A New Secure Multicast Key Distribution Protocol Using Combinatorial Boolean Approach. MMN Rasslan, YH Dakroury, HK Aslan Int. J. Netw. Secur. 8 (1), 75-89, 2009 | 14 | 2009 |
A design of a fast parallel-pipelined implementation of AES: Advanced Encryption Standard GF Elkabbany, HK Aslan, MN Rasslan arXiv preprint arXiv:1501.01427, 2015 | 12 | 2015 |
Security issues in distributed computing system models GF Elkabbany, M Rasslan Cyber security and threats: Concepts, methodologies, tools, and applications …, 2018 | 10 | 2018 |
Robust hybrid-security protocol for HealthCare systems I Albarki, M Rasslan, AM Bahaa-Eldin, M Sobh Procedia Computer Science 160, 843-848, 2019 | 8 | 2019 |
Cryptanalysis of a public key encryption scheme using ergodic matrices M Rasslan, A Youssef IEICE transactions on fundamentals of electronics, communications and …, 2011 | 8 | 2011 |
On the security of two improved authenticated encryption schemes M Rasslan, HK Aslan International Journal of Security and Networks 8 (4), 194-199, 2013 | 7 | 2013 |
A Stamped Hidden-signature Scheme Utilizing The Elliptic Curve Discrete Logarithm Problem. MMN Rasslan Int. J. Netw. Secur. 13 (1), 49-57, 2011 | 7 | 2011 |
New Generic Design to Expedite Asymmetric Cryptosystems Using Three-levels of Parallelism HA M. Rasslan, G. El-Kabbany International Journal of Network Security 20 (2), 370-380, 2018 | 6* | 2018 |
Cryptanalysis of Hwang-Lo-Hsiao-Chu Authenticated Encryption Schemes M Rasslan, A Youssef IEICE TRANSACTIONS on Information and Systems 93 (5), 1301-1302, 2010 | 6 | 2010 |
Ibn Sina: A patient privacy‐preserving authentication protocol in medical internet of things M Rasslan, MM Nasreldin, HK Aslan Computers & Security 119, 102753, 2022 | 5 | 2022 |
Implementation of schnorr signcryption algorithm on dsp A Elshobaky, M Rasslan, S Guirguis International Journal of Security and Its Applications 9 (11), 217-230, 2015 | 5 | 2015 |
An Efficient Pipelined Technique for Signcryption Algorithms MR G. El-Kabbany, H. Aslan International Journal of Computer Science Issues 11 (1), 67-78, 2014 | 3* | 2014 |
Implementation, Comparison, and Enhancement of Secure Communication Designs A Elshobaky, G Elkabbany, M Rasslan, S Gurguis Procedia Computer Science 37, 363-369, 2014 | 3 | 2014 |
Identification Protocols Based on Discrete Log Representation Problem M Rasslan, M Nasreldin Procedia Computer Science 21, 368-373, 2013 | 3 | 2013 |
Comments on the security of Chen’s authenticated encryption scheme M Rasslan, A Youssef Computers & Electrical Engineering 37 (1), 71-74, 2011 | 3 | 2011 |
An IoT Privacy-Oriented selective disclosure credential system M Rasslan, MM Nasreldin, HK Aslan Journal of Cybersecurity 8 (1), tyac013, 2022 | 2 | 2022 |
Enhanement of elgamal signature scheme using multi-processing system GF Elkabbany, M Rasslan, HK Aslan 2017 Intl Conf on Advanced Control Circuits Systems (ACCS) Systems & 2017 …, 2017 | 2 | 2017 |
Evidence acquisition in cloud forensics M Nasreldin, H Aslan, M Rasslan, G Weir IEEE 4th International Conference on New Paradigms in Electronics …, 2017 | 2 | 2017 |
Cryptanalysis of An Identity-Based Strong Designated Verifier Signature Scheme M Rasslan Future Information Technology, Application, and Service: FutureTech 2012 …, 2012 | 2 | 2012 |
Networking and cryptography library with a non-repudiation flavor for blockchain M Rasslan, MM Nasreldin, D Abdelrahman, A Elshobaky, H Aslan Journal of Computer Virology and Hacking Techniques 20 (1), 1-14, 2024 | 1 | 2024 |