On the Key-Commitment Properties of Forkcipher-based AEADs. Mostafizar Rahman, Samir Kundu and Takanori Isobe. IACR Communications in Cryptology, Vol. 2024, Issue 4.
ASURA: An Efficient Large-State Tweakable Block Cipher For ARM Environment. Atsushi Tanaka, Rentaro Shiba, Kosei Sakamoto, Mostafizar Rahman, Takuro Shiraya and Takanori Isobe. Indocrypt 2024.
BIZness: Bit Invariant Zero-Sum Property based on Division Trail. Shibam Ghosh, Anup Kumar Kundu, Mostafizar Rahman and Dhiman Saha. Indocrypt 2024.
Differential fault attack on AES-based encryption schemes: application to B5G/6G ciphers-Rocca, Rocca-S and AEGIS. Ravi Anand, Takanori Isobe, Anup Kumar Kundu, Mostafizar Rahman, Sahiba Suryawanshi. Journal of Cryptographic Engineering 14, 595–607 (2024).
Implementing Grover’s on AES-based AEAD schemes. Surajit Mandal, Ravi Anand, Mostafizar Rahman, Santanu Sarkar, Takanori Isobe. Scientific Reports volume 14, Article number: 21105 (2024).
Gleeok: A Family of Low-Latency PRFs and its Applications to Authenticated Encryption. Ravi Anand, Subhadeep Banik, Andrea Caforio, Tatsuya Ishikawa, Takanori Isobe, Fukang Liu, Kazuhiko Minematsu, Mostafizar Rahman, Kosei Sakamoto. IACR Transactions on Cryptographic Hardware and Embedded Systems, Volume 2024, Issue 2.
Key Committing Attacks against AES-based AEAD Schemes. Patrick Derbez, Pierre-Alain Fouque, Takanori Isobe, Mostafizar Rahman, André Schrottenloher. IACR Transactions on Symmetric Cryptology (ToSC) Volume 2024, Issue 1.
Revisiting Yoyo Tricks on AES. Sandip Kumar Mondal, Mostafizar Rahman, Santanu Sarkar, Avishek Adhikari. IACR Transactions on Symmetric Cryptology (ToSC) Volume 2023, Issue 4.
Revisiting the Boomerang Attack from a Perspective of 3-differential. Libo Wang, Ling Song, Baofeng Wu, Mostafizar Rahman, Takanori Isobe. IEEE Transactions on Information Theory.
Ghidle: Efficient Large-State Block Ciphers for Post-Quantum Security. Motoki Nakahashi, Rentaro Shiba, Ravi Anand, Mostafizar Rahman, Kosei Sakamoto, Fukang Liu and Takanori Isobe. Australasian Conference on Information Security and Privacy (ACISP 2023).
Divide and Rule: DiFA - Division Property Based Fault Attacks on PRESENT and GIFT. Anup Kundu, Shibam Ghosh, Dhiman Saha and Mostafizar Rahman. Applied Cryptography and Network Security (ACNS) 2023.
Grover on KATAN: Quantum Resource Estimation. Mostafizar Rahman and Goutam Paul. IEEE Transactions on Quantum Engineering 2022(3).
Boomeyong: Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES and Pholkos. Mostafizar Rahman, Dhiman Saha and Goutam Paul. IACR Transactions on Symmetric Cryptology (ToSC) Volume 2021, Issue 3.
Quantum Attacks on HCTR and its Variants. Mostafizar Rahman and Goutam Paul. IEEE Transactions on Quantum Engineering 2020(1).
Cryptanalysis of FlexAEAD. Mostafizar Rahman, Dhiman Saha and Goutam Paul. Africacrypt 2020.
Cryptanalysis of ForkAES. Subhadeep Banik, Jannis Bossert, Amit Jana, Eik List, Stefan Lucks, Willi Meier, Mostafizar Rahman, Dhiman Saha and Yu Sasaki. Applied Cryptography and Network Security 2019.
New Yoyo Tricks with AES-based Permutations. Dhiman Saha, Mostafizar Rahman and Goutam Paul. IACR Transactions on Symmetric Cryptology (ToSC) Volume 2018, Issue 4.
Cryptanalysis of Internal keyed Permutation of FlexAEAD. Mostafizar Rahman, Dhiman Saha and Goutam Paul. NIST Lightweight Cryptography Workshop 2019.