BibTeX records: Mohamed Tolba

download as .bib file

@article{DBLP:journals/ieicet/ElSheikhTY18,
  author    = {Muhammad ElSheikh and
               Mohamed Tolba and
               Amr M. Youssef},
  title     = {Impossible Differential Attack on Reduced Round {SPARX-128/256}},
  journal   = {{IEICE} Transactions},
  volume    = {101-A},
  number    = {4},
  pages     = {731--733},
  year      = {2018},
  url       = {http://search.ieice.org/bin/summary.php?id=e101-a\_4\_731},
  timestamp = {Tue, 17 Apr 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieicet/ElSheikhTY18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/AbdelkhalekTY18,
  author    = {Ahmed Abdelkhalek and
               Mohamed Tolba and
               Amr M. Youssef},
  title     = {Related-Key Differential Attack on Round-Reduced Bel-T-256},
  journal   = {{IEICE} Transactions},
  volume    = {101-A},
  number    = {5},
  pages     = {859--862},
  year      = {2018},
  url       = {http://search.ieice.org/bin/summary.php?id=e101-a\_5\_859},
  timestamp = {Mon, 14 May 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieicet/AbdelkhalekTY18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/Tolba0Y17,
  author    = {Mohamed Tolba and
               Ahmed Abdelkhalek and
               Amr M. Youssef},
  title     = {Improved Multiple Impossible Differential Cryptanalysis of Midori128},
  journal   = {{IEICE} Transactions},
  volume    = {100-A},
  number    = {8},
  pages     = {1733--1737},
  year      = {2017},
  url       = {http://search.ieice.org/bin/summary.php?id=e100-a\_8\_1733},
  timestamp = {Wed, 13 Sep 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieicet/Tolba0Y17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/0001STTY17,
  author    = {Ahmed Abdelkhalek and
               Yu Sasaki and
               Yosuke Todo and
               Mohamed Tolba and
               Amr M. Youssef},
  title     = {{MILP} Modeling for (Large) S-boxes to Optimize Probability of Differential
               Characteristics},
  journal   = {{IACR} Trans. Symmetric Cryptol.},
  volume    = {2017},
  number    = {4},
  pages     = {99--129},
  year      = {2017},
  url       = {https://doi.org/10.13154/tosc.v2017.i4.99-129},
  doi       = {10.13154/tosc.v2017.i4.99-129},
  timestamp = {Mon, 08 Jan 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tosc/0001STTY17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/Tolba0Y17,
  author    = {Mohamed Tolba and
               Ahmed Abdelkhalek and
               Amr M. Youssef},
  title     = {Impossible Differential Cryptanalysis of Reduced-Round {SKINNY}},
  booktitle = {Progress in Cryptology - {AFRICACRYPT} 2017 - 9th International Conference
               on Cryptology in Africa, Dakar, Senegal, May 24-26, 2017, Proceedings},
  pages     = {117--134},
  year      = {2017},
  crossref  = {DBLP:conf/africacrypt/2017},
  url       = {https://doi.org/10.1007/978-3-319-57339-7\_7},
  doi       = {10.1007/978-3-319-57339-7\_7},
  timestamp = {Wed, 10 May 2017 15:23:55 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/africacrypt/Tolba0Y17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/0001TY17,
  author    = {Ahmed Abdelkhalek and
               Mohamed Tolba and
               Amr M. Youssef},
  title     = {Impossible Differential Attack on Reduced Round {SPARX-64/128}},
  booktitle = {Progress in Cryptology - {AFRICACRYPT} 2017 - 9th International Conference
               on Cryptology in Africa, Dakar, Senegal, May 24-26, 2017, Proceedings},
  pages     = {135--146},
  year      = {2017},
  crossref  = {DBLP:conf/africacrypt/2017},
  url       = {https://doi.org/10.1007/978-3-319-57339-7\_8},
  doi       = {10.1007/978-3-319-57339-7\_8},
  timestamp = {Wed, 10 May 2017 15:23:55 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/africacrypt/0001TY17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/TolbaY17,
  author    = {Mohamed Tolba and
               Amr M. Youssef},
  title     = {Improved Meet-in-the-Middle Attacks on Reduced Round Kuznyechik},
  booktitle = {Information Security and Cryptology - {ICISC} 2017 - 20th International
               Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised
               Selected Papers},
