Ahmed Abdelkhalek

According to our database1, Ahmed Abdelkhalek authored at least 17 papers between 2015 and 2019.

Collaborative distances:
  • Dijkstra number2 of six.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
On MILP-Based Automatic Search for Differential Trails Through Modular Additions with Application to Bel-T.
IACR Cryptol. ePrint Arch., 2019

2018
Related-Key Differential Attack on Round-Reduced Bel-T-256.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

2017
MILP Modeling for (Large) S-boxes to Optimize Probability of Differential Characteristics.
IACR Trans. Symmetric Cryptol., 2017

Improved Multiple Impossible Differential Cryptanalysis of Midori128.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

Multidimensional Zero-Correlation Linear Cryptanalysis of Reduced Round SPARX-128.
Proceedings of the Selected Areas in Cryptography - SAC 2017, 2017

Impossible Differential Attack on Reduced Round SPARX-64/128.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2017, 2017

2016
A Meet in the Middle Attack on Reduced Round Kiasu-BC.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

A Meet-in-the-Middle Attack on Reduced-Round Kalyna-<i>b</i>/2<i>b</i>.
IEICE Trans. Inf. Syst., 2016

Impossible Differential Cryptanalysis of Reduced-Round SKINNY.
IACR Cryptol. ePrint Arch., 2016

Truncated and Multiple Differential Cryptanalysis of Reduced Round Midori128.
Proceedings of the Information Security - 19th International Conference, 2016

Improved Linear Cryptanalysis of Round-Reduced ARIA.
Proceedings of the Information Security - 19th International Conference, 2016

2015
A Meet-in-the-Middle Attack on Reduced-Round Kalyna-b/2b.
IACR Cryptol. ePrint Arch., 2015

Meet-in-the-Middle Attacks on Round-Reduced Khudra.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2015

Improved Key Recovery Attack on Round-reduced Hierocrypt-L1 in the Single-Key Setting.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2015

Meet-in-the-Middle Attacks on Reduced Round Piccolo.
Proceedings of the Lightweight Cryptography for Security and Privacy, 2015

Meet-in-the-Middle Attacks on Reduced-Round Hierocrypt-3.
Proceedings of the Progress in Cryptology - LATINCRYPT 2015, 2015

Impossible Differential Properties of Reduced Round Streebog.
Proceedings of the Codes, Cryptology, and Information Security, 2015


  Loading...