Sitemap
A list of all the posts and pages found on the site. For you robots out there, there is an XML version available for digesting as well.
Pages
Posts
Future Blog Post
Published:
This post will show up by default. To disable scheduling of future posts, edit config.yml
and set future: false
.
Blog Post number 4
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Blog Post number 3
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Blog Post number 2
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Blog Post number 1
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
portfolio
Portfolio item number 1
Short description of portfolio item number 1
Portfolio item number 2
Short description of portfolio item number 2
publications
New Yoyo Tricks with AES-based Permutations
Published in IACR Transactions on Symmetric Cryptology, 2018
Use Google Scholar for full citation
Recommended citation: Dhiman Saha, Mostafizar Rahman, Goutam Paul, "New Yoyo Tricks with AES-based Permutations." IACR Transactions on Symmetric Cryptology, 2018.
Cryptanalysis of forkaes
Published in In the proceedings of International Conference on Applied Cryptography and Network Security, 2019
Use Google Scholar for full citation
Recommended citation: Subhadeep Banik, Jannis Bossert, Amit Jana, Eik List, Stefan Lucks, Willi Meier, Mostafizar Rahman, Dhiman Saha, Yu Sasaki, "Cryptanalysis of forkaes." In the proceedings of International Conference on Applied Cryptography and Network Security, 2019.
Cryptanalysis of FlexAEAD
Published in In the proceedings of Progress in Cryptology-AFRICACRYPT 2020: 12th International Conference on Cryptology in Africa, Cairo, Egypt, July 20--22, 2020, Proceedings, 2020
Use Google Scholar for full citation
Recommended citation: Mostafizar Rahman, Dhiman Saha, Goutam Paul, "Cryptanalysis of FlexAEAD." In the proceedings of Progress in Cryptology-AFRICACRYPT 2020: 12th International Conference on Cryptology in Africa, Cairo, Egypt, July 20--22, 2020, Proceedings, 2020.
Quantum Attacks on HCTR and its Variants
Published in IEEE Transactions on Quantum Engineering, 2020
Use Google Scholar for full citation
Recommended citation: Mostafizar Rahman, Goutam Paul, "Quantum Attacks on HCTR and its Variants." IEEE Transactions on Quantum Engineering, 2020.
Boomeyong: Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES and Pholkos
Published in IACR Transactions on Symmetric Cryptology, 2021
Use Google Scholar for full citation
Recommended citation: Mostafizar Rahman, Dhiman Saha, Goutam Paul, "Boomeyong: Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES and Pholkos." IACR Transactions on Symmetric Cryptology, 2021.
Grover on Present: Quantum Resource Estimation
Published in Cryptology ePrint Archive, 2021
Use Google Scholar for full citation
Recommended citation: Mostafizar Rahman, Goutam Paul, "Grover on Present: Quantum Resource Estimation." Cryptology ePrint Archive, 2021.
Grover on katan: Quantum resource estimation
Published in IEEE Transactions on Quantum Engineering, 2022
Use Google Scholar for full citation
Recommended citation: Mostafizar Rahman, Goutam Paul, "Grover on katan: Quantum resource estimation." IEEE Transactions on Quantum Engineering, 2022.
Divide and Rule: DiFA-Division Property Based Fault Attacks on PRESENT and GIFT
Published in In the proceedings of International Conference on Applied Cryptography and Network Security, 2023
Use Google Scholar for full citation
Recommended citation: Anup Kundu, Shibam Ghosh, Dhiman Saha, Mostafizar Rahman, "Divide and Rule: DiFA-Division Property Based Fault Attacks on PRESENT and GIFT." In the proceedings of International Conference on Applied Cryptography and Network Security, 2023.
Ghidle: Efficient Large-State Block Ciphers for Post-quantum Security
Published in In the proceedings of Australasian Conference on Information Security and Privacy, 2023
Use Google Scholar for full citation
Recommended citation: Motoki Nakahashi, Rentaro Shiba, Ravi Anand, Mostafizar Rahman, Kosei Sakamoto, Fukang Liu, Takanori Isobe, "Ghidle: Efficient Large-State Block Ciphers for Post-quantum Security." In the proceedings of Australasian Conference on Information Security and Privacy, 2023.
Revisiting Yoyo Tricks on AES
Published in IACR Transactions on Symmetric Cryptology, 2023
Use Google Scholar for full citation
Recommended citation: Sandip Mondal, Mostafizar Rahman, Santanu Sarkar, Avishek Adhikari, "Revisiting Yoyo Tricks on AES." IACR Transactions on Symmetric Cryptology, 2023.
Revisiting the Boomerang Attack from a Perspective of 3-differential
Published in IEEE Transactions on Information Theory, 2023
Use Google Scholar for full citation
Recommended citation: Libo Wang, Ling Song, Baofeng Wu, Mostafizar Rahman, Takanori Isobe, "Revisiting the Boomerang Attack from a Perspective of 3-differential." IEEE Transactions on Information Theory, 2023.
ASURA: An Efficient Large-State Tweakable Block Cipher for ARM Environment
Published in In the proceedings of International Conference on Cryptology in India, 2024
Use Google Scholar for full citation
Recommended citation: Atsushi Tanaka, Rentaro Shiba, Kosei Sakamoto, Mostafizar Rahman, Takuro Shiraya, Takanori Isobe, "ASURA: An Efficient Large-State Tweakable Block Cipher for ARM Environment." In the proceedings of International Conference on Cryptology in India, 2024.
