default search action
Amr M. Youssef
Person information
- affiliation: Concordia University, Montreal, Canada
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j94]Francesca Stabile, Walter Lucia, Amr M. Youssef, Giuseppe Franzè:
A Verifiable Computing Scheme for Encrypted Control Systems. IEEE Control. Syst. Lett. 8: 1096-1101 (2024) - [j93]Philippe Mangeard, Bhaskar Tejaswi, Mohammad Mannan, Amr M. Youssef:
WARNE: A stalkerware evidence collection tool. Forensic Sci. Int. Digit. Investig. 48: 301677 (2024) - [j92]Mohamed Seifelnasr, Riham AlTawy, Amr M. Youssef:
SKAFS: Symmetric Key Authentication Protocol With Forward Secrecy for Edge Computing. IEEE Internet Things J. 11(1): 510-525 (2024) - [j91]Bhaskar Tejaswi, Mohammad Mannan, Amr M. Youssef:
Security Weaknesses in IoT Management Platforms. IEEE Internet Things J. 11(1): 1572-1588 (2024) - [j90]Mohamed Seifelnasr, Riham AlTawy, Amr M. Youssef, Essam Ghadafi:
Privacy-Preserving Mutual Authentication Protocol With Forward Secrecy for IoT-Edge-Cloud. IEEE Internet Things J. 11(5): 8105-8117 (2024) - [j89]Omniyah Gul M. Khan, Fadi Elghitani, Amr M. Youssef, Magdy M. A. Salama, Ehab Fahmy El-Saadany:
Real-Time Congestion-Aware Charging Station Assignment Model for EVs. IEEE Internet Things J. 11(7): 11723-11736 (2024) - [j88]Ahmed Aly, Shahrear Iqbal, Amr M. Youssef, Essam Mansour:
MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning. IEEE Trans. Inf. Forensics Secur. 19: 5257-5271 (2024) - [j87]Ahmad Mohammad Saber, Amr M. Youssef, Davor Svetinovic, Hatem H. Zeineldin, Ehab F. El-Saadany:
Cyber-Immune Line Current Differential Relays. IEEE Trans. Ind. Informatics 20(3): 3597-3608 (2024) - [j86]Maryna Kluban, Mohammad Mannan, Amr M. Youssef:
On Detecting and Measuring Exploitable JavaScript Functions in Real-world Applications. ACM Trans. Priv. Secur. 27(1): 8:1-8:37 (2024) - [j85]Mouna Nakkar, Riham AlTawy, Amr M. Youssef:
Lightweight Group Authentication Scheme Leveraging Shamir's Secret Sharing and PUFs. IEEE Trans. Netw. Sci. Eng. 11(4): 3412-3429 (2024) - [c135]Abdelrahman Ragab, Mohammad Mannan, Amr M. Youssef:
"Trust Me Over My Privacy Policy": Privacy Discrepancies in Romantic AI Chatbot Apps. EuroS&P Workshops 2024: 484-495 - [c134]Sajjad Pourali, Xiufen Yu, Lianying Zhao, Mohammad Mannan, Amr M. Youssef:
Racing for TLS Certificate Validation: A Hijacker's Guide to the Android TLS Galaxy. USENIX Security Symposium 2024 - [i46]Ahmad Mohammad Saber, Amr M. Youssef, Davor Svetinovic, Hatem H. Zeineldin, Deepa Kundur, Ehab F. El-Saadany:
Enhancing Power Quality Event Classification with AI Transformer Models. CoRR abs/2402.14949 (2024) - [i45]Francesca Stabile, Walter Lucia, Amr M. Youssef, Giuseppe Franzè:
A Verifiable Computing Scheme for Encrypted Control Systems. CoRR abs/2405.18586 (2024) - [i44]Ahmad Mohammad Saber, Alaa Selim, Mohamed M. Hammad, Amr M. Youssef, Deepa Kundur, Ehab F. El-Saadany:
A Novel Approach to Classify Power Quality Signals Using Vision Transformers. CoRR abs/2409.00025 (2024) - [i43]Ahmad Mohammad Saber, Amr M. Youssef, Davor Svetinovic, Hatem H. Zeineldin, Ehab F. El-Saadany:
Unmasking Covert Intrusions: Detection of Fault-Masking Cyberattacks on Differential Protection Systems. CoRR abs/2409.04242 (2024) - 2023
- [j84]Mouna Nakkar, Riham AlTawy, Amr M. Youssef:
GASE: A Lightweight Group Authentication Scheme With Key Agreement for Edge Computing Applications. IEEE Internet Things J. 10(1): 840-854 (2023) - [j83]Mohammed Elbayoumi, Mohamed Ibrahim, Salah Elhoushy, Walaa Hamouda, Amr M. Youssef:
Performance Analysis of Cellular Ultradense IoT Networks With Wireless Backhauls. IEEE Internet Things J. 10(17): 15774-15787 (2023) - [j82]Omniyah Gul M. Khan, Amr M. Youssef, Magdy M. A. Salama, Ehab F. El-Saadany:
Management of Congestion in Distribution Networks Utilizing Demand Side Management and Reinforcement Learning. IEEE Syst. J. 17(3): 4452-4463 (2023) - [j81]Hisham S. Galal, Amr M. Youssef:
Aegis: Privacy-Preserving Market for Non-Fungible Tokens. IEEE Trans. Netw. Sci. Eng. 10(1): 92-102 (2023) - [j80]Riham AlTawy, Hisham S. Galal, Amr M. Youssef:
Mjolnir: Breaking the Glass in a Publicly Verifiable Yet Private Manner. IEEE Trans. Netw. Serv. Manag. 20(3): 2942-2956 (2023) - [c133]Bhaskar Tejaswi, Mohammad Mannan, Amr M. Youssef:
All Your IoT Devices Are Belong to Us: Security Weaknesses in IoT Management Platforms. CODASPY 2023: 245-250 - [c132]Abdelrahman Ragab, Mohammad Mannan, Amr M. Youssef:
Try On, Spied On?: Privacy Analysis of Virtual Try-On Websites and Android Apps. ESORICS Workshops (1) 2023: 232-248 - [c131]Ismail Afia, Hisham S. Galal, Riham AlTawy, Amr M. Youssef:
vPass: Publicly Verifiable Fair Exchange Protocol for Vehicle Passports. ICBC 2023: 1-9 - [c130]Mohammed Elbayoumi, Mohamed Ibrahim, Salah Elhoushy, Walaa Hamouda, Amr M. Youssef:
Machine-Type Communications in mmWave Ultra-Dense Networks: Performance Analysis. ICC 2023: 5843-5848 - [c129]Ahmad Mohammad Saber, Amr M. Youssef, Davor Svetinovic, Hatem H. Zeineldin, Ehab F. El-Saadany:
Learning-Based Detection of Malicious Volt-VAr Control Parameters in Smart Inverters. IECON 2023: 1-6 - [c128]Philippe Mangeard, Xiufen Yu, Mohammad Mannan, Amr M. Youssef:
No Place to Hide: Privacy Exposure in Anti-stalkerware Apps and Support Websites. NordSec 2023: 18-36 - [c127]Supraja Baskaran, Lianying Zhao, Mohammad Mannan, Amr M. Youssef:
Measuring the Leakage and Exploitability of Authentication Secrets in Super-apps: The WeChat Case. RAID 2023: 727-743 - [c126]Rohan Pagey, Mohammad Mannan, Amr M. Youssef:
All Your Shops Are Belong to Us: Security Weaknesses in E-commerce Platforms. WWW 2023: 2144-2154 - [i42]Amir Mohammad Naseri, Walter Lucia, Amr M. Youssef:
