BibTeX records: Mohamed Tolba

download as .bib file

@article{DBLP:journals/arobots/TolbaSEM23,
  author       = {Mohamed Tolba and
                  Bijan Shirinzadeh and
                  Gamal El{-}bayoumi and
                  Osama Mohamady},
  title        = {Adaptive optimal controller design for an unbalanced {UAV} with slung
                  load},
  journal      = {Auton. Robots},
  volume       = {47},
  number       = {3},
  pages        = {267--280},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10514-023-10090-z},
  doi          = {10.1007/S10514-023-10090-Z},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/arobots/TolbaSEM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/TolbaEY20,
  author       = {Mohamed Tolba and
                  Muhammad ElSheikh and
                  Amr M. Youssef},
  editor       = {Abderrahmane Nitaj and
                  Amr M. Youssef},
  title        = {Impossible Differential Cryptanalysis of Reduced-Round Tweakable {TWINE}},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2020 - 12th International Conference
                  on Cryptology in Africa, Cairo, Egypt, July 20-22, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12174},
  pages        = {91--113},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-51938-4\_5},
  doi          = {10.1007/978-3-030-51938-4\_5},
  timestamp    = {Tue, 07 Jul 2020 13:21:59 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/TolbaEY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TolbaEY20,
  author       = {Mohamed Tolba and
                  Muhammad ElSheikh and
                  Amr M. Youssef},
  title        = {Impossible Differential Cryptanalysis of Reduced-Round Tweakable {TWINE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {52},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/052},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TolbaEY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ElSheikhTY18,
  author       = {Muhammad ElSheikh and
                  Mohamed Tolba and
                  Amr M. Youssef},
  title        = {Impossible Differential Attack on Reduced Round {SPARX-128/256}},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {101-A},
  number       = {4},
  pages        = {731--733},
  year         = {2018},
  url          = {https://doi.org/10.1587/transfun.E101.A.731},
  doi          = {10.1587/TRANSFUN.E101.A.731},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ElSheikhTY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/AbdelkhalekTY18,
  author       = {Ahmed Abdelkhalek and
                  Mohamed Tolba and
                  Amr M. Youssef},
  title        = {Related-Key Differential Attack on Round-Reduced Bel-T-256},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {101-A},
  number       = {5},
  pages        = {859--862},
  year         = {2018},
  url          = {https://doi.org/10.1587/transfun.E101.A.859},
  doi          = {10.1587/TRANSFUN.E101.A.859},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/AbdelkhalekTY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/ElSheikhTY18,
  author       = {Muhammad ElSheikh and
                  Mohamed Tolba and
                  Amr M. Youssef},
  editor       = {Carlos Cid and
                  Michael J. Jacobson Jr.},
  title        = {Integral Attacks on Round-Reduced Bel-T-256},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2018 - 25th International Conference,
                  Calgary, AB, Canada, August 15-17, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11349},
  pages        = {73--91},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-10970-7\_4},
  doi          = {10.1007/978-3-030-10970-7\_4},
  timestamp    = {Wed, 25 Sep 2019 18:08:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/ElSheikhTY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/Tolba0Y17,
  author       = {Mohamed Tolba and
                  Ahmed Abdelkhalek and
                  Amr M. Youssef},
  title        = {Improved Multiple Impossible Differential Cryptanalysis of Midori128},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {100-A},
  number       = {8},
  pages        = {1733--1737},
  year         = {2017},
  url          = {https://doi.org/10.1587/transfun.E100.A.1733},
  doi          = {10.1587/TRANSFUN.E100.A.1733},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/Tolba0Y17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/0001STTY17,
  author       = {Ahmed Abdelkhalek and
                  Yu Sasaki and
                  Yosuke Todo and
                  Mohamed Tolba and
                  Amr M. Youssef},
  title        = {{MILP} Modeling for (Large) S-boxes to Optimize Probability of Differential
                  Characteristics},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {4},
  pages        = {99--129},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i4.99-129},
  doi          = {10.13154/TOSC.V2017.I4.99-129},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/0001STTY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/Tolba0Y17,
  author       = {Mohamed Tolba and