BIZness: Bit Invariant Zero-Sum Property Based on Division Trail
Published in In the proceedings of International Conference on Cryptology in India, 2024
Use Google Scholar for full citation
Recommended citation: Shibam Ghosh, Anup Kundu, Mostafizar Rahman, Dhiman Saha, "BIZness: Bit Invariant Zero-Sum Property Based on Division Trail." In the proceedings of International Conference on Cryptology in India, 2024.
Differential fault attack on AES-based encryption schemes: application to B5G/6G ciphers—Rocca, Rocca-S and AEGIS
Published in Journal of Cryptographic Engineering, 2024
Use Google Scholar for full citation
Recommended citation: Ravi Anand, Takanori Isobe, Anup Kundu, Mostafizar Rahman, Sahiba Suryawanshi, "Differential fault attack on AES-based encryption schemes: application to B5G/6G ciphers—Rocca, Rocca-S and AEGIS." Journal of Cryptographic Engineering, 2024.
Gleeok: A Family of Low-Latency PRFs and its Applications to Authenticated Encryption
Published in IACR Transactions on Cryptographic Hardware and Embedded Systems, 2024
Use Google Scholar for full citation
Recommended citation: Ravi Anand, Subhadeep Banik, Andrea Caforio, Tatsuya Ishikawa, Takanori Isobe, Fukang Liu, Kazuhiko Minematsu, Mostafizar Rahman, Kosei Sakamoto, "Gleeok: A Family of Low-Latency PRFs and its Applications to Authenticated Encryption." IACR Transactions on Cryptographic Hardware and Embedded Systems, 2024.
Implementing Grover’s on AES-based AEAD schemes
Published in Scientific Reports, 2024
Use Google Scholar for full citation
Recommended citation: Surajit Mandal, Ravi Anand, Mostafizar Rahman, Santanu Sarkar, Takanori Isobe, "Implementing Grover’s on AES-based AEAD schemes." Scientific Reports, 2024.
Key Committing Attacks against AES-based AEAD Schemes
Published in IACR Transactions on Symmetric Cryptology, 2024
Use Google Scholar for full citation
Recommended citation: Patrick Derbez, Pierre-Alain Fouque, Takanori Isobe, Mostafizar Rahman, Andr{\'e} Schrottenloher, "Key Committing Attacks against AES-based AEAD Schemes." IACR Transactions on Symmetric Cryptology, 2024.
Yoyo cryptanalysis on Future
Published in International Journal of Applied Cryptography, 2024
Use Google Scholar for full citation
Recommended citation: Sandip Mondal, Mostafizar Rahman, Santanu Sarkar, Avishek Adhikari, "Yoyo cryptanalysis on Future." International Journal of Applied Cryptography, 2024.
AETHER: An Ultra-High Throughput and Low Energy Authenticated Encryption Scheme
Published in IACR Transactions on Cryptographic Hardware and Embedded Systems, 2025
Use Google Scholar for full citation
Recommended citation: Subhadeep Banik, Andrea Caforio, Tatsuya Ishikawa, Takanori Isobe, Mostafizar Rahman, Kosei Sakamoto, "AETHER: An Ultra-High Throughput and Low Energy Authenticated Encryption Scheme." IACR Transactions on Cryptographic Hardware and Embedded Systems, 2025.
Depending on DEEPAND: Cryptanalysis of NLFSR-based Lightweight Ciphers TinyJambu, Katan and Ktantan
Published in IEEE Transactions on Information Theory, 2025
Use Google Scholar for full citation
Recommended citation: Amit Jana, Mostafizar Rahman, Dhiman Saha, "Depending on DEEPAND: Cryptanalysis of NLFSR-based Lightweight Ciphers TinyJambu, Katan and Ktantan." IEEE Transactions on Information Theory, 2025.
On the Key-Commitment Properties of Forkcipher-based AEADs
Published in IACR Communications in Cryptology, 2025
Use Google Scholar for full citation
Recommended citation: Mostafizar Rahman, Samir Kundu, Takanori Isobe, "On the Key-Commitment Properties of Forkcipher-based AEADs." IACR Communications in Cryptology, 2025.
talks
Quantum Security of Classical Cryptosystems
Published:
Invited Talk
Boomeyong: Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES and Pholkos
Published:
Conference Talk (short talk, full talk)
Quantum Attacks on Symmetric-key Schemes
Published:
Invited Talk
Capturing the Dependency between Correlated AND gates using MILP
Published:
Invited Talk
Quantum Cryptography
Published:
Invited Talk
Key Committing Attacks against AES-based AEAD Schemes
Published:
Conference Talk
Key Committing Attacks against AES-based AEAD Schemes
Published:
Invited Talk
Locking Secrets: End-to-End Encryption and the Importance of Commitment
Published:
Invited Talk
teaching
Teaching experience 1
Undergraduate course, University 1, Department, 2014
This is a description of a teaching experience. You can use markdown like any other post.
Teaching experience 2
Workshop, University 1, Department, 2015
This is a description of a teaching experience. You can use markdown like any other post.