Mohamed Tolba

Orcid: 0000-0001-8669-7934

According to our database1, Mohamed Tolba authored at least 20 papers between 2015 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Adaptive optimal controller design for an unbalanced UAV with slung load.
Auton. Robots, March, 2023

2020
Impossible Differential Cryptanalysis of Reduced-Round Tweakable TWINE.
IACR Cryptol. ePrint Arch., 2020

2018
Impossible Differential Attack on Reduced Round SPARX-128/256.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Related-Key Differential Attack on Round-Reduced Bel-T-256.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Integral Attacks on Round-Reduced Bel-T-256.
Proceedings of the Selected Areas in Cryptography - SAC 2018, 2018

2017
MILP Modeling for (Large) S-boxes to Optimize Probability of Differential Characteristics.
IACR Trans. Symmetric Cryptol., 2017

Improved Multiple Impossible Differential Cryptanalysis of Midori128.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

Multidimensional Zero-Correlation Linear Cryptanalysis of Reduced Round SPARX-128.
Proceedings of the Selected Areas in Cryptography - SAC 2017, 2017

Improved Meet-in-the-Middle Attacks on Reduced Round Kuznyechik.
Proceedings of the Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29, 2017

Impossible Differential Attack on Reduced Round SPARX-64/128.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2017, 2017

2016
Generalized MitM attacks on full TWINE.
Inf. Process. Lett., 2016

A Meet in the Middle Attack on Reduced Round Kiasu-BC.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

Impossible Differential Cryptanalysis of Reduced-Round SKINNY.
IACR Cryptol. ePrint Arch., 2016

Truncated and Multiple Differential Cryptanalysis of Reduced Round Midori128.
Proceedings of the Information Security - 19th International Conference, 2016

Improved Linear Cryptanalysis of Round-Reduced ARIA.
Proceedings of the Information Security - 19th International Conference, 2016

2015
Meet-in-the-Middle Attacks on Round-Reduced Khudra.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2015

Improved Key Recovery Attack on Round-reduced Hierocrypt-L1 in the Single-Key Setting.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2015

Meet-in-the-Middle Attacks on Reduced Round Piccolo.
Proceedings of the Lightweight Cryptography for Security and Privacy, 2015

Meet-in-the-Middle Attacks on Reduced-Round Hierocrypt-3.
Proceedings of the Progress in Cryptology - LATINCRYPT 2015, 2015

A Higher Order Key Partitioning Attack with Application to LBlock.
Proceedings of the Codes, Cryptology, and Information Security, 2015


  Loading...