Notice: Unexpected clearActionName after getActionName already called in /var/www/html/includes/context/RequestContext.php on line 337
Amr M. Youssef - MaRDI portal

Amr M. Youssef

From MaRDI portal
(Redirected from Person:673238)
Person:552294

Available identifiers

zbMath Open youssef.amr-mWikidataQ102245841 ScholiaQ102245841MaRDI QIDQ552294

List of research outcomes

PublicationDate of PublicationType
Impossible Differential Cryptanalysis of Reduced-Round Tweakable TWINE2022-11-09Paper
Publicly verifiable and secrecy preserving periodic auctions2022-06-01Paper
On MILP-based automatic search for differential trails through modular additions with application to Bel-T2020-05-06Paper
Integral attacks on round-reduced Bel-T-2562019-02-20Paper
Differential fault analysis of streebog2018-12-07Paper
Truncated and multiple differential cryptanalysis of reduced round Midori1282018-10-18Paper
Improved linear cryptanalysis of round-reduced ARIA2018-10-18Paper
Improved meet-in-the-middle attacks on reduced round Kuznyechik2018-06-15Paper
Multidimensional zero-correlation linear cryptanalysis of reduced round SPARX-1282018-04-26Paper
A Comment on “Cryptographic Applications of Brahmagupta–Bhãskara Equation”2017-11-20Paper
Impossible Differential Cryptanalysis of Reduced-Round SKINNY2017-08-04Paper
Impossible Differential Attack on Reduced Round SPARX-64/1282017-08-04Paper
Meet-in-the-Middle Attacks on Reduced Round Piccolo2016-02-22Paper
Cryptanalysis of the Loiss Stream Cipher2015-12-04Paper
Boomerang and Slide-Rotational Analysis of the SM3 Hash Function2015-12-04Paper
Generalized MitM attacks on full TWINE2015-12-01Paper
Second Preimage Analysis of Whirlwind2015-11-25Paper
Rebound Attacks on Stribog2015-10-16Paper
A Higher Order Key Partitioning Attack with Application to LBlock2015-09-21Paper
Impossible Differential Properties of Reduced Round Streebog2015-09-21Paper
Differential Sieving for 2-Step Matching Meet-in-the-Middle Attack with Application to LBlock2015-09-18Paper
Meet-in-the-Middle Attacks on Reduced-Round Hierocrypt-32015-09-17Paper
Cryptanalysis of Álvarez et al. key exchange scheme2014-08-01Paper
Preimage Attacks on Reduced-Round Stribog2014-06-24Paper
Integral distinguishers for reduced-round Stribog2014-04-30Paper
Second order collision for the 42-step reduced DHA-256 hash function2014-04-14Paper
A Heuristic for Finding Compatible Differential Paths with Application to HAS-1602013-12-10Paper
Fault analysis of the NTRUSign digital signature scheme2013-04-23Paper
Cryptanalysis of a key exchange protocol based on the endomorphisms ring \(\mathrm{End}(\mathbb Z_p\times\mathbb Z_{p^2})\)2012-12-13Paper
On the Sosemanuk Related Key-IV Sets2012-09-21Paper
Cryptanalysis of a quadratic knapsack cryptosystem2011-07-21Paper
Differential Fault Analysis of Sosemanuk2011-06-29Paper
Differential Fault Analysis of HC-1282010-05-04Paper
On the structural weakness of the GGHN stream cipher2010-04-12Paper
Cryptanalysis of Boolean permutation-based key escrow scheme2010-04-07Paper
Differential Fault Analysis of Rabbit2009-12-09Paper
A new distinguishing and key recovery attack on NGG stream cipher2009-10-26Paper
Cryptanalysis of a knapsack-based probabilistic encryption scheme2009-10-01Paper
On the existence of (9,3,5,240) resilient functions2008-12-21Paper
On some probabilistic approximations for AES-like S-boxes2006-09-14Paper
On linear complexity of sequences over \(\text{GF}(2^n)\)2006-03-24Paper
Affine equivalence in the AES round function2005-08-17Paper
Cryptographic properties of the Welch-Gong transformation sequence generators2005-05-11Paper
https://portal.mardi4nfdi.de/entity/Q47364212004-08-09Paper
https://portal.mardi4nfdi.de/entity/Q47885772003-05-19Paper
https://portal.mardi4nfdi.de/entity/Q31496732002-12-03Paper
https://portal.mardi4nfdi.de/entity/Q45379862002-11-24Paper
https://portal.mardi4nfdi.de/entity/Q31497052002-09-26Paper
https://portal.mardi4nfdi.de/entity/Q27627572002-01-09Paper
Information leakage of a randomly selected boolean function1998-11-17Paper
Comment on ``Bounds on the number of functions satisfying the Strict Avalanche Criterion1997-02-28Paper
Resistance of balanced s-boxes to linear and differential cryptanalysis1997-02-27Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Amr M. Youssef