An up-to-date publication records with citations by Google Scholar https://goo.gl/1pvfNV
Journal Articles:
- A. Monfared, M. Taha, A. Reyhani-Masoleh, ‘Secure and Efficient Exponentiation Architectures Using Gaussian Normal Basis’, Accepted for publication in the IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
- A. Reyhani-Masoleh, M. Taha, D. Ashmawy, ‘New Low-Area Designs for the AES Forward, Inverse and Combined S-boxes,’ IEEE Transactions on Computers vol.69, no.12 pp.1757-1773, 2019.
[Paper] - A. Reyhani-Masoleh, M. Taha, D. Ashmawy ‘Smashing the implementation records of AES S-box,’ IACR Transactions on Cryptographic Hardware and Embedded Systems, vol. 2018, pp. 298-336, May 2018.
[Paper] - A Shahverdi, M. Taha, T Eisenbarth `Lightweight Side Channel Resistance: Threshold Implementations of SIMON,’ IEEE Transactions on Computers, vol.66, no.4, pp.661-671, 2017.
[Paper] - S Mavoungou, G Kaddoum, M. Taha, G Matar `Survey on Threats and Attacks on Mobile Networks,’ IEEE Access, vol.4, pp.4543-4572, 2016.
[Paper] - H. Eldib, C. Wang, M. Taha, P. Schaumont, `Quantitative Masking Strength: Quantifying the Power Side-Channel Resistance of Software Code,’ IEEE Transactions on Computer Aided Design of Integrated Circuits and Systems, vol.34, no.10, pp.1558-1568, 2015.
[Paper] - M. Taha, P. Schaumont, `Key Updating for Leakage Resiliency With Application to AES Modes of Operation,’ IEEE Transactions on Information Forensics and Security, vol.10, no.3, pp.519-528, 2015.
[Paper]
Peer Reviewed Conference and Workshop Proceedings:
- M. AbdelHafeez, M. Taha, E. Khaled, M. AbdelRaheem, ‘A Study on Transmission Overhead of Post Quantum Cryptography Algorithms in Internet of Things Networks,’ 31st International Conference on Microelectronics (ICM), Cairo, Egypt, 2019, pp.113-117.
[Paper] - A. Reyhani-Masoleh, M. Taha, D. Ashmawy, ‘New Area Record for the AES Combined S-Box/Inverse S-Box,’ IEEE 25th Symposium on Computer Arithmetic (ARITH), Amherst, MA, 2018, pp. 145-152.
[Paper] - M. Taha, A. Reyhani-Masoleh, P. Schaumont `Stateless Leakage Resiliency from NLFSRs,’ IEEE International Symposium on Hardware-Oriented Security and Trust (HOST’17), May 2017.
[Paper, Presentation] [nominated best paper, acceptance rate 17%, received 6 reviews] - C. Chen, M Sinan Inci, M. Taha, T. Eisenbarth, `SpecTre: A Tiny Side-Channel Resistant Speck Core for FPGAs,’ The 15th Smart Card Research and Advanced Application Conference (CARDIS’16), Cannes, France, Nov. 2016.
[Paper] [received 3 reviews] - M. Taha, A. Reyhani-Masoleh, P. Schaumont `Keymill: Side-Channel Resilient Key Generator,’ Selected Areas in Cryptography (SAC’16), August 2016.
[Paper, Presentation] [acceptance rate 28%, received 5 reviews] - L. Kong, G. Kaddoum, M. Taha, `Performance Analysis of Physical Layer Security of Chaos-based Modulation Schemes,’ The 11th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob’15).
[Paper] [acceptance rate 30%, received 3 reviews] - X. Ye, C. Chan, M. Taha, T. Eisenbarth, `Faster Leakage Detection and Exploitation,’ ACM 5th International Workshop on Trustworthy Embedded Devices (TrustED’15), Oct 2015.
[Paper] [received 3 reviews] - A. Shahverdi, M. Taha, T. Eisenbarth, `Silent SIMON: A Threshold Implementation under 100 Slices,’ IEEE International Symposium on Hardware-Oriented Security and Trust (HOST’15), May 2015.
[Paper] [acceptance rate 24%, received 5 reviews and 17 citations] - M. Taha, T. Eisenbarth, `Implementation Attacks on Post-Quantum Cryptographic Schemes,’ IEEE International Conference on Anti-Cybercrime (ICACC’15), November 2015.
