Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Mohamed Tolba
@article{DBLP:journals/arobots/TolbaSEM23, author = {Mohamed Tolba and Bijan Shirinzadeh and Gamal El{-}bayoumi and Osama Mohamady}, title = {Adaptive optimal controller design for an unbalanced {UAV} with slung load}, journal = {Auton. Robots}, volume = {47}, number = {3}, pages = {267--280}, year = {2023}, url = {https://doi.org/10.1007/s10514-023-10090-z}, doi = {10.1007/S10514-023-10090-Z}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/arobots/TolbaSEM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/TolbaEY20, author = {Mohamed Tolba and Muhammad ElSheikh and Amr M. Youssef}, editor = {Abderrahmane Nitaj and Amr M. Youssef}, title = {Impossible Differential Cryptanalysis of Reduced-Round Tweakable {TWINE}}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2020 - 12th International Conference on Cryptology in Africa, Cairo, Egypt, July 20-22, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12174}, pages = {91--113}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-51938-4\_5}, doi = {10.1007/978-3-030-51938-4\_5}, timestamp = {Tue, 07 Jul 2020 13:21:59 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/TolbaEY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TolbaEY20, author = {Mohamed Tolba and Muhammad ElSheikh and Amr M. Youssef}, title = {Impossible Differential Cryptanalysis of Reduced-Round Tweakable {TWINE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {52}, year = {2020}, url = {https://eprint.iacr.org/2020/052}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TolbaEY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ElSheikhTY18, author = {Muhammad ElSheikh and Mohamed Tolba and Amr M. Youssef}, title = {Impossible Differential Attack on Reduced Round {SPARX-128/256}}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {101-A}, number = {4}, pages = {731--733}, year = {2018}, url = {https://doi.org/10.1587/transfun.E101.A.731}, doi = {10.1587/TRANSFUN.E101.A.731}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/ElSheikhTY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/AbdelkhalekTY18, author = {Ahmed Abdelkhalek and Mohamed Tolba and Amr M. Youssef}, title = {Related-Key Differential Attack on Round-Reduced Bel-T-256}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {101-A}, number = {5}, pages = {859--862}, year = {2018}, url = {https://doi.org/10.1587/transfun.E101.A.859}, doi = {10.1587/TRANSFUN.E101.A.859}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/AbdelkhalekTY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/ElSheikhTY18, author = {Muhammad ElSheikh and Mohamed Tolba and Amr M. Youssef}, editor = {Carlos Cid and Michael J. Jacobson Jr.}, title = {Integral Attacks on Round-Reduced Bel-T-256}, booktitle = {Selected Areas in Cryptography - {SAC} 2018 - 25th International Conference, Calgary, AB, Canada, August 15-17, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11349}, pages = {73--91}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-10970-7\_4}, doi = {10.1007/978-3-030-10970-7\_4}, timestamp = {Wed, 25 Sep 2019 18:08:16 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/ElSheikhTY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/Tolba0Y17, author = {Mohamed Tolba and Ahmed Abdelkhalek and Amr M. Youssef}, title = {Improved Multiple Impossible Differential Cryptanalysis of Midori128}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {100-A}, number = {8}, pages = {1733--1737}, year = {2017}, url = {https://doi.org/10.1587/transfun.E100.A.1733}, doi = {10.1587/TRANSFUN.E100.A.1733}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/Tolba0Y17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/0001STTY17, author = {Ahmed Abdelkhalek and Yu Sasaki and Yosuke Todo and Mohamed Tolba and Amr M. Youssef}, title = {{MILP} Modeling for (Large) S-boxes to Optimize Probability of Differential Characteristics}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {4}, pages = {99--129}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i4.99-129}, doi = {10.13154/TOSC.V2017.I4.99-129}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/0001STTY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/Tolba0Y17, author = {Mohamed Tolba and Ahmed Abdelkhalek and Amr M. Youssef}, editor = {Marc Joye and Abderrahmane Nitaj}, title = {Impossible Differential Cryptanalysis of Reduced-Round {SKINNY}}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2017 - 9th International Conference on Cryptology in Africa, Dakar, Senegal, May 24-26, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10239}, pages = {117--134}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-57339-7\_7}, doi = {10.1007/978-3-319-57339-7\_7}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/Tolba0Y17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/0001TY17, author = {Ahmed Abdelkhalek and Mohamed Tolba and Amr M. Youssef}, editor = {Marc Joye and Abderrahmane Nitaj}, title = {Impossible Differential Attack on Reduced Round {SPARX-64/128}}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2017 - 9th International Conference on Cryptology in Africa, Dakar, Senegal, May 24-26, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10239}, pages = {135--146}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-57339-7\_8}, doi = {10.1007/978-3-319-57339-7\_8}, timestamp = {Wed, 10 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/0001TY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/TolbaY17, author = {Mohamed Tolba and Amr M. Youssef}, editor = {Howon Kim and Dong{-}Chan Kim}, title = {Improved Meet-in-the-Middle Attacks on Reduced Round Kuznyechik}, booktitle = {Information Security and Cryptology - {ICISC} 2017 - 20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10779}, pages = {26--38}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-78556-1\_2}, doi = {10.1007/978-3-319-78556-1\_2}, timestamp = {Thu, 02 Mar 2023 10:53:05 +0100}, biburl = {https://dblp.org/rec/conf/icisc/TolbaY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/Tolba0Y17, author = {Mohamed Tolba and Ahmed Abdelkhalek and Amr M. Youssef}, editor = {Carlisle Adams and Jan Camenisch}, title = {Multidimensional Zero-Correlation Linear Cryptanalysis