Muhammad ElSheikh

Orcid: 0000-0003-3678-6140

According to our database1, Muhammad ElSheikh authored at least 16 papers between 2014 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Self-Tallying E-Voting Using Homomorphic Time-Lock Puzzles and ZK-SNARKs.
IEEE Trans. Netw. Sci. Eng., 2025

Accelerating EdDSA Signature Verification with Faster Scalar Size Halving.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2025

2022
Dispute-Free Scalable Open Vote Network Using zk-SNARKs.
Proceedings of the Financial Cryptography and Data Security. FC 2022 International Workshops, 2022

2021
On MILP-Based Automatic Search for Bit-Based Division Property for Ciphers with (Large) Linear Layers.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021

2020
A cautionary note on the use of Gurobi for cryptanalysis.
IACR Cryptol. ePrint Arch., 2020

Integral Cryptanalysis of Reduced-Round Tweakable TWINE.
Proceedings of the Cryptology and Network Security - 19th International Conference, 2020

Impossible Differential Cryptanalysis of Reduced-Round Tweakable TWINE.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2020, 2020

2019
Related-Key Differential Cryptanalysis of Full Round CRAFT.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2019

Short Paper: Deploying PayWord on Ethereum.
Proceedings of the Financial Cryptography and Data Security, 2019

An Efficient Micropayment Channel on Ethereum.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2019

On MILP-Based Automatic Search for Differential Trails Through Modular Additions with Application to Bel-T.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2019, 2019

2018
BotCap: Machine Learning Approach for Botnet Detection Based on Statistical Features.
Int. J. Commun. Networks Inf. Secur., 2018

Impossible Differential Attack on Reduced Round SPARX-128/256.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Integral Attacks on Round-Reduced Bel-T-256.
Proceedings of the Selected Areas in Cryptography - SAC 2018, 2018

2017
Lelantos: A Blockchain-Based Anonymous Physical Delivery System.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

2014
BoTGen: A new approach for in-lab generation of botnet datasets.
Proceedings of the 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, 2014


  Loading...