[Paper] [received 3 reviews] - N. Ghalaty, B. Yuce, M. Taha, P. Schaumont, `Differential Fault Intensity Analysis,’ 11th Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC’14), Busan, Korea, September 2014.
[Paper, Presentation] [received 24 citations] - M. Taha, P. Schaumont, `Side-Channel Countermeasure for SHA-3 at Almost-Zero Area Overhead,’ IEEE Symposium on Hardware Oriented Security and Trust (HOST’14), Arlington, VA, May 2014.
[Paper, Presentation] [received 4 reviews] - H. Eldib, C. Wang, M. Taha, P. Schaumont, `QMS: Evaluating the side-channel resistance of masked software from source code,’ The 51th Design Automation Conference (DAC’14), June 2014.
[Paper] [acceptance rate 22.1%, received 6 reviews and 19 citations] - M. Taha, P. Schaumont, `Differential Power Analysis of MAC-Keccak at Any Key-Length,’ The 8th International Workshop on Security (IWSEC’13), Okinawa, Japan, November 2013.
[Paper, Presentation] [acceptance rate 31%, received 3 reviews and 17 citations] - M .Taha, P. Schaumont, `A Key Management Scheme for DPA-Protected Authenticated Encryption,’ Directions in Authenticated Ciphers (DIAC’13), August 2013.
[Presentation] - M. Taha, P. Schaumont, `Side-Channel Analysis of MAC-Keccak,’ IEEE International Symposium on Hardware-Oriented Security and Trust (HOST’13), June 2013.
[Paper, Presentation] [nominated best paper, acceptance rate 30%, received 3 reviews and 21 citations] - M. Taha, P. Schaumont, `A Novel Profiled Side-Channel Attack in Presence of High Algorithmic Noise,’ IEEE International Conference on Computer Design (ICCD’12), September 2012.
[Paper] [acceptance rate 25%, received 4 reviews] - S. Mane, M. Taha, P. Schaumont, `Efficient and Side-Channel-Secure Block Cipher Implementation with Custom Instructions on FPGA,’ International Conference on Field Programmable Logic and Applications (FPL’12), August 2012.
[Paper] [acceptance rate 28%, received 4 reviews] - Y. Hasan, M. Taha, S. Elsharif, A. Elaksher, `Integrated Intra-Vehicle – VANET System for Increasing Road Safety,’ the Global Knowledge Forum (NOOR’08), June 2008.
- M. Taha, Y. Hasan, `A Novel Headway-Based Vehicle-to-Vehicle Multi-Mode Broadcasting Protocol,’ IEEE Vehicular Technology Conference (VTC’08), September 2008.
[Paper] - M. Taha, Y. Hasan, `VANET-DSRC Protocol for Reliable Broadcasting of Life Safety Messages,’ IEEE International Symposium on Signal Processing and Information Technology (ISSPIT-07), 2007.
[Paper] [received 56 citations]
Non-Refereed Contributions:
- Invited Talk: ‘Lightweight Leakage Resiliency for Symmetric Cryptography,’ Department of Electrical and Computer Engineering, Northeastern University, MA, USA. Hosted by Dr. Yunsi Fei.
[Talk] - Invited Talk: ‘Advances in the Side-Channel Analysis of Symmetric Cryptography,’ Department of Electrical and Computer Engineering at Worcester Polytechnic Institute (WPI), MA, USA. Hosted by Dr. Thomas Eisenbarth.
[Talk] - Invited Talk: ‘Introduction to Side-Channel Analysis,’ VT-MENA program at the Bradley Department of Electrical and Computer Engineering, Virginia Tech, VA, USA.
- Newsletter: ‘The Birth of a New Hashing Standard: SHA-3,’ CESCA Newsletter, February 2013.
[reprint in EETimes] - Poster: ‘Side-Channel Analysis of MAC-Keccak,’ Annual Workshop of Virginia Tech’s Center for Embedded Systems for Critical Applications (CESCA), April 2013.
- Poster ‘A Novel Profiled Side-Channel Attack in Presence of High Algorithmic Noise,’ Workshop on Cryptographic Hardware and Embedded Systems (CHES’12), September 2012.
- Poster ‘High Dimensional Leakage Modeling of Combinational Logic Circuits,’ Annual Workshop of Virginia Tech’s Center for Embedded Systems for Critical Applications (CESCA), May 2012.