Folgen
Mohamed Ahmed Abdelraheem
Mohamed Ahmed Abdelraheem
Entrust
Bestätigte E-Mail-Adresse bei entrust.com
Titel
Zitiert von
Zitiert von
Jahr
A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack
G Leander, MA Abdelraheem, H AlKhzaimi, E Zenner
Annual Cryptology Conference, 206-221, 2011
1762011
Preserving privacy in speaker and speech characterisation
A Nautsch, A Jiménez, A Treiber, J Kolberg, C Jasserand, E Kindt, ...
Computer Speech & Language 58, 441-480, 2019
722019
On the distribution of linear biases: Three instructive examples
MA Abdelraheem, M Ågren, P Beelen, G Leander
Annual Cryptology Conference, 50-67, 2012
452012
Improved linear cryptanalysis of reduced-round SIMON-32 and SIMON-48
MA Abdelraheem, J Alizadeh, HA Alkhzaimi, MR Aref, N Bagheri, ...
International Conference on Cryptology in India, 153-179, 2015
442015
Differential Cryptanalysis of Round-Reduced PRINTcipher: Computing Roots of Permutations
MA Abdelraheem, G Leander, E Zenner
International Workshop on Fast Software Encryption, 1-17, 2011
272011
Estimating the Probabilities of Low-Weight Differential and Linear Approximations on PRESENT-Like Ciphers
MA Abdelraheem
International conference on information security and cryptology, 368-382, 2012
252012
Twisted polynomials and forgery attacks on GCM
MA Abdelraheem, P Beelen, A Bogdanov, E Tischhauser
Annual International Conference on the Theory and Applications of …, 2015
242015
Improved linear cryptanalysis of reduced-round SIMON
MA Abdelraheem, J Alizadeh, HA Alkhzaimi, MR Aref, N Bagheri, ...
Cryptology ePrint Archive, 2014
242014
Searchable Encrypted Relational Databases: Risks and Countermeasures
MA Abdelraheem, T Andersson, C Gehrmann
IACR Cryptology ePrint Archive 2017, 24, 2017
22*2017
Cryptanalysis of ARMADILLO2
MA Abdelraheem, C Blondeau, M Naya-Plasencia, M Videau, E Zenner
International Conference on the Theory and Application of Cryptology and …, 2011
222011
Cryptanalysis of reduced QTL block cipher
S Sadeghi, N Bagheri, MA Abdelraheem
Microprocessors and Microsystems 52, 34-48, 2017
172017
IoT protection through device to cloud synchronization
C Gehrmann, MA Abdelraheem
2016 IEEE International Conference on Cloud Computing Technology and Science …, 2016
122016
Weak-key analysis of poet
MA Abdelraheem, A Bogdanov, E Tischhauser
Cryptology ePrint Archive, 2014
112014
Cryptanalysis of the light-weight cipher A2U2
MA Abdelraheem, J Borghoff, E Zenner, M David
IMA International Conference on Cryptography and Coding, 375-390, 2011
102011
TT and ANF Representations of Boolean functions
S Ronjom, M Abdelraheem, LE Danielsen
Online Database of Boolean Functions, 2007
92007
Blockchain and IoT: mind the gap
A Sedrati, MA Abdelraheem, S Raza
Interoperability, Safety And Security in IoT, 113-122, 2017
72017
Practical attacks on relational databases protected via searchable encryption
MA Abdelraheem, T Andersson, C Gehrmann, C Glackin
International Conference on Information Security, 171-191, 2018
62018
Executing boolean queries on an encrypted bitmap index
MA Abdelraheem, C Gehrmann, M Lindström, C Nordahl
Proceedings of the 2016 ACM on cloud computing security workshop, 11-22, 2016
52016
PaaSword: A Data Privacy and Context-aware Security Framework for Developing Secure Cloud Applications-Technical and Scientific Contributions
E Papatheocharous, S Mantzouratos, P Gouvas, G Schiefer, S Schork, ...
EPS Porto 2017, 3-27, 2017
2017
PaaSword: A Data Privacy and Context-aware Security Framework for Developing Secure Cloud Applications
E Papatheocharous, S Mantzouratos, P Gouvas, G Schiefer, ST Schork, ...
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20