleton.ca\/mtaha\/publications\/","name":"Publications - Mostafa Taha","isPartOf":{"@id":"https:\/\/carleton.ca\/mtaha\/#website"},"datePublished":"2020-04-20T20:00:13+00:00","dateModified":"2021-03-04T16:05:31+00:00","description":"An up-to-date publication records with citations by Google Scholar https:\/\/goo.gl\/1pvfNV Journal Articles: A. Monfared, M. Taha, A. Reyhani-Masoleh,","breadcrumb":{"@id":"https:\/\/carleton.ca\/mtaha\/publications\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/carleton.ca\/mtaha\/publications\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/carleton.ca\/mtaha\/publications\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/carleton.ca\/mtaha\/"},{"@type":"ListItem","position":2,"name":"Publications"}]},{"@type":"WebSite","@id":"https:\/\/carleton.ca\/mtaha\/#website","url":"https:\/\/carleton.ca\/mtaha\/","name":"Mostafa Taha","description":"ÐÓ°ÉÔ­´´ University","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/carleton.ca\/mtaha\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"acf":{"banner_image_type":"none","banner_button":"no"},"_links":{"self":[{"href":"https:\/\/carleton.ca\/mtaha\/wp-json\/wp\/v2\/pages\/19"}],"collection":[{"href":"https:\/\/carleton.ca\/mtaha\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/carleton.ca\/mtaha\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/carleton.ca\/mtaha\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/carleton.ca\/mtaha\/wp-json\/wp\/v2\/comments?post=19"}],"version-history":[{"count":3,"href":"https:\/\/carleton.ca\/mtaha\/wp-json\/wp\/v2\/pages\/19\/revisions"}],"predecessor-version":[{"id":63,"href":"https:\/\/carleton.ca\/mtaha\/wp-json\/wp\/v2\/pages\/19\/revisions\/63"}],"wp:attachment":[{"href":"https:\/\/carleton.ca\/mtaha\/wp-json\/wp\/v2\/media?parent=19"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}