关注
Riham AlTawy
Riham AlTawy
Associate Professor, Dept. ECE, University of Victoria
在 uvic.ca 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Security, privacy, and safety aspects of civilian drones: A survey
R Altawy, AM Youssef
ACM Transactions on Cyber-Physical Systems 1 (2), 1-25, 2016
4772016
Security tradeoffs in cyber physical systems: A case study survey on implantable medical devices
R AlTawy, AM Youssef
Ieee Access 4, 959-979, 2016
1732016
Lelantos: A blockchain-based anonymous physical delivery system
R AlTawy, M ElSheikh, AM Youssef, G Gong
2017 15th Annual Conference on Privacy, Security and Trust (PST), 15-1509, 2017
682017
sLiSCP: Simeck-based permutations for lightweight sponge cryptographic primitives
R AlTawy, R Rohit, M He, K Mandal, G Yang, G Gong
Selected Areas in Cryptography–SAC 2017: 24th International Conference …, 2018
512018
ACE: An authenticated encryption and hash algorithm
M Aagaard, R AlTawy, G Gong, K Mandal, R Rohit
Submission to NIST-LWC (announced as round 2 candidate on August 30, 2019), 2019
372019
Lightweight broadcast authentication protocol for edge-based applications
M Nakkar, R Altawy, A Youssef
IEEE Internet of Things Journal 7 (12), 11766-11777, 2020
352020
SLISCP-light: Towards Hardware Optimized Sponge-specific Cryptographic Permutations
R Altawy, R Rohit, M He, K Mandal, G Yang, G Gong
ACM Transactions on Embedded Computing Systems (TECS) 17 (4), 1-26, 2018
332018
Watch your constants: malicious Streebog
R AlTawy, AM Youssef
IET Information Security 9 (6), 328-333, 2015
322015
A meet in the middle attack on reduced round Kuznyechik
R AlTawy, AM Youssef
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2015
322015
Preimage attacks on reduced-round Stribog
R AlTawy, AM Youssef
Progress in Cryptology–AFRICACRYPT 2014: 7th International Conference on …, 2014
322014
Rebound attacks on Stribog
R AlTawy, A Kircanski, AM Youssef
International Conference on Information Security and Cryptology, 175-188, 2013
302013
WAGE: an authenticated encryption with a twist
R AlTawy, G Gong, K Mandal, R Rohit
IACR Transactions on Symmetric Cryptology, 132-159, 2020
232020
Differential fault analysis of Streebog
R AlTawy, AM Youssef
Information Security Practice and Experience: 11th International Conference …, 2015
212015
Fault analysis of Kuznyechik
R AlTawy, O Duman, AM Youssef
Cryptology ePrint Archive, 2015
182015
GASE: A lightweight group authentication scheme with key agreement for edge computing applications
M Nakkar, R AlTawy, A Youssef
IEEE Internet of Things Journal 10 (1), 840-854, 2022
162022
Spix: An authenticated cipher submission to the NIST LWC competition
R AlTawy, G Gong, M He, K Mandal, R Rohit
Submitted to NIST Lightweight Standardization Process, 2019
162019
Integral distinguishers for reduced-round Stribog
R AlTawy, AM Youssef
Information Processing Letters 114 (8), 426-431, 2014
162014
Mesh: A supply chain solution with locally private blockchain transactions
R AlTawy, G Gong
Proceedings on Privacy Enhancing Technologies, 2019
142019
WAGE: An authenticated cipher
M Aagaard, R AlTawy, G Gong, K Mandal, R Rohit, N Zidaric
Submission to NIST Lightweight Cryptography Standardization Project …, 2019
132019
Efficient inter-cloud authentication and micropayment protocol for IoT edge computing
M Seifelnasr, R AlTawy, A Youssef
IEEE Transactions on Network and Service Management 18 (4), 4420-4433, 2021
112021
系统目前无法执行此操作,请稍后再试。
文章 1–20