default search action
BibTeX records: Mohamed Tolba
@article{DBLP:journals/arobots/TolbaSEM23, author = {Mohamed Tolba and Bijan Shirinzadeh and Gamal El{-}bayoumi and Osama Mohamady}, title = {Adaptive optimal controller design for an unbalanced {UAV} with slung load}, journal = {Auton. Robots}, volume = {47}, number = {3}, pages = {267--280}, year = {2023} }
@inproceedings{DBLP:conf/africacrypt/TolbaEY20, author = {Mohamed Tolba and Muhammad ElSheikh and Amr M. Youssef}, title = {Impossible Differential Cryptanalysis of Reduced-Round Tweakable {TWINE}}, booktitle = {{AFRICACRYPT}}, series = {Lecture Notes in Computer Science}, volume = {12174}, pages = {91--113}, publisher = {Springer}, year = {2020} }
@article{DBLP:journals/iacr/TolbaEY20, author = {Mohamed Tolba and Muhammad ElSheikh and Amr M. Youssef}, title = {Impossible Differential Cryptanalysis of Reduced-Round Tweakable {TWINE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {52}, year = {2020} }
@article{DBLP:journals/ieicet/ElSheikhTY18, author = {Muhammad ElSheikh and Mohamed Tolba and Amr M. Youssef}, title = {Impossible Differential Attack on Reduced Round {SPARX-128/256}}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {101-A}, number = {4}, pages = {731--733}, year = {2018} }
@article{DBLP:journals/ieicet/AbdelkhalekTY18, author = {Ahmed Abdelkhalek and Mohamed Tolba and Amr M. Youssef}, title = {Related-Key Differential Attack on Round-Reduced Bel-T-256}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {101-A}, number = {5}, pages = {859--862}, year = {2018} }
@inproceedings{DBLP:conf/sacrypt/ElSheikhTY18, author = {Muhammad ElSheikh and Mohamed Tolba and Amr M. Youssef}, title = {Integral Attacks on Round-Reduced Bel-T-256}, booktitle = {{SAC}}, series = {Lecture Notes in Computer Science}, volume = {11349}, pages = {73--91}, publisher = {Springer}, year = {2018} }
@article{DBLP:journals/ieicet/Tolba0Y17, author = {Mohamed Tolba and Ahmed Abdelkhalek and Amr M. Youssef}, title = {Improved Multiple Impossible Differential Cryptanalysis of Midori128}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {100-A}, number = {8}, pages = {1733--1737}, year = {2017} }
@article{DBLP:journals/tosc/0001STTY17, author = {Ahmed Abdelkhalek and Yu Sasaki and Yosuke Todo and Mohamed Tolba and Amr M. Youssef}, title = {{MILP} Modeling for (Large) S-boxes to Optimize Probability of Differential Characteristics}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {4}, pages = {99--129}, year = {2017} }
@inproceedings{DBLP:conf/africacrypt/Tolba0Y17, author = {Mohamed Tolba and Ahmed Abdelkhalek and Amr M. Youssef}, title = {Impossible Differential Cryptanalysis of Reduced-Round {SKINNY}}, booktitle = {{AFRICACRYPT}}, series = {Lecture Notes in Computer Science}, volume = {10239}, pages = {117--134}, year = {2017} }
@inproceedings{DBLP:conf/africacrypt/0001TY17, author = {Ahmed Abdelkhalek and Mohamed Tolba and Amr M. Youssef}, title = {Impossible Differential Attack on Reduced Round {SPARX-64/128}}, booktitle = {{AFRICACRYPT}}, series = {Lecture Notes in Computer Science}, volume = {10239}, pages = {135--146}, year = {2017} }
@inproceedings{DBLP:conf/icisc/TolbaY17, author = {Mohamed Tolba and Amr M. Youssef}, title = {Improved Meet-in-the-Middle Attacks on Reduced Round Kuznyechik}, booktitle = {{ICISC}}, series = {Lecture Notes in Computer Science}, volume = {10779}, pages = {26--38}, publisher = {Springer}, year = {2017} }
