Altawy, R.; Duman, O.; Youssef, A. M. Fault analysis of Kuznyechik. (Russian. English summary) Zbl 1475.94096 Mat. Vopr. Kriptografii 7, No. 2, 21-34 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Altawy} et al., Mat. Vopr. Kriptografii 7, No. 2, 21--34 (2016; Zbl 1475.94096) Full Text: DOI MNR
AlTawy, Riham; Youssef, Amr M. Differential fault analysis of streebog. (English) Zbl 1403.94040 Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 35-49 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{R. AlTawy} and \textit{A. M. Youssef}, Lect. Notes Comput. Sci. 9065, 35--49 (2015; Zbl 1403.94040) Full Text: DOI
AlTawy, Riham; Youssef, Amr M. Second preimage analysis of Whirlwind. (English) Zbl 1400.94109 Lin, Dongdai (ed.) et al., Information security and cryptology. 10th international conference, Inscrypt 2014, Beijing, China, December 13–15, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-16744-2/pbk; 978-3-319-16745-9/ebook). Lecture Notes in Computer Science 8957, 311-328 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{R. AlTawy} and \textit{A. M. Youssef}, Lect. Notes Comput. Sci. 8957, 311--328 (2015; Zbl 1400.94109) Full Text: DOI
Abdelkhalek, Ahmed; AlTawy, Riham; Youssef, Amr M. Impossible differential properties of reduced round Streebog. (English) Zbl 1441.94065 El Hajji, Said (ed.) et al., Codes, cryptology, and information security. First international conference, C2SI 2015, Rabat, Morocco, May 26–28, 2015. Proceedings – in honor of Thierry Berger. Cham: Springer. Lect. Notes Comput. Sci. 9084, 274-286 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Abdelkhalek} et al., Lect. Notes Comput. Sci. 9084, 274--286 (2015; Zbl 1441.94065) Full Text: DOI
AlTawy, Riham; Tolba, Mohamed; Youssef, Amr M. A higher order key partitioning attack with application to LBlock. (English) Zbl 1441.94067 El Hajji, Said (ed.) et al., Codes, cryptology, and information security. First international conference, C2SI 2015, Rabat, Morocco, May 26–28, 2015. Proceedings – in honor of Thierry Berger. Cham: Springer. Lect. Notes Comput. Sci. 9084, 215-227 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{R. AlTawy} et al., Lect. Notes Comput. Sci. 9084, 215--227 (2015; Zbl 1441.94067) Full Text: DOI
AlTawy, Riham; Youssef, Amr Differential sieving for 2-step matching meet-in-the-middle attack with application to lblock. (English) Zbl 1382.94039 Eisenbarth, Thomas (ed.) et al., Lightweight cryptography for security and privacy. Third international workshop, LightSec 2014, Istanbul, Turkey, September 1–2, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-16362-8/pbk; 978-3-319-16363-5/ebook). Lecture Notes in Computer Science 8898, 126-139 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{R. AlTawy} and \textit{A. Youssef}, Lect. Notes Comput. Sci. 8898, 126--139 (2015; Zbl 1382.94039) Full Text: DOI
Abdelkhalek, Ahmed; AlTawy, Riham; Tolba, Mohamed; Youssef, Amr M. Meet-in-the-middle attacks on reduced-round Hierocrypt-3. (English) Zbl 1370.94474 Lauter, Kristin (ed.) et al., Progress in cryptology – LATINCRYPT 2015. 4th international conference on cryptology and information security in Latin America, Guadalajara, Mexico, August 23–26, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22173-1/pbk; 978-3-319-22174-8/ebook). Lecture Notes in Computer Science 9230, 187-203 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Abdelkhalek} et al., Lect. Notes Comput. Sci. 9230, 187--203 (2015; Zbl 1370.94474) Full Text: DOI
AlTawy, Riham; Kircanski, Aleksandar; Youssef, Amr M. Rebound attacks on Stribog. (English) Zbl 1368.94081 Lee, Hyang-Sook (ed.) et al., Information security and cryptology – ICISC 2013. 16th international conference, Seoul, Korea, November 27–29, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-12159-8/pbk; 978-3-319-12160-4/ebook). Lecture Notes in Computer Science 8565, 175-188 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{R. AlTawy} et al., Lect. Notes Comput. Sci. 8565, 175--188 (2014; Zbl 1368.94081) Full Text: DOI
AlTawy, Riham; Youssef, Amr M. Preimage attacks on reduced-round Stribog. (English) Zbl 1288.94048 Pointcheval, David (ed.) et al., Progress in cryptology – AFRICACRYPT 2014. 7th international conference on cryptology in Africa, Marrakesh, Morocco, May 28–30, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-06733-9/pbk). Lecture Notes in Computer Science 8469, 109-125 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{R. AlTawy} and \textit{A. M. Youssef}, Lect. Notes Comput. Sci. 8469, 109--125 (2014; Zbl 1288.94048) Full Text: DOI
AlTawy, Riham; Youssef, Amr M. Integral distinguishers for reduced-round Stribog. (English) Zbl 1296.94075 Inf. Process. Lett. 114, No. 8, 426-431 (2014). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{R. AlTawy} and \textit{A. M. Youssef}, Inf. Process. Lett. 114, No. 8, 426--431 (2014; Zbl 1296.94075) Full Text: DOI
AlTawy, Riham; Kircanski, Aleksandar; Youssef, Amr Second order collision for the 42-step reduced DHA-256 hash function. (English) Zbl 1285.94038 Inf. Process. Lett. 113, No. 19-21, 764-770 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{R. AlTawy} et al., Inf. Process. Lett. 113, No. 19--21, 764--770 (2013; Zbl 1285.94038) Full Text: DOI
Kircanski, Aleksandar; AlTawy, Riham; Youssef, Amr M. A heuristic for finding compatible differential paths with application to HAS-160. (English) Zbl 1326.94104 Sako, Kazue (ed.) et al., Advances in cryptology – ASIACRYPT 2013. 19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1–5, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-42044-3/pbk). Lecture Notes in Computer Science 8270, 464-483 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Kircanski} et al., Lect. Notes Comput. Sci. 8270, 464--483 (2013; Zbl 1326.94104) Full Text: DOI