Sitemap

A list of all the posts and pages found on the site. For you robots out there, there is an XML version available for digesting as well.

Pages

Posts

Future Blog Post

less than 1 minute read

Published:

This post will show up by default. To disable scheduling of future posts, edit config.yml and set future: false.

Blog Post number 4

less than 1 minute read

Published:

This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.

Blog Post number 3

less than 1 minute read

Published:

This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.

Blog Post number 2

less than 1 minute read

Published:

This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.

Blog Post number 1

less than 1 minute read

Published:

This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.

portfolio

publications

New Yoyo Tricks with AES-based Permutations

Published in IACR Transactions on Symmetric Cryptology, 2018

Use Google Scholar for full citation

Recommended citation: Dhiman Saha, Mostafizar Rahman, Goutam Paul, "New Yoyo Tricks with AES-based Permutations." IACR Transactions on Symmetric Cryptology, 2018.

Cryptanalysis of forkaes

Published in In the proceedings of International Conference on Applied Cryptography and Network Security, 2019

Use Google Scholar for full citation

Recommended citation: Subhadeep Banik, Jannis Bossert, Amit Jana, Eik List, Stefan Lucks, Willi Meier, Mostafizar Rahman, Dhiman Saha, Yu Sasaki, "Cryptanalysis of forkaes." In the proceedings of International Conference on Applied Cryptography and Network Security, 2019.

Cryptanalysis of FlexAEAD

Published in In the proceedings of Progress in Cryptology-AFRICACRYPT 2020: 12th International Conference on Cryptology in Africa, Cairo, Egypt, July 20--22, 2020, Proceedings, 2020

Use Google Scholar for full citation

Recommended citation: Mostafizar Rahman, Dhiman Saha, Goutam Paul, "Cryptanalysis of FlexAEAD." In the proceedings of Progress in Cryptology-AFRICACRYPT 2020: 12th International Conference on Cryptology in Africa, Cairo, Egypt, July 20--22, 2020, Proceedings, 2020.

Quantum Attacks on HCTR and its Variants

Published in IEEE Transactions on Quantum Engineering, 2020

Use Google Scholar for full citation

Recommended citation: Mostafizar Rahman, Goutam Paul, "Quantum Attacks on HCTR and its Variants." IEEE Transactions on Quantum Engineering, 2020.

Divide and Rule: DiFA-Division Property Based Fault Attacks on PRESENT and GIFT

Published in In the proceedings of International Conference on Applied Cryptography and Network Security, 2023

Use Google Scholar for full citation

Recommended citation: Anup Kundu, Shibam Ghosh, Dhiman Saha, Mostafizar Rahman, "Divide and Rule: DiFA-Division Property Based Fault Attacks on PRESENT and GIFT." In the proceedings of International Conference on Applied Cryptography and Network Security, 2023.

Ghidle: Efficient Large-State Block Ciphers for Post-quantum Security

Published in In the proceedings of Australasian Conference on Information Security and Privacy, 2023

Use Google Scholar for full citation

Recommended citation: Motoki Nakahashi, Rentaro Shiba, Ravi Anand, Mostafizar Rahman, Kosei Sakamoto, Fukang Liu, Takanori Isobe, "Ghidle: Efficient Large-State Block Ciphers for Post-quantum Security." In the proceedings of Australasian Conference on Information Security and Privacy, 2023.

Revisiting Yoyo Tricks on AES

Published in IACR Transactions on Symmetric Cryptology, 2023

Use Google Scholar for full citation

Recommended citation: Sandip Mondal, Mostafizar Rahman, Santanu Sarkar, Avishek Adhikari, "Revisiting Yoyo Tricks on AES." IACR Transactions on Symmetric Cryptology, 2023.

ASURA: An Efficient Large-State Tweakable Block Cipher for ARM Environment

Published in In the proceedings of International Conference on Cryptology in India, 2024

Use Google Scholar for full citation

Recommended citation: Atsushi Tanaka, Rentaro Shiba, Kosei Sakamoto, Mostafizar Rahman, Takuro Shiraya, Takanori Isobe, "ASURA: An Efficient Large-State Tweakable Block Cipher for ARM Environment." In the proceedings of International Conference on Cryptology in India, 2024.

BIZness: Bit Invariant Zero-Sum Property Based on Division Trail

Published in In the proceedings of International Conference on Cryptology in India, 2024

Use Google Scholar for full citation

Recommended citation: Shibam Ghosh, Anup Kundu, Mostafizar Rahman, Dhiman Saha, "BIZness: Bit Invariant Zero-Sum Property Based on Division Trail." In the proceedings of International Conference on Cryptology in India, 2024.

Gleeok: A Family of Low-Latency PRFs and its Applications to Authenticated Encryption

Published in IACR Transactions on Cryptographic Hardware and Embedded Systems, 2024

Use Google Scholar for full citation

Recommended citation: Ravi Anand, Subhadeep Banik, Andrea Caforio, Tatsuya Ishikawa, Takanori Isobe, Fukang Liu, Kazuhiko Minematsu, Mostafizar Rahman, Kosei Sakamoto, "Gleeok: A Family of Low-Latency PRFs and its Applications to Authenticated Encryption." IACR Transactions on Cryptographic Hardware and Embedded Systems, 2024.

Key Committing Attacks against AES-based AEAD Schemes

Published in IACR Transactions on Symmetric Cryptology, 2024

Use Google Scholar for full citation

Recommended citation: Patrick Derbez, Pierre-Alain Fouque, Takanori Isobe, Mostafizar Rahman, Andr{\'e} Schrottenloher, "Key Committing Attacks against AES-based AEAD Schemes." IACR Transactions on Symmetric Cryptology, 2024.

Yoyo cryptanalysis on Future

Published in International Journal of Applied Cryptography, 2024

Use Google Scholar for full citation

Recommended citation: Sandip Mondal, Mostafizar Rahman, Santanu Sarkar, Avishek Adhikari, "Yoyo cryptanalysis on Future." International Journal of Applied Cryptography, 2024.

AETHER: An Ultra-High Throughput and Low Energy Authenticated Encryption Scheme

Published in IACR Transactions on Cryptographic Hardware and Embedded Systems, 2025

Use Google Scholar for full citation

Recommended citation: Subhadeep Banik, Andrea Caforio, Tatsuya Ishikawa, Takanori Isobe, Mostafizar Rahman, Kosei Sakamoto, "AETHER: An Ultra-High Throughput and Low Energy Authenticated Encryption Scheme." IACR Transactions on Cryptographic Hardware and Embedded Systems, 2025.

talks

teaching

Teaching experience 1

Undergraduate course, University 1, Department, 2014

This is a description of a teaching experience. You can use markdown like any other post.

Teaching experience 2

Workshop, University 1, Department, 2015

This is a description of a teaching experience. You can use markdown like any other post.