                  Ahmed Abdelkhalek and
                  Amr M. Youssef},
  editor       = {Marc Joye and
                  Abderrahmane Nitaj},
  title        = {Impossible Differential Cryptanalysis of Reduced-Round {SKINNY}},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2017 - 9th International Conference
                  on Cryptology in Africa, Dakar, Senegal, May 24-26, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10239},
  pages        = {117--134},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-57339-7\_7},
  doi          = {10.1007/978-3-319-57339-7\_7},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/Tolba0Y17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/0001TY17,
  author       = {Ahmed Abdelkhalek and
                  Mohamed Tolba and
                  Amr M. Youssef},
  editor       = {Marc Joye and
                  Abderrahmane Nitaj},
  title        = {Impossible Differential Attack on Reduced Round {SPARX-64/128}},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2017 - 9th International Conference
                  on Cryptology in Africa, Dakar, Senegal, May 24-26, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10239},
  pages        = {135--146},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-57339-7\_8},
  doi          = {10.1007/978-3-319-57339-7\_8},
  timestamp    = {Wed, 10 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/0001TY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/TolbaY17,
  author       = {Mohamed Tolba and
                  Amr M. Youssef},
  editor       = {Howon Kim and
                  Dong{-}Chan Kim},
  title        = {Improved Meet-in-the-Middle Attacks on Reduced Round Kuznyechik},
  booktitle    = {Information Security and Cryptology - {ICISC} 2017 - 20th International
                  Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10779},
  pages        = {26--38},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-78556-1\_2},
  doi          = {10.1007/978-3-319-78556-1\_2},
  timestamp    = {Thu, 02 Mar 2023 10:53:05 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/TolbaY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/Tolba0Y17,
  author       = {Mohamed Tolba and
                  Ahmed Abdelkhalek and
                  Amr M. Youssef},
  editor       = {Carlisle Adams and
                  Jan Camenisch},
  title        = {Multidimensional Zero-Correlation Linear Cryptanalysis of Reduced
                  Round {SPARX-128}},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2017 - 24th International Conference,
                  Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10719},
  pages        = {423--441},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72565-9\_22},
  doi          = {10.1007/978-3-319-72565-9\_22},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/Tolba0Y17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/TolbaAY16,
  author       = {Mohamed Tolba and
                  Ahmed Abdelkhalek and
                  Amr M. Youssef},
  title        = {A Meet in the Middle Attack on Reduced Round Kiasu-BC},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {99-A},
  number       = {10},
  pages        = {1888--1890},
  year         = {2016},
  url          = {https://doi.org/10.1587/transfun.E99.A.1888},
  doi          = {10.1587/TRANSFUN.E99.A.1888},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/TolbaAY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/TolbaY16,
  author       = {Mohamed Tolba and
                  Amr M. Youssef},
  title        = {Generalized MitM attacks on full {TWINE}},
  journal      = {Inf. Process. Lett.},
  volume       = {116},
  number       = {2},
  pages        = {128--135},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.ipl.2015.09.011},
  doi          = {10.1016/J.IPL.2015.09.011},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/TolbaY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/Tolba0Y16,
  author       = {Mohamed Tolba and
                  Ahmed Abdelkhalek and
                  Amr M. Youssef},
  editor       = {Matt Bishop and
                  Anderson C. A. Nascimento},
  title        = {Truncated and Multiple Differential Cryptanalysis of Reduced Round
                  Midori128},
  booktitle    = {Information Security - 19th International Conference, {ISC} 2016,
                  Honolulu, HI, USA, September 3-6, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9866},
  pages        = {3--17},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45871-7\_1},
  doi          = {10.1007/978-3-319-45871-7\_1},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/Tolba0Y16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/0001TY16,
  author       = {Ahmed Abdelkhalek and
                  Mohamed Tolba and
                  Amr M. Youssef},
  editor       = {Matt Bishop and
                  Anderson C. A. Nascimento},
  title        = {Improved Linear Cryptanalysis of Round-Reduced {ARIA}},
  booktitle    = {Information Security - 19th International Conference, {ISC} 2016,
