Mohamed Saied Emam Mohamed

Affiliations:
  • TU Darmstadt, Department of Computer Science, Germany


According to our database1, Mohamed Saied Emam Mohamed authored at least 17 papers between 2008 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2017
A Practical Multivariate Blind Signature Scheme.
IACR Cryptol. ePrint Arch., 2017

Efficient Multivariate Ring Signature Schemes.
IACR Cryptol. ePrint Arch., 2017

RingRainbow - An Efficient Multivariate Ring Signature Scheme.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2017, 2017

2016
The Shortest Signatures Ever.
IACR Cryptol. ePrint Arch., 2016

MQSAS - A Multivariate Sequential Aggregate Signature Scheme.
IACR Cryptol. ePrint Arch., 2016

2014
Mutant Differential Fault Analysis of Trivium MDFA.
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014

2013
Improved algebraic side-channel attack on AES.
J. Cryptogr. Eng., 2013

2012
Improved Algebraic Side-Channel Attack on AES.
IACR Cryptol. ePrint Arch., 2012

2011
Improved Strategies for Solving Multivariate Polynomial Equation Systems over Finite Fields
PhD thesis, 2011

Towards Algebraic Cryptanalysis of HFE Challenge 2.
Proceedings of the Information Security and Assurance - International Conference, 2011

Using SAT Solving to Improve Differential Fault Analysis of Trivium.
Proceedings of the Information Security and Assurance - International Conference, 2011

2010
Flexible Partial Enlargement to Accelerate Gröbner Basis Computation over <i>F</i><sub>2</sub>.
Proceedings of the Progress in Cryptology, 2010

2009
MXL<sub>3</sub>: An Efficient Algorithm for Computing Gröbner Bases of Zero-Dimensional Ideals.
Proceedings of the Information, Security and Cryptology, 2009

MutantXL: Solving Multivariate Polynomial Equations for Cryptanalysis.
Proceedings of the Symmetric Cryptography, 11.01. - 16.01.2009, 2009

Algebraic Attack on the MQQ Public Key Cryptosystem.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009

2008
Algebraic Cryptanalysis of MQQ Public Key Cryptosystem by MutantXL.
IACR Cryptol. ePrint Arch., 2008

MXL2: Solving Polynomial Equations over GF(2) Using an Improved Mutant Strategy.
Proceedings of the Post-Quantum Cryptography, Second International Workshop, 2008


  Loading...