Mohamed Ahmed Abdelraheem
Mohamed Ahmed Abdelraheem
Entrust
Email verificata su entrust.com
Titolo
Citata da
Citata da
Anno
A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack
G Leander, MA Abdelraheem, H AlKhzaimi, E Zenner
Annual Cryptology Conference, 206-221, 2011
1652011
Preserving privacy in speaker and speech characterisation
A Nautsch, A JimÚnez, A Treiber, J Kolberg, C Jasserand, E Kindt, ...
Computer Speech & Language 58, 441-480, 2019
462019
On the distribution of linear biases: Three instructive examples
MA Abdelraheem, M ┼gren, P Beelen, G Leander
Annual Cryptology Conference, 50-67, 2012
432012
Improved linear cryptanalysis of reduced-round SIMON-32 and SIMON-48
MA Abdelraheem, J Alizadeh, HA Alkhzaimi, MR Aref, N Bagheri, ...
International Conference on Cryptology in India, 153-179, 2015
402015
Differential cryptanalysis of round-reduced PRINTcipher: Computing roots of permutations
MA Abdelraheem, G Leander, E Zenner
International Workshop on Fast Software Encryption, 1-17, 2011
272011
Searchable Encrypted Relational Databases: Risks and Countermeasures
MA Abdelraheem, T Andersson, C Gehrmann
IACR Cryptology ePrint Archive 2017, 24, 2017
22*2017
Twisted polynomials and forgery attacks on GCM
MA Abdelraheem, P Beelen, A Bogdanov, E Tischhauser
Annual International Conference on the Theory and Applications ofá…, 2015
222015
Estimating the Probabilities of Low-Weight Differential and Linear Approximations on PRESENT-Like Ciphers
MA Abdelraheem
International conference on information security and cryptology, 368-382, 2012
222012
Cryptanalysis of ARMADILLO2
MA Abdelraheem, C Blondeau, M Naya-Plasencia, M Videau, E Zenner
International Conference on the Theory and Application of Cryptology andá…, 2011
202011
Improved linear cryptanalysis of reduced-round SIMON
MA Abdelraheem, J Alizadeh, HA Alkhzaimi, MR Aref, N Bagheri, ...
Cryptology ePrint Archive, Report 2014/681, 2014
192014
Cryptanalysis of reduced QTL block cipher
S Sadeghi, N Bagheri, MA Abdelraheem
Microprocessors and Microsystems 52, 34-48, 2017
112017
Weak-Key Analysis of POET.
MA Abdelraheem, A Bogdanov, E Tischhauser
IACR Cryptol. ePrint Arch. 2014, 226, 2014
102014
IoT protection through device to cloud synchronization
C Gehrmann, MA Abdelraheem
2016 IEEE International Conference on Cloud Computing Technology and Scienceá…, 2016
92016
Cryptanalysis of the light-weight cipher A2U2
MA Abdelraheem, J Borghoff, E Zenner, M David
IMA International Conference on Cryptography and Coding, 375-390, 2011
92011
TT and ANF Representations of Boolean functions
S Ronjom, M Abdelraheem, LE Danielsen
Online Database of Boolean Functions, 2007
92007
Practical attacks on relational databases protected via searchable encryption
MA Abdelraheem, T Andersson, C Gehrmann, C Glackin
International Conference on Information Security, 171-191, 2018
62018
Blockchain and IoT: mind the gap
A Sedrati, MA Abdelraheem, S Raza
Interoperability, Safety and Security in IoT, 113-122, 2017
52017
Executing boolean queries on an encrypted bitmap index
MA Abdelraheem, C Gehrmann, M Lindstr÷m, C Nordahl
Proceedings of the 2016 ACM on Cloud Computing Security Workshop, 11-22, 2016
42016
PaaSword: A Data Privacy and Context-aware Security Framework for Developing Secure Cloud Applications-Technical and Scientific Contributions
E Papatheocharous, S Mantzouratos, P Gouvas, G Schiefer, S Schork, ...
EPS Porto 2017, 3-27, 2017
2017
PaaSword: A Data Privacy and Context-aware Security Framework for Developing Secure Cloud Applications
E Papatheocharous, S Mantzouratos, P Gouvas, G Schiefer, ST Schork, ...
Il sistema al momento non pu˛ eseguire l'operazione. Riprova pi¨ tardi.
Articoli 1–20