                  Honolulu, HI, USA, September 3-6, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9866},
  pages        = {18--34},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45871-7\_2},
  doi          = {10.1007/978-3-319-45871-7\_2},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/0001TY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TolbaAY16,
  author       = {Mohamed Tolba and
                  Ahmed Abdelkhalek and
                  Amr M. Youssef},
  title        = {Impossible Differential Cryptanalysis of Reduced-Round {SKINNY}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1115},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1115},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TolbaAY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/c2si/AlTawyTY15,
  author       = {Riham AlTawy and
                  Mohamed Tolba and
                  Amr M. Youssef},
  editor       = {Said El Hajji and
                  Abderrahmane Nitaj and
                  Claude Carlet and
                  El Mamoun Souidi},
  title        = {A Higher Order Key Partitioning Attack with Application to LBlock},
  booktitle    = {Codes, Cryptology, and Information Security - First International
                  Conference, {C2SI} 2015, Rabat, Morocco, May 26-28, 2015, Proceedings
                  - In Honor of Thierry Berger},
  series       = {Lecture Notes in Computer Science},
  volume       = {9084},
  pages        = {215--227},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18681-8\_17},
  doi          = {10.1007/978-3-319-18681-8\_17},
  timestamp    = {Tue, 27 Aug 2019 17:49:45 +0200},
  biburl       = {https://dblp.org/rec/conf/c2si/AlTawyTY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latincrypt/AbdelkhalekATY15,
  author       = {Ahmed Abdelkhalek and
                  Riham AlTawy and
                  Mohamed Tolba and
                  Amr M. Youssef},
  editor       = {Kristin E. Lauter and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez},
  title        = {Meet-in-the-Middle Attacks on Reduced-Round Hierocrypt-3},
  booktitle    = {Progress in Cryptology - {LATINCRYPT} 2015 - 4th International Conference
                  on Cryptology and Information Security in Latin America, Guadalajara,
                  Mexico, August 23-26, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9230},
  pages        = {187--203},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22174-8\_11},
  doi          = {10.1007/978-3-319-22174-8\_11},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/latincrypt/AbdelkhalekATY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lightsec/TolbaAY15,
  author       = {Mohamed Tolba and
                  Ahmed Abdelkhalek and
                  Amr M. Youssef},
  editor       = {Tim G{\"{u}}neysu and
                  Gregor Leander and
                  Amir Moradi},
  title        = {Meet-in-the-Middle Attacks on Reduced Round Piccolo},
  booktitle    = {Lightweight Cryptography for Security and Privacy - 4th International
                  Workshop, LightSec 2015, Bochum, Germany, September 10-11, 2015, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9542},
  pages        = {3--20},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-29078-2\_1},
  doi          = {10.1007/978-3-319-29078-2\_1},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/lightsec/TolbaAY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/space/TolbaAY15,
  author       = {Mohamed Tolba and
                  Ahmed Abdelkhalek and
                  Amr M. Youssef},
  editor       = {Rajat Subhra Chakraborty and
                  Peter Schwabe and
                  Jon A. Solworth},
  title        = {Meet-in-the-Middle Attacks on Round-Reduced Khudra},
  booktitle    = {Security, Privacy, and Applied Cryptography Engineering - 5th International
                  Conference, {SPACE} 2015, Jaipur, India, October 3-7, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9354},
  pages        = {127--138},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24126-5\_8},
  doi          = {10.1007/978-3-319-24126-5\_8},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/space/TolbaAY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/space/AbdelkhalekTY15,
  author       = {Ahmed Abdelkhalek and
                  Mohamed Tolba and
                  Amr M. Youssef},
  editor       = {Rajat Subhra Chakraborty and
                  Peter Schwabe and
                  Jon A. Solworth},
  title        = {Improved Key Recovery Attack on Round-reduced Hierocrypt-L1 in the
                  Single-Key Setting},
  booktitle    = {Security, Privacy, and Applied Cryptography Engineering - 5th International
                  Conference, {SPACE} 2015, Jaipur, India, October 3-7, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9354},
  pages        = {139--150},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24126-5\_9},
  doi          = {10.1007/978-3-319-24126-5\_9},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/space/AbdelkhalekTY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics