{"id":19,"date":"2020-04-20T16:00:13","date_gmt":"2020-04-20T20:00:13","guid":{"rendered":"https:\/\/carleton.ca\/mtaha\/?page_id=19"},"modified":"2021-03-04T11:05:31","modified_gmt":"2021-03-04T16:05:31","slug":"publications","status":"publish","type":"page","link":"https:\/\/carleton.ca\/mtaha\/publications\/","title":{"rendered":"Publications"},"content":{"rendered":"<p>An up-to-date publication records with citations by Google Scholar <a href=\"https:\/\/goo.gl\/1pvfNV\">https:\/\/goo.gl\/1pvfNV <\/a><\/p>\n<h4><a name=\"TOC-Journal-Articles:\"><\/a>Journal Articles:<\/h4>\n<ol>\n<li>A. Monfared, <strong>M. Taha<\/strong>, A. Reyhani-Masoleh, \u2018Secure and E\ufb03cient Exponentiation Architectures Using Gaussian Normal Basis\u2019, Accepted for publication in the IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.<\/li>\n<li>A. Reyhani-Masoleh, <strong>M. Taha<\/strong>, D. Ashmawy, \u2018New Low-Area Designs for the AES Forward, Inverse and Combined S-boxes,\u2019 IEEE Transactions on Computers vol.69, no.12 pp.1757-1773, 2019.<br \/>\n[<a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/8735717\">Paper<\/a>]<\/li>\n<li>A. Reyhani-Masoleh, <strong>M. Taha<\/strong>, D. Ashmawy \u2018Smashing the implementation records of AES S-box,\u2019 IACR Transactions on Cryptographic Hardware and Embedded Systems, vol. 2018, pp. 298-336, May 2018.<br \/>\n[<a href=\"https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/884\">Paper<\/a>]<\/li>\n<li>A Shahverdi, <b>M. Taha<\/b>, T Eisenbarth `Lightweight Side Channel Resistance: Threshold Implementations of SIMON,&#8217; IEEE Transactions on Computers, vol.66, no.4, pp.661-671, 2017.<br \/>\n[<a href=\"http:\/\/ieeexplore.ieee.org\/abstract\/document\/7579637\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Paper<\/a>]<\/li>\n<li>S Mavoungou, G Kaddoum, <b>M. Taha<\/b>, G Matar `Survey on Threats and Attacks on Mobile Networks,&#8217; IEEE Access, vol.4, pp.4543-4572, 2016.<br \/>\n[<a href=\"http:\/\/ieeexplore.ieee.org\/abstract\/document\/7547270\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Paper<\/a>]<\/li>\n<li>H. Eldib, C. Wang, <b>M. Taha<\/b>, P. Schaumont, `Quantitative Masking Strength: Quantifying the Power Side-Channel Resistance of Software Code,&#8217; IEEE Transactions on Computer Aided Design of Integrated Circuits and Systems, vol.34, no.10, pp.1558-1568, 2015.<br \/>\n[<a href=\"http:\/\/ieeexplore.ieee.org\/abstract\/document\/7090986\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Paper<\/a>]<\/li>\n<li><b>M. Taha<\/b>, P. Schaumont, `Key Updating for Leakage Resiliency With Application to AES Modes of Operation,&#8217; IEEE Transactions on Information Forensics and Security, vol.10, no.3, pp.519-528, 2015.<br \/>\n[<a href=\"http:\/\/ieeexplore.ieee.org\/abstract\/document\/6987331\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Paper<\/a>]<\/li>\n<\/ol>\n<h4><a name=\"TOC-Peer-Reviewed-Conference-and-Workshop-Proceedings:\"><\/a>Peer Reviewed Conference and Workshop Proceedings:<\/h4>\n<ol>\n<li>M. AbdelHafeez, <strong>M. Taha<\/strong>, E. Khaled, M. AbdelRaheem, \u2018A Study on Transmission Overhead of Post Quantum Cryptography Algorithms in Internet of Things Networks,\u2019 31st International Conference on Microelectronics (ICM), Cairo, Egypt, 2019, pp.113-117.<br \/>\n[<a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/9021842\">Paper<\/a>]<\/li>\n<li>A. Reyhani-Masoleh, <strong>M. Taha<\/strong>, D. Ashmawy, \u2018New Area Record for the AES Combined S-Box\/Inverse S-Box,\u2019 IEEE 25th Symposium on Computer Arithmetic (ARITH), Amherst, MA, 2018, pp. 145-152.