  pages     = {26--38},
  year      = {2017},
  crossref  = {DBLP:conf/icisc/2017},
  url       = {https://doi.org/10.1007/978-3-319-78556-1\_2},
  doi       = {10.1007/978-3-319-78556-1\_2},
  timestamp = {Fri, 06 Apr 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icisc/TolbaY17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/Tolba0Y17,
  author    = {Mohamed Tolba and
               Ahmed Abdelkhalek and
               Amr M. Youssef},
  title     = {Multidimensional Zero-Correlation Linear Cryptanalysis of Reduced
               Round {SPARX-128}},
  booktitle = {Selected Areas in Cryptography - {SAC} 2017 - 24th International Conference,
               Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers},
  pages     = {423--441},
  year      = {2017},
  crossref  = {DBLP:conf/sacrypt/2017},
  url       = {https://doi.org/10.1007/978-3-319-72565-9\_22},
  doi       = {10.1007/978-3-319-72565-9\_22},
  timestamp = {Fri, 12 Jan 2018 11:12:26 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacrypt/Tolba0Y17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/TolbaAY16,
  author    = {Mohamed Tolba and
               Ahmed Abdelkhalek and
               Amr M. Youssef},
  title     = {A Meet in the Middle Attack on Reduced Round Kiasu-BC},
  journal   = {{IEICE} Transactions},
  volume    = {99-A},
  number    = {10},
  pages     = {1888--1890},
  year      = {2016},
  url       = {http://search.ieice.org/bin/summary.php?id=e99-a\_10\_1888},
  timestamp = {Tue, 25 Oct 2016 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieicet/TolbaAY16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/TolbaY16,
  author    = {Mohamed Tolba and
               Amr M. Youssef},
  title     = {Generalized MitM attacks on full {TWINE}},
  journal   = {Inf. Process. Lett.},
  volume    = {116},
  number    = {2},
  pages     = {128--135},
  year      = {2016},
  url       = {https://doi.org/10.1016/j.ipl.2015.09.011},
  doi       = {10.1016/j.ipl.2015.09.011},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ipl/TolbaY16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/Tolba0Y16,
  author    = {Mohamed Tolba and
               Ahmed Abdelkhalek and
               Amr M. Youssef},
  title     = {Truncated and Multiple Differential Cryptanalysis of Reduced Round
               Midori128},
  booktitle = {Information Security - 19th International Conference, {ISC} 2016,
               Honolulu, HI, USA, September 3-6, 2016, Proceedings},
  pages     = {3--17},
  year      = {2016},
  crossref  = {DBLP:conf/isw/2016},
  url       = {https://doi.org/10.1007/978-3-319-45871-7\_1},
  doi       = {10.1007/978-3-319-45871-7\_1},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isw/Tolba0Y16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/0001TY16,
  author    = {Ahmed Abdelkhalek and
               Mohamed Tolba and
               Amr M. Youssef},
  title     = {Improved Linear Cryptanalysis of Round-Reduced {ARIA}},
  booktitle = {Information Security - 19th International Conference, {ISC} 2016,
               Honolulu, HI, USA, September 3-6, 2016, Proceedings},
  pages     = {18--34},
  year      = {2016},
  crossref  = {DBLP:conf/isw/2016},
  url       = {https://doi.org/10.1007/978-3-319-45871-7\_2},
  doi       = {10.1007/978-3-319-45871-7\_2},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isw/0001TY16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TolbaAY16,
  author    = {Mohamed Tolba and
               Ahmed Abdelkhalek and
               Amr M. Youssef},
  title     = {Impossible Differential Cryptanalysis of Reduced-Round {SKINNY}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {1115},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/1115},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/TolbaAY16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/c2si/AlTawyTY15,
  author    = {Riham AlTawy and
               Mohamed Tolba and
               Amr M. Youssef},
  title     = {A Higher Order Key Partitioning Attack with Application to LBlock},
  booktitle = {Codes, Cryptology, and Information Security - First International
               Conference, {C2SI} 2015, Rabat, Morocco, May 26-28, 2015, Proceedings
               - In Honor of Thierry Berger},
  pages     = {215--227},
  year      = {2015},
  crossref  = {DBLP:conf/c2si/2015},
  url       = {https://doi.org/10.1007/978-3-319-18681-8\_17},
  doi       = {10.1007/978-3-319-18681-8\_17},
  timestamp = {Thu, 15 Jun 2017 21:32:35 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/c2si/AlTawyTY15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latincrypt/AbdelkhalekATY15,
  author    = {Ahmed Abdelkhalek and
               Riham AlTawy and
               Mohamed Tolba and
               Amr M. Youssef},
  title     = {Meet-in-the-Middle Attacks on Reduced-Round Hierocrypt-3},
  booktitle = {Progress in Cryptology - {LATINCRYPT} 2015 - 4th International Conference
               on Cryptology and Information Security in Latin America, Guadalajara,
               Mexico, August 23-26, 2015, Proceedings},
  pages     = {187--203},
  year      = {2015},
  crossref  = {DBLP:conf/latincrypt/2015},
  url       = {https://doi.org/10.1007/978-3-319-22174-8\_11},
  doi       = {10.1007/978-3-319-22174-8\_11},
  timestamp = {Wed, 24 May 2017 08:28:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/latincrypt/AbdelkhalekATY15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lightsec/TolbaAY15,
  author    = {Mohamed Tolba and
               Ahmed Abdelkhalek and
               Amr M. Youssef},
  title     = {Meet-in-the-Middle Attacks on Reduced Round Piccolo},
  booktitle = {Lightweight Cryptography for Security and Privacy - 4th International
               Workshop, LightSec 2015, Bochum, Germany, September 10-11, 2015, Revised
               Selected Papers},
  pages     = {3--20},
  year      = {2015},
  crossref  = {DBLP:conf/lightsec/2015},
  url       = {https://doi.org/10.1007/978-3-319-29078-2\_1},
  doi       = {10.1007/978-3-319-29078-2\_1},
  timestamp = {Tue, 23 May 2017 01:12:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/lightsec/TolbaAY15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/space/TolbaAY15,
  author    = {Mohamed Tolba and
               Ahmed Abdelkhalek and
               Amr M. Youssef},
  title     = {Meet-in-the-Middle Attacks on Round-Reduced Khudra},
  booktitle = {Security, Privacy, and Applied Cryptography Engineering - 5th International
               Conference, {SPACE} 2015, Jaipur, India, October 3-7, 2015, Proceedings},
  pages     = {127--138},
  year      = {2015},
  crossref  = {DBLP:conf/space/2015},
  url       = {https://doi.org/10.1007/978-3-319-24126-5\_8},
  doi       = {10.1007/978-3-319-24126-5\_8},
  timestamp = {Wed, 17 May 2017 14:25:06 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/space/TolbaAY15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/space/AbdelkhalekTY15,
  author    = {Ahmed Abdelkhalek and
               Mohamed Tolba and
               Amr M. Youssef},
  title     = {Improved Key Recovery Attack on Round-reduced Hierocrypt-L1 in the
               Single-Key Setting},
  booktitle = {Security, Privacy, and Applied Cryptography Engineering - 5th International
               Conference, {SPACE} 2015, Jaipur, India, October 3-7, 2015, Proceedings},
  pages     = {139--150},
  year      = {2015},
  crossref  = {DBLP:conf/space/2015},
  url       = {https://doi.org/10.1007/978-3-319-24126-5\_9},
  doi       = {10.1007/978-3-319-24126-5\_9},
  timestamp = {Wed, 17 May 2017 14:25:06 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/space/AbdelkhalekTY15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/africacrypt/2017,
  editor    = {Marc Joye and
               Abderrahmane Nitaj},
  title     = {Progress in Cryptology - {AFRICACRYPT} 2017 - 9th International Conference
               on Cryptology in Africa, Dakar, Senegal, May 24-26, 2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10239},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-57339-7},
  doi       = {10.1007/978-3-319-57339-7},
  isbn      = {978-3-319-57338-0},
  timestamp = {Wed, 10 May 2017 15:23:55 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/africacrypt/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icisc/2017,
  editor    = {Howon Kim and
               Dong{-}Chan Kim},
  title     = {Information Security and Cryptology - {ICISC} 2017 - 20th International
               Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised
               Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {10779},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-78556-1},
  doi       = {10.1007/978-3-319-78556-1},
  isbn      = {978-3-319-78555-4},
  timestamp = {Thu, 22 Mar 2018 11:29:50 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icisc/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacrypt/2017,
  editor    = {Carlisle Adams and
               Jan Camenisch},
  title     = {Selected Areas in Cryptography - {SAC} 2017 - 24th International Conference,
               Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {10719},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-72565-9},
  doi       = {10.1007/978-3-319-72565-9},
  isbn      = {978-3-319-72564-2},
  timestamp = {Fri, 12 Jan 2018 11:12:26 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacrypt/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isw/2016,
  editor    = {Matt Bishop and
               Anderson C. A. Nascimento},
  title     = {Information Security - 19th International Conference, {ISC} 2016,
               Honolulu, HI, USA, September 3-6, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9866},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-45871-7},
  doi       = {10.1007/978-3-319-45871-7},
  isbn      = {978-3-319-45870-0},
  timestamp = {Sun, 21 May 2017 00:20:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isw/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/c2si/2015,
  editor    = {Said El Hajji and
               Abderrahmane Nitaj and
               Claude Carlet and
               El Mamoun Souidi},
  title     = {Codes, Cryptology, and Information Security - First International
               Conference, {C2SI} 2015, Rabat, Morocco, May 26-28, 2015, Proceedings
               - In Honor of Thierry Berger},
  series    = {Lecture Notes in Computer Science},
  volume    = {9084},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-18681-8},
  doi       = {10.1007/978-3-319-18681-8},
  isbn      = {978-3-319-18680-1},
  timestamp = {Thu, 15 Jun 2017 21:32:35 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/c2si/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/latincrypt/2015,
  editor    = {Kristin E. Lauter and
               Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez},
  title     = {Progress in Cryptology - {LATINCRYPT} 2015 - 4th International Conference
               on Cryptology and Information Security in Latin America, Guadalajara,
               Mexico, August 23-26, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9230},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-22174-8},
  doi       = {10.1007/978-3-319-22174-8},
  isbn      = {978-3-319-22173-1},
  timestamp = {Wed, 24 May 2017 08:28:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/latincrypt/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/lightsec/2015,
  editor    = {Tim G{\"{u}}neysu and
               Gregor Leander and
               Amir Moradi},
  title     = {Lightweight Cryptography for Security and Privacy - 4th International
               Workshop, LightSec 2015, Bochum, Germany, September 10-11, 2015, Revised
               Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {9542},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-29078-2},
  doi       = {10.1007/978-3-319-29078-2},
  isbn      = {978-3-319-29077-5},
  timestamp = {Tue, 23 May 2017 01:12:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/lightsec/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/space/2015,
  editor    = {Rajat Subhra Chakraborty and
               Peter Schwabe and
               Jon A. Solworth},
  title     = {Security, Privacy, and Applied Cryptography Engineering - 5th International
               Conference, {SPACE} 2015, Jaipur, India, October 3-7, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9354},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-24126-5},
  doi       = {10.1007/978-3-319-24126-5},
  isbn      = {978-3-319-24125-8},
  timestamp = {Wed, 17 May 2017 14:25:06 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/space/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI at University of Trier