Follow
Mostafizar Rahman
Mostafizar Rahman
University of Hyogo, Japan
Verified email at isical.ac.in - Homepage
Title
Cited by
Cited by
Year
Grover on katan: Quantum resource estimation
M Rahman, G Paul
IEEE Transactions on Quantum Engineering 3, 1-9, 2022
282022
Boomeyong: Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES and Pholkos
M Rahman, D Saha, G Paul
IACR Transactions on Symmetric Cryptology, 137-169, 2021
222021
Quantum Attacks on HCTR and its Variants
M Rahman, G Paul
IEEE Transactions on Quantum Engineering 1, 1-8, 2020
16*2020
Cryptanalysis of forkaes
S Banik, J Bossert, A Jana, E List, S Lucks, W Meier, M Rahman, D Saha, ...
Applied Cryptography and Network Security: 17th International Conference …, 2019
152019
New Yoyo Tricks with AES-based Permutations
D Saha, M Rahman, G Paul
IACR Transactions on Symmetric Cryptology, 102-127, 2018
92018
Key Committing Attacks against AES-based AEAD Schemes
P Derbez, PA Fouque, T Isobe, M Rahman, A Schrottenloher
IACR Transactions on Symmetric Cryptology 2024 (1), 135-157, 2024
72024
Gleeok: A Family of Low-Latency PRFs and its Applications to Authenticated Encryption
R Anand, S Banik, A Caforio, T Ishikawa, T Isobe, F Liu, K Minematsu, ...
IACR Transactions on Cryptographic Hardware and Embedded Systems 2024 (2 …, 2024
62024
DEEPAND: In-Depth Modeling of Correlated AND Gates for NLFSR-based Lightweight Block Ciphers
A Jana, M Rahman, D Saha
Cryptology ePrint Archive, 2022
52022
Revisiting the Boomerang Attack from a Perspective of 3-differential
L Wang, L Song, B Wu, M Rahman, T Isobe
IEEE Transactions on Information Theory, 2023
32023
Grover on Present: Quantum Resource Estimation
M Rahman, G Paul
Cryptology ePrint Archive, 2021
32021
Implementing Grover’s on AES-based AEAD schemes
S Mandal, R Anand, M Rahman, S Sarkar, T Isobe
Scientific Reports 14 (1), 21105, 2024
22024
Ghidle: Efficient Large-State Block Ciphers for Post-quantum Security
M Nakahashi, R Shiba, R Anand, M Rahman, K Sakamoto, F Liu, T Isobe
Australasian Conference on Information Security and Privacy, 403-430, 2023
22023
Divide and Rule: DiFA-Division Property Based Fault Attacks on PRESENT and GIFT
AK Kundu, S Ghosh, D Saha, M Rahman
International Conference on Applied Cryptography and Network Security, 89-116, 2023
22023
Iterated Truncated Differential for Internal Keyed Permutation of FlexAEAD.
M Rahman, D Saha, G Paul
IACR Cryptol. ePrint Arch. 2019, 539, 2019
22019
Yoyo cryptanalysis on Future
SK Mondal, M Rahman, S Sarkar, A Adhikari
International Journal of Applied Cryptography 4 (3-4), 238-249, 2024
12024
Revisiting Yoyo Tricks on AES
SK Mondal, M Rahman, S Sarkar, A Adhikari
IACR Transactions on Symmetric Cryptology 2023 (4), 28-57, 2023
12023
Key Committing Security Analysis of AEGIS
T Isobe, M Rahman
Cryptology ePrint Archive, 2023
12023
Cryptanalysis of FlexAEAD
M Rahman, D Saha, G Paul
Progress in Cryptology-AFRICACRYPT 2020: 12th International Conference on …, 2020
12020
On the Key-Commitment Properties of Forkcipher-based AEADs
M Rahman, S Kundu, T Isobe
IACR Communications in Cryptology 1 (4), 2025
2025
ASURA: An Efficient Large-State Tweakable Block Cipher for ARM Environment
A Tanaka, R Shiba, K Sakamoto, M Rahman, T Shiraya, T Isobe
International Conference on Cryptology in India, 143-164, 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–20