-
1
المؤلفون: Arash Reyhani-Masoleh, Mostafa Taha, Doaa Ashmawy
المصدر: Transactions on Cryptographic Hardware and Embedded Systems, Vol 2018, Iss 2 (2018)
مصطلحات موضوعية: Logic-Minimization, lcsh:Computer engineering. Computer hardware, lcsh:T58.5-58.64, lcsh:Information technology, AES S-box, Composite/Tower Field Arithmetic, Heuristics, 0202 electrical engineering, electronic engineering, information engineering, lcsh:TK7885-7895, 020201 artificial intelligence & image processing, 02 engineering and technology, 020202 computer hardware & architecture
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ec7214208998d28c71abfb5862016684
https://doi.org/10.46586/tches.v2018.i2.298-336 -
2
المؤلفون: Georges Kaddoum, Silvere Mavoungou, Mostafa Taha, Georges Matar
المصدر: IEEE Access, Vol 4, Pp 4543-4572 (2016)
مصطلحات موضوعية: General Computer Science, Network security, Computer science, Mobile computing, Core network, 02 engineering and technology, Computer security, computer.software_genre, availability attacks, 0202 electrical engineering, electronic engineering, information engineering, General Materials Science, Mobile technology, Mobile network security, Wi-Fi Protected Setup, Network architecture, Access network, Wireless network, business.industry, Network packet, General Engineering, confidentiality attacks, 020206 networking & telecommunications, impersonation attacks, integrity attacks, Network Access Control, Cellular network, authentication attacks, 020201 artificial intelligence & image processing, lcsh:Electrical engineering. Electronics. Nuclear engineering, Mobile telephony, business, lcsh:TK1-9971, computer, Computer network
-
3
المؤلفون: Patrick Schaumont, Mostafa Taha
المصدر: IEEE Transactions on Information Forensics and Security. 10:519-528
مصطلحات موضوعية: Cryptographic primitive, Computer Networks and Communications, business.industry, Computer science, Cryptography standards, Distributed computing, Advanced Encryption Standard, Key distribution, Cryptography, 02 engineering and technology, Computer security, computer.software_genre, 020202 computer hardware & architecture, Power analysis, Symmetric-key algorithm, 0202 electrical engineering, electronic engineering, information engineering, 020201 artificial intelligence & image processing, Safety, Risk, Reliability and Quality, business, Cryptographic key types, Key management, computer, Key exchange, Key size
-
4
المؤلفون: Patrick Schaumont, Mostafa Taha, Arash Reyhani-Masoleh
المصدر: HOST
مصطلحات موضوعية: 021110 strategic, defence & security studies, Stateless protocol, Theoretical computer science, Mathematical model, business.industry, Computer science, Monte Carlo method, 0211 other engineering and technologies, Cryptography, 02 engineering and technology, Tree structure, Computer engineering, 0202 electrical engineering, electronic engineering, information engineering, 020201 artificial intelligence & image processing, business, Design methods, Leakage (electronics), Shift register
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::1a3dd9209d44c45bff1a09298272d99f
https://doi.org/10.1109/hst.2017.7951798 -
5
المؤلفون: Mehmet Sinan Inci, Mostafa Taha, Thomas Eisenbarth, Cong Chen
المصدر: Smart Card Research and Advanced Applications ISBN: 9783319546681
CARDISمصطلحات موضوعية: Computer science, business.industry, Round function, Cryptography, Data_CODINGANDINFORMATIONTHEORY, 02 engineering and technology, 020202 computer hardware & architecture, Cipher, Embedded system, 0202 electrical engineering, electronic engineering, information engineering, 020201 artificial intelligence & image processing, Side channel attack, Spartan, business, Field-programmable gate array, Stream cipher, Block cipher
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::64e0331c80448b14443b7db73c2abee9
https://doi.org/10.1007/978-3-319-54669-8_5 -
6
المؤلفون: Patrick Schaumont, Mostafa Taha, Arash Reyhani-Masoleh
المصدر: Lecture Notes in Computer Science ISBN: 9783319694528
SACمصطلحات موضوعية: Cryptographic primitive, Computer science, business.industry, Distributed computing, Cryptography, 02 engineering and technology, NAND logic, Key generator, 020202 computer hardware & architecture, 0202 electrical engineering, electronic engineering, information engineering, 020201 artificial intelligence & image processing, Side channel attack, Achterbahn, business, Protected mode, Block cipher
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::2ed6200b073a77dc0d7c0e50c4814e43
https://doi.org/10.1007/978-3-319-69453-5_12