<br \/>\n[<a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/8464780\">Paper<\/a>]<\/li>\n<li><b>M. Taha<\/b>, A. Reyhani-Masoleh, P. Schaumont `Stateless Leakage Resiliency from NLFSRs,&#8217; IEEE International Symposium on Hardware-Oriented Security and Trust (HOST&#8217;17), May 2017.<br \/>\n[<a href=\"http:\/\/ieeexplore.ieee.org\/abstract\/document\/7951798\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Paper<\/a>, <a href=\"https:\/\/drive.google.com\/file\/d\/0B87-DHEZNejUZ3BSQ0dKdGd6ZGc\/\" target=\"_blank\" rel=\"noopener noreferrer\">Presentation<\/a>] [<u>nominated best paper<\/u>, acceptance rate 17%, received 6 reviews]<\/li>\n<li>C. Chen, M Sinan Inci, <b>M. Taha<\/b>, T. Eisenbarth, `SpecTre: A Tiny Side-Channel Resistant Speck Core for FPGAs,&#8217; The 15th Smart Card Research and Advanced Application Conference (CARDIS&#8217;16), Cannes, France, Nov. 2016.<br \/>\n[<a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-319-54669-8_5\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Paper<\/a>] [received 3 reviews]<\/li>\n<li><b>M. Taha<\/b>, A. Reyhani-Masoleh, P. Schaumont `Keymill: Side-Channel Resilient Key Generator,&#8217; Selected Areas in Cryptography (SAC&#8217;16), August 2016.<br \/>\n[<a href=\"http:\/\/eprint.iacr.org\/2016\/710\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Paper<\/a>, <a href=\"http:\/\/www.engr.mun.ca\/~howard\/SAC_SLIDES\/slides_Taha.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Presentation<\/a>] [acceptance rate 28%, received 5 reviews]<\/li>\n<li>L. Kong, G. Kaddoum, <b>M. Taha<\/b>, `Performance Analysis of Physical Layer Security of Chaos-based Modulation Schemes,&#8217; The 11th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob&#8217;15).<br \/>\n[<a href=\"http:\/\/ieeexplore.ieee.org\/abstract\/document\/7347973\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Paper<\/a>] [acceptance rate 30%, received 3 reviews]<\/li>\n<li>X. Ye, C. Chan, <b>M. Taha<\/b>, T. Eisenbarth, `Faster Leakage Detection and Exploitation,&#8217; ACM 5th International Workshop on Trustworthy Embedded Devices (TrustED&#8217;15), Oct 2015.<br \/>\n[<a href=\"http:\/\/dl.acm.org\/citation.cfm?id=2808419\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Paper<\/a>] [received 3 reviews]<\/li>\n<li>A. Shahverdi, <b>M. Taha<\/b>, T. Eisenbarth, `Silent SIMON: A Threshold Implementation under 100 Slices,&#8217; IEEE International Symposium on Hardware-Oriented Security and Trust (HOST&#8217;15), May 2015.<br \/>\n[<a href=\"http:\/\/ieeexplore.ieee.org\/abstract\/document\/7140227\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Paper<\/a>] [acceptance rate 24%, received 5 reviews and 17 citations]<\/li>\n<li><b>M. Taha<\/b>, T. Eisenbarth, `Implementation Attacks on Post-Quantum Cryptographic Schemes,&#8217; IEEE International Conference on Anti-Cybercrime (ICACC&#8217;15), November 2015.<br \/>\n[<a href=\"http:\/\/eprint.iacr.org\/2015\/1083\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Paper<\/a>] [received 3 reviews]<\/li>\n<li>N. Ghalaty, B. Yuce, <b>M. Taha<\/b>, P. Schaumont, `Differential Fault Intensity Analysis,&#8217; 11th Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC&#8217;14), Busan, Korea, September 2014.