Lelantos: A blockchain-based anonymous physical delivery system R AlTawy, M ElSheikh, AM Youssef, G Gong 2017 15th Annual Conference on Privacy, Security and Trust (PST), 15-1509, 2017 | 68 | 2017 |
BotCap: Machine learning approach for botnet detection based on statistical features MS Gadelrab, M ElSheikh, MA Ghoneim, M Rashwan Int. J. Commun. Netw. Inf. Secur 10 (3), 563, 2018 | 31 | 2018 |
Related-key differential cryptanalysis of full round CRAFT M ElSheikh, AM Youssef International Conference on Security, Privacy, and Applied Cryptography …, 2019 | 21 | 2019 |
An efficient micropayment channel on ethereum HS Galal, M ElSheikh, AM Youssef Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS …, 2019 | 18 | 2019 |
On MILP-based automatic search for differential trails through modular additions with application to Bel-T M ElSheikh, A Abdelkhalek, AM Youssef Progress in Cryptology–AFRICACRYPT 2019: 11th International Conference on …, 2019 | 11 | 2019 |
Dispute-free scalable open vote network using zk-SNARKs M ElSheikh, AM Youssef Financial Cryptography and Data Security. FC 2022 International Workshops …, 2022 | 9 | 2022 |
On MILP-based automatic search for bit-based division property for ciphers with (large) linear layers M ElSheikh, AM Youssef Australasian Conference on Information Security and Privacy, 111-131, 2021 | 8 | 2021 |
Integral cryptanalysis of reduced-round tweakable TWINE M ElSheikh, AM Youssef Cryptology and Network Security: 19th International Conference, CANS 2020 …, 2020 | 6 | 2020 |
Short paper: Deploying payword on Ethereum M Elsheikh, J Clark, AM Youssef Financial Cryptography and Data Security: FC 2019 International Workshops …, 2020 | 5 | 2020 |
Integral attacks on round-reduced Bel-T-256 M ElSheikh, M Tolba, AM Youssef International Conference on Selected Areas in Cryptography, 73-91, 2018 | 5 | 2018 |
BoTGen: A new approach for in-lab generation of botnet datasets MH ElSheikh, MS Gadelrab, MA Ghoneim, M Rashwan 2014 9th International Conference on Malicious and Unwanted Software: The …, 2014 | 5 | 2014 |
Impossible Differential Cryptanalysis of Reduced-Round Tweakable TWINE M Tolba, M ElSheikh, AM Youssef AFRICACRYPT 2020 12174, 91–113, 2020 | 3 | 2020 |
MILP-aided Cryptanalysis of Some Block Ciphers M ElSheikh Concordia University, 2021 | 1 | 2021 |
A cautionary note on the use of Gurobi for cryptanalysis M ElSheikh, AM Youssef Cryptology ePrint Archive, 2020 | 1 | 2020 |
Impossible Differential Attack on Reduced Round SPARX-128/256 M Elsheikh, M Tolba, AM Youssef IEICE Transactions on Fundamentals of Electronics, Communications and …, 2018 | 1 | 2018 |