A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack G Leander, MA Abdelraheem, H AlKhzaimi, E Zenner Advances in Cryptology–CRYPTO 2011: 31st Annual Cryptology Conference, Santa …, 2011 | 219 | 2011 |
Preserving privacy in speaker and speech characterisation A Nautsch, A Jiménez, A Treiber, J Kolberg, C Jasserand, E Kindt, ... Computer Speech & Language 58, 441-480, 2019 | 139 | 2019 |
On the distribution of linear biases: Three instructive examples MA Abdelraheem, M Ågren, P Beelen, G Leander Annual Cryptology Conference, 50-67, 2012 | 50 | 2012 |
Improved linear cryptanalysis of reduced-round SIMON-32 and SIMON-48 MA Abdelraheem, J Alizadeh, HA Alkhzaimi, MR Aref, N Bagheri, ... Progress in Cryptology--INDOCRYPT 2015: 16th International Conference on …, 2015 | 49 | 2015 |
Estimating the Probabilities of Low-Weight Differential and Linear Approximations on PRESENT-Like Ciphers MA Abdelraheem Information Security and Cryptology–ICISC 2012: 15th International …, 2013 | 30 | 2013 |
Differential Cryptanalysis of Round-Reduced PRINTcipher: Computing Roots of Permutations MA Abdelraheem, G Leander, E Zenner Fast Software Encryption: 18th International Workshop, FSE 2011, Lyngby …, 2011 | 29 | 2011 |
Twisted polynomials and forgery attacks on GCM MA Abdelraheem, P Beelen, A Bogdanov, E Tischhauser Advances in Cryptology--EUROCRYPT 2015: 34th Annual International Conference …, 2015 | 28 | 2015 |
Cryptanalysis of reduced QTL block cipher S Sadeghi, N Bagheri, MA Abdelraheem Microprocessors and Microsystems 52, 34-48, 2017 | 26 | 2017 |
Searchable Encrypted Relational Databases: Risks and Countermeasures MA Abdelraheem, T Andersson, C Gehrmann IACR Cryptology ePrint Archive 2017, 24, 2017 | 26* | 2017 |
Improved linear cryptanalysis of reduced-round SIMON MA Abdelraheem, J Alizadeh, HA Alkhzaimi, MR Aref, N Bagheri, ... Cryptology ePrint Archive, 2014 | 25 | 2014 |
Cryptanalysis of ARMADILLO2 MA Abdelraheem, C Blondeau, M Naya-Plasencia, M Videau, E Zenner International Conference on the Theory and Application of Cryptology and …, 2011 | 23 | 2011 |
IoT protection through device to cloud synchronization C Gehrmann, MA Abdelraheem 2016 IEEE International Conference on Cloud Computing Technology and Science …, 2016 | 12 | 2016 |
Weak-key analysis of POET MA Abdelraheem, A Bogdanov, E Tischhauser Cryptology ePrint Archive, 2014 | 12 | 2014 |
Cryptanalysis of the light-weight cipher A2U2 MA Abdelraheem, J Borghoff, E Zenner, M David Cryptography and Coding: 13th IMA International Conference, IMACC 2011 …, 2011 | 12 | 2011 |
Blockchain and IoT: mind the gap A Sedrati, MA Abdelraheem, S Raza Interoperability, Safety and Security in IoT: Third International Conference …, 2018 | 9 | 2018 |
TT and ANF Representations of Boolean functions S Ronjom, M Abdelraheem, LE Danielsen Online Database of Boolean Functions, 2007 | 9 | 2007 |
Practical attacks on relational databases protected via searchable encryption MA Abdelraheem, T Andersson, C Gehrmann, C Glackin Information Security: 21st International Conference, ISC 2018, Guildford, UK …, 2018 | 8 | 2018 |
Executing boolean queries on an encrypted bitmap index MA Abdelraheem, C Gehrmann, M Lindström, C Nordahl Proceedings of the 2016 ACM on cloud computing security workshop, 11-22, 2016 | 7 | 2016 |
Private search service MA Abdelraheem, CP Glackin, N Cannings US Patent App. 17/819,166, 2024 | | 2024 |
Private search service MA Abdelraheem, CP Glackin, N Cannings US Patent App. 17/819,210, 2024 | | 2024 |