Mostafa Taha

738 total citations
25 papers, 430 citations indexed

About

Mostafa Taha is a scholar working on Artificial Intelligence, Computer Vision and Pattern Recognition and Hardware and Architecture. According to data from OpenAlex, Mostafa Taha has authored 25 papers receiving a total of 430 indexed citations (citations by other indexed papers that have themselves been cited), including 21 papers in Artificial Intelligence, 14 papers in Computer Vision and Pattern Recognition and 6 papers in Hardware and Architecture. Recurrent topics in Mostafa Taha's work include Cryptographic Implementations and Security (17 papers), Chaos-based Image/Signal Encryption (14 papers) and Coding theory and cryptography (7 papers). Mostafa Taha is often cited by papers focused on Cryptographic Implementations and Security (17 papers), Chaos-based Image/Signal Encryption (14 papers) and Coding theory and cryptography (7 papers). Mostafa Taha collaborates with scholars based in Canada, United States and Egypt. Mostafa Taha's co-authors include Patrick Schaumont, Arash Reyhani-Masoleh, Georges Kaddoum, Bilgiday Yuce, Nahid Farhady Ghalaty, Georges Matar, Thomas Eisenbarth, Chao Wang, Long Kong and Elsayed Esam M. Khaled and has published in prestigious journals such as SHILAP Revista de lepidopterología, Scientific Reports and IEEE Access.

In The Last Decade

Mostafa Taha

23 papers receiving 408 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Mostafa Taha Canada 12 294 150 128 126 117 25 430
Thomas Peyrin Singapore 14 443 1.5× 94 0.6× 247 1.9× 118 0.9× 62 0.5× 41 532
Thomas Bourgeat United States 10 151 0.5× 114 0.8× 50 0.4× 86 0.7× 69 0.6× 20 286
Dooho Choi South Korea 13 217 0.7× 112 0.7× 86 0.7× 100 0.8× 112 1.0× 66 418
Nader Sehatbakhsh United States 12 288 1.0× 190 1.3× 74 0.6× 148 1.2× 119 1.0× 36 456
Maria Eichlseder Austria 11 455 1.5× 232 1.5× 240 1.9× 54 0.4× 71 0.6× 31 545
Elke De Mulder Belgium 8 320 1.1× 189 1.3× 108 0.8× 81 0.6× 31 0.3× 17 405
Miroslav Knežević Belgium 8 352 1.2× 113 0.8× 171 1.3× 54 0.4× 54 0.5× 18 411
Jude Angelo Ambrose Australia 12 204 0.7× 252 1.7× 94 0.7× 103 0.8× 122 1.0× 43 391
Manaar Alam India 8 244 0.8× 56 0.4× 46 0.4× 44 0.3× 66 0.6× 29 338
Feiyi Xie China 10 239 0.8× 32 0.2× 82 0.6× 219 1.7× 141 1.2× 17 444

Countries citing papers authored by Mostafa Taha

Since Specialization
Citations

This map shows the geographic impact of Mostafa Taha's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Mostafa Taha with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Mostafa Taha more than expected).

Fields of papers citing papers by Mostafa Taha

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Mostafa Taha. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Mostafa Taha. The network helps show where Mostafa Taha may publish in the future.

Co-authorship network of co-authors of Mostafa Taha

This figure shows the co-authorship network connecting the top 25 collaborators of Mostafa Taha. A scholar is included among the top collaborators of Mostafa Taha based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Mostafa Taha. Mostafa Taha is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Taha, Mostafa, et al.. (2023). Oblivious network intrusion detection systems. Scientific Reports. 13(1). 22308–22308. 2 indexed citations
4.
Taha, Mostafa, et al.. (2021). Secure and Efficient Exponentiation Architectures Using Gaussian Normal Basis. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. 41(3). 424–437. 1 indexed citations
5.
Reyhani-Masoleh, Arash, et al.. (2019). New Low-Area Designs for the AES Forward, Inverse and Combined S-Boxes. IEEE Transactions on Computers. 69(12). 1757–1773. 10 indexed citations
7.
Reyhani-Masoleh, Arash, et al.. (2018). New Area Record for the AES Combined S-Box/Inverse S-Box. 145–152. 20 indexed citations
8.
Reyhani-Masoleh, Arash, et al.. (2018). Smashing the Implementation Records of AES S-box. IACR Transactions on Cryptographic Hardware and Embedded Systems. 298–336. 28 indexed citations
9.
Taha, Mostafa, et al.. (2016). Lightweight Side Channel Resistance: Threshold Implementations of S<sc>imon</sc>. IEEE Transactions on Computers. 66(4). 661–671. 24 indexed citations
10.
Kaddoum, Georges, et al.. (2016). Survey on Threats and Attacks on Mobile Networks. IEEE Access. 4. 4543–4572. 77 indexed citations
11.
Kong, Long, Georges Kaddoum, & Mostafa Taha. (2015). Performance analysis of physical layer security of chaos-based modulation schemes. 283–288. 5 indexed citations
12.
Wang, Chao, et al.. (2015). Quantitative Masking Strength: Quantifying the Power Side-Channel Resistance of Software Code. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. 34(10). 1558–1568. 16 indexed citations
13.
Taha, Mostafa, et al.. (2014). QMS. 1–6. 20 indexed citations
14.
Taha, Mostafa & Patrick Schaumont. (2014). Key Updating for Leakage Resiliency With Application to AES Modes of Operation. IEEE Transactions on Information Forensics and Security. 10(3). 519–528. 22 indexed citations
15.
Taha, Mostafa & Patrick Schaumont. (2014). Side-channel countermeasure for SHA-3 at almost-zero area overhead. 6917. 93–96. 10 indexed citations
16.
Ghalaty, Nahid Farhady, Bilgiday Yuce, Mostafa Taha, & Patrick Schaumont. (2014). Differential Fault Intensity Analysis. 49–58. 81 indexed citations
17.
Taha, Mostafa & Patrick Schaumont. (2013). Side-Channel Analysis of MAC-Keccak. 125–130. 17 indexed citations
18.
Taha, Mostafa, et al.. (2012). Efficient and side-channel-secure block cipher implementation with custom instructions on FPGA. 2012. 20–25. 6 indexed citations
19.
Taha, Mostafa, et al.. (2008). A Novel Headway-Based Vehicle-to-Vehicle Multi-Mode Broadcasting Protocol. 1–5. 4 indexed citations
20.
Taha, Mostafa, et al.. (2007). VANET-DSRC Protocol for Reliable Broadcasting of Life Safety Messages. 104–109. 49 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026