Amr M. Youssef

From MaRDI portal
Revision as of 11:04, 7 October 2023 by Import231006081045 (talk | contribs) (Created automatically from import231006081045)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Person:552294

Available identifiers

zbMath Open youssef.amr-mWikidataQ102245841 ScholiaQ102245841MaRDI QIDQ552294

List of research outcomes





PublicationDate of PublicationType
Related-key differential cryptanalysis of full round \texttt{CRAFT}2024-03-12Paper
On MILP-Based Automatic Search for Bit-Based Division Property for Ciphers with (Large) Linear Layers2023-04-13Paper
Integral Cryptanalysis of Reduced-Round Tweakable TWINE2023-03-22Paper
Impossible Differential Cryptanalysis of Reduced-Round Tweakable TWINE2022-11-09Paper
Publicly verifiable and secrecy preserving periodic auctions2022-06-01Paper
On MILP-based automatic search for differential trails through modular additions with application to Bel-T2020-05-06Paper
Integral attacks on round-reduced Bel-T-2562019-02-20Paper
Differential fault analysis of streebog2018-12-07Paper
Truncated and multiple differential cryptanalysis of reduced round Midori1282018-10-18Paper
Improved linear cryptanalysis of round-reduced ARIA2018-10-18Paper
Improved meet-in-the-middle attacks on reduced round Kuznyechik2018-06-15Paper
Multidimensional zero-correlation linear cryptanalysis of reduced round SPARX-1282018-04-26Paper
A Comment on “Cryptographic Applications of Brahmagupta–Bhãskara Equation”2017-11-20Paper
Impossible Differential Cryptanalysis of Reduced-Round SKINNY2017-08-04Paper
Impossible Differential Attack on Reduced Round SPARX-64/1282017-08-04Paper
Meet-in-the-Middle Attacks on Reduced Round Piccolo2016-02-22Paper
Cryptanalysis of the Loiss Stream Cipher2015-12-04Paper
Boomerang and Slide-Rotational Analysis of the SM3 Hash Function2015-12-04Paper
Generalized MitM attacks on full TWINE2015-12-01Paper
Second Preimage Analysis of Whirlwind2015-11-25Paper
Rebound Attacks on Stribog2015-10-16Paper
A Higher Order Key Partitioning Attack with Application to LBlock2015-09-21Paper
Impossible Differential Properties of Reduced Round Streebog2015-09-21Paper
Differential Sieving for 2-Step Matching Meet-in-the-Middle Attack with Application to LBlock2015-09-18Paper
Meet-in-the-Middle Attacks on Reduced-Round Hierocrypt-32015-09-17Paper
Cryptanalysis of Álvarez et al. key exchange scheme2014-08-01Paper
Preimage Attacks on Reduced-Round Stribog2014-06-24Paper
Integral distinguishers for reduced-round Stribog2014-04-30Paper
Second order collision for the 42-step reduced DHA-256 hash function2014-04-14Paper
A Heuristic for Finding Compatible Differential Paths with Application to HAS-1602013-12-10Paper
Fault analysis of the NTRUSign digital signature scheme2013-04-23Paper
Cryptanalysis of a key exchange protocol based on the endomorphisms ring \(\mathrm{End}(\mathbb Z_p\times\mathbb Z_{p^2})\)2012-12-13Paper
On the Sosemanuk Related Key-IV Sets2012-09-21Paper
Cryptanalysis of a quadratic knapsack cryptosystem2011-07-21Paper
Differential Fault Analysis of Sosemanuk2011-06-29Paper
Differential Fault Analysis of HC-1282010-05-04Paper
On the structural weakness of the GGHN stream cipher2010-04-12Paper
Cryptanalysis of Boolean permutation-based key escrow scheme2010-04-07Paper
Differential Fault Analysis of Rabbit2009-12-09Paper
A new distinguishing and key recovery attack on NGG stream cipher2009-10-26Paper
Cryptanalysis of a knapsack-based probabilistic encryption scheme2009-10-01Paper
On the existence of (9,3,5,240) resilient functions2008-12-21Paper
On some probabilistic approximations for AES-like S-boxes2006-09-14Paper
On linear complexity of sequences over \(\text{GF}(2^n)\)2006-03-24Paper
Affine equivalence in the AES round function2005-08-17Paper
Cryptographic properties of the Welch-Gong transformation sequence generators2005-05-11Paper
https://portal.mardi4nfdi.de/entity/Q47364212004-08-09Paper
https://portal.mardi4nfdi.de/entity/Q47885772003-05-19Paper
https://portal.mardi4nfdi.de/entity/Q31496732002-12-03Paper
https://portal.mardi4nfdi.de/entity/Q45379862002-11-24Paper
https://portal.mardi4nfdi.de/entity/Q31497052002-09-26Paper
https://portal.mardi4nfdi.de/entity/Q27627572002-01-09Paper
Information leakage of a randomly selected boolean function1998-11-17Paper
Comment on ``Bounds on the number of functions satisfying the Strict Avalanche Criterion1997-02-28Paper
Resistance of balanced s-boxes to linear and differential cryptanalysis1997-02-27Paper

Research outcomes over time

This page was built for person: Amr M. Youssef