Amr M. YOUSSEF


Related-Key Differential Attack on Round-Reduced Bel-T-256
Ahmed ABDELKHALEK Mohamed TOLBA Amr M. YOUSSEF 
Publication:   
Publication Date: 2018/05/01
Vol. E101-A  No. 5  pp. 859-862
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
related-keydifferential cryptanalysisBel-T
 Summary | Full Text:PDF(564.5KB)

Impossible Differential Attack on Reduced Round SPARX-128/256
Muhammad ELSHEIKH Mohamed TOLBA Amr M. YOUSSEF 
Publication:   
Publication Date: 2018/04/01
Vol. E101-A  No. 4  pp. 731-733
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
SPARXblock cipherscryptanalysisimpossible differential attacks
 Summary | Full Text:PDF(412.6KB)

Improved Multiple Impossible Differential Cryptanalysis of Midori128
Mohamed TOLBA Ahmed ABDELKHALEK Amr M. YOUSSEF 
Publication:   
Publication Date: 2017/08/01
Vol. E100-A  No. 8  pp. 1733-1737
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
cryptanalysisimpossible differential cryptanalysisblock ciphersMidori128
 Summary | Full Text:PDF(473.7KB)

A Meet in the Middle Attack on Reduced Round Kiasu-BC
Mohamed TOLBA Ahmed ABDELKHALEK Amr M. YOUSSEF 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2016/10/01
Vol. E99-A  No. 10  pp. 1888-1890
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
Kiasu-BCtweakcryptanalysismeet-in-the-middle attacksdifferential enumeration
 Summary | Full Text:PDF(134.9KB)

A Meet-in-the-Middle Attack on Reduced-Round Kalyna-b/2b
Riham ALTAWY Ahmed ABDELKHALEK Amr M. YOUSSEF 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2016/04/01
Vol. E99-D  No. 4  pp. 1246-1250
Type of Manuscript:  LETTER
Category: Information Network
Keyword: 
Kalynacryptanalysismeet-in-the-middle attacksdifferential enumerationDSTU 7624:2014
 Summary | Full Text:PDF(290.5KB)

A Meet in the Middle Attack on Reduced Round Kuznyechik
Riham ALTAWY Amr M. YOUSSEF 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/10/01
Vol. E98-A  No. 10  pp. 2194-2198
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
Kuznyechikcryptanalysismeet-in-the-middle attacksdifferential enumerationGOST-grasshopper
 Summary | Full Text:PDF(328KB)