An Observer-Based Key Agreement Scheme for Remotely Controlled Mobile Robots. CoRR abs/2303.04931 (2023) - [i41]Supraja Baskaran, Lianying Zhao, Mohammad Mannan, Amr M. Youssef:
Measuring the Leakage and Exploitability of Authentication Secrets in Super-apps: The WeChat Case. CoRR abs/2307.09317 (2023) - [i40]Bhaskar Tejaswi, Mohammad Mannan, Amr M. Youssef:
Security Weaknesses in IoT Management Platforms. CoRR abs/2307.13952 (2023) - [i39]Ahmad Mohammad Saber, Amr M. Youssef, Davor Svetinovic, Hatem H. Zeineldin, Ehab F. El-Saadany:
Learning-Based Detection of Malicious Volt-VAr Control Parameters in Smart Inverters. CoRR abs/2309.10304 (2023) - [i38]Hisham S. Galal, Amr M. Youssef:
Aegis: Privacy-Preserving Market for Non-Fungible Tokens. IACR Cryptol. ePrint Arch. 2023: 144 (2023) - 2022
- [j79]Hisham S. Galal, Mohammad Mannan, Amr M. Youssef:
Blindfold: Keeping private keys in PKIs and CDNs out of sight. Comput. Secur. 118: 102731 (2022) - [j78]Amir Mohammad Naseri, Walter Lucia, Amr M. Youssef:
Encrypted Cloud-Based Set-Theoretic Model Predictive Control. IEEE Control. Syst. Lett. 6: 3032-3037 (2022) - [j77]Mohammed Elbayoumi, Walaa Hamouda, Amr M. Youssef:
Edge Computing and Multiple-Association in Ultra-Dense Networks: Performance Analysis. IEEE Trans. Commun. 70(8): 5098-5112 (2022) - [j76]Abdullah Albarakati, Chantale Robillard, Mark Karanfil, Marthe Kassouf, Mourad Debbabi, Amr M. Youssef, Mohsen Ghafouri, Rachid Hadjidj:
Security Monitoring of IEC 61850 Substations Using IEC 62351-7 Network and System Management. IEEE Trans. Ind. Informatics 18(3): 1641-1653 (2022) - [j75]Ahmad Mohammad Saber, Amr M. Youssef, Davor Svetinovic, Hatem H. Zeineldin, Ehab F. El-Saadany:
Anomaly-Based Detection of Cyberattacks on Line Current Differential Relays. IEEE Trans. Smart Grid 13(6): 4787-4800 (2022) - [j74]Walter Lucia, Amr M. Youssef:
A Key-Agreement Scheme for Cyber-Physical Systems. IEEE Trans. Syst. Man Cybern. Syst. 52(8): 5368-5373 (2022) - [c125]Maryna Kluban, Mohammad Mannan, Amr M. Youssef:
On Measuring Vulnerable JavaScript Functions in the Wild. AsiaCCS 2022: 917-930 - [c124]Bhaskar Tejaswi, Nayanamana Samarasinghe, Sajjad Pourali, Mohammad Mannan, Amr M. Youssef:
Leaky Kits: The Increased Risk of Data Exposure from Phishing Kits. eCrime 2022: 1-13 - [c123]Nayanamana Samarasinghe, Pranay Kapoor, Mohammad Mannan, Amr M. Youssef:
No Salvation from Trackers: Privacy Analysis of Religious Websites and Mobile Apps. DPM/CBT@ESORICS 2022: 151-166 - [c122]Amir Mohammad Naseri, Walter Lucia, Amr M. Youssef:
A Privacy Preserving Solution for Cloud-Enabled Set-Theoretic Model Predictive Control. ECC 2022: 894-899 - [c121]Xiufen Yu, Nayanamana Samarasinghe, Mohammad Mannan, Amr M. Youssef:
Got Sick and Tracked: Privacy Analysis of Hospital Websites. EuroS&P Workshops 2022: 278-286 - [c120]Mounir Elgharabawy, Blas Kojusner, Mohammad Mannan, Kevin R. B. Butler, Byron Williams, Amr M. Youssef:
SAUSAGE: Security Analysis of Unix domain Socket usAGE in Android. EuroS&P 2022: 572-586 - [c119]Muhammad ElSheikh, Amr M. Youssef:
Dispute-Free Scalable Open Vote Network Using zk-SNARKs. Financial Cryptography Workshops 2022: 499-515 - [c118]Pranay Kapoor, Rohan Pagey, Mohammad Mannan, Amr M. Youssef:
Silver Surfers on the Tech Wave: Privacy Analysis of Android Apps for the Elderly. SecureComm 2022: 673-691 - [c117]Nayanamana Samarasinghe, Aashish Adhikari, Mohammad Mannan, Amr M. Youssef:
Et tu, Brute? Privacy Analysis of Government Websites and Mobile Apps. WWW 2022: 564-575 - [i37]Muhammad ElSheikh, Amr M. Youssef:
Dispute-free Scalable Open Vote Network using zk-SNARKs. CoRR abs/2203.03363 (2022) - [i36]Mounir Elgharabawy, Blas Kojusner, Mohammad Mannan, Kevin R. B. Butler, Byron Williams, Amr M. Youssef:
SAUSAGE: Security Analysis of Unix domain Socket Usage in Android. CoRR abs/2204.01516 (2022) - [i35]Hisham S. Galal, Mohammad Mannan, Amr M. Youssef:
Blindfold: Keeping Private Keys in PKIs and CDNs out of Sight. CoRR abs/2207.09335 (2022) - [i34]Muhammad ElSheikh, Amr M. Youssef:
Dispute-free Scalable Open Vote Network using zk-SNARKs. IACR Cryptol. ePrint Arch. 2022: 310 (2022) - 2021
- [j73]Ahmed Abdelwahab, Walter Lucia, Amr M. Youssef:
Covert Channels in Cyber-Physical Systems. IEEE Control. Syst. Lett. 5(4): 1273-1278 (2021) - [j72]Suzan Ali, Mounir Elgharabawy, Quentin Duchaussoy, Mohammad Mannan, Amr M. Youssef:
Parental Controls: Safer Internet Solutions or New Pitfalls? IEEE Secur. Priv. 19(6): 36-46 (2021) - [j71]Walter Lucia, Amr M. Youssef:
Covert channels in stochastic cyber-physical systems. IET Cyper-Phys. Syst.: Theory & Appl. 6(4): 228-237 (2021) - [j70]Mohammed Elbayoumi, Walaa Hamouda, Amr M. Youssef:
Multiple-Association Supporting HTC/MTC in Limited-Backhaul Capacity Ultra-Dense Networks. IEEE Trans. Commun. 69(6): 4113-4127 (2021) - [j69]Olivier Cabana, Amr M. Youssef, Mourad Debbabi, Bernard Lebel, Marthe Kassouf, Ribal Atallah, Basile L. Agba:
Threat Intelligence Generation Using Network Telescope Data for Industrial Control Systems. IEEE Trans. Inf. Forensics Secur. 16: 3355-3370 (2021) - [j68]Omniyah Gul M. Khan, Ehab F. El-Saadany, Amr M. Youssef, Mostafa F. Shaaban:
Cyber Security of Market-Based Congestion Management Methods in Power Distribution Systems. IEEE Trans. Ind. Informatics 17(12): 8142-8153 (2021) - [j67]Mohamed Seifelnasr, Riham AlTawy, Amr M. Youssef:
Efficient Inter-Cloud Authentication and Micropayment Protocol for IoT Edge Computing. IEEE Trans. Netw. Serv. Manag. 18(4): 4420-4433 (2021) - [c116]Muhammad ElSheikh, Amr M. Youssef:
On MILP-Based Automatic Search for Bit-Based Division Property for Ciphers with (Large) Linear Layers. ACISP 2021: 111-131 - [c115]Ahmed Abdelwahab, Walter Lucia, Amr M. Youssef:
Covert Channels in Cyber-Physical Systems. ACC 2021: 4649-4654 - [c114]Hisham S. Galal, Amr M. Youssef:
