Security, privacy, and safety aspects of civilian drones: A survey R Altawy, AM Youssef ACM Transactions on Cyber-Physical Systems 1 (2), 1-25, 2016 | 477 | 2016 |
Security tradeoffs in cyber physical systems: A case study survey on implantable medical devices R AlTawy, AM Youssef Ieee Access 4, 959-979, 2016 | 173 | 2016 |
Lelantos: A blockchain-based anonymous physical delivery system R AlTawy, M ElSheikh, AM Youssef, G Gong 2017 15th Annual Conference on Privacy, Security and Trust (PST), 15-1509, 2017 | 68 | 2017 |
sLiSCP: Simeck-based permutations for lightweight sponge cryptographic primitives R AlTawy, R Rohit, M He, K Mandal, G Yang, G Gong Selected Areas in Cryptography–SAC 2017: 24th International Conference …, 2018 | 51 | 2018 |
ACE: An authenticated encryption and hash algorithm M Aagaard, R AlTawy, G Gong, K Mandal, R Rohit Submission to NIST-LWC (announced as round 2 candidate on August 30, 2019), 2019 | 37 | 2019 |
Lightweight broadcast authentication protocol for edge-based applications M Nakkar, R Altawy, A Youssef IEEE Internet of Things Journal 7 (12), 11766-11777, 2020 | 35 | 2020 |
SLISCP-light: Towards Hardware Optimized Sponge-specific Cryptographic Permutations R Altawy, R Rohit, M He, K Mandal, G Yang, G Gong ACM Transactions on Embedded Computing Systems (TECS) 17 (4), 1-26, 2018 | 33 | 2018 |
Watch your constants: malicious Streebog R AlTawy, AM Youssef IET Information Security 9 (6), 328-333, 2015 | 32 | 2015 |
A meet in the middle attack on reduced round Kuznyechik R AlTawy, AM Youssef IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2015 | 32 | 2015 |
Preimage attacks on reduced-round Stribog R AlTawy, AM Youssef Progress in Cryptology–AFRICACRYPT 2014: 7th International Conference on …, 2014 | 32 | 2014 |
Rebound attacks on Stribog R AlTawy, A Kircanski, AM Youssef International Conference on Information Security and Cryptology, 175-188, 2013 | 30 | 2013 |
WAGE: an authenticated encryption with a twist R AlTawy, G Gong, K Mandal, R Rohit IACR Transactions on Symmetric Cryptology, 132-159, 2020 | 23 | 2020 |
Differential fault analysis of Streebog R AlTawy, AM Youssef Information Security Practice and Experience: 11th International Conference …, 2015 | 21 | 2015 |
Fault analysis of Kuznyechik R AlTawy, O Duman, AM Youssef Cryptology ePrint Archive, 2015 | 18 | 2015 |
GASE: A lightweight group authentication scheme with key agreement for edge computing applications M Nakkar, R AlTawy, A Youssef IEEE Internet of Things Journal 10 (1), 840-854, 2022 | 16 | 2022 |
Spix: An authenticated cipher submission to the NIST LWC competition R AlTawy, G Gong, M He, K Mandal, R Rohit Submitted to NIST Lightweight Standardization Process, 2019 | 16 | 2019 |
Integral distinguishers for reduced-round Stribog R AlTawy, AM Youssef Information Processing Letters 114 (8), 426-431, 2014 | 16 | 2014 |
Mesh: A supply chain solution with locally private blockchain transactions R AlTawy, G Gong Proceedings on Privacy Enhancing Technologies, 2019 | 14 | 2019 |
WAGE: An authenticated cipher M Aagaard, R AlTawy, G Gong, K Mandal, R Rohit, N Zidaric Submission to NIST Lightweight Cryptography Standardization Project …, 2019 | 13 | 2019 |
Efficient inter-cloud authentication and micropayment protocol for IoT edge computing M Seifelnasr, R AlTawy, A Youssef IEEE Transactions on Network and Service Management 18 (4), 4420-4433, 2021 | 11 | 2021 |