关注
Muhammad ElSheikh
Muhammad ElSheikh
PhD student, Concordia University, Canada
在 nis.sci.eg 的电子邮件经过验证
标题
引用次数
引用次数
年份
Lelantos: A blockchain-based anonymous physical delivery system
R AlTawy, M ElSheikh, AM Youssef, G Gong
2017 15th Annual Conference on Privacy, Security and Trust (PST), 15-1509, 2017
682017
BotCap: Machine learning approach for botnet detection based on statistical features
MS Gadelrab, M ElSheikh, MA Ghoneim, M Rashwan
Int. J. Commun. Netw. Inf. Secur 10 (3), 563, 2018
312018
Related-key differential cryptanalysis of full round CRAFT
M ElSheikh, AM Youssef
International Conference on Security, Privacy, and Applied Cryptography …, 2019
212019
An efficient micropayment channel on ethereum
HS Galal, M ElSheikh, AM Youssef
Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS …, 2019
182019
On MILP-based automatic search for differential trails through modular additions with application to Bel-T
M ElSheikh, A Abdelkhalek, AM Youssef
Progress in Cryptology–AFRICACRYPT 2019: 11th International Conference on …, 2019
112019
Dispute-free scalable open vote network using zk-SNARKs
M ElSheikh, AM Youssef
Financial Cryptography and Data Security. FC 2022 International Workshops …, 2022
92022
On MILP-based automatic search for bit-based division property for ciphers with (large) linear layers
M ElSheikh, AM Youssef
Australasian Conference on Information Security and Privacy, 111-131, 2021
82021
Integral cryptanalysis of reduced-round tweakable TWINE
M ElSheikh, AM Youssef
Cryptology and Network Security: 19th International Conference, CANS 2020 …, 2020
62020
Short paper: Deploying payword on Ethereum
M Elsheikh, J Clark, AM Youssef
Financial Cryptography and Data Security: FC 2019 International Workshops …, 2020
52020
Integral attacks on round-reduced Bel-T-256
M ElSheikh, M Tolba, AM Youssef
International Conference on Selected Areas in Cryptography, 73-91, 2018
52018
BoTGen: A new approach for in-lab generation of botnet datasets
MH ElSheikh, MS Gadelrab, MA Ghoneim, M Rashwan
2014 9th International Conference on Malicious and Unwanted Software: The …, 2014
52014
Impossible Differential Cryptanalysis of Reduced-Round Tweakable TWINE
M Tolba, M ElSheikh, AM Youssef
AFRICACRYPT 2020 12174, 91–113, 2020
32020
MILP-aided Cryptanalysis of Some Block Ciphers
M ElSheikh
Concordia University, 2021
12021
A cautionary note on the use of Gurobi for cryptanalysis
M ElSheikh, AM Youssef
Cryptology ePrint Archive, 2020
12020
Impossible Differential Attack on Reduced Round SPARX-128/256
M Elsheikh, M Tolba, AM Youssef
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2018
12018
系统目前无法执行此操作,请稍后再试。
文章 1–15