Publicly Verifiable and Secrecy Preserving Periodic Auctions. Financial Cryptography Workshops 2021: 348-363 - [c113]Mohammed Elbayoumi, Walaa Hamouda, Amr M. Youssef:
Ergodic Secrecy Rate Analysis of Ultra-Dense Networks with Multiple Antennas. ICC 2021: 1-6 - [c112]Md Shahab Uddin, Mohammad Mannan, Amr M. Youssef:
Horus: A Security Assessment Framework for Android Crypto Wallets. SecureComm (2) 2021: 120-139 - [c111]Mouna Nakkar, Riham AlTawy, Amr M. Youssef:
Lightweight Authentication and Key Agreement Protocol for Edge Computing Applications. WF-IoT 2021: 415-420 - [i33]Omniyah Gul M. Khan, Ehab F. El-Saadany, Amr M. Youssef, Mostafa F. Shaaban:
Impact of Electric Vehicles Botnets on the Power Grid. CoRR abs/2103.09153 (2021) - [i32]Amir Mohammad Naseri, Walter Lucia, Mohammad Mannan, Amr M. Youssef:
On Securing Cloud-hosted Cyber-physical Systems Using Trusted Execution Environments. CoRR abs/2104.01011 (2021) - [i31]Walter Lucia, Amr M. Youssef:
Wyner wiretap-like encoding scheme for cyber-physical systems. CoRR abs/2105.03509 (2021) - [i30]Omniyah Gul M. Khan, Amr M. Youssef, Ehab F. El-Saadany, Magdy M. A. Salama:
LSTM-based approach to detect cyber attacks on market-based congestion management methods. CoRR abs/2109.13312 (2021) - [i29]Muhammad ElSheikh, Amr M. Youssef:
On MILP-based Automatic Search for Bit-Based Division Property for Ciphers with (large) Linear Layers. IACR Cryptol. ePrint Arch. 2021: 643 (2021) - 2020
- [b1]Saed Alrabaee, Mourad Debbabi, Paria Shirani, Lingyu Wang, Amr M. Youssef, Ashkan Rahimian, Lina Nouh, Djedjiga Mouheb, He Huang, Aiman Hanna:
Binary Code Fingerprinting for Cybersecurity - Application to Malicious Code Fingerprinting. Advances in Information Security 78, Springer 2020, ISBN 978-3-030-34237-1, pp. 1-233 - [j66]Mohammed Elbayoumi, Mahmoud I. Kamel, Walaa Hamouda, Amr M. Youssef:
NOMA-Assisted Machine-Type Communications in UDN: State-of-the-Art and Challenges. IEEE Commun. Surv. Tutorials 22(2): 1276-1304 (2020) - [j65]Abdelrahman Ayad, Hany Essa Zidan Farag, Amr M. Youssef, Ehab F. El-Saadany:
Cyber-physical attacks on power distribution systems. IET Cyper-Phys. Syst.: Theory & Appl. 5(2): 218-225 (2020) - [j64]Walter Lucia, Amr M. Youssef:
Wyner wiretap-like encoding scheme for cyber-physical systems. IET Cyper-Phys. Syst.: Theory & Appl. 5(4): 359-365 (2020) - [j63]Mahmoud I. Kamel, Walaa Hamouda, Amr M. Youssef:
Uplink Performance of NOMA-Based Combined HTC and MTC in Ultradense Networks. IEEE Internet Things J. 7(8): 7319-7333 (2020) - [j62]Mouna Nakkar, Riham AlTawy, Amr M. Youssef:
Lightweight Broadcast Authentication Protocol for Edge-Based Applications. IEEE Internet Things J. 7(12): 11766-11777 (2020) - [j61]Amir Ameli, Ali Hooshyar, Ehab F. El-Saadany, Amr M. Youssef:
An Intrusion Detection Method for Line Current Differential Relays. IEEE Trans. Inf. Forensics Secur. 15: 329-344 (2020) - [j60]Mahmoud I. Kamel, Walaa Hamouda, Amr M. Youssef:
Uplink Coverage and Capacity Analysis of mMTC in Ultra-Dense Networks. IEEE Trans. Veh. Technol. 69(1): 746-759 (2020) - [c110]Suzan Ali, Mounir Elgharabawy, Quentin Duchaussoy, Mohammad Mannan, Amr M. Youssef:
Betrayed by the Guardian: Security and Privacy Risks of Parental Control Solutions. ACSAC 2020: 69-83 - [c109]Mohamed Tolba, Muhammad ElSheikh, Amr M. Youssef:
Impossible Differential Cryptanalysis of Reduced-Round Tweakable TWINE. AFRICACRYPT 2020: 91-113 - [c108]Muhammad ElSheikh, Amr M. Youssef:
Integral Cryptanalysis of Reduced-Round Tweakable TWINE. CANS 2020: 485-504 - [c107]Ahmed Abdelwahab, Walter Lucia, Amr M. Youssef:
Set-Theoretic Control for Active Detection of Replay Attacks with Applications to Smart Grid. CCTA 2020: 1004-1009 - [c106]Mohamed Seifelnasr, Mouna Nakkar, Amr M. Youssef, Riham AlTawy:
A Lightweight Authentication and Inter-Cloud Payment Protocol for Edge Computing. CloudNet 2020: 1-4 - [c105]Hisham S. Galal, Amr M. Youssef:
Privacy Preserving Netting Protocol for Inter-bank Payments. DPM/CBT@ESORICS 2020: 319-334 - [c104]Mohamed Seifelnasr, Hisham S. Galal, Amr M. Youssef:
Scalable Open-Vote Network on Ethereum. Financial Cryptography Workshops 2020: 436-450 - [c103]Mohammed Elbayoumi, Walaa Hamouda, Amr M. Youssef:
A Hybrid NOMA/OMA Scheme for MTC in Ultra-Dense Networks. GLOBECOM 2020: 1-6 - [c102]Mohammed Elbayoumi, Walaa Hamouda, Amr M. Youssef:
Secrecy Performance in Ultra-Dense Networks with Multiple Associations. GLOBECOM (Workshops) 2020: 1-6 - [c101]Elizabeth Stobert, Tina Safaie, Heather Molyneaux, Mohammad Mannan, Amr M. Youssef:
ByPass: Reconsidering the Usability of Password Managers. SecureComm (1) 2020: 446-466 - [e5]Abderrahmane Nitaj, Amr M. Youssef:
Progress in Cryptology - AFRICACRYPT 2020 - 12th International Conference on Cryptology in Africa, Cairo, Egypt, July 20-22, 2020, Proceedings. Lecture Notes in Computer Science 12174, Springer 2020, ISBN 978-3-030-51937-7 [contents] - [i28]Mohammed Elbayoumi, Walaa Hamouda, Amr M. Youssef:
Multiple-Association Supporting HTC/MTC in Limited-Backhaul Capacity Ultra-Dense Networks. CoRR abs/2009.13456 (2020) - [i27]Suzan Ali, Mounir Elgharabawy, Quentin Duchaussoy, Mohammad Mannan, Amr M. Youssef:
Betrayed by the Guardian: Security and Privacy Risks of Parental Control Solutions. CoRR abs/2012.06502 (2020) - [i26]Mohamed Seifelnasr, Hisham S. Galal, Amr M. Youssef:
Scalable Open-Vote Network on Ethereum. IACR Cryptol. ePrint Arch. 2020: 33 (2020) - [i25]Mohamed Tolba, Muhammad ElSheikh, Amr M. Youssef:
Impossible Differential Cryptanalysis of Reduced-Round Tweakable TWINE. IACR Cryptol. ePrint Arch. 2020: 52 (2020) - [i24]Muhammad ElSheikh, Amr M. Youssef:
A cautionary note on the use of Gurobi for cryptanalysis. IACR Cryptol. ePrint Arch. 2020: 1112 (2020) - [i23]Muhammad ElSheikh, Amr M. Youssef:
Integral Cryptanalysis of Reduced-Round Tweakable TWINE. IACR Cryptol. ePrint Arch. 2020: 1227 (2020)
2010 – 2019
- 2019
- [j59]Sharon Shasha, Moustafa Mahmoud, Mohammad Mannan, Amr M. Youssef:
Playing With Danger: A Taxonomy and Evaluation of Threats to Smart Toys. IEEE Internet Things J. 6(2): 2986-3002 (2019) - [j58]Mohsen Khalaf, Amr M. Youssef, Ehab F. El-Saadany:
Joint Detection and Mitigation of False Data Injection Attacks in AGC Systems. IEEE Trans. Smart Grid 10(5): 4985-4995 (2019) - [c100]Tousif Osman, Mohammad Mannan, Urs Hengartner, Amr M. Youssef:
AppVeto: mobile application self-defense through resource access veto. ACSAC 2019: 366-377 - [c99]Muhammad ElSheikh, Ahmed Abdelkhalek, Amr M. Youssef:
On MILP-Based Automatic Search for Differential Trails Through Modular Additions with Application to Bel-T. AFRICACRYPT 2019: 273-296 - [c98]Olivier Cabana, Amr M. Youssef, Mourad Debbabi, Bernard Lebel, Marthe Kassouf, Basile L. Agba:
Detecting, Fingerprinting and Tracking Reconnaissance Campaigns Targeting Industrial Control Systems. DIMVA 2019: 89-108 - [c97]Suzan Ali, Tousif Osman, Mohammad Mannan, Amr M. Youssef:
On Privacy Risks of Public WiFi Captive Portals. DPM/CBT@ESORICS 2019: 80-98 - [c96]Hisham S. Galal, Muhammad ElSheikh, Amr M. Youssef:
An Efficient Micropayment Channel on Ethereum. DPM/CBT@ESORICS 2019: 211-218 - [c95]Muhammad ElSheikh, Jeremy Clark, Amr M. Youssef:
Short Paper: Deploying PayWord on Ethereum. Financial Cryptography Workshops 2019: 82-90 - [c94]Hisham S. Galal, Amr M. Youssef:
Trustee: Full Privacy Preserving Vickrey Auction on Top of Ethereum. Financial Cryptography Workshops 2019: 190-207 - [c93]Mohammed Elbayoumi, Mahmoud I. Kamel, Walaa Hamouda, Amr M. Youssef:
Capacity Analysis of Downlink NOMA-Based Coexistent HTC/MTC in UDN. ICCSPA 2019: 1-6 - [c92]Abdullah Albarakati, Chantale Robillard, Mark Karanfil, Marthe Kassouf, Rachid Hadjidj, Mourad Debbabi, Amr M. Youssef:
Security Monitoring of IEC 61850 Substations Using IEC 62351-7 Network and System Management1. SmartGridComm 2019: 1-7 - [c91]Muhammad ElSheikh, Amr M. Youssef:
Related-Key Differential Cryptanalysis of Full Round CRAFT. SPACE 2019: 50-66 - [i22]Hisham S. Galal, Amr M. Youssef:
Trustee: Full Privacy Preserving Vickrey Auction on top of Ethereum. CoRR abs/1905.06280 (2019) - [i21]Suzan Ali, Tousif Osman, Mohammad Mannan, Amr M. Youssef:
On Privacy Risks of Public WiFi Captive Portals. CoRR abs/1907.02142 (2019) - [i20]Hisham S. Galal, Amr M. Youssef:
Trustee: Full Privacy Preserving Vickrey Auction on top of Ethereum. IACR Cryptol. ePrint Arch. 2019: 102 (2019) - [i19]Muhammad ElSheikh, Ahmed Abdelkhalek, Amr M. Youssef:
On MILP-Based Automatic Search for Differential Trails Through Modular Additions with Application to Bel-T. IACR Cryptol. ePrint Arch. 2019: 476 (2019) - [i18]Muhammad ElSheikh, Amr M. Youssef:
Related-key Differential Cryptanalysis of Full Round CRAFT. IACR Cryptol. ePrint Arch. 2019: 932 (2019) - [i17]Hisham S. Galal, Muhammad ElSheikh, Amr M. Youssef:
An Efficient Micropayment Channel on Ethereum. IACR Cryptol. ePrint Arch. 2019: 1322 (2019) - 2018
- [j57]Muhammad ElSheikh, Mohamed Tolba, Amr M. Youssef:
Impossible Differential Attack on Reduced Round SPARX-128/256. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(4): 731-733 (2018) - [j56]Ahmed Abdelkhalek, Mohamed Tolba, Amr M. Youssef:
Related-Key Differential Attack on Round-Reduced Bel-T-256. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(5): 859-862 (2018) - [j55]Amir Ameli, Ali Hooshyar, Ameen Hassan Yazdavar, Ehab F. El-Saadany, Amr M. Youssef:
Attack Detection for Load Frequency Control Systems Using Stochastic Unknown Input Estimators. IEEE Trans. Inf. Forensics Secur. 13(10): 2575-2590 (2018) - [c90]Louis Waked, Mohammad Mannan, Amr M. Youssef:
To Intercept or Not to Intercept: Analyzing TLS Interception in Network Appliances. AsiaCCS 2018: 399-412 - [c89]Hisham S. Galal, Amr M. Youssef:
Succinctly Verifiable Sealed-Bid Auction Smart Contract. DPM/CBT@ESORICS 2018: 3-19 - [c88]Hisham S. Galal, Amr M. Youssef:
Verifiable Sealed-Bid Auction on the Ethereum Blockchain. Financial Cryptography Workshops 2018: 265-278 - [c87]Onur Duman, Amr M. Youssef:
Fault Analysis of the New Ukrainian Hash Function Standard: Kupyna. FPS 2018: 225-240 - [c86]Mahmoud I. Kamel, Walaa Hamouda, Amr M. Youssef:
Uplink Coverage of Machine-Type Communications in Ultra-Dense Networks. GLOBECOM 2018: 1-6 - [c85]Abdelrahman Ayad, Hany Essa Zidan Farag, Amr M. Youssef, Ehab F. El-Saadany:
Detection of false data injection attacks in smart grids using Recurrent Neural Networks. ISGT 2018: 1-5 - [c84]Muhammad ElSheikh, Mohamed Tolba, Amr M. Youssef:
Integral Attacks on Round-Reduced Bel-T-256. SAC 2018: 73-91 - [c83]Abdullah Albarakati, Bassam Moussa, Mourad Debbabi, Amr M. Youssef, Basile L. Agba, Marthe Kassouf:
OpenStack-Based Evaluation Framework for Smart Grid Cyber Security. SmartGridComm 2018: 1-6 - [i16]Sharon Shasha, Moustafa Mahmoud, Mohammad Mannan, Amr M. Youssef:
Smart But Unsafe: Experimental Evaluation of Security and Privacy Practices in Smart Toys. CoRR abs/1809.05556 (2018) - [i15]Louis Waked, Mohammad Mannan, Amr M. Youssef:
The Sorry State of TLS Security in Enterprise Interception Appliances. CoRR abs/1809.08729 (2018) - [i14]Hisham S. Galal, Amr M. Youssef:
Verifiable Sealed-Bid Auction on the Ethereum Blockchain. IACR Cryptol. ePrint Arch. 2018: 704 (2018) - 2017
- [j54]Mohamed Tolba, Ahmed Abdelkhalek, Amr M. Youssef:
Improved Multiple Impossible Differential Cryptanalysis of Midori128. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(8): 1733-1737 (2017) - [j53]Onur Duman, Amr M. Youssef:
Fault analysis on Kalyna. Inf. Secur. J. A Glob. Perspect. 26(5): 249-265 (2017) - [j52]Mahmoud I. Kamel, Walaa Hamouda, Amr M. Youssef:
Performance Analysis of Multiple Association in Ultra-Dense Networks. IEEE Trans. Commun. 65(9): 3818-3831 (2017) - [j51]Riham AlTawy, Amr M. Youssef:
Security, Privacy, and Safety Aspects of Civilian Drones: A Survey. ACM Trans. Cyber Phys. Syst. 1(2): 7:1-7:25 (2017) - [j50]Ahmed Abdelkhalek, Yu Sasaki, Yosuke Todo, Mohamed Tolba, Amr M. Youssef:
MILP Modeling for (Large) S-boxes to Optimize Probability of Differential Characteristics. IACR Trans. Symmetric Cryptol. 2017(4): 99-129 (2017) - [j49]Mahmoud I. Kamel, Walaa Hamouda, Amr M. Youssef:
Physical Layer Security in Ultra-Dense Networks. IEEE Wirel. Commun. Lett. 6(5): 690-693 (2017) - [c82]Mohamed Tolba, Ahmed Abdelkhalek, Amr M. Youssef:
Impossible Differential Cryptanalysis of Reduced-Round SKINNY. AFRICACRYPT 2017: 117-134 - [c81]Ahmed Abdelkhalek, Mohamed Tolba, Amr M. Youssef:
Impossible Differential Attack on Reduced Round SPARX-64/128. AFRICACRYPT 2017: 135-146 - [c80]He Huang, Amr M. Youssef, Mourad Debbabi:
BinSequence: Fast, Accurate and Scalable Binary Code Reuse Detection. AsiaCCS 2017: 155-166 - [c79]Mahmoud I. Kamel, Walaa Hamouda, Amr M. Youssef:
Coverage and Capacity Analysis with Stretched Exponential Path Loss in Ultra-Dense Networks. GLOBECOM 2017: 1-6 - [c78]Mahmoud I. Kamel, Walaa Hamouda, Amr M. Youssef:
Average downlink rate in Ultra-Dense Networks. ICC 2017: 1-6 - [c77]Mohamed Tolba, Amr M. Youssef:
Improved Meet-in-the-Middle Attacks on Reduced Round Kuznyechik. ICISC 2017: 26-38 - [c76]Moustafa Mahmoud, Mouna Nakkar, Amr M. Youssef:
A power analysis resistant FPGA implementation of NTRUEncrypt. ICM 2017: 1-4 - [c75]Mouna Nakkar, Moustafa Mahmoud, Amr M. Youssef:
Fault analysis-resistant implementation of Rainbow Signature scheme. ICM 2017: 1-5 - [c74]Mahmoud I. Kamel, Walaa Hamouda, Amr M. Youssef:
Downlink coverage and average cell load of M2M and H2H in ultra-dense networks. PIMRC 2017: 1-5 - [c73]Riham AlTawy, Muhammad ElSheikh, Amr M. Youssef, Guang Gong:
Lelantos: A Blockchain-Based Anonymous Physical Delivery System. PST 2017: 15-24 - [c72]Mohamed Tolba, Ahmed Abdelkhalek, Amr M. Youssef:
Multidimensional Zero-Correlation Linear Cryptanalysis of Reduced Round SPARX-128. SAC 2017: 423-441 - [c71]Moustafa Mahmoud, Md Zakir Hossen, Hesham Barakat, Mohammad Mannan, Amr M. Youssef:
Towards a comprehensive analytical framework for smart toy privacy practices. STAST 2017: 64-75 - [i13]Riham AlTawy, Muhammad ElSheikh, Amr M. Youssef, Guang Gong:
Lelantos: A Blockchain-based Anonymous Physical Delivery System. IACR Cryptol. ePrint Arch. 2017: 465 (2017) - 2016
- [j48]Riham AlTawy, Amr M. Youssef:
Security Tradeoffs in Cyber Physical Systems: A Case Study Survey on Implantable Medical Devices. IEEE Access 4: 959-979 (2016) - [j47]Mahmoud I. Kamel, Walaa Hamouda, Amr M. Youssef:
Ultra-Dense Networks: A Survey. IEEE Commun. Surv. Tutorials 18(4): 2522-2545 (2016) - [j46]Riham AlTawy, Ahmed Abdelkhalek, Amr M. Youssef:
A Meet-in-the-Middle Attack on Reduced-Round Kalyna-b/2b. IEICE Trans. Inf. Syst. 99-D(4): 1246-1250 (2016) - [j45]Mohamed Tolba, Ahmed Abdelkhalek, Amr M. Youssef:
A Meet in the Middle Attack on Reduced Round Kiasu-BC. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(10): 1888-1890 (2016) - [j44]Mohamed Tolba, Amr M. Youssef:
Generalized MitM attacks on full TWINE. Inf. Process. Lett. 116(2): 128-135 (2016) - [c70]Mahmoud I. Kamel, Walaa Hamouda, Amr M. Youssef:
Multiple association in ultra-dense networks. ICC 2016: 1-6 - [c69]Mohamed Tolba, Ahmed Abdelkhalek, Amr M. Youssef:
Truncated and Multiple Differential Cryptanalysis of Reduced Round Midori128. ISC 2016: 3-17 - [c68]Ahmed Abdelkhalek, Mohamed Tolba, Amr M. Youssef:
Improved Linear Cryptanalysis of Round-Reduced ARIA. ISC 2016: 18-34 - [c67]Fu Zhu, Amr M. Youssef, Walaa Hamouda:
Detection techniques for data-level spoofing in GPS-based phasor measurement units. MoWNet 2016: 1-8 - [i12]Mohamed Tolba, Ahmed Abdelkhalek, Amr M. Youssef:
Impossible Differential Cryptanalysis of Reduced-Round SKINNY. IACR Cryptol. ePrint Arch. 2016: 1115 (2016) - 2015
- [j43]Riham AlTawy, Amr M. Youssef:
A Meet in the Middle Attack on Reduced Round Kuznyechik. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(10): 2194-2198 (2015) - [j42]Riham AlTawy, Amr M. Youssef:
Watch your constants: malicious Streebog. IET Inf. Secur. 9(6): 328-333 (2015) - [c66]Riham AlTawy, Mohamed Tolba, Amr M. Youssef:
A Higher Order Key Partitioning Attack with Application to LBlock. C2SI 2015: 215-227 - [c65]Ahmed Abdelkhalek, Riham AlTawy, Amr M. Youssef:
Impossible Differential Properties of Reduced Round Streebog. C2SI 2015: 274-286 - [c64]Riham AlTawy, Amr M. Youssef:
Differential Fault Analysis of Streebog. ISPEC 2015: 35-49 - [c63]Ahmed Abdelkhalek, Riham AlTawy, Mohamed Tolba, Amr M. Youssef:
Meet-in-the-Middle Attacks on Reduced-Round Hierocrypt-3. LATINCRYPT 2015: 187-203 - [c62]Mohamed Tolba, Ahmed Abdelkhalek, Amr M. Youssef:
Meet-in-the-Middle Attacks on Reduced Round Piccolo. LightSec 2015: 3-20 - [c61]Riham AlTawy, Amr M. Youssef:
Preimage Analysis of the Maelstrom-0 Hash Function. SPACE 2015: 113-126 - [c60]Mohamed Tolba, Ahmed Abdelkhalek, Amr M. Youssef:
Meet-in-the-Middle Attacks on Round-Reduced Khudra. SPACE 2015: 127-138 - [c59]Ahmed Abdelkhalek, Mohamed Tolba, Amr M. Youssef:
Improved Key Recovery Attack on Round-reduced Hierocrypt-L1 in the Single-Key Setting. SPACE 2015: 139-150 - [i11]Riham AlTawy, Amr M. Youssef:
Meet in the Middle Attacks on Reduced Round Kuznyechik. IACR Cryptol. ePrint Arch. 2015: 96 (2015) - [i10]Riham AlTawy, Onur Duman, Amr M. Youssef:
Fault Analysis of Kuznyechik. IACR Cryptol. ePrint Arch. 2015: 347 (2015) - [i9]Riham AlTawy, Ahmed Abdelkhalek, Amr M. Youssef:
