Abdelrahaman Aly

According to our database1, Abdelrahaman Aly authored at least 20 papers between 2013 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols.
IACR Trans. Symmetric Cryptol., 2020

2019
A Secure and Privacy-Preserving Protocol for Smart Metering Operational Data Collection.
IEEE Trans. Smart Grid, 2019

Benchmarking Privacy Preserving Scientific Operations.
IACR Cryptol. ePrint Arch., 2019

Zaphod: Efficiently Combining LSSS and Garbled Circuits in SCALE.
IACR Cryptol. ePrint Arch., 2019

Practically Efficient Secure Distributed Exponentiation without Bit-Decomposition.
IACR Cryptol. ePrint Arch., 2019

Efficient Symmetric Primitives for Advanced Cryptographic Protocols (A Marvellous Contribution).
IACR Cryptol. ePrint Arch., 2019

DataBlinder: A distributed data protection middleware supporting search and computation on encrypted data.
Proceedings of the 20th International Middleware Conference Industrial Track, 2019

Collaborative Authentication Using Threshold Cryptography.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2019

2018
Secure and Privacy-Friendly Local Electricity Trading and Billing in Smart Grid.
CoRR, 2018

2017
PePTCAP: A Privacy-enhancing Protocol for(Temporary) Car Access Provision.
IACR Cryptol. ePrint Arch., 2017

Practically Efficient Secure Single-Commodity Multi-Market Auctions.
IACR Cryptol. ePrint Arch., 2017

An Improved Protocol for Securely Solving the Shortest Path Problem and its Application to Combinatorial Auctions.
IACR Cryptol. ePrint Arch., 2017

An MPC-based protocol for secure and privacy-preserving smart metering.
Proceedings of the 2017 IEEE PES Innovative Smart Grid Technologies Conference Europe, 2017

SePCAR: A Secure and Privacy-Enhancing Protocol for Car Access Provision.
Proceedings of the Computer Security - ESORICS 2017, 2017

2016
An MPC-based Privacy-Preserving Protocol for a Local Electricity Trading Market.
IACR Cryptol. ePrint Arch., 2016

A Privacy-Preserving Model for Biometric Fusion.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

Efficient Verifiable Computation of XOR for Biometric Authentication.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

2015
Network flow problems with secure multiparty computation.
PhD thesis, 2015

2014
Securely Solving Classical Network Flow Problems.
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014

2013
Securely Solving Simple Combinatorial Graph Problems.
Proceedings of the Financial Cryptography and Data Security, 2013


  Loading...