A. M. Youssef

From MaRDI portal
(Redirected from Person:552294)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Related-key differential cryptanalysis of full round \texttt{CRAFT}2024-03-12Paper
On MILP-Based Automatic Search for Bit-Based Division Property for Ciphers with (Large) Linear Layers2023-04-13Paper
Integral Cryptanalysis of Reduced-Round Tweakable TWINE2023-03-22Paper
Impossible differential cryptanalysis of reduced-round tweakable TWINE
Progress in Cryptology - AFRICACRYPT 2020
2022-11-09Paper
Publicly verifiable and secrecy preserving periodic auctions2022-06-01Paper
On MILP-based automatic search for differential trails through modular additions with application to Bel-T2020-05-06Paper
Integral attacks on round-reduced Bel-T-2562019-02-20Paper
Differential fault analysis of streebog2018-12-07Paper
Truncated and multiple differential cryptanalysis of reduced round Midori1282018-10-18Paper
Improved linear cryptanalysis of round-reduced ARIA2018-10-18Paper
Improved meet-in-the-middle attacks on reduced round Kuznyechik2018-06-15Paper
Multidimensional zero-correlation linear cryptanalysis of reduced round SPARX-1282018-04-26Paper
A Comment on “Cryptographic Applications of Brahmagupta–Bhãskara Equation”
IEEE Transactions on Circuits and Systems I: Regular Papers
2017-11-20Paper
Impossible differential attack on reduced round SPARX-64/128
Progress in Cryptology - AFRICACRYPT 2017
2017-08-04Paper
Impossible differential cryptanalysis of reduced-round \texttt{SKINNY}
Progress in Cryptology - AFRICACRYPT 2017
2017-08-04Paper
Meet-in-the-middle attacks on reduced round Piccolo
Lecture Notes in Computer Science
2016-02-22Paper
Cryptanalysis of the loiss stream cipher
Selected Areas in Cryptography
2015-12-04Paper
Boomerang and slide-rotational analysis of the SM3 hash function
Selected Areas in Cryptography
2015-12-04Paper
Generalized MitM attacks on full TWINE
Information Processing Letters
2015-12-01Paper
Second preimage analysis of Whirlwind
Information Security and Cryptology
2015-11-25Paper
Rebound attacks on Stribog
Information Security and Cryptology -- ICISC 2013
2015-10-16Paper
A higher order key partitioning attack with application to LBlock
Lecture Notes in Computer Science
2015-09-21Paper
Impossible differential properties of reduced round Streebog
Lecture Notes in Computer Science
2015-09-21Paper
Differential sieving for 2-step matching meet-in-the-middle attack with application to lblock
Lecture Notes in Computer Science
2015-09-18Paper
Meet-in-the-middle attacks on reduced-round Hierocrypt-3
Progress in Cryptology -- LATINCRYPT 2015
2015-09-17Paper
Cryptanalysis of Álvarez et al. key exchange scheme
Information Sciences
2014-08-01Paper
Preimage attacks on reduced-round Stribog
Progress in Cryptology – AFRICACRYPT 2014
2014-06-24Paper
Integral distinguishers for reduced-round Stribog
Information Processing Letters
2014-04-30Paper
Second order collision for the 42-step reduced DHA-256 hash function
Information Processing Letters
2014-04-14Paper
A solution form of a class of higher-order rational difference equations
Journal of the Egyptian Mathematical Society
2014-01-13Paper
A Heuristic for Finding Compatible Differential Paths with Application to HAS-160
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
Fault analysis of the NTRUSign digital signature scheme
Cryptography and Communications
2013-04-23Paper
Cryptanalysis of a key exchange protocol based on the endomorphisms ring \(\mathrm{End}(\mathbb Z_p\times\mathbb Z_{p^2})\)
Applicable Algebra in Engineering, Communication and Computing
2012-12-13Paper
On the Sosemanuk related key-IV sets
Progress in Cryptology – LATINCRYPT 2012
2012-09-21Paper
Cryptanalysis of a quadratic knapsack cryptosystem
Computers & Mathematics with Applications
2011-07-21Paper
Differential fault analysis of Sosemanuk
Lecture Notes in Computer Science
2011-06-29Paper
Differential fault analysis of HC-128
Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings
2010-05-04Paper
On the structural weakness of the GGHN stream cipher
Cryptography and Communications
2010-04-12Paper
Cryptanalysis of Boolean permutation-based key escrow scheme
Computers and Electrical Engineering
2010-04-07Paper
Differential fault analysis of Rabbit
Selected Areas in Cryptography
2009-12-09Paper
A new distinguishing and key recovery attack on NGG stream cipher
Cryptography and Communications
2009-10-26Paper
Cryptanalysis of a knapsack-based probabilistic encryption scheme
Information Sciences
2009-10-01Paper
On the existence of (9,3,5,240) resilient functions
IEEE Transactions on Information Theory
2008-12-21Paper
On some probabilistic approximations for AES-like S-boxes
Discrete Mathematics
2006-09-14Paper
On linear complexity of sequences over \(\text{GF}(2^n)\)
Theoretical Computer Science
2006-03-24Paper
Affine equivalence in the AES round function
Discrete Applied Mathematics
2005-08-17Paper
Cryptographic properties of the Welch-Gong transformation sequence generators
IEEE Transactions on Information Theory
2005-05-11Paper
scientific article; zbMATH DE number 2085194 (Why is no real title available?)2004-08-09Paper
scientific article; zbMATH DE number 1857528 (Why is no real title available?)2003-05-19Paper
scientific article; zbMATH DE number 1808211 (Why is no real title available?)2002-12-03Paper
scientific article; zbMATH DE number 1759265 (Why is no real title available?)2002-11-24Paper
scientific article; zbMATH DE number 1808247 (Why is no real title available?)2002-09-26Paper
scientific article; zbMATH DE number 1689009 (Why is no real title available?)2002-01-09Paper
Information leakage of a randomly selected boolean function
Information Theory and Applications II
1998-11-17Paper
Comment on ``Bounds on the number of functions satisfying the Strict Avalanche Criterion
Information Processing Letters
1997-02-28Paper
Resistance of balanced s-boxes to linear and differential cryptanalysis
Information Processing Letters
1997-02-27Paper


Research outcomes over time


This page was built for person: A. M. Youssef