Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Mohamed Ahmed Abdelraheem"'
Publikováno v:
Microprocessors and Microsystems. 52:34-48
Recently, a new ultra lightweight block cipher called QTL has been proposed. The authors claim to achieve a fast diffusion in QTL by using a new variant of a generalized Feistel network structure that changes all block messages in one iterative round
Publikováno v:
Interoperability, Safety and Security in IoT ISBN: 9783319937960
Blockchain, the core technology behind the first decentralized cryptocurrency, Bitcoin, has been recently proposed as a promising solution to create a viable decentralized network of Internet of Things (IoT) with good security and privacy properties.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5f0a52986c0064911ab00d6078b932e4
https://doi.org/10.1007/978-3-319-93797-7_13
https://doi.org/10.1007/978-3-319-93797-7_13
Autor:
Mohamed Ahmed Abdelraheem, Spyros Mantzouratos, Jeremias Mechler, Sebastian Thomas Schork, Efi Papatheocharous, Thomas Carnehult, Kateryna Yurchenko, Gunther Schiefer, Panagiotis Gouvas, George Moldovan, Matthias Gabel
Most industries worldwide have entered a period of reaping the benefits and opportunities cloud offers. At the same time, many efforts are made to address engineering challenges for the secure development of cloud systems and software.With the majori
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::18752393e04e7cac5b47cbecb3c21e05
https://publikationen.bibliothek.kit.edu/1000105415
https://publikationen.bibliothek.kit.edu/1000105415
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783319678153
DPM/CBT@ESORICS
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Data Privacy Management, Cryptocurrencies and Blockchain Technology
DPM/CBT@ESORICS
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Data Privacy Management, Cryptocurrencies and Blockchain Technology
We point out the risks of protecting relational databases viaSearchable Symmetric Encryption (SSE) schemes by proposing an infer-ence attack exploiting the structural properties of relational databases.We show that record-injection attacks mounted on
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::0c5702466c10aebd544b185ef042f369
Publikováno v:
CCSW
Proceedings of the 2016 ACM on Cloud Computing Security Workshop
Proceedings of the 2016 ACM on Cloud Computing Security Workshop-CCSW 16
Proceedings of the 2016 ACM on Cloud Computing Security Workshop-CCSW '16
Proceedings of the 2016 ACM on Cloud Computing Security Workshop
Proceedings of the 2016 ACM on Cloud Computing Security Workshop-CCSW 16
Proceedings of the 2016 ACM on Cloud Computing Security Workshop-CCSW '16
We propose a simple and efficient searchable symmetric encryption scheme based on a Bitmap index that evaluates Boolean queries. Our scheme provides a practical solution in settings where communications and computations are very constrained as it off
Publikováno v:
2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom)
CloudCom
CloudCom
This paper addresses the problem of protecting distributed IoT units from network based attacks while still having a high level of availability. In particular we suggest a novel method where the IoT device execution state is modeled with a suitable h
Autor:
Nasour Bagheri, Mohammad Reza Aref, Praveen Gauravaram, Hoda AlKhzaimi, Javad Alizadeh, Mohamed Ahmed Abdelraheem
Publikováno v:
Progress in Cryptology--INDOCRYPT 2015 ISBN: 9783319266169
INDOCRYPT
INDOCRYPT
In this paper we analyse two variants of SIMON family of light-weight block ciphers against variants of linear cryptanalysis and present the best linear cryptanalytic results on these variants of reduced-round SIMON to date. We propose a time-memory
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::0db94a05e290ec6e10215798d659b799
http://soda.swedishict.se/6125/
http://soda.swedishict.se/6125/
Publikováno v:
Advances in Cryptology--EUROCRYPT 2015 ISBN: 9783662467992
EUROCRYPT (1)
EUROCRYPT (1)
Polynomial hashing as an instantiation of universal hashing is a widely employed method for the construction of MACs and authenticated encryption (AE) schemes, the ubiquitous GCM being a prominent example. It is also used in recent AE proposals withi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a1cb2ed85850e02a92cbe3a93df8c2e8
https://doi.org/10.1007/978-3-662-46800-5_29
https://doi.org/10.1007/978-3-662-46800-5_29
Autor:
Mohamed Ahmed Abdelraheem
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783642376818
ICISC
ICISC
We use large but sparse correlation and transition-difference-probability submatrices to find the best linear and differential approximations respectively on PRESENT-like ciphers. This outperforms the branch and bound algorithm when the number of low
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ad116b65b597f0cc59551704a934df6a
https://doi.org/10.1007/978-3-642-37682-5_26
https://doi.org/10.1007/978-3-642-37682-5_26
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783642320088
CRYPTO
CRYPTO
Despite the fact that we evidently have very good block ciphers at hand today, some fundamental questions on their security are still unsolved. One such fundamental problem is to precisely assess the security of a given block cipher with respect to l
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7342bcd2a2731de485fb891c7a847556
https://doi.org/10.1007/978-3-642-32009-5_4
https://doi.org/10.1007/978-3-642-32009-5_4