<br \/>\n[<a href=\"http:\/\/ieeexplore.ieee.org\/abstract\/document\/6976631\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Paper<\/a>, <a href=\"https:\/\/sites.google.com\/a\/vt.edu\/mtaha\/FDTC-2014-session_2_3.pdf?attredirects=0\" target=\"_blank\" rel=\"noopener noreferrer\">Presentation<\/a>] [received 24 citations]<\/li>\n<li><b>M. Taha<\/b>, P. Schaumont, `Side-Channel Countermeasure for SHA-3 at Almost-Zero Area Overhead,&#8217; IEEE Symposium on Hardware Oriented Security and Trust (HOST&#8217;14), Arlington, VA, May 2014.<br \/>\n[<a href=\"http:\/\/ieeexplore.ieee.org\/abstract\/document\/6855576\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Paper<\/a>, <a href=\"https:\/\/sites.google.com\/a\/vt.edu\/mtaha\/HOST14_pdf.pdf?attredirects=0\" target=\"_blank\" rel=\"noopener noreferrer\">Presentation<\/a>] [received 4 reviews]<\/li>\n<li>H. Eldib, C. Wang, <b>M. Taha<\/b>, P. Schaumont, `QMS: Evaluating the side-channel resistance of masked software from source code,&#8217; The 51th Design Automation Conference (DAC&#8217;14), June 2014.<br \/>\n[<a href=\"http:\/\/ieeexplore.ieee.org\/abstract\/document\/6881536\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Paper<\/a>] [acceptance rate 22.1%, received 6 reviews and 19 citations]<\/li>\n<li><b>M. Taha<\/b>, P. Schaumont, `Differential Power Analysis of MAC-Keccak at Any Key-Length,&#8217; The 8th International Workshop on Security (IWSEC&#8217;13), Okinawa, Japan, November 2013.<br \/>\n[<a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-642-41383-4_5\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Paper<\/a>, <a href=\"https:\/\/sites.google.com\/a\/vt.edu\/mtaha\/IWSEC-2013.pdf?attredirects=0\" target=\"_blank\" rel=\"noopener noreferrer\">Presentation<\/a>] [acceptance rate 31%, received 3 reviews and 17 citations]<\/li>\n<li><b>M .Taha<\/b>, P. Schaumont, `A Key Management Scheme for DPA-Protected Authenticated Encryption,&#8217; Directions in Authenticated Ciphers (DIAC&#8217;13), August 2013.<br \/>\n[<a href=\"https:\/\/sites.google.com\/a\/vt.edu\/mtaha\/Taha_DIAC2013.pdf?attredirects=0\" target=\"_blank\" rel=\"noopener noreferrer\">Presentation<\/a>]<\/li>\n<li><b>M. Taha<\/b>, P. Schaumont, `Side-Channel Analysis of MAC-Keccak,&#8217; IEEE International Symposium on Hardware-Oriented Security and Trust (HOST&#8217;13), June 2013.<br \/>\n[<a href=\"http:\/\/ieeexplore.ieee.org\/abstract\/document\/6581577\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Paper<\/a>, <a href=\"https:\/\/sites.google.com\/a\/vt.edu\/mtaha\/HOST-2013.pdf?attredirects=0\" target=\"_blank\" rel=\"noopener noreferrer\">Presentation<\/a>] [<u>nominated best paper<\/u>, acceptance rate 30%, received 3 reviews and 21 citations]<\/li>\n<li><b>M. Taha<\/b>, P. Schaumont, `A Novel Profiled Side-Channel Attack in Presence of High Algorithmic Noise,&#8217; IEEE International Conference on Computer Design (ICCD&#8217;12), September 2012.<br \/>\n[<a href=\"http:\/\/ieeexplore.ieee.org\/abstract\/document\/6378675\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Paper<\/a>] [acceptance rate 25%, received 4 reviews]<\/li>\n<li>S. Mane, <b>M. Taha<\/b>, P. Schaumont, `Efficient and Side-Channel-Secure Block Cipher Implementation with Custom Instructions on FPGA,&#8217; International Conference on Field Programmable Logic and Applications (FPL&#8217;12), August 2012.<br \/>\n[<a href=\"http:\/\/ieeexplore.ieee.org\/abstract\/document\/6339236\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Paper<\/a>] [acceptance rate 28%, received 4 reviews]<\/li>\n<li>Y. Hasan, <b>M. Taha<\/b>, S. Elsharif, A. Elaksher, `Integrated Intra-Vehicle &#8211; VANET System for Increasing Road Safety,&#8217; the Global Knowledge Forum (NOOR&#8217;08), June 2008.