default search action
Arash Reyhani-Masoleh
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2022
- [j36]Amin Monfared, Mostafa M. I. Taha, Arash Reyhani-Masoleh:
Secure and Efficient Exponentiation Architectures Using Gaussian Normal Basis. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41(3): 424-437 (2022) - 2020
- [j35]Arash Reyhani-Masoleh, Mostafa M. I. Taha, Doaa Ashmawy:
New Low-Area Designs for the AES Forward, Inverse and Combined S-Boxes. IEEE Trans. Computers 69(12): 1757-1773 (2020) - 2019
- [j34]Arash Reyhani-Masoleh, Hayssam El-Razouk, Amin Monfared:
New Multiplicative Inverse Architectures Using Gaussian Normal Basis. IEEE Trans. Computers 68(7): 991-1006 (2019) - 2018
- [j33]Amir Ardakani, Shahriar B. Shokouhi, Arash Reyhani-Masoleh:
Improving performance of FPGA-based SR-latch PUF using Transient Effect Ring Oscillator and programmable delay lines. Integr. 62: 371-381 (2018) - [j32]Arash Reyhani-Masoleh, Mostafa M. I. Taha, Doaa Ashmawy:
Smashing the Implementation Records of AES S-box. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(2): 298-336 (2018) - 2016
- [j31]Ebrahim A. Hasan Abdulrahman, Arash Reyhani-Masoleh:
High-Speed Hybrid-Double Multiplication Architectures Using New Serial-Out Bit-Level Mastrovito Multipliers. IEEE Trans. Computers 65(6): 1734-1747 (2016) - [j30]Dipanwita Gangopadhyay, Arash Reyhani-Masoleh:
Multiple-Bit Parity-Based Concurrent Fault Detection Architecture for Parallel CRC Computation. IEEE Trans. Computers 65(7): 2143-2157 (2016) - [j29]Hayssam El-Razouk, Arash Reyhani-Masoleh:
New Architectures for Digit-Level Single, Hybrid-Double, Hybrid-Triple Field Multiplications and Exponentiation Using Gaussian Normal Bases. IEEE Trans. Computers 65(8): 2495-2509 (2016) - 2015
- [j28]Ebrahim A. Hasan Abdulrahman, Arash Reyhani-Masoleh:
New Regular Radix-8 Scheme for Elliptic Curve Scalar Multiplication without Pre-Computation. IEEE Trans. Computers 64(2): 438-451 (2015) - [j27]Arash Reyhani-Masoleh:
Comments on "Low-Latency Digit-Serial Systolic Double Basis Multiplier over GF(2m) Using Subquadratic Toeplitz Matrix-Vector Product Approach". IEEE Trans. Computers 64(4): 1215-1216 (2015) - [j26]Hayssam El-Razouk, Arash Reyhani-Masoleh, Guang Gong:
New Hardware Implementations of WG(29, 11) and WG-16 Stream Ciphers Using Polynomial Basis. IEEE Trans. Computers 64(7): 2020-2035 (2015) - [j25]Reza Azarderakhsh, Arash Reyhani-Masoleh:
Parallel and High-Speed Computations of Elliptic Curve Cryptography Using Hybrid-Double Multipliers. IEEE Trans. Parallel Distributed Syst. 26(6): 1668-1677 (2015) - 2014
- [j24]Siavash Bayat Sarmadi, Mehran Mozaffari Kermani, Arash Reyhani-Masoleh:
Efficient and Concurrent Reliable Realization of the Secure Cryptographic SHA-3 Algorithm. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 33(7): 1105-1109 (2014) - [j23]Hayssam El-Razouk, Arash Reyhani-Masoleh, Guang Gong:
New Implementations of the WG Stream Cipher. IEEE Trans. Very Large Scale Integr. Syst. 22(9): 1865-1878 (2014) - 2013
