Amr YOUSSEF


Cryptanalysis of a GL(r,Zn)-Based Public Key System
Abdel Alim KAMAL Amr YOUSSEF 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/04/01
Vol. E95-A  No. 4  pp. 829-831
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
general linear groupcryptanalysispublic key cryptography
 Summary | Full Text:PDF

Fault Analysis of the NTRUEncrypt Cryptosystem
Abdel Alim KAMAL Amr YOUSSEF 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/04/01
Vol. E94-A  No. 4  pp. 1156-1158
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
NTRUside channel attacksfault analysispublic key cryptography
 Summary | Full Text:PDF

Cryptanalysis of a Public Key Encryption Scheme Using Ergodic Matrices
Mohamed RASSLAN Amr YOUSSEF 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/02/01
Vol. E94-A  No. 2  pp. 853-854
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
public key cryptosystemscryptanalysis
 Summary | Full Text:PDF

Cryptanalysis of Hwang-Lo-Hsiao-Chu Authenticated Encryption Schemes
Mohamed RASSLAN Amr YOUSSEF 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2010/05/01
Vol. E93-D  No. 5  pp. 1301-1302
Type of Manuscript:  LETTER
Category: Data Engineering, Web Information Systems
Keyword: 
authenticated encryptionauthenticitynon-repudiation
 Summary | Full Text:PDF