of Reduced Round {SPARX-128}}, booktitle = {Selected Areas in Cryptography - {SAC} 2017 - 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10719}, pages = {423--441}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72565-9\_22}, doi = {10.1007/978-3-319-72565-9\_22}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/Tolba0Y17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/TolbaAY16, author = {Mohamed Tolba and Ahmed Abdelkhalek and Amr M. Youssef}, title = {A Meet in the Middle Attack on Reduced Round Kiasu-BC}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {99-A}, number = {10}, pages = {1888--1890}, year = {2016}, url = {https://doi.org/10.1587/transfun.E99.A.1888}, doi = {10.1587/TRANSFUN.E99.A.1888}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/TolbaAY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/TolbaY16, author = {Mohamed Tolba and Amr M. Youssef}, title = {Generalized MitM attacks on full {TWINE}}, journal = {Inf. Process. Lett.}, volume = {116}, number = {2}, pages = {128--135}, year = {2016}, url = {https://doi.org/10.1016/j.ipl.2015.09.011}, doi = {10.1016/J.IPL.2015.09.011}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/TolbaY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/Tolba0Y16, author = {Mohamed Tolba and Ahmed Abdelkhalek and Amr M. Youssef}, editor = {Matt Bishop and Anderson C. A. Nascimento}, title = {Truncated and Multiple Differential Cryptanalysis of Reduced Round Midori128}, booktitle = {Information Security - 19th International Conference, {ISC} 2016, Honolulu, HI, USA, September 3-6, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9866}, pages = {3--17}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45871-7\_1}, doi = {10.1007/978-3-319-45871-7\_1}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/Tolba0Y16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/0001TY16, author = {Ahmed Abdelkhalek and Mohamed Tolba and Amr M. Youssef}, editor = {Matt Bishop and Anderson C. A. Nascimento}, title = {Improved Linear Cryptanalysis of Round-Reduced {ARIA}}, booktitle = {Information Security - 19th International Conference, {ISC} 2016, Honolulu, HI, USA, September 3-6, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9866}, pages = {18--34}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45871-7\_2}, doi = {10.1007/978-3-319-45871-7\_2}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/0001TY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TolbaAY16, author = {Mohamed Tolba and Ahmed Abdelkhalek and Amr M. Youssef}, title = {Impossible Differential Cryptanalysis of Reduced-Round {SKINNY}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1115}, year = {2016}, url = {http://eprint.iacr.org/2016/1115}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TolbaAY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/c2si/AlTawyTY15, author = {Riham AlTawy and Mohamed Tolba and Amr M. Youssef}, editor = {Said El Hajji and Abderrahmane Nitaj and Claude Carlet and El Mamoun Souidi}, title = {A Higher Order Key Partitioning Attack with Application to LBlock}, booktitle = {Codes, Cryptology, and Information Security - First International Conference, {C2SI} 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Berger}, series = {Lecture Notes in Computer Science}, volume = {9084}, pages = {215--227}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18681-8\_17}, doi = {10.1007/978-3-319-18681-8\_17}, timestamp = {Tue, 27 Aug 2019 17:49:45 +0200}, biburl = {https://dblp.org/rec/conf/c2si/AlTawyTY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latincrypt/AbdelkhalekATY15, author = {Ahmed Abdelkhalek and Riham AlTawy and Mohamed Tolba and Amr M. Youssef}, editor = {Kristin E. Lauter and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez}, title = {Meet-in-the-Middle Attacks on Reduced-Round Hierocrypt-3}, booktitle = {Progress in Cryptology - {LATINCRYPT} 2015 - 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9230}, pages = {187--203}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22174-8\_11}, doi = {10.1007/978-3-319-22174-8\_11}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/latincrypt/AbdelkhalekATY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lightsec/TolbaAY15, author = {Mohamed Tolba and Ahmed Abdelkhalek and Amr M. Youssef}, editor = {Tim G{\"{u}}neysu and Gregor Leander and Amir Moradi}, title = {Meet-in-the-Middle Attacks on Reduced Round Piccolo}, booktitle = {Lightweight Cryptography for Security and Privacy - 4th International Workshop, LightSec 2015, Bochum, Germany, September 10-11, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9542}, pages = {3--20}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-29078-2\_1}, doi = {10.1007/978-3-319-29078-2\_1}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/lightsec/TolbaAY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/space/TolbaAY15, author = {Mohamed Tolba and Ahmed Abdelkhalek and Amr M. Youssef}, editor = {Rajat Subhra Chakraborty and Peter Schwabe and Jon A. Solworth}, title = {Meet-in-the-Middle Attacks on Round-Reduced Khudra}, booktitle = {Security, Privacy, and Applied Cryptography Engineering - 5th International Conference, {SPACE} 2015, Jaipur, India, October 3-7, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9354}, pages = {127--138}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24126-5\_8}, doi = {10.1007/978-3-319-24126-5\_8}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/space/TolbaAY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/space/AbdelkhalekTY15, author = {Ahmed Abdelkhalek and Mohamed Tolba and Amr M. Youssef}, editor = {Rajat Subhra Chakraborty and Peter Schwabe and Jon A. Solworth}, title = {Improved Key Recovery Attack on Round-reduced Hierocrypt-L1 in the Single-Key Setting}, booktitle = {Security, Privacy, and Applied Cryptography Engineering - 5th International Conference, {SPACE} 2015, Jaipur, India, October 3-7, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9354}, pages = {139--150}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24126-5\_9}, doi = {10.1007/978-3-319-24126-5\_9}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/space/AbdelkhalekTY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.