Mohamed Ahmed Abdelraheem
Mohamed Ahmed Abdelraheem
Verified email at
Cited by
Cited by
A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack
G Leander, MA Abdelraheem, H AlKhzaimi, E Zenner
Advances in Cryptology–CRYPTO 2011: 31st Annual Cryptology Conference, Santa …, 2011
Preserving privacy in speaker and speech characterisation
A Nautsch, A Jiménez, A Treiber, J Kolberg, C Jasserand, E Kindt, ...
Computer Speech & Language 58, 441-480, 2019
On the distribution of linear biases: Three instructive examples
MA Abdelraheem, M Ågren, P Beelen, G Leander
Annual Cryptology Conference, 50-67, 2012
Improved linear cryptanalysis of reduced-round SIMON-32 and SIMON-48
MA Abdelraheem, J Alizadeh, HA Alkhzaimi, MR Aref, N Bagheri, ...
Progress in Cryptology--INDOCRYPT 2015: 16th International Conference on …, 2015
Estimating the Probabilities of Low-Weight Differential and Linear Approximations on PRESENT-Like Ciphers
MA Abdelraheem
Information Security and Cryptology–ICISC 2012: 15th International …, 2013
Differential Cryptanalysis of Round-Reduced PRINTcipher: Computing Roots of Permutations
MA Abdelraheem, G Leander, E Zenner
Fast Software Encryption: 18th International Workshop, FSE 2011, Lyngby …, 2011
Twisted polynomials and forgery attacks on GCM
MA Abdelraheem, P Beelen, A Bogdanov, E Tischhauser
Advances in Cryptology--EUROCRYPT 2015: 34th Annual International Conference …, 2015
Cryptanalysis of reduced QTL block cipher
S Sadeghi, N Bagheri, MA Abdelraheem
Microprocessors and Microsystems 52, 34-48, 2017
Searchable Encrypted Relational Databases: Risks and Countermeasures
MA Abdelraheem, T Andersson, C Gehrmann
IACR Cryptology ePrint Archive 2017, 24, 2017
Improved linear cryptanalysis of reduced-round SIMON
MA Abdelraheem, J Alizadeh, HA Alkhzaimi, MR Aref, N Bagheri, ...
Cryptology ePrint Archive, 2014
Cryptanalysis of ARMADILLO2
MA Abdelraheem, C Blondeau, M Naya-Plasencia, M Videau, E Zenner
International Conference on the Theory and Application of Cryptology and …, 2011
IoT protection through device to cloud synchronization
C Gehrmann, MA Abdelraheem
2016 IEEE International Conference on Cloud Computing Technology and Science …, 2016
Weak-key analysis of POET
MA Abdelraheem, A Bogdanov, E Tischhauser
Cryptology ePrint Archive, 2014
Cryptanalysis of the light-weight cipher A2U2
MA Abdelraheem, J Borghoff, E Zenner, M David
Cryptography and Coding: 13th IMA International Conference, IMACC 2011 …, 2011
Blockchain and IoT: mind the gap
A Sedrati, MA Abdelraheem, S Raza
Interoperability, Safety and Security in IoT: Third International Conference …, 2018
TT and ANF Representations of Boolean functions
S Ronjom, M Abdelraheem, LE Danielsen
Online Database of Boolean Functions, 2007
Executing boolean queries on an encrypted bitmap index
MA Abdelraheem, C Gehrmann, M Lindström, C Nordahl
Proceedings of the 2016 ACM on cloud computing security workshop, 11-22, 2016
Practical attacks on relational databases protected via searchable encryption
MA Abdelraheem, T Andersson, C Gehrmann, C Glackin
Information Security: 21st International Conference, ISC 2018, Guildford, UK …, 2018
Private search service
MA Abdelraheem, CP Glackin, N Cannings
US Patent App. 17/819,166, 2024
Private search service
MA Abdelraheem, CP Glackin, N Cannings
US Patent App. 17/819,210, 2024
The system can't perform the operation now. Try again later.
Articles 1–20