Name
Papers
Collaborators
AMR M. YOUSSEF
28
31
Citations 
PageRank 
Referers 
41
10.68
100
Referees 
References 
471
247
Search Limit
100471
Title
Citations
PageRank
Year
On MILP-Based Automatic Search for Bit-Based Division Property for Ciphers with (Large) Linear Layers00.342021
Cyber–physical attacks on power distribution systems00.342020
Privacy Preserving Netting Protocol for Inter-bank Payments.00.342020
On MILP-Based Automatic Search for Differential Trails Through Modular Additions with Application to Bel-T.00.342019
The Sorry State of TLS Security in Enterprise Interception Appliances00.342018
OpenStack-Based Evaluation Framework for Smart Grid Cyber Security10.382018
Smart But Unsafe: Experimental Evaluation of Security and Privacy Practices in Smart Toys.10.372018
Integral Attacks on Round-Reduced Bel-T-256.00.342018
Impossible Differential Attack On Reduced Round Sparx-128/25600.342018
Related-Key Differential Attack On Round-Reduced Bel-T-25600.342018
To Intercept or Not to Intercept: Analyzing TLS Interception in Network Appliances.00.342018
Uplink Coverage of Machine-Type Communications in Ultra-Dense Networks.00.342018
Fault analysis-resistant implementation of Rainbow Signature scheme00.342017
BinSequence: Fast, Accurate and Scalable Binary Code Reuse Detection.00.342017
Milp Modeling For (Large) S-Boxes To Optimize Probability Of Differential Characteristics10.432017
A power analysis resistant FPGA implementation of NTRUEncrypt00.342017
Coverage and Capacity Analysis with Stretched Exponential Path Loss in Ultra-Dense Networks.00.342017
A Meet-In-The-Middle Attack On Reduced-Round Kalyna-B/2b10.352016
Security Tradeoffs in Cyber Physical Systems: A Case Study Survey on Implantable Medical Devices.160.592016
Watch your constants: malicious Streebog.90.692015
A Higher Order Key Partitioning Attack With Application To Lblock00.342015
A Meet In The Middle Attack On Reduced Round Kuznyechik00.342015
Differential Fault Analysis Of Streebog40.432015
Fault Analysis of Kuznyechik.20.582015
Meet-in-the-Middle Attacks on Reduced-Round Hierocrypt-330.392015
Impossible Differential Properties Of Reduced Round Streebog00.342015
Preimage Analysis of the Maelstrom-0 Hash Function.00.342015
Differential Sieving for 2-Step Matching Meet-in-the-Middle Attack with Application to LBlock.30.392014