Mohamed Ahmed Abdelraheem

According to our database1, Mohamed Ahmed Abdelraheem authored at least 17 papers between 2011 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Practical Attacks on Relational Databases Protected via Searchable Encryption.
Proceedings of the Information Security - 21st International Conference, 2018

2017
Cryptanalysis of reduced QTL block cipher.
Microprocess. Microsystems, 2017

Inference and Record-Injection Attacks on Searchable Encrypted Relational Databases.
IACR Cryptol. ePrint Arch., 2017

Blockchain and IoT: Mind the Gap.
Proceedings of the Interoperability, Safety and Security in IoT, 2017

Searchable Encrypted Relational Databases: Risks and Countermeasures.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2017

2016
IoT Protection through Device to Cloud Synchronization.
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science, 2016

Executing Boolean Queries on an Encrypted Bitmap Index.
Proceedings of the 2016 ACM on Cloud Computing Security Workshop, 2016

2015
Improved Linear Cryptanalysis of Reduced-Round SIMON-32 and SIMON-48.
Proceedings of the Progress in Cryptology - INDOCRYPT 2015, 2015

Twisted Polynomials and Forgery Attacks on GCM.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

2014
Weak-Key Analysis of POET.
IACR Cryptol. ePrint Arch., 2014

2012
Estimating the Probabilities of Low-Weight Differential and Linear Approximations on PRESENT-Like Ciphers.
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012

On the Distribution of Linear Biases: Three Instructive Examples.
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012

2011
Cryptanalysis of the Light-Weight Cipher A2U2 - Reduced draft version.
IACR Cryptol. ePrint Arch., 2011

Cryptanalysis of the Light-Weight Cipher A2U2.
Proceedings of the Cryptography and Coding - 13th IMA International Conference, 2011

Differential Cryptanalysis of Round-Reduced PRINTcipher: Computing Roots of Permutations.
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011

A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack.
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011

Cryptanalysis of ARMADILLO2.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011


  Loading...