Mohamed Ahmed Abdelraheem

According to our database1, Mohamed Ahmed Abdelraheem authored at least 17 papers between 2011 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Practical Attacks on Relational Databases Protected via Searchable Encryption.
IACR Cryptol. ePrint Arch., 2018

2017
Cryptanalysis of reduced QTL block cipher.
Microprocess. Microsystems, 2017

Inference and Record-Injection Attacks on Searchable Encrypted Relational Databases.
IACR Cryptol. ePrint Arch., 2017

Blockchain and IoT: Mind the Gap.
Proceedings of the Interoperability, Safety and Security in IoT, 2017

Searchable Encrypted Relational Databases: Risks and Countermeasures.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2017

2016
IoT Protection through Device to Cloud Synchronization.
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science, 2016

Executing Boolean Queries on an Encrypted Bitmap Index.
Proceedings of the 2016 ACM on Cloud Computing Security Workshop, 2016

2015
Twisted Polynomials and Forgery Attacks on GCM.
IACR Cryptol. ePrint Arch., 2015

Improved Linear Cryptanalysis of reduced-round SIMON-32 and SIMON-48.
IACR Cryptol. ePrint Arch., 2015

2014
Weak-Key Analysis of POET.
IACR Cryptol. ePrint Arch., 2014

2012
On The Distribution of Linear Biases: Three Instructive Examples.
IACR Cryptol. ePrint Arch., 2012

Estimating the Probabilities of Low-Weight Differential and Linear Approximations on PRESENT-Like Ciphers.
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012

2011
Cryptanalysis of the Light-Weight Cipher A2U2 - Reduced draft version.
IACR Cryptol. ePrint Arch., 2011

Cryptanalysis of ARMADILLO2.
IACR Cryptol. ePrint Arch., 2011

Cryptanalysis of the Light-Weight Cipher A2U2.
Proceedings of the Cryptography and Coding - 13th IMA International Conference, 2011

Differential Cryptanalysis of Round-Reduced PRINTcipher: Computing Roots of Permutations.
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011

A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack.
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011


  Loading...