A Meet-in-the-Middle Attack on Reduced-Round Kalyna-b/2b. IACR Cryptol. ePrint Arch. 2015: 762 (2015) - 2014
- [j41]Riham AlTawy, Amr M. Youssef:
Integral distinguishers for reduced-round Stribog. Inf. Process. Lett. 114(8): 426-431 (2014) - [c58]Riham AlTawy, Amr M. Youssef:
Preimage Attacks on Reduced-Round Stribog. AFRICACRYPT 2014: 109-125 - [c57]Riham AlTawy, Amr M. Youssef:
Second Preimage Analysis of Whirlwind. Inscrypt 2014: 311-328 - [c56]A. Mert Kara, Hamad Binsalleeh, Mohammad Mannan, Amr M. Youssef, Mourad Debbabi:
Detection of malicious payload distribution channels in DNS. ICC 2014: 853-858 - [c55]Riham AlTawy, Amr M. Youssef:
Differential Sieving for 2-Step Matching Meet-in-the-Middle Attack with Application to LBlock. LightSec 2014: 126-139 - [c54]Hamad Binsalleeh, A. Mert Kara, Amr M. Youssef, Mourad Debbabi:
Characterization of Covert Channels in DNS. NTMS 2014: 1-5 - [e4]Antoine Joux, Amr M. Youssef:
Selected Areas in Cryptography - SAC 2014 - 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers. Lecture Notes in Computer Science 8781, Springer 2014, ISBN 978-3-319-13050-7 [contents] - [i8]Riham AlTawy, Amr M. Youssef:
Preimage attacks on Reduced-round Stribog. IACR Cryptol. ePrint Arch. 2014: 319 (2014) - [i7]Riham AlTawy, Amr M. Youssef:
Watch your Constants: Malicious Streebog. IACR Cryptol. ePrint Arch. 2014: 879 (2014) - 2013
- [j40]Riham AlTawy, Aleksandar Kircanski, Amr M. Youssef:
Second order collision for the 42-step reduced DHA-256 hash function. Inf. Process. Lett. 113(19-21): 764-770 (2013) - [j39]Abdel Alim Kamal, Amr M. Youssef:
Cryptanalysis of Álvarez et al. key exchange scheme. Inf. Sci. 223: 317-321 (2013) - [j38]Osama Hayatle, Hadi Otrok, Amr M. Youssef:
A Markov Decision Process Model for High Interaction Honeypots. Inf. Secur. J. A Glob. Perspect. 22(4): 159-170 (2013) - [j37]Abdel Alim Kamal, Amr M. Youssef:
Strengthening hardware implementations of NTRUEncrypt against fault analysis attacks. J. Cryptogr. Eng. 3(4): 227-240 (2013) - [c53]Abdel Alim Kamal, Roger Zahno, Amr M. Youssef:
A Comparison between Two Off-the-Shelf Algebraic Tools for Extraction of Cryptographic Keys from Corrupted Memory Images. CD-ARES Workshops 2013: 75-90 - [c52]Aleksandar Kircanski, Riham AlTawy, Amr M. Youssef:
A Heuristic for Finding Compatible Differential Paths with Application to HAS-160. ASIACRYPT (2) 2013: 464-483 - [c51]Riham AlTawy, Aleksandar Kircanski, Amr M. Youssef:
Rebound Attacks on Stribog. ICISC 2013: 175-188 - [c50]Merwais Shinwari, Amr M. Youssef, Walaa Hamouda:
A Privacy Preserving Approach to Smart Metering. SecNet 2013: 164-176 - [e3]Amr M. Youssef, Abderrahmane Nitaj, Aboul Ella Hassanien:
Progress in Cryptology - AFRICACRYPT 2013, 6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedings. Lecture Notes in Computer Science 7918, Springer 2013, ISBN 978-3-642-38552-0 [contents] - [i6]Aleksandar Kircanski, Riham AlTawy, Amr M. Youssef:
A heuristic for finding compatible differential paths with application to HAS-160. IACR Cryptol. ePrint Arch. 2013: 359 (2013) - [i5]Riham AlTawy, Aleksandar Kircanski, Amr M. Youssef:
Rebound attacks on Stribog. IACR Cryptol. ePrint Arch. 2013: 539 (2013) - [i4]Riham AlTawy, Amr M. Youssef:
Integral Distinguishers for Reduced-round Stribog. IACR Cryptol. ePrint Arch. 2013: 648 (2013) - 2012
- [j36]Abdel Alim Kamal, Amr M. Youssef:
Cryptanalysis of a key exchange protocol based on the endomorphisms ring End (ℤp × ℤp2). Appl. Algebra Eng. Commun. Comput. 23(3-4): 143-149 (2012) - [j35]Abdel Alim Kamal, Amr M. Youssef:
Fault analysis of the NTRUSign digital signature scheme. Cryptogr. Commun. 4(2): 131-144 (2012) - [j34]Rabeah Al-Zaidy, Benjamin C. M. Fung, Amr M. Youssef, Francis Fortin:
Mining criminal networks from unstructured text documents. Digit. Investig. 8(3-4): 147-160 (2012) - [j33]Abdel Alim Kamal, Amr M. Youssef:
Cryptanalysis of a GL(r, Zn)-Based Public Key System. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(4): 829-831 (2012) - [j32]Osama Hayatle, Amr M. Youssef, Hadi Otrok:
Dempster-Shafer Evidence Combining for (Anti)-Honeypot Technologies. Inf. Secur. J. A Glob. Perspect. 21(6): 306-316 (2012) - [j31]Merwais Shinwari, Amr M. Youssef, Walaa Hamouda:
A Water-Filling Based Scheduling Algorithm for the Smart Grid. IEEE Trans. Smart Grid 3(2): 710-719 (2012) - [c49]Aleksandar Kircanski, Amr M. Youssef:
On the Weak State in GGHN-like Ciphers. ARES 2012: 397-401 - [c48]Abdel Alim Kamal, Amr M. Youssef:
A Scan-Based Side Channel Attack on the NTRUEncrypt Cryptosystem. ARES 2012: 402-409 - [c47]Roger Zahno, Amr M. Youssef:
An Obfuscated Implementation of RC4. ACITY (1) 2012: 113-129 - [c46]Osama Hayatle, Hadi Otrok, Amr M. Youssef:
A game theoretic investigation for high interaction honeypots. ICC 2012: 6662-6667 - [c45]Aleksandar Kircanski, Amr M. Youssef:
On the Sosemanuk Related Key-IV Sets. LATINCRYPT 2012: 271-287 - [c44]Alex Biryukov, Aleksandar Kircanski, Amr M. Youssef:
Cryptanalysis of the Loiss Stream Cipher. Selected Areas in Cryptography 2012: 119-134 - [c43]Aleksandar Kircanski, Yanzhao Shen, Gaoli Wang, Amr M. Youssef:
Boomerang and Slide-Rotational Analysis of the SM3 Hash Function. Selected Areas in Cryptography 2012: 304-320 - [i3]Aleksandar Kircanski, Amr M. Youssef:
Boomerang and Slide-Rotational Analysis of the SM3 Hash Function. IACR Cryptol. ePrint Arch. 2012: 274 (2012) - 2011
- [j30]Mohamed M. Nasreldin Rasslan, Amr M. Youssef:
Comments on the security of Chen's authenticated encryption scheme. Comput. Electr. Eng. 37(1): 71-74 (2011) - [j29]Amr M. Youssef:
Cryptanalysis of a quadratic knapsack cryptosystem. Comput. Math. Appl. 61(4): 1261-1265 (2011) - [j28]Mohamed M. Nasreldin Rasslan, Amr M. Youssef:
