The following pages link to Amr M. Youssef (Q552294):
Displaying 50 items.
- Cryptanalysis of a quadratic knapsack cryptosystem (Q552295) (← links)
- (Q673238) (redirect page) (← links)
- Comment on ``Bounds on the number of functions satisfying the Strict Avalanche Criterion'' (Q673240) (← links)
- Cryptanalysis of a key exchange protocol based on the endomorphisms ring \(\mathrm{End}(\mathbb Z_p\times\mathbb Z_{p^2})\) (Q694564) (← links)
- Cryptanalysis of a knapsack-based probabilistic encryption scheme (Q730959) (← links)
- On linear complexity of sequences over \(\text{GF}(2^n)\) (Q818141) (← links)
- Generalized MitM attacks on full TWINE (Q894457) (← links)
- Cryptanalysis of Boolean permutation-based key escrow scheme (Q962570) (← links)
- A new distinguishing and key recovery attack on NGG stream cipher (Q1032502) (← links)
- Resistance of balanced s-boxes to linear and differential cryptanalysis (Q1352088) (← links)
- Differential fault analysis of streebog (Q1631895) (← links)
- Improved meet-in-the-middle attacks on reduced round Kuznyechik (Q1641164) (← links)
- Integral attacks on round-reduced Bel-T-256 (Q1726664) (← links)
- Multidimensional zero-correlation linear cryptanalysis of reduced round SPARX-128 (Q1746987) (← links)
- Truncated and multiple differential cryptanalysis of reduced round Midori128 (Q1799180) (← links)
- Improved linear cryptanalysis of round-reduced ARIA (Q1799181) (← links)
- Fault analysis of the NTRUSign digital signature scheme (Q1947651) (← links)
- On MILP-based automatic search for differential trails through modular additions with application to Bel-T (Q2177635) (← links)
- On the structural weakness of the GGHN stream cipher (Q2380845) (← links)
- Second order collision for the 42-step reduced DHA-256 hash function (Q2445246) (← links)
- Integral distinguishers for reduced-round Stribog (Q2448116) (← links)
- Affine equivalence in the AES round function (Q2486749) (← links)
- On some probabilistic approximations for AES-like S-boxes (Q2501584) (← links)
- Cryptanalysis of Álvarez et al. key exchange scheme (Q2510463) (← links)
- Publicly verifiable and secrecy preserving periodic auctions (Q2670857) (← links)
- (Q2762757) (← links)
- Meet-in-the-Middle Attacks on Reduced Round Piccolo (Q2788811) (← links)
- A Heuristic for Finding Compatible Differential Paths with Application to HAS-160 (Q2867170) (← links)
- On the Sosemanuk Related Key-IV Sets (Q2915127) (← links)
- Meet-in-the-Middle Attacks on Reduced-Round Hierocrypt-3 (Q2946449) (← links)
- Differential Sieving for 2-Step Matching Meet-in-the-Middle Attack with Application to LBlock (Q2946981) (← links)
- A Higher Order Key Partitioning Attack with Application to LBlock (Q2947084) (← links)
- Impossible Differential Properties of Reduced Round Streebog (Q2947090) (← links)
- Differential Fault Analysis of Sosemanuk (Q3011922) (← links)
- (Q3149673) (← links)
- (Q3149705) (← links)
- Rebound Attacks on Stribog (Q3193261) (← links)
- Second Preimage Analysis of Whirlwind (Q3454591) (← links)
- Cryptanalysis of the Loiss Stream Cipher (Q3455492) (← links)
- Boomerang and Slide-Rotational Analysis of the SM3 Hash Function (Q3455507) (← links)
- On the existence of (9,3,5,240) resilient functions (Q3547573) (← links)
- Differential Fault Analysis of HC-128 (Q3558317) (← links)
- Differential Fault Analysis of Rabbit (Q3651258) (← links)
- Information leakage of a randomly selected boolean function (Q4375828) (← links)
- (Q4537986) (← links)
- A Comment on “Cryptographic Applications of Brahmagupta–Bhãskara Equation” (Q4590183) (← links)
- Cryptographic properties of the Welch-Gong transformation sequence generators (Q4677607) (← links)
- (Q4736421) (← links)
- (Q4788577) (← links)
- Impossible Differential Cryptanalysis of Reduced-Round SKINNY (Q4975182) (← links)