<\/li>\n<li><b>M. Taha<\/b>, Y. Hasan, `A Novel Headway-Based Vehicle-to-Vehicle Multi-Mode Broadcasting Protocol,&#8217; IEEE Vehicular Technology Conference (VTC&#8217;08), September 2008.<br \/>\n[<a href=\"http:\/\/ieeexplore.ieee.org\/abstract\/document\/4657283\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Paper<\/a>]<\/li>\n<li><b>M. Taha<\/b>, Y. Hasan, `VANET-DSRC Protocol for Reliable Broadcasting of Life Safety Messages,&#8217; IEEE International Symposium on Signal Processing and Information Technology (ISSPIT-07), 2007.<br \/>\n[<a href=\"http:\/\/ieeexplore.ieee.org\/abstract\/document\/4458046\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Paper<\/a>] [received 56 citations]<\/li>\n<\/ol>\n<h4><a name=\"TOC-Non-Refereed-Contributions:\"><\/a>Non-Refereed Contributions:<\/h4>\n<ol>\n<li>Invited Talk: \u2018Lightweight Leakage Resiliency for Symmetric Cryptography,\u2019 Department of Electrical and Computer Engineering, Northeastern University, MA, USA. Hosted by Dr. Yunsi Fei.<br \/>\n[<a href=\"https:\/\/sites.google.com\/a\/vt.edu\/mtaha\/NEU_2016.pdf?attredirects=0\" target=\"_blank\" rel=\"noopener noreferrer\">Talk<\/a>]<\/li>\n<li>Invited Talk: \u2018Advances in the Side-Channel Analysis of Symmetric Cryptography,\u2019 Department of Electrical and Computer Engineering at Worcester Polytechnic Institute (WPI), MA, USA. Hosted by Dr. Thomas Eisenbarth.<br \/>\n[<a href=\"https:\/\/sites.google.com\/a\/vt.edu\/mtaha\/WPI_2014.pdf?attredirects=0\" target=\"_blank\" rel=\"noopener noreferrer\">Talk<\/a>]<\/li>\n<li>Invited Talk: \u2018Introduction to Side-Channel Analysis,\u2019 VT-MENA program at the Bradley Department of Electrical and Computer Engineering, Virginia Tech, VA, USA.<\/li>\n<li>Newsletter: \u2018The Birth of a New Hashing Standard: SHA-3,\u2019 CESCA Newsletter, February 2013.<br \/>\n[reprint in <a href=\"http:\/\/www.eetimes.com\/author.asp?section_id=36&amp;doc_id=1287027\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">EETimes<\/a>]<\/li>\n<li>Poster: \u2018Side-Channel Analysis of MAC-Keccak,\u2019 Annual Workshop of Virginia Tech\u2019s Center for Embedded Systems for Critical Applications (CESCA), April 2013.<\/li>\n<li>Poster \u2018A Novel Pro\ufb01led Side-Channel Attack in Presence of High Algorithmic Noise,\u2019 Workshop on Cryptographic Hardware and Embedded Systems (CHES\u201912), September 2012.<\/li>\n<li>Poster \u2018High Dimensional Leakage Modeling of Combinational Logic Circuits,\u2019 Annual Workshop of Virginia Tech\u2019s Center for Embedded Systems for Critical Applications (CESCA), May 2012.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>An up-to-date publication records with citations by Google Scholar https:\/\/goo.gl\/1pvfNV Journal Articles: A. Monfared, M. Taha, A. Reyhani-Masoleh, \u2018Secure and E\ufb03cient Exponentiation Architectures Using Gaussian Normal Basis\u2019, Accepted for publication in the IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. A. Reyhani-Masoleh, M. Taha, D. Ashmawy, \u2018New Low-Area Designs for the AES Forward, [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","_mi_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":"","_links_to":"","_links_to_target":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Publications - Mostafa Taha<\/title>\n<meta name=\"description\" content=\"An up-to-date publication records with citations by Google Scholar https:\/\/goo.gl\/1pvfNV Journal Articles: A. Monfared, M. Taha, A. Reyhani-Masoleh,\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/carleton.ca\/mtaha\/publications\/\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/carleton.ca\/mtaha\/publications\/\",\"url\":\"https:\/\/carleton.ca\/mtaha\/publications\/\",\"name\":\"Publications - Mostafa Taha\",\"isPartOf\":{\"@id\":\"https:\/\/carleton.ca\/mtaha\/#website\"},\"datePublished\":\"2020-04-20T20:00:13+00:00\",\"dateModified\":\"2021-03-04T16:05:31+00:00\",\"description\":\"An up-to-date publication records with citations by Google Scholar https:\/\/goo.gl\/1pvfNV Journal Articles: A. Monfared, M. Taha, A. Reyhani-Masoleh,\",\"breadcrumb\":{\"@id\":\"https:\/\/carleton.ca\/mtaha\/publications\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/carleton.ca\/mtaha\/publications\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/carleton.ca\/mtaha\/publications\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/carleton.ca\/mtaha\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Publications\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/carleton.ca\/mtaha\/#website\",\"url\":\"https:\/\/carleton.ca\/mtaha\/\",\"name\":\"Mostafa Taha\",\"description\":\"Carleton University\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/carleton.ca\/mtaha\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Publications - Mostafa Taha","description":"An up-to-date publication records with citations by Google Scholar https:\/\/goo.gl\/1pvfNV Journal Articles: A. Monfared, M. Taha, A. Reyhani-Masoleh,","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/carleton.ca\/mtaha\/publications\/","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/carleton.ca\/mtaha\/publications\/","url":"https:\/\/carleton.ca\/mtaha\/publications\/","name":"Publications - Mostafa Taha","isPartOf":{"@id":"https:\/\/carleton.ca\/mtaha\/#website"},"datePublished":"2020-04-20T20:00:13+00:00","dateModified":"2021-03-04T16:05:31+00:00","description":"An up-to-date publication records with citations by Google Scholar https:\/\/goo.gl\/1pvfNV Journal Articles: A. Monfared, M. Taha, A. Reyhani-Masoleh,","breadcrumb":{"@id":"https:\/\/carleton.ca\/mtaha\/publications\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/carleton.ca\/mtaha\/publications\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/carleton.ca\/mtaha\/publications\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/carleton.ca\/mtaha\/"},{"@type":"ListItem","position":2,"name":"Publications"}]},{"@type":"WebSite","@id":"https:\/\/carleton.ca\/mtaha\/#website","url":"https:\/\/carleton.ca\/mtaha\/","name":"Mostafa Taha","description":"Carleton University","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/carleton.ca\/mtaha\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"acf":{"banner_image_type":"none","banner_button":"no"},"_links":{"self":[{"href":"https:\/\/carleton.ca\/mtaha\/wp-json\/wp\/v2\/pages\/19"}],"collection":[{"href":"https:\/\/carleton.ca\/mtaha\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/carleton.ca\/mtaha\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/carleton.ca\/mtaha\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/carleton.ca\/mtaha\/wp-json\/wp\/v2\/comments?post=19"}],"version-history":[{"count":3,"href":"https:\/\/carleton.ca\/mtaha\/wp-json\/wp\/v2\/pages\/19\/revisions"}],"predecessor-version":[{"id":63,"href":"https:\/\/carleton.ca\/mtaha\/wp-json\/wp\/v2\/pages\/19\/revisions\/63"}],"wp:attachment":[{"href":"https:\/\/carleton.ca\/mtaha\/wp-json\/wp\/v2\/media?parent=19"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}