Cryptanalysis of a Public Key Encryption Scheme Using Ergodic Matrices. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(2): 853-854 (2011) - [j27]Abdel Alim Kamal, Amr M. Youssef:
Fault Analysis of the NTRUEncrypt Cryptosystem. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(4): 1156-1158 (2011) - [j26]Ayda Basyouni, Walaa Hamouda, Amr M. Youssef:
Cooperative relaying protocol for energy-constrained ad hoc networks. IET Commun. 5(4): 418-424 (2011) - [j25]Aleksandar Kircanski, Amr M. Youssef:
On the sliding property of SNOW 3 G and SNOW 2.0. IET Inf. Secur. 5(4): 199-206 (2011) - [c42]Yaser Esmaeili Salehani, Aleksandar Kircanski, Amr M. Youssef:
Differential Fault Analysis of Sosemanuk. AFRICACRYPT 2011: 316-331 - [c41]Rabeah Al-Zaidy, Benjamin C. M. Fung, Amr M. Youssef:
Towards discovering criminal communities from textual data. SAC 2011: 172-177 - [c40]Yaser Esmaeili Salehani, Amr M. Youssef:
Differential Fault Analysis of Hummingbird. SECRYPT 2011: 357-361 - 2010
- [j24]Aleksandar Kircanski, Amr M. Youssef:
On the structural weakness of the GGHN stream cipher. Cryptogr. Commun. 2(1): 1-17 (2010) - [j23]Amr M. Youssef:
Cryptanalysis of Boolean permutation-based key escrow scheme. Comput. Electr. Eng. 36(1): 56-60 (2010) - [j22]Liaqat Ali Khan, Muhammad Shamim Baig, Amr M. Youssef:
Speaker recognition from encrypted VoIP communications. Digit. Investig. 7(1-2): 65-73 (2010) - [j21]Mohamed M. Nasreldin Rasslan, Amr M. Youssef:
Cryptanalysis of Hwang-Lo-Hsiao-Chu Authenticated Encryption Schemes. IEICE Trans. Inf. Syst. 93-D(5): 1301-1302 (2010) - [j20]Ayda Basyouni, Walaa Hamouda, Amr M. Youssef:
Improved channel access protocol for cooperative ad hoc networks. IET Commun. 4(8): 915-923 (2010) - [j19]Ayman Assra, Walaa Hamouda, Amr M. Youssef:
EM-Based Joint Channel Estimation and Data Detection for MIMO-CDMA Systems. IEEE Trans. Veh. Technol. 59(3): 1205-1216 (2010) - [j18]Ayman Assra, Walaa Hamouda, Amr M. Youssef:
A Channel-Estimation and Data-Detection Scheme for Multiuser MIMO-CDMA Systems in Fading Channels. IEEE Trans. Veh. Technol. 59(6): 2830-2844 (2010) - [c39]Aleksandar Kircanski, Amr M. Youssef:
Differential Fault Analysis of HC-128. AFRICACRYPT 2010: 261-278 - [c38]Ayman Assra, Walaa Hamouda, Amr M. Youssef:
Joint Iterative Channel Estimation and Data Detection for MIMO-CDMA Systems over Frequency-Selective Fading Channels. GLOBECOM 2010: 1-6 - [c37]Ayda Basyouni, Walaa Hamouda, Amr M. Youssef:
A New Rate Control Technique for cdma2000 1xEV. GLOBECOM 2010: 1-5 - [c36]Peipei Shi, Bo Zhu, Amr M. Youssef:
A framework to strengthen password authentication using mobile devices and browser extensions. ISSPIT 2010: 73-78 - [c35]Esam Elsheh, Amr M. Youssef:
On the security of image encryption schemes based on Multiple Parameters Transforms. ISSPIT 2010: 97-101 - [c34]Hamad Binsalleeh, Thomas C. Ormerod, Amine Boukhtouta, Prosenjit Sinha, Amr M. Youssef, Mourad Debbabi, Lingyu Wang:
On the analysis of the Zeus botnet crimeware toolkit. PST 2010: 31-38 - [c33]Thomas C. Ormerod, Lingyu Wang, Mourad Debbabi, Amr M. Youssef, Hamad Binsalleeh, Amine Boukhtouta, Prosenjit Sinha:
Defaming Botnet Toolkits: A Bottom-Up Approach to Mitigating the Threat. SECURWARE 2010: 195-200 - [c32]Abdel Alim Kamal, Amr M. Youssef:
Applications of SAT Solvers to AES Key Recovery from Decayed Key Schedule Images. SECURWARE 2010: 216-220 - [c31]Ayman Assra, Walaa Hamouda, Amr M. Youssef:
EM Channel Estimation and Data Detection for MIMO-CDMA Systems over Slow-Fading Channels. VTC Fall 2010: 1-5 - [c30]Mohamed Rasslan, Amr M. Youssef:
A Bilinear Pairing Based Hidden-Signature Scheme. WiMo 2010: 389-397 - [i2]Abdel Alim Kamal, Amr M. Youssef:
Applications of SAT Solvers to AES key Recovery from Decayed Key Schedule Images. IACR Cryptol. ePrint Arch. 2010: 324 (2010)
2000 – 2009
- 2009
- [j17]Aleksandar Kircanski, Rabeah Al-Zaidy, Amr M. Youssef:
A new distinguishing and key recovery attack on NGG stream cipher. Cryptogr. Commun. 1(2): 269-282 (2009) - [j16]Ayman Assra, Walaa Hamouda, Amr M. Youssef:
BER analysis of space-time diversity in CDMA systems over frequency-selective fading channels. IET Commun. 3(7): 1216-1226 (2009) - [j15]Amr M. Youssef:
Cryptanalysis of a knapsack-based probabilistic encryption scheme. Inf. Sci. 179(18): 3116-3121 (2009) - [j14]Wen Ming Liu, Amr M. Youssef:
On the Existence of (10, 2, 7, 488) Resilient Functions. IEEE Trans. Inf. Theory 55(1): 411-412 (2009) - [c29]Ayman Assra, Walaa Hamouda, Amr M. Youssef:
Performance of Superimposed Training-Based Channel Estimation in MIMO-CDMA Systems. GLOBECOM 2009: 1-6 - [c28]Ayda Basyouni, Walaa Hamouda, Amr M. Youssef:
On Reducing Blocking Probability in Cooperative Ad-hoc Networks. GLOBECOM 2009: 1-5 - [c27]Peipei Shi, Bo Zhu, Amr M. Youssef:
A rotary PIN entry scheme resilient to shoulder-surfing. ICITST 2009: 1-7 - [c26]Aleksandar Kircanski, Amr M. Youssef:
Differential Fault Analysis of Rabbit. Selected Areas in Cryptography 2009: 197-214 - [c25]Peipei Shi, Bo Zhu, Amr M. Youssef:
A PIN Entry Scheme Resistant to Recording-Based Shoulder-Surfing. SECURWARE 2009: 237-241 - 2008
- [j13]Rabeah Al-Zaidy, Aleksandar Kircanski, Amr M. Youssef:
Cryptanalysis of the parameterized improved fast encryption algorithm for multimedia. IEEE Commun. Lett. 12(12): 886-887 (2008) - [j12]Amr M. Youssef:
On the Security of a Cryptosystem Based on Multiple-Parameters Discrete Fractional Fourier Transform. IEEE Signal Process. Lett. 15: 77-78 (2008) - [j11]Amr M. Youssef:
An Attack Against the Revised Murthy-Swamy Cryptosystem. IEEE Trans. Circuits Syst. II Express Briefs 55-II(2): 166-167 (2008) - [j10]Kun Liu, Walaa Hamouda, Amr M. Youssef:
Performance of a MANET directional MAC protocol with angle-of-arrival estimation. Wirel. Commun. Mob. Comput. 8(6): 759-769 (2008) - [c24]Aleksandar Kircanski, Amr M. Youssef:
A Related-Key Attack on TREYFER. SECURWARE 2008: 213-217 - [c23]Ayman Assra, Walaa Hamouda, Amr M. Youssef:
Joint Decorrelating Channel and Data Estimation for Space-Time Spreading Systems. VTC Spring 2008: 1399-1403 - 2007
- [j9]Amr M. Youssef:
A Comment on "Cryptographic Applications of Brahmagupta-Bhãskara Equation". IEEE Trans. Circuits Syst. I Regul. Pap. 54-I(4): 927-928 (2007) - [c22]Xuxin Xu, Lingyu Wang, Amr M. Youssef, Bo Zhu:
Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme. ACNS 2007: 177-193 - [c21]Ayman Assra, Walaa Hamouda, Amr M. Youssef:
Performance of Space-Time Diversity in CDMA Over Frequency-Selective Fading Channels. GLOBECOM 2007: 1514-1518 - [c20]Kun Liu, Walaa Hamouda, Amr M. Youssef:
ESPRIT-Based Directional MAC Protocol for Mobile Ad Hoc Networks. ICC 2007: 3654-3659 - [c19]Osama Abdel-Mannan, A. Ben Hamza, Amr M. Youssef:
Incremental Hessian Locally Linear Embedding algorithm. ISSPA 2007: 1-4 - [c18]Ayman Assra, Walaa Hamouda, Amr M. Youssef:
Space-time spreading and diversity in asynchronous CDMA systems over frequency-selective fading channels. ISSPA 2007: 1-4 - [e2]Eli Biham, Amr M. Youssef:
Selected Areas in Cryptography, 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers. Lecture Notes in Computer Science 4356, Springer 2007, ISBN 978-3-540-74461-0 [contents] - 2006
- [j8]Amr M. Youssef, Stafford E. Tavares, Guang Gong:
On some probabilistic approximations for AES-like s-boxes. Discret. Math. 306(16): 2016-2020 (2006) - [j7]Amr M. Youssef, Guang Gong:
On linear complexity of sequences over GF(2n). Theor. Comput. Sci. 352(1-3): 288-292 (2006) - [j6]Z. Saber, Mohammad Faisal Uddin, Amr M. Youssef:
On the existence of (9, 3, 5, 240) resilient functions. IEEE Trans. Inf. Theory 52(5): 2269-2270 (2006) - [c17]S. S. Mohamed, Amr M. Youssef, E. F. El-Saadany, Magdy M. A. Salama:
On the Use of Spectral Clustering for Prostate Tissue Characterization. CCECE 2006: 979-982 - [c16]Mohammad Faisal Uddin, Amr M. Youssef:
An Artificial Life Technique for the Cryptanalysis of Simple Substitution Ciphers. CCECE 2006: 1582-1585 - [c15]Ren Wang, Amr M. Youssef, Ahmed K. Elhakeem:
On Some Feature Selection Strategies for Spam Filter Design. CCECE 2006: 2186-2189 - [c14]Mohammad Faisal Uddin, Amr M. Youssef:
Cryptanalysis of Simple Substitution Ciphers Using Particle Swarm Optimization. IEEE Congress on Evolutionary Computation 2006: 677-680 - [c13]Kun Liu, Walaa Hamouda, Amr M. Youssef:
Performance of Directional MAC Protocols in Ad-Hoc Networks over Fading Channels. GLOBECOM 2006 - [c12]Ren Wang, Amr M. Youssef, Ahmed K. Elhakeem:
Artificial life feature selection techniques for spam e-mail filters. Computational Intelligence 2006: 102-107 - [c11]S. S. Mohamed, Amr M. Youssef, E. F. El-Saadany, Magdy M. A. Salama:
Prostate Tissue Characterization Using TRUS Image Spectral Features. ICIAR (2) 2006: 589-601 - [c10]S. S. Mohamed, Amr M. Youssef, E. F. El-Saadany, M. M. A. Salama:
AIS TLS-ESPRIT feature selection for prostate tissue characterization. Medical Imaging: Image Processing 2006: 614451 - 2005
- [j5]Amr M. Youssef, Stafford E. Tavares:
Affine equivalence in the AES round function. Discret. Appl. Math. 148(2): 161-170 (2005) - [c9]S. S. Mohamed, Amr M. Youssef, E. F. El-Saadany, Magdy M. A. Salama:
Artificial Life Feature Selection Techniques for Prostrate Cancer Diagnosis Using TRUS Images. ICIAR 2005: 903-913 - 2003
- [j4]Amr M. Youssef, Stafford E. Tavares:
Comments on the security of fast encryption algorithm for multimedia (FEA-M). IEEE Trans. Consumer Electron. 49(1): 168-170 (2003) - 2002
- [j3]Guang Gong, Amr M. Youssef:
Cryptographic properties of the Welch-Gong transformation sequence generators. IEEE Trans. Inf. Theory 48(11): 2837-2846 (2002) - [i1]Amr M. Youssef, Stafford E. Tavares:
On Some Algebraic Structures in the AES Round Function. IACR Cryptol. ePrint Arch. 2002: 144 (2002) - 2001
- [c8]Amr M. Youssef, Guang Gong:
Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP 2000. ACISP 2001: 15-20 - [c7]Amr M. Youssef, Guang Gong:
Hyper-bent Functions. EUROCRYPT 2001: 406-419 - [c6]Amr M. Youssef, Guang Gong:
Cryptanalysis of Imai and Matsumoto Scheme B Asymmetric Cryptosystem. INDOCRYPT 2001: 214-222 - [c5]Amr M. Youssef, Guang Gong:
Boolean Functions with Large Distance to All Bijective Monomials: N Odd Case. Selected Areas in Cryptography 2001: 49-59 - [e1]Serge Vaudenay, Amr M. Youssef:
Selected Areas in Cryptography, 8th Annual International Workshop, SAC 2001 Toronto, Ontario, Canada, August 16-17, 2001, Revised Papers. Lecture Notes in Computer Science 2259, Springer 2001, ISBN 3-540-43066-0 [contents] - 2000
- [c4]Amr M. Youssef, Guang Gong:
On the Interpolation Attacks on Block Ciphers. FSE 2000: 109-120 - [c3]Amr M. Youssef:
Cryptanalysis of the "Augmented Family of Cryptographic Parity Circuits" Proposed at ISW'97. Selected Areas in Cryptography 2000: 29-38 - [c2]Guang Gong, Amr M. Youssef:
On Welch-Gong Transformation Sequence Generators. Selected Areas in Cryptography 2000: 217-232
1990 – 1999
- 1996
- [j2]Amr M. Youssef, Stafford E. Tavares:
Comment on "Bounds on the Number of Functions Satisfying the Strict Avalanche Criterion". Inf. Process. Lett. 60(5): 271-275 (1996) - 1995
- [j1]Amr M. Youssef, Stafford E. Tavares:
Resistance of Balanced s-Boxes to Linear and Differential Cryptanalysis. Inf. Process. Lett. 56(5): 249-252 (1995) - [c1]Amr M. Youssef, Stafford E. Tavares:
Information Leakage of a Randomly Selected Boolean Function. Information Theory and Applications 1995: 41-52
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-22 21:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint