TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 15.

Petzoldt, Albrecht and Szepieniec, Alan and Mohamed, Mohamed Saied Emam (2017):
A Practical Multivariate Blind Signature Scheme.
In: Financial Cryptography and Data Security 2017, Malta, [Conference or Workshop Item]

Mohamed, Mohamed Saied Emam and El Bansarkhani, Rachid and Petzoldt, Albrecht (2016):
MQSAS - A Multivariate Sequential Aggregate Signature Scheme.
In: ISC 2016 - The 19th Information Security Conference, Springer LNCS, Honolulu, Hi, USA, [Conference or Workshop Item]

Mohamed, Mohamed Saied Emam and Buchmann, Johannes (2014):
Mutant Differential Fault Analysis of Trivium MDFA.
In: the 17th Annual International Conference on Information Security and Cryptology, ICISC2014, Springer, [Conference or Workshop Item]

Mohamed, Mohamed Saied Emam and Bulygin, Stanislav and Zohner, Michael and Heuser, Annelie and Walter, Michael and Buchmann, Johannes (2013):
Improved Algebraic Side-Channel Attack on AES.
In: Journal of Cryptographic Engineering, pp. 139-156, [Article]

Mohamed, Mohamed Saied Emam and Bulygin, Stanislav and Zohner, Michael and Heuser, Annelie and Walter, Michael and Buchmann, Johannes (2012):
Improved Algebraic Side-Channel Attack on AES.
In: 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, IEEE, ISBN 978-1-4673-2341-3,
DOI: 10.1109/HST.2012.6224335,
[Conference or Workshop Item]

Mohamed, Mohamed Saied Emam and Ding, Jintai and Buchmann, Johannes
Kim, Tai-Hoon and Adeli, Hojjat and Robles, Rosslin John and Balitanas, Maricel (eds.) (2011):
Towards Algebraic Cryptanalysis of HFE Challenge 2.
In: Proceedings of "The 5th International Conference on Information Security and Assurance" ISA 2011, Springer, Brno University, Czech Republic, In: Communications in Computer and Information Science, ISBN 978-3-642-23140-7,
DOI: 10.1007/978-3-642-23141-4_12,
[Conference or Workshop Item]

Mohamed, Mohamed Saied Emam and Bulygin, Stanislav and Buchmann, Johannes
Kim, Tai-Hoon and Adeli, Hojjat and Robles, Rosslin John and Balitanas, Maricel (eds.) (2011):
Using SAT Solving to Improve Differential Fault Analysis of Trivium.
In: Proceedings of "The 5th International Conference on Information Security and Assurance" ISA 2011, Springer, Brno, Czech Republic, In: Communications in Computer and Information Science, 200, DOI: 10.1007/978-3-642-23141-4_7,
[Conference or Workshop Item]

Mohamed, Mohamed Saied Emam (2011):
Improved Strategies for Solving Multivariate Polynomial Equation Systems over Finite Fields.
Darmstadt, TU Darmstadt, Informatik, [Online-Edition: urn:nbn:de:tuda-tuprints-26222],
[Ph.D. Thesis]

Mohamed, Mohamed Saied Emam and Bulygin, Stanislav and Buchmann, Johannes (2011):
Improved Differential Fault Analysis of Trivium.
In: Proceedings of COSADE 2011, Darmstadt, [Conference or Workshop Item]

Mohamed, Mohamed Saied Emam and Ding, Jintai and Buchmann, Johannes (2011):
The Complexity Analysis of the MutantXL Family.
In: IACR Cryptology ePrint Archive, p. 36, [Article]

Mohamed, Mohamed Saied Emam and Cabarcas, Daniel and Ding, Jintai and Buchmann, Johannes and Bulygin, Stanislav
Lee, Donghoon and Hong, Seokhie (eds.) (2010):
MXL3: An efficient algorithm for computing Gröbner bases of zero-dimensional ideals.
In: Proceedings of the 12th International Conference on Information Security and Cryptography - ICISC 2009, Springer, Seoul, Korea, Lecture Notes in Computer, ISBN 978-3-642-14422-6,
DOI: 10.1007/978-3-642-14423-3_7,
[Conference or Workshop Item]

Buchmann, Johannes and Cabarcas, Daniel and Ding, Jintai and Mohamed, Mohamed Saied Emam
Bernstein, Daniel and Lange, Tanja (eds.) (2010):
Flexible Partial Enlargement to Accelerate Gröbner Basis Computation over F_2.
In: AFRICACRYPT, Springer, Stellenbosch, South Africa, In: LNCS, ISBN 978-3-642-12677-2,
[Conference or Workshop Item]

Mohamed, Mohamed Saied Emam and Ding, Jintai and Buchmann, Johannes and Werner, Fabian (2009):
Algebraic Attack on the MQQ Public Key Cryptosystem.
In: Cryptology and Network Security, 8th International Conference, CANS 2009, Springer, Kanazawa, Japan, In: LNCS, ISBN 978-3-642-10432-9,
DOI: 10.1007/978-3-642-10433-6_26,
[Conference or Workshop Item]

Mohamed, Mohamed Saied Emam and Mohamed, Wael Said Abd Elmageed and Ding, Jintai and Buchmann, Johannes (2008):
MXL2: Solving Polynomial Equations over GF(2) Using an Improved Mutant Strategy.
In: Post-Quantum Cryptography, Second International Workshop, PQCrypto 2008, DOI: 10.1007/978-3-540-88403-3_14,
[Conference or Workshop Item]

Ding, Jintai and Buchmann, Johannes and Mohamed, Mohamed Saied Emam and Mohamed, Wael Said Abd Elmageed and Weinmann, Ralf-Philipp (2008):
MutantXL.
In: SCC 2008, [Conference or Workshop Item]

This list was generated on Sat Oct 19 01:36:19 2019 CEST.