Portfolio item number 1
Short description of portfolio item number 1
Short description of portfolio item number 1
Short description of portfolio item number 2
Published in IACR Transactions on Symmetric Cryptology, 2018
Use Google Scholar for full citation
Recommended citation: Dhiman Saha, Mostafizar Rahman, Goutam Paul, "New Yoyo Tricks with AES-based Permutations." IACR Transactions on Symmetric Cryptology, 2018.
Published in In the proceedings of International Conference on Applied Cryptography and Network Security, 2019
Use Google Scholar for full citation
Recommended citation: Subhadeep Banik, Jannis Bossert, Amit Jana, Eik List, Stefan Lucks, Willi Meier, Mostafizar Rahman, Dhiman Saha, Yu Sasaki, "Cryptanalysis of forkaes." In the proceedings of International Conference on Applied Cryptography and Network Security, 2019.
Published in In the proceedings of Progress in Cryptology-AFRICACRYPT 2020: 12th International Conference on Cryptology in Africa, Cairo, Egypt, July 20--22, 2020, Proceedings, 2020
Use Google Scholar for full citation
Recommended citation: Mostafizar Rahman, Dhiman Saha, Goutam Paul, "Cryptanalysis of FlexAEAD." In the proceedings of Progress in Cryptology-AFRICACRYPT 2020: 12th International Conference on Cryptology in Africa, Cairo, Egypt, July 20--22, 2020, Proceedings, 2020.
Published in IEEE Transactions on Quantum Engineering, 2020
Use Google Scholar for full citation
Recommended citation: Mostafizar Rahman, Goutam Paul, "Quantum Attacks on HCTR and its Variants." IEEE Transactions on Quantum Engineering, 2020.
Published in IACR Transactions on Symmetric Cryptology, 2021
Use Google Scholar for full citation
Recommended citation: Mostafizar Rahman, Dhiman Saha, Goutam Paul, "Boomeyong: Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES and Pholkos." IACR Transactions on Symmetric Cryptology, 2021.
Published in Cryptology ePrint Archive, 2021
Use Google Scholar for full citation
Recommended citation: Mostafizar Rahman, Goutam Paul, "Grover on Present: Quantum Resource Estimation." Cryptology ePrint Archive, 2021.
Published in IEEE Transactions on Quantum Engineering, 2022
Use Google Scholar for full citation
Recommended citation: Mostafizar Rahman, Goutam Paul, "Grover on katan: Quantum resource estimation." IEEE Transactions on Quantum Engineering, 2022.
Published in In the proceedings of International Conference on Applied Cryptography and Network Security, 2023
Use Google Scholar for full citation
Recommended citation: Anup Kundu, Shibam Ghosh, Dhiman Saha, Mostafizar Rahman, "Divide and Rule: DiFA-Division Property Based Fault Attacks on PRESENT and GIFT." In the proceedings of International Conference on Applied Cryptography and Network Security, 2023.
Published in In the proceedings of Australasian Conference on Information Security and Privacy, 2023
Use Google Scholar for full citation
Recommended citation: Motoki Nakahashi, Rentaro Shiba, Ravi Anand, Mostafizar Rahman, Kosei Sakamoto, Fukang Liu, Takanori Isobe, "Ghidle: Efficient Large-State Block Ciphers for Post-quantum Security." In the proceedings of Australasian Conference on Information Security and Privacy, 2023.
Published in IACR Transactions on Symmetric Cryptology, 2023
Use Google Scholar for full citation
Recommended citation: Sandip Mondal, Mostafizar Rahman, Santanu Sarkar, Avishek Adhikari, "Revisiting Yoyo Tricks on AES." IACR Transactions on Symmetric Cryptology, 2023.
Published in IEEE Transactions on Information Theory, 2023
Use Google Scholar for full citation
Recommended citation: Libo Wang, Ling Song, Baofeng Wu, Mostafizar Rahman, Takanori Isobe, "Revisiting the Boomerang Attack from a Perspective of 3-differential." IEEE Transactions on Information Theory, 2023.
Published in In the proceedings of International Conference on Cryptology in India, 2024
Use Google Scholar for full citation
Recommended citation: Atsushi Tanaka, Rentaro Shiba, Kosei Sakamoto, Mostafizar Rahman, Takuro Shiraya, Takanori Isobe, "ASURA: An Efficient Large-State Tweakable Block Cipher for ARM Environment." In the proceedings of International Conference on Cryptology in India, 2024.
Published in In the proceedings of International Conference on Cryptology in India, 2024
Use Google Scholar for full citation
Recommended citation: Shibam Ghosh, Anup Kundu, Mostafizar Rahman, Dhiman Saha, "BIZness: Bit Invariant Zero-Sum Property Based on Division Trail." In the proceedings of International Conference on Cryptology in India, 2024.
Published in Journal of Cryptographic Engineering, 2024
Use Google Scholar for full citation
Recommended citation: Ravi Anand, Takanori Isobe, Anup Kundu, Mostafizar Rahman, Sahiba Suryawanshi, "Differential fault attack on AES-based encryption schemes: application to B5G/6G ciphers—Rocca, Rocca-S and AEGIS." Journal of Cryptographic Engineering, 2024.
Published in IACR Transactions on Cryptographic Hardware and Embedded Systems, 2024
Use Google Scholar for full citation
Recommended citation: Ravi Anand, Subhadeep Banik, Andrea Caforio, Tatsuya Ishikawa, Takanori Isobe, Fukang Liu, Kazuhiko Minematsu, Mostafizar Rahman, Kosei Sakamoto, "Gleeok: A Family of Low-Latency PRFs and its Applications to Authenticated Encryption." IACR Transactions on Cryptographic Hardware and Embedded Systems, 2024.
Published in Scientific Reports, 2024
Use Google Scholar for full citation
Recommended citation: Surajit Mandal, Ravi Anand, Mostafizar Rahman, Santanu Sarkar, Takanori Isobe, "Implementing Grover’s on AES-based AEAD schemes." Scientific Reports, 2024.
Published in IACR Transactions on Symmetric Cryptology, 2024
Use Google Scholar for full citation
Recommended citation: Patrick Derbez, Pierre-Alain Fouque, Takanori Isobe, Mostafizar Rahman, Andr{\'e} Schrottenloher, "Key Committing Attacks against AES-based AEAD Schemes." IACR Transactions on Symmetric Cryptology, 2024.
Published in International Journal of Applied Cryptography, 2024
Use Google Scholar for full citation
Recommended citation: Sandip Mondal, Mostafizar Rahman, Santanu Sarkar, Avishek Adhikari, "Yoyo cryptanalysis on Future." International Journal of Applied Cryptography, 2024.
Published in IACR Transactions on Cryptographic Hardware and Embedded Systems, 2025
Use Google Scholar for full citation
Recommended citation: Subhadeep Banik, Andrea Caforio, Tatsuya Ishikawa, Takanori Isobe, Mostafizar Rahman, Kosei Sakamoto, "AETHER: An Ultra-High Throughput and Low Energy Authenticated Encryption Scheme." IACR Transactions on Cryptographic Hardware and Embedded Systems, 2025.
Published in IEEE Transactions on Information Theory, 2025
Use Google Scholar for full citation
Recommended citation: Amit Jana, Mostafizar Rahman, Dhiman Saha, "Depending on DEEPAND: Cryptanalysis of NLFSR-based Lightweight Ciphers TinyJambu, Katan and Ktantan." IEEE Transactions on Information Theory, 2025.
Published in IACR Communications in Cryptology, 2025
Use Google Scholar for full citation
Recommended citation: Mostafizar Rahman, Samir Kundu, Takanori Isobe, "On the Key-Commitment Properties of Forkcipher-based AEADs." IACR Communications in Cryptology, 2025.
Published:
Invited Talk
Published:
Conference Talk (short talk, full talk)
Published:
Invited Talk
Published:
Invited Talk
Published:
Invited Talk
Published:
Conference Talk
Published:
Invited Talk
Published:
Invited Talk
Undergraduate course, University 1, Department, 2014
This is a description of a teaching experience. You can use markdown like any other post.
Workshop, University 1, Department, 2015
This is a description of a teaching experience. You can use markdown like any other post.