{"id":105,"date":"2024-06-24T12:59:56","date_gmt":"2024-06-24T16:59:56","guid":{"rendered":"https:\/\/carleton.ca\/sci-lab\/?page_id=105"},"modified":"2026-04-03T17:06:15","modified_gmt":"2026-04-03T21:06:15","slug":"publications","status":"publish","type":"page","link":"https:\/\/carleton.ca\/sci-lab\/publications\/","title":{"rendered":"Publications"},"content":{"rendered":"<p>Full list of publications of lab members (Google Scholar)<\/p>\n<ul>\n<li><a href=\"https:\/\/scholar.google.ca\/citations?hl=en&amp;user=iM8ssiUAAAAJ\">Mostafa Taha<\/a><\/li>\n<li><a href=\"https:\/\/scholar.google.ca\/citations?user=hb5Qvsmevr8C&amp;hl=en\">Mouhcine Guennoun<\/a><\/li>\n<li><a href=\"https:\/\/scholar.google.com\/citations?user=gtRaEm0AAAAJ&amp;hl=en\">Mahmoud AbdelHafeez Sayed<\/a><\/li>\n<li><a href=\"https:\/\/scholar.google.com\/citations?user=70y7FlgAAAAJ&amp;hl=en\">Mahmoud Yassin<\/a><\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.linkedin.com\/company\/sci-research-lab-carleton\/\"><img decoding=\"async\" loading=\"lazy\" class=\"\" src=\"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/thumb\/8\/81\/LinkedIn_icon.svg\/3840px-LinkedIn_icon.svg.png\" alt=\"File:LinkedIn icon.svg - Wikipedia\" width=\"38\" height=\"38\" \/><\/a>\u00a0 |<a href=\"https:\/\/github.com\/Carleton-SCI\"><img decoding=\"async\" loading=\"lazy\" class=\"\" src=\"https:\/\/logos-world.net\/wp-content\/uploads\/2020\/11\/GitHub-Logo-700x394.png\" alt=\"GitHub Logo\" width=\"65\" height=\"37\" \/><\/a><\/p>\n<p>A list of notable recent publications of SCI-LAB.<\/p>\n<ul>\n<li><strong>M.A. Sayed<\/strong>, and <strong>M. Taha<\/strong>. <a href=\"https:\/\/link.springer.com\/article\/10.1007\/s13389-025-00373-9\">Evaluation of encrypted matching criteria using homomorphic encryption based FSM<\/a>.\u00a0<i>J Cryptogr Eng<\/i>\u00a015, 8 (2025). https:\/\/doi.org\/10.1007\/s13389-025-00373-9<\/li>\n<li><strong>M.A. Sayed<\/strong>, and <strong>M. Taha<\/strong>. &#8220;<a href=\"https:\/\/www.nature.com\/articles\/s41598-023-48475-w\">Oblivious network intrusion detection systems<\/a>.&#8221;\u00a0<i>Scientific Reports<\/i> 13.1 (2023): 22308, doi: 10.1038\/s41598-023-48475-w<\/li>\n<li><strong>M. A. Sayed<\/strong> and <strong>M. Taha<\/strong>, &#8220;<a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/10357743\">A High Speed Post-Quantum Digital Signature At 180 Sig\/Sec On ARM Cortex-M4<\/a>,&#8221;\u00a0<em>2023 8th International Conference on Multimedia Communication Technologies (ICMCT)<\/em>, Xiamen, China, 2023, pp. 43-49, doi: 10.1109\/ICMCT60483.2023.00015.<\/li>\n<li><strong>M. Y. M. Yassin<\/strong>, A. A. Nasir, <strong>M. Taha<\/strong> and N. Iqbal, &#8220;<a href=\"https:\/\/ieeexplore.ieee.org\/document\/10320057\">Enhanced DFT-Based Chaotic Image Block Cipher with Several Modes of Operation<\/a>,&#8221;\u00a0<em>2023 Twelfth International Conference on Image Processing Theory, Tools and Applications (IPTA)<\/em>, Paris, France, 2023, pp. 1-6, doi: 10.1109\/IPTA59101.2023.10320057.<\/li>\n<li>M. Abdoun, <strong>M. Guennoun<\/strong>, A. Amar, T. Saad and <strong>M. Taha<\/strong>, &#8220;<a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/10187725\">Efficient BGP Intrusion Detection Model Using Machine Learning: A Comparative Study with AdaBoost as the Optimal Classifier<\/a>,&#8221;\u00a0<em>2023 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE)<\/em>, Regina, SK, Canada, 2023, pp. 399-404, doi: 10.1109\/CCECE58730.2023.10288818.<\/li>\n<li>A. Singh Lakhan, M. Abuibaid, J. Steed Huang, <strong>M. Taha<\/strong> and Z. Wang, &#8220;<a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/10187725\">Multivariate Polynomial Public Key Digital Signature Algorithm: Semi-covariance Analysis and Performance Test over 5G Networks<\/a>,&#8221;\u00a0<em>2023 19th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)<\/em>, Montreal, QC, Canada, 2023, pp. 299-305, doi: 10.1109\/WiMob58348.2023.10187725.<\/li>\n<li><strong>M. A. Sayed<\/strong> and <strong>M. Taha<\/strong>, &#8220;<a href=\"https:\/\/ieeexplore.ieee.org\/document\/9840140\">Oblivious Intrusion Detection System<\/a>,&#8221;\u00a0<em>2022 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)<\/em>, McLean, VA, USA, 2022, pp. 165-168, doi: 10.1109\/HOST54066.2022.9840140.<\/li>\n<li>A. Monfared, <strong>M. Taha<\/strong> and A. Reyhani-Masoleh, &#8220;<a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/9367292\">Secure and Efficient Exponentiation Architectures Using Gaussian Normal Basis<\/a>,&#8221; in\u00a0<em>IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems<\/em>, vol. 41, no. 3, pp. 424-437, March 2022, doi: 10.1109\/TCAD.2021.3063304.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Full list of publications of lab members (Google Scholar) Mostafa Taha Mouhcine Guennoun Mahmoud AbdelHafeez Sayed Mahmoud Yassin \u00a0 | A list of notable recent publications of SCI-LAB. M.A. Sayed, and M. Taha. Evaluation of encrypted matching criteria using homomorphic encryption based FSM.\u00a0J Cryptogr Eng\u00a015, 8 (2025). https:\/\/doi.org\/10.1007\/s13389-025-00373-9 M.A. Sayed, and M. Taha. &#8220;Oblivious network [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","_mi_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":"","_links_to":"","_links_to_target":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Publications - Secure Cryptographic Implementations Lab<\/title>\n<meta name=\"description\" content=\"Full list of publications of lab members (Google Scholar) Mostafa Taha Mouhcine Guennoun Mahmoud AbdelHafeez Sayed Mahmoud Yassin \u00a0 | A list of notable\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/carleton.ca\/sci-lab\/publications\/\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/carleton.ca\/sci-lab\/publications\/\",\"url\":\"https:\/\/carleton.ca\/sci-lab\/publications\/\",\"name\":\"Publications - Secure Cryptographic Implementations Lab\",\"isPartOf\":{\"@id\":\"https:\/\/carleton.ca\/sci-lab\/#website\"},\"datePublished\":\"2024-06-24T16:59:56+00:00\",\"dateModified\":\"2026-04-03T21:06:15+00:00\",\"description\":\"Full list of publications of lab members (Google Scholar) Mostafa Taha Mouhcine Guennoun Mahmoud AbdelHafeez Sayed Mahmoud Yassin \u00a0 | A list of notable\",\"breadcrumb\":{\"@id\":\"https:\/\/carleton.ca\/sci-lab\/publications\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/carleton.ca\/sci-lab\/publications\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/carleton.ca\/sci-lab\/publications\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/carleton.ca\/sci-lab\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Publications\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/carleton.ca\/sci-lab\/#website\",\"url\":\"https:\/\/carleton.ca\/sci-lab\/\",\"name\":\"Secure Cryptographic Implementations Lab\",\"description\":\"Carleton University\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/carleton.ca\/sci-lab\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Publications - Secure Cryptographic Implementations Lab","description":"Full list of publications of lab members (Google Scholar) Mostafa Taha Mouhcine Guennoun Mahmoud AbdelHafeez Sayed Mahmoud Yassin \u00a0 | A list of notable","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/carleton.ca\/sci-lab\/publications\/","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/carleton.ca\/sci-lab\/publications\/","url":"https:\/\/carleton.ca\/sci-lab\/publications\/","name":"Publications - Secure Cryptographic Implementations Lab","isPartOf":{"@id":"https:\/\/carleton.ca\/sci-lab\/#website"},"datePublished":"2024-06-24T16:59:56+00:00","dateModified":"2026-04-03T21:06:15+00:00","description":"Full list of publications of lab members (Google Scholar) Mostafa Taha Mouhcine Guennoun Mahmoud AbdelHafeez Sayed Mahmoud Yassin \u00a0 | A list of notable","breadcrumb":{"@id":"https:\/\/carleton.ca\/sci-lab\/publications\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/carleton.ca\/sci-lab\/publications\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/carleton.ca\/sci-lab\/publications\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/carleton.ca\/sci-lab\/"},{"@type":"ListItem","position":2,"name":"Publications"}]},{"@type":"WebSite","@id":"https:\/\/carleton.ca\/sci-lab\/#website","url":"https:\/\/carleton.ca\/sci-lab\/","name":"Secure Cryptographic Implementations Lab","description":"Carleton University","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/carleton.ca\/sci-lab\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"acf":{"banner_image_type":"none","banner_button":"no","banner_hosted_image":"aerial","banner_opacity":"default"},"_links":{"self":[{"href":"https:\/\/carleton.ca\/sci-lab\/wp-json\/wp\/v2\/pages\/105"}],"collection":[{"href":"https:\/\/carleton.ca\/sci-lab\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/carleton.ca\/sci-lab\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/carleton.ca\/sci-lab\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/carleton.ca\/sci-lab\/wp-json\/wp\/v2\/comments?post=105"}],"version-history":[{"count":3,"href":"https:\/\/carleton.ca\/sci-lab\/wp-json\/wp\/v2\/pages\/105\/revisions"}],"predecessor-version":[{"id":246,"href":"https:\/\/carleton.ca\/sci-lab\/wp-json\/wp\/v2\/pages\/105\/revisions\/246"}],"wp:attachment":[{"href":"https:\/\/carleton.ca\/sci-lab\/wp-json\/wp\/v2\/media?parent=105"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}