@inproceedings{DBLP:conf/sacrypt/Tolba0Y17, author = {Mohamed Tolba and Ahmed Abdelkhalek and Amr M. Youssef}, title = {Multidimensional Zero-Correlation Linear Cryptanalysis of Reduced Round {SPARX-128}}, booktitle = {{SAC}}, series = {Lecture Notes in Computer Science}, volume = {10719}, pages = {423--441}, publisher = {Springer}, year = {2017} }
@article{DBLP:journals/ieicet/TolbaAY16, author = {Mohamed Tolba and Ahmed Abdelkhalek and Amr M. Youssef}, title = {A Meet in the Middle Attack on Reduced Round Kiasu-BC}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {99-A}, number = {10}, pages = {1888--1890}, year = {2016} }
@article{DBLP:journals/ipl/TolbaY16, author = {Mohamed Tolba and Amr M. Youssef}, title = {Generalized MitM attacks on full {TWINE}}, journal = {Inf. Process. Lett.}, volume = {116}, number = {2}, pages = {128--135}, year = {2016} }
@inproceedings{DBLP:conf/isw/Tolba0Y16, author = {Mohamed Tolba and Ahmed Abdelkhalek and Amr M. Youssef}, title = {Truncated and Multiple Differential Cryptanalysis of Reduced Round Midori128}, booktitle = {{ISC}}, series = {Lecture Notes in Computer Science}, volume = {9866}, pages = {3--17}, publisher = {Springer}, year = {2016} }
@inproceedings{DBLP:conf/isw/0001TY16, author = {Ahmed Abdelkhalek and Mohamed Tolba and Amr M. Youssef}, title = {Improved Linear Cryptanalysis of Round-Reduced {ARIA}}, booktitle = {{ISC}}, series = {Lecture Notes in Computer Science}, volume = {9866}, pages = {18--34}, publisher = {Springer}, year = {2016} }
@article{DBLP:journals/iacr/TolbaAY16, author = {Mohamed Tolba and Ahmed Abdelkhalek and Amr M. Youssef}, title = {Impossible Differential Cryptanalysis of Reduced-Round {SKINNY}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1115}, year = {2016} }
@inproceedings{DBLP:conf/c2si/AlTawyTY15, author = {Riham AlTawy and Mohamed Tolba and Amr M. Youssef}, title = {A Higher Order Key Partitioning Attack with Application to LBlock}, booktitle = {{C2SI}}, series = {Lecture Notes in Computer Science}, volume = {9084}, pages = {215--227}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/latincrypt/AbdelkhalekATY15, author = {Ahmed Abdelkhalek and Riham AlTawy and Mohamed Tolba and Amr M. Youssef}, title = {Meet-in-the-Middle Attacks on Reduced-Round Hierocrypt-3}, booktitle = {{LATINCRYPT}}, series = {Lecture Notes in Computer Science}, volume = {9230}, pages = {187--203}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/lightsec/TolbaAY15, author = {Mohamed Tolba and Ahmed Abdelkhalek and Amr M. Youssef}, title = {Meet-in-the-Middle Attacks on Reduced Round Piccolo}, booktitle = {LightSec}, series = {Lecture Notes in Computer Science}, volume = {9542}, pages = {3--20}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/space/TolbaAY15, author = {Mohamed Tolba and Ahmed Abdelkhalek and Amr M. Youssef}, title = {Meet-in-the-Middle Attacks on Round-Reduced Khudra}, booktitle = {{SPACE}}, series = {Lecture Notes in Computer Science}, volume = {9354}, pages = {127--138}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/space/AbdelkhalekTY15, author = {Ahmed Abdelkhalek and Mohamed Tolba and Amr M. Youssef}, title = {Improved Key Recovery Attack on Round-reduced Hierocrypt-L1 in the Single-Key Setting}, booktitle = {{SPACE}}, series = {Lecture Notes in Computer Science}, volume = {9354}, pages = {139--150}, publisher = {Springer}, year = {2015} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.