- [j22]Reza Azarderakhsh, Arash Reyhani-Masoleh:
Low-Complexity Multiplier Architectures for Single and Hybrid-Double Multiplications in Gaussian Normal Bases. IEEE Trans. Computers 62(4): 744-757 (2013) - [j21]Reza Azarderakhsh, Arash Reyhani-Masoleh:
High-Performance Implementation of Point Multiplication on Koblitz Curves. IEEE Trans. Circuits Syst. II Express Briefs 60-II(1): 41-45 (2013) - 2012
- [j20]Mehran Mozaffari Kermani, Arash Reyhani-Masoleh:
Efficient and High-Performance Parallel Hardware Architectures for the AES-GCM. IEEE Trans. Computers 61(8): 1165-1178 (2012) - [j19]Reza Azarderakhsh, Arash Reyhani-Masoleh:
Efficient FPGA Implementations of Point Multiplication on Binary Edwards and Generalized Hessian Curves Using Gaussian Normal Basis. IEEE Trans. Very Large Scale Integr. Syst. 20(8): 1453-1466 (2012) - 2011
- [j18]Reza Azarderakhsh, Arash Reyhani-Masoleh:
Secure Clustering and Symmetric Key Establishment in Heterogeneous Wireless Sensor Networks. EURASIP J. Wirel. Commun. Netw. 2011 (2011) - [j17]Mohsen Bahramali, Jin Jiang, Arash Reyhani-Masoleh:
A Fault Detection Scheme for the FPGA Implementation of SHA-1 and SHA-512 Round Computations. J. Electron. Test. 27(4): 517-530 (2011) - [j16]Mehran Mozaffari Kermani, Arash Reyhani-Masoleh:
A Low-Power High-Performance Concurrent Fault Detection Approach for the Composite Field S-Box and Inverse S-Box. IEEE Trans. Computers 60(9): 1327-1340 (2011) - [j15]Arash Hariri, Arash Reyhani-Masoleh:
Concurrent Error Detection in Montgomery Multiplication over Binary Extension Fields. IEEE Trans. Computers 60(9): 1341-1353 (2011) - [j14]Mehran Mozaffari Kermani, Arash Reyhani-Masoleh:
A Lightweight High-Performance Fault Detection Scheme for the Advanced Encryption Standard Using Composite Fields. IEEE Trans. Very Large Scale Integr. Syst. 19(1): 85-91 (2011) - [j13]Arash Hariri, Arash Reyhani-Masoleh:
Digit-Level Semi-Systolic and Systolic Structures for the Shifted Polynomial Basis Multiplication Over Binary Extension Fields. IEEE Trans. Very Large Scale Integr. Syst. 19(11): 2125-2129 (2011) - 2010
- [j12]Mehran Mozaffari Kermani, Arash Reyhani-Masoleh:
Concurrent Structure-Independent Fault Detection Schemes for the Advanced Encryption Standard. IEEE Trans. Computers 59(5): 608-622 (2010) - 2009
- [j11]Mehran Mozaffari Kermani, Arash Reyhani-Masoleh:
Fault Detection Structures of the S-boxes and the Inverse S-boxes for the Advanced Encryption Standard. J. Electron. Test. 25(4-5): 225-245 (2009) - [j10]Arash Hariri, Arash Reyhani-Masoleh:
Bit-Serial and Bit-Parallel Montgomery Multiplication and Squaring over GF(2^m). IEEE Trans. Computers 58(10): 1332-1345 (2009) - 2006
- [j9]Arash Reyhani-Masoleh:
Efficient Algorithms and Architectures for Field Multiplication Using Gaussian Normal Bases. IEEE Trans. Computers 55(1): 34-47 (2006) - [j8]Arash Reyhani-Masoleh, M. Anwar Hasan:
Fault Detection Architectures for Field Multiplication Using Polynomial Bases. IEEE Trans. Computers 55(9): 1089-1103 (2006) - 2005
- [j7]Arash Reyhani-Masoleh, M. Anwar Hasan:
Low Complexity Word-Level Sequential Normal Basis Multipliers. IEEE Trans. Computers 54(2): 98-110 (2005) - 2004
- [j6]Arash Reyhani-Masoleh, M. Anwar Hasan:
Low Complexity Bit Parallel Architectures for Polynomial Basis Multiplication over GF(2^{m}). IEEE Trans. Computers 53(8): 945-959 (2004) - [j5]Arash Reyhani-Masoleh, M. Anwar Hasan:
Efficient digit-serial normal basis multipliers over binary extension fields. ACM Trans. Embed. Comput. Syst. 3(3): 575-592 (2004) - [j4]Arash Reyhani-Masoleh, M. Anwar Hasan:
Towards fault-tolerant cryptographic computations over finite fields. ACM Trans. Embed. Comput. Syst. 3(3): 593-613 (2004) - 2003
- [j3]Arash Reyhani-Masoleh, M. Anwarul Hasan:
Efficient Multiplication Beyond Optimal Normal Bases. IEEE Trans. Computers 52(4): 428-439 (2003) - [j2]Arash Reyhani-Masoleh, M. Anwarul Hasan:
Fast Normal Basis Multiplication Using General Purpose Processors. IEEE Trans. Computers 52(11): 1379-1390 (2003) - 2002
- [j1]Arash Reyhani-Masoleh, M. Anwarul Hasan:
A New Construction of Massey-Omura Parallel Multiplier over GF(2m). IEEE Trans. Computers 51(5): 511-520 (2002)
Conference and Workshop Papers
- 2021
- [c28]Doaa Ashmawy, Arash Reyhani-Masoleh:
A Faster Hardware Implementation of the AES S-box. ARITH 2021: 123-130 - 2018
- [c27]Arash Reyhani-Masoleh, Mostafa M. I. Taha, Doaa Ashmawy:
New Area Record for the AES Combined S-Box/Inverse S-Box. ARITH 2018: 145-152 - 2017
- [c26]Amin Monfared, Hayssam El-Razouk, Arash Reyhani-Masoleh:
A New Multiplicative Inverse Architecture in Normal Basis Using Novel Concurrent Serial Squaring and Multiplication. ARITH 2017: 164-171 - [c25]Mostafa M. I. Taha, Arash Reyhani-Masoleh, Patrick Schaumont:
Stateless leakage resiliency from NLFSRs. HOST 2017: 56-61 - 2016
- [c24]Amir Ali Kouzeh Geran, Arash Reyhani-Masoleh:
A CRC-Based Concurrent Fault Detection Architecture for Galois/Counter Mode (GCM). ARITH 2016: 24-31 - [c23]Mostafa M. I. Taha, Arash Reyhani-Masoleh, Patrick Schaumont:
Keymill: Side-Channel Resilient Key Generator, A New Concept for SCA-Security by Design - A New Concept for SCA-Security by Design. SAC 2016: 217-230 - 2015
- [c22]Hayssam El-Razouk, Arash Reyhani-Masoleh:
New Bit-Level Serial GF (2m) Multiplication Using Polynomial Basis. ARITH 2015: 129-136 - 2011
- [c21]Mehran Mozaffari Kermani, Arash Reyhani-Masoleh:
Reliable Hardware Architectures for the Third-Round SHA-3 Finalist Grostl Benchmarked on FPGA Platform. DFT 2011: 325-331 - [c20]Mehran Mozaffari Kermani, Arash Reyhani-Masoleh:
A High-Performance Fault Diagnosis Approach for the AES SubBytes Utilizing Mixed Bases. FDTC 2011: 80-87 - 2010
- [c19]Reza Azarderakhsh, Arash Reyhani-Masoleh:
A Modified Low Complexity Digit-Level Gaussian Normal Basis Multiplier. WAIFI 2010: 25-40 - 2009
- [c18]Christopher Kennedy, Arash Reyhani-Masoleh:
High-speed CRC computations using improved state-space transformations. EIT 2009: 9-14 - [c17]Mehran Mozaffari Kermani, Arash Reyhani-Masoleh:
A low-cost S-box for the Advanced Encryption Standard using normal basis. EIT 2009: 52-55 - 2008
- [c16]Christopher Kennedy, Arash Reyhani-Masoleh:
High-speed parallel CRC circuits. ACSCC 2008: 1823-1829 - [c15]Mehran Mozaffari Kermani, Arash Reyhani-Masoleh:
A Lightweight Concurrent Fault Detection Scheme for the AES S-Boxes Using Normal Basis. CHES 2008: 113-129 - [c14]Arash Reyhani-Masoleh:
A New Bit-Serial Architecture for Field Multiplication Using Polynomial Bases. CHES 2008: 300-314 - [c13]Reza Azarderakhsh, Arash Reyhani-Masoleh, Zine-Eddine Abid:
A Key Management Scheme for Cluster Based Wireless Sensor Networks. EUC (2) 2008: 222-227 - [c12]Yuan Xue, Helmut Jürgensen, Reza Azarderakhsh, Arash Reyhani-Masoleh:
Key Management for Wireless Sensor Networks Using Trusted Neighbors. EUC (2) 2008: 228-233 - [c11]Arash Hariri, Arash Reyhani-Masoleh:
Digit-Serial Structures for the Shifted Polynomial Basis Multiplication over Binary Extension Fields. WAIFI 2008: 103-116 - 2007
- [c10]Arash Hariri, Arash Reyhani-Masoleh:
Fault Detection Structures for the Montgomery Multiplication over Binary Extension Fields. FDTC 2007: 37-46 - [c9]Mehran Mozaffari Kermani, Arash Reyhani-Masoleh:
A Structure-independent Approach for Fault Detection Hardware Implementations of the Advanced Encryption Standard. FDTC 2007: 47-53 - 2006
- [c8]Mehran Mozaffari Kermani, Arash Reyhani-Masoleh:
Parity Prediction of S-Box for AES. CCECE 2006: 2357-2360 - [c7]Mehran Mozaffari Kermani, Arash Reyhani-Masoleh:
Parity-Based Fault Detection Architecture of S-box for Advanced Encryption Standard. DFT 2006: 572-580 - 2003
- [c6]Arash Reyhani-Masoleh, M. Anwarul Hasan:
Low Complexity Sequential Normal Basis Multipliers over GF(2m). IEEE Symposium on Computer Arithmetic 2003: 188-195 - [c5]Arash Reyhani-Masoleh, M. Anwarul Hasan:
On Low Complexity Bit Parallel Polynomial Basis Multipliers. CHES 2003: 189-202 - 2002
- [c4]Arash Reyhani-Masoleh, M. Anwarul Hasan:
Error Detection in Polynomial Basis Multipliers over Binary Extension Fields. CHES 2002: 515-528 - [c3]Arash Reyhani-Masoleh, M. Anwar Hasan:
Efficient digit-serial normal basis multipliers over GF(2m). ISCAS (5) 2002: 781-784 - 2001
- [c2]Arash Reyhani-Masoleh, M. Anwarul Hasan:
Fast Normal Basis Multiplication Using General Purpose Processors. Selected Areas in Cryptography 2001: 230-244 - 2000
- [c1]Arash Reyhani-Masoleh, M. Anwarul Hasan:
On Efficient Normal Basis Multiplication. INDOCRYPT 2000: 213-224
Parts in Books or Collections
- 2012
- [p1]Arash Hariri, Arash Reyhani-Masoleh:
On Countermeasures Against Fault Attacks on Elliptic Curve Cryptography Using Fault Detection. Fault Analysis in Cryptography 2012: 157-169
Informal and Other Publications
- 2016
- [i1]Mostafa M. I. Taha, Arash Reyhani-Masoleh, Patrick Schaumont:
Keymill: Side-Channel Resilient Key Generator. IACR Cryptol. ePrint Arch. 2016: 710 (2016)
Coauthor Index
aka: M. Anwarul Hasan
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint