BibTeX records: Amr M. Youssef

download as .bib file

@article{DBLP:journals/iotj/SeifelnasrAY24,
  author       = {Mohamed Seifelnasr and
                  Riham AlTawy and
                  Amr M. Youssef},
  title        = {{SKAFS:} Symmetric Key Authentication Protocol With Forward Secrecy
                  for Edge Computing},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {1},
  pages        = {510--525},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3285513},
  doi          = {10.1109/JIOT.2023.3285513},
  timestamp    = {Fri, 09 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/SeifelnasrAY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/TejaswiMY24,
  author       = {Bhaskar Tejaswi and
                  Mohammad Mannan and
                  Amr M. Youssef},
  title        = {Security Weaknesses in IoT Management Platforms},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {1},
  pages        = {1572--1588},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3289754},
  doi          = {10.1109/JIOT.2023.3289754},
  timestamp    = {Fri, 09 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/TejaswiMY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/SeifelnasrAYG24,
  author       = {Mohamed Seifelnasr and
                  Riham AlTawy and
                  Amr M. Youssef and
                  Essam Ghadafi},
  title        = {Privacy-Preserving Mutual Authentication Protocol With Forward Secrecy
                  for IoT-Edge-Cloud},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {5},
  pages        = {8105--8117},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3318180},
  doi          = {10.1109/JIOT.2023.3318180},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/SeifelnasrAYG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/KhanEYSE24,
  author       = {Omniyah Gul M. Khan and
                  Fadi Elghitani and
                  Amr M. Youssef and
                  Magdy M. A. Salama and
                  Ehab Fahmy El{-}Saadany},
  title        = {Real-Time Congestion-Aware Charging Station Assignment Model for EVs},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {7},
  pages        = {11723--11736},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3331600},
  doi          = {10.1109/JIOT.2023.3331600},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/KhanEYSE24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/SaberYSZE24,
  author       = {Ahmad Mohammad Saber and
                  Amr M. Youssef and
                  Davor Svetinovic and
                  Hatem H. Zeineldin and
                  Ehab F. El{-}Saadany},
  title        = {Cyber-Immune Line Current Differential Relays},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {20},
  number       = {3},
  pages        = {3597--3608},
  year         = {2024},
  url          = {https://doi.org/10.1109/TII.2023.3310769},
  doi          = {10.1109/TII.2023.3310769},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tii/SaberYSZE24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/KlubanMY24,
  author       = {Maryna Kluban and
                  Mohammad Mannan and
                  Amr M. Youssef},
  title        = {On Detecting and Measuring Exploitable JavaScript Functions in Real-world
                  Applications},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {27},
  number       = {1},
  pages        = {8:1--8:37},
  year         = {2024},
  url          = {https://doi.org/10.1145/3630253},
  doi          = {10.1145/3630253},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/KlubanMY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-14949,
  author       = {Ahmad Mohammad Saber and
                  Amr M. Youssef and
                  Davor Svetinovic and
                  Hatem H. Zeineldin and
                  Deepa Kundur and
                  Ehab F. El{-}Saadany},
  title        = {Enhancing Power Quality Event Classification with {AI} Transformer
                  Models},
  journal      = {CoRR},
  volume       = {abs/2402.14949},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.14949},
  doi          = {10.48550/ARXIV.2402.14949},
  eprinttype    = {arXiv},
  eprint       = {2402.14949},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-14949.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/NakkarAY23,
  author       = {Mouna Nakkar and
                  Riham AlTawy and
                  Amr M. Youssef},
  title        = {{GASE:} {A} Lightweight Group Authentication Scheme With Key Agreement
                  for Edge Computing Applications},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {1},
  pages        = {840--854},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2022.3204335},
  doi          = {10.1109/JIOT.2022.3204335},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/NakkarAY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ElbayoumiIEHY23,
  author       = {Mohammed Elbayoumi and
                  Mohamed Ibrahim and
                  Salah Elhoushy and
                  Walaa Hamouda and
                  Amr M. Youssef},
  title        = {Performance Analysis of Cellular Ultradense IoT Networks With Wireless
                  Backhauls},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {17},
  pages        = {15774--15787},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2023.3265192},
  doi          = {10.1109/JIOT.2023.3265192},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/ElbayoumiIEHY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/KhanYSE23,
  author       = {Omniyah Gul M. Khan and
                  Amr M. Youssef and
                  Magdy M. A. Salama and
                  Ehab F. El{-}Saadany},
  title        = {Management of Congestion in Distribution Networks Utilizing Demand
                  Side Management and Reinforcement Learning},
  journal      = {{IEEE} Syst. J.},
  volume       = {17},
  number       = {3},
  pages        = {4452--4463},
  year         = {2023},
  url          = {https://doi.org/10.1109/JSYST.2023.3281524},
  doi          = {10.1109/JSYST.2023.3281524},
  timestamp    = {Thu, 14 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sj/KhanYSE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnse/GalalY23,
  author       = {Hisham S. Galal and
                  Amr M. Youssef},
  title        = {Aegis: Privacy-Preserving Market for Non-Fungible Tokens},
  journal      = {{IEEE} Trans. Netw. Sci. Eng.},
  volume       = {10},
  number       = {1},
  pages        = {92--102},
  year         = {2023},
  url          = {https://doi.org/10.1109/TNSE.2022.3205428},
  doi          = {10.1109/TNSE.2022.3205428},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnse/GalalY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/AlTawyGY23,
  author       = {Riham AlTawy and
                  Hisham S. Galal and
                  Amr M. Youssef},
  title        = {Mjolnir: Breaking the Glass in a Publicly Verifiable Yet Private Manner},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {20},
  number       = {3},
  pages        = {2942--2956},
  year         = {2023},
  url          = {https://doi.org/10.1109/TNSM.2023.3244506},
  doi          = {10.1109/TNSM.2023.3244506},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnsm/AlTawyGY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/TejaswiMY23,
  author       = {Bhaskar Tejaswi and
                  Mohammad Mannan and
                  Amr M. Youssef},
  editor       = {Mohamed Shehab and
                  Maribel Fern{\'{a}}ndez and
                  Ninghui Li},
  title        = {All Your IoT Devices Are Belong to Us: Security Weaknesses in IoT
                  Management Platforms},
  booktitle    = {Proceedings of the Thirteenth {ACM} Conference on Data and Application
                  Security and Privacy, {CODASPY} 2023, Charlotte, NC, USA, April 24-26,
                  2023},
  pages        = {245--250},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3577923.3583636},
  doi          = {10.1145/3577923.3583636},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/TejaswiMY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/RagabMY23,
  author       = {Abdelrahman Ragab and
                  Mohammad Mannan and
                  Amr M. Youssef},
  editor       = {Sokratis K. Katsikas and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Costas Lambrinoudakis and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Guillermo Navarro{-}Arribas and
                  Pantaleone Nespoli and
                  Christos Kalloniatis and
                  John Mylopoulos and
                  Annie I. Ant{\'{o}}n and
                  Stefanos Gritzalis},
  title        = {Try On, Spied On?: Privacy Analysis of Virtual Try-On Websites and
                  Android Apps},
  booktitle    = {Computer Security. {ESORICS} 2023 International Workshops - CyberICS,
                  DPM, CBT, and SECPRE, The Hague, The Netherlands, September 25-29,
                  2023, Revised Selected Papers, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14398},
  pages        = {232--248},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-54204-6\_13},
  doi          = {10.1007/978-3-031-54204-6\_13},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/RagabMY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icbc2/AfiaGAY23,
  author       = {Ismail Afia and
                  Hisham S. Galal and
                  Riham AlTawy and
                  Amr M. Youssef},
  title        = {vPass: Publicly Verifiable Fair Exchange Protocol for Vehicle Passports},
  booktitle    = {{IEEE} International Conference on Blockchain and Cryptocurrency,
                  {ICBC} 2023, Dubai, United Arab Emirates, May 1-5, 2023},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICBC56567.2023.10174895},
  doi          = {10.1109/ICBC56567.2023.10174895},
  timestamp    = {Fri, 21 Jul 2023 12:10:41 +0200},
  biburl       = {https://dblp.org/rec/conf/icbc2/AfiaGAY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/ElbayoumiIEHY23,
  author       = {Mohammed Elbayoumi and
                  Mohamed Ibrahim and
                  Salah Elhoushy and
                  Walaa Hamouda and
                  Amr M. Youssef},
  title        = {Machine-Type Communications in mmWave Ultra-Dense Networks: Performance
                  Analysis},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2023, Rome,
                  Italy, May 28 - June 1, 2023},
  pages        = {5843--5848},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICC45041.2023.10279718},
  doi          = {10.1109/ICC45041.2023.10279718},
  timestamp    = {Thu, 02 Nov 2023 17:09:41 +0100},
  biburl       = {https://dblp.org/rec/conf/icc/ElbayoumiIEHY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iecon/SaberYSZE23,
  author       = {Ahmad Mohammad Saber and
                  Amr M. Youssef and
                  Davor Svetinovic and
                  Hatem H. Zeineldin and
                  Ehab F. El{-}Saadany},
  title        = {Learning-Based Detection of Malicious Volt-VAr Control Parameters
                  in Smart Inverters},
  booktitle    = {49th Annual Conference of the {IEEE} Industrial Electronics Society,
                  {IECON} 2023, Singapore, October 16-19, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/IECON51785.2023.10312615},
  doi          = {10.1109/IECON51785.2023.10312615},
  timestamp    = {Sat, 25 Nov 2023 16:52:31 +0100},
  biburl       = {https://dblp.org/rec/conf/iecon/SaberYSZE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/MangeardYMY23,
  author       = {Philippe Mangeard and
                  Xiufen Yu and
                  Mohammad Mannan and
                  Amr M. Youssef},
  editor       = {Lothar Fritsch and
                  Ismail Hassan and
                  Ebenezer Paintsil},
  title        = {No Place to Hide: Privacy Exposure in Anti-stalkerware Apps and Support
                  Websites},
  booktitle    = {Secure {IT} Systems - 28th Nordic Conference, NordSec 2023, Oslo,
                  Norway, November 16-17, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14324},
  pages        = {18--36},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-47748-5\_2},
  doi          = {10.1007/978-3-031-47748-5\_2},
  timestamp    = {Wed, 15 Nov 2023 10:18:13 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/MangeardYMY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BaskaranZMY23,
  author       = {Supraja Baskaran and
                  Lianying Zhao and
                  Mohammad Mannan and
                  Amr M. Youssef},
  title        = {Measuring the Leakage and Exploitability of Authentication Secrets
                  in Super-apps: The WeChat Case},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {727--743},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607236},
  doi          = {10.1145/3607199.3607236},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/BaskaranZMY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/PageyMY23,
  author       = {Rohan Pagey and
                  Mohammad Mannan and
                  Amr M. Youssef},
  editor       = {Ying Ding and
                  Jie Tang and
                  Juan F. Sequeda and
                  Lora Aroyo and
                  Carlos Castillo and
                  Geert{-}Jan Houben},
  title        = {All Your Shops Are Belong to Us: Security Weaknesses in E-commerce
                  Platforms},
  booktitle    = {Proceedings of the {ACM} Web Conference 2023, {WWW} 2023, Austin,
                  TX, USA, 30 April 2023 - 4 May 2023},
  pages        = {2144--2154},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3543507.3583319},
  doi          = {10.1145/3543507.3583319},
  timestamp    = {Mon, 28 Aug 2023 21:17:10 +0200},
  biburl       = {https://dblp.org/rec/conf/www/PageyMY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2303-04931,
  author       = {Amir Mohammad Naseri and
                  Walter Lucia and
                  Amr M. Youssef},
  title        = {An Observer-Based Key Agreement Scheme for Remotely Controlled Mobile
                  Robots},
  journal      = {CoRR},
  volume       = {abs/2303.04931},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2303.04931},
  doi          = {10.48550/ARXIV.2303.04931},
  eprinttype    = {arXiv},
  eprint       = {2303.04931},
  timestamp    = {Wed, 15 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2303-04931.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2307-09317,
  author       = {Supraja Baskaran and
                  Lianying Zhao and
                  Mohammad Mannan and
                  Amr M. Youssef},
  title        = {Measuring the Leakage and Exploitability of Authentication Secrets
                  in Super-apps: The WeChat Case},
  journal      = {CoRR},
  volume       = {abs/2307.09317},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2307.09317},
  doi          = {10.48550/ARXIV.2307.09317},
  eprinttype    = {arXiv},
  eprint       = {2307.09317},
  timestamp    = {Tue, 25 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2307-09317.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2307-13952,
  author       = {Bhaskar Tejaswi and
                  Mohammad Mannan and
                  Amr M. Youssef},
  title        = {Security Weaknesses in IoT Management Platforms},
  journal      = {CoRR},
  volume       = {abs/2307.13952},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2307.13952},
  doi          = {10.48550/ARXIV.2307.13952},
  eprinttype    = {arXiv},
  eprint       = {2307.13952},
  timestamp    = {Wed, 02 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2307-13952.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-10304,
  author       = {Ahmad Mohammad Saber and
                  Amr M. Youssef and
                  Davor Svetinovic and
                  Hatem H. Zeineldin and
                  Ehab F. El{-}Saadany},
  title        = {Learning-Based Detection of Malicious Volt-VAr Control Parameters
                  in Smart Inverters},
  journal      = {CoRR},
  volume       = {abs/2309.10304},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.10304},
  doi          = {10.48550/ARXIV.2309.10304},
  eprinttype    = {arXiv},
  eprint       = {2309.10304},
  timestamp    = {Mon, 25 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-10304.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalalY23,
  author       = {Hisham S. Galal and
                  Amr M. Youssef},
  title        = {Aegis: Privacy-Preserving Market for Non-Fungible Tokens},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {144},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/144},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GalalY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GalalMY22,
  author       = {Hisham S. Galal and
                  Mohammad Mannan and
                  Amr M. Youssef},
  title        = {Blindfold: Keeping private keys in PKIs and CDNs out of sight},
  journal      = {Comput. Secur.},
  volume       = {118},
  pages        = {102731},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102731},
  doi          = {10.1016/J.COSE.2022.102731},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GalalMY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csysl/NaseriLY22,
  author       = {Amir Mohammad Naseri and
                  Walter Lucia and
                  Amr M. Youssef},
  title        = {Encrypted Cloud-Based Set-Theoretic Model Predictive Control},
  journal      = {{IEEE} Control. Syst. Lett.},
  volume       = {6},
  pages        = {3032--3037},
  year         = {2022},
  url          = {https://doi.org/10.1109/LCSYS.2022.3182295},
  doi          = {10.1109/LCSYS.2022.3182295},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csysl/NaseriLY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcom/ElbayoumiHY22,
  author       = {Mohammed Elbayoumi and
                  Walaa Hamouda and
                  Amr M. Youssef},
  title        = {Edge Computing and Multiple-Association in Ultra-Dense Networks: Performance
                  Analysis},
  journal      = {{IEEE} Trans. Commun.},
  volume       = {70},
  number       = {8},
  pages        = {5098--5112},
  year         = {2022},
  url          = {https://doi.org/10.1109/TCOMM.2022.3186989},
  doi          = {10.1109/TCOMM.2022.3186989},
  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcom/ElbayoumiHY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/AlbarakatiRKKDY22,
  author       = {Abdullah Albarakati and
                  Chantale Robillard and
                  Mark Karanfil and
                  Marthe Kassouf and
                  Mourad Debbabi and
                  Amr M. Youssef and
                  Mohsen Ghafouri and
                  Rachid Hadjidj},
  title        = {Security Monitoring of {IEC} 61850 Substations Using {IEC} 62351-7
                  Network and System Management},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {18},
  number       = {3},
  pages        = {1641--1653},
  year         = {2022},
  url          = {https://doi.org/10.1109/TII.2021.3082079},
  doi          = {10.1109/TII.2021.3082079},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tii/AlbarakatiRKKDY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/SaberYSZE22,
  author       = {Ahmad Mohammad Saber and
                  Amr M. Youssef and
                  Davor Svetinovic and
                  Hatem H. Zeineldin and
                  Ehab F. El{-}Saadany},
  title        = {Anomaly-Based Detection of Cyberattacks on Line Current Differential
                  Relays},
  journal      = {{IEEE} Trans. Smart Grid},
  volume       = {13},
  number       = {6},
  pages        = {4787--4800},
  year         = {2022},
  url          = {https://doi.org/10.1109/TSG.2022.3185764},
  doi          = {10.1109/TSG.2022.3185764},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsg/SaberYSZE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsmc/LuciaY22,
  author       = {Walter Lucia and
                  Amr M. Youssef},
  title        = {A Key-Agreement Scheme for Cyber-Physical Systems},
  journal      = {{IEEE} Trans. Syst. Man Cybern. Syst.},
  volume       = {52},
  number       = {8},
  pages        = {5368--5373},
  year         = {2022},
  url          = {https://doi.org/10.1109/TSMC.2021.3121205},
  doi          = {10.1109/TSMC.2021.3121205},
  timestamp    = {Mon, 08 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsmc/LuciaY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/KlubanMY22,
  author       = {Maryna Kluban and
                  Mohammad Mannan and
                  Amr M. Youssef},
  editor       = {Yuji Suga and
                  Kouichi Sakurai and
                  Xuhua Ding and
                  Kazue Sako},
  title        = {On Measuring Vulnerable JavaScript Functions in the Wild},
  booktitle    = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications
                  Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022},
  pages        = {917--930},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3488932.3497769},
  doi          = {10.1145/3488932.3497769},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiaccs/KlubanMY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/TejaswiSPMY22,
  author       = {Bhaskar Tejaswi and
                  Nayanamana Samarasinghe and
                  Sajjad Pourali and
                  Mohammad Mannan and
                  Amr M. Youssef},
  title        = {Leaky Kits: The Increased Risk of Data Exposure from Phishing Kits},
  booktitle    = {{APWG} Symposium on Electronic Crime Research, eCrime 2022, Boston,
                  MA, USA, November 30 - December 2, 2022},
  pages        = {1--13},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/eCrime57793.2022.10142092},
  doi          = {10.1109/ECRIME57793.2022.10142092},
  timestamp    = {Tue, 20 Jun 2023 14:12:59 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/TejaswiSPMY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/SamarasingheKMY22,
  author       = {Nayanamana Samarasinghe and
                  Pranay Kapoor and
                  Mohammad Mannan and
                  Amr M. Youssef},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Guillermo Navarro{-}Arribas and
                  Nicola Dragoni},
  title        = {No Salvation from Trackers: Privacy Analysis of Religious Websites
                  and Mobile Apps},
  booktitle    = {Data Privacy Management, Cryptocurrencies and Blockchain Technology
                  - {ESORICS} 2022 International Workshops, {DPM} 2022 and {CBT} 2022,
                  Copenhagen, Denmark, September 26-30, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13619},
  pages        = {151--166},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25734-6\_10},
  doi          = {10.1007/978-3-031-25734-6\_10},
  timestamp    = {Tue, 28 Feb 2023 08:10:09 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/SamarasingheKMY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eucc/NaseriLY22,
  author       = {Amir Mohammad Naseri and
                  Walter Lucia and
                  Amr M. Youssef},
  title        = {A Privacy Preserving Solution for Cloud-Enabled Set-Theoretic Model
                  Predictive Control},
  booktitle    = {European Control Conference, {ECC} 2022, London, United Kingdom, July
                  12-15, 2022},
  pages        = {894--899},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.23919/ECC55457.2022.9838573},
  doi          = {10.23919/ECC55457.2022.9838573},
  timestamp    = {Wed, 10 Aug 2022 08:28:40 +0200},
  biburl       = {https://dblp.org/rec/conf/eucc/NaseriLY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/YuSMY22,
  author       = {Xiufen Yu and
                  Nayanamana Samarasinghe and
                  Mohammad Mannan and
                  Amr M. Youssef},
  title        = {Got Sick and Tracked: Privacy Analysis of Hospital Websites},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2022 - Workshops, Genoa, Italy, June 6-10, 2022},
  pages        = {278--286},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/EuroSPW55150.2022.00034},
  doi          = {10.1109/EUROSPW55150.2022.00034},
  timestamp    = {Mon, 04 Jul 2022 17:06:18 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/YuSMY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/ElgharabawyKMBW22,
  author       = {Mounir Elgharabawy and
                  Blas Kojusner and
                  Mohammad Mannan and
                  Kevin R. B. Butler and
                  Byron Williams and
                  Amr M. Youssef},
  title        = {{SAUSAGE:} Security Analysis of Unix domain Socket usAGE in Android},
  booktitle    = {7th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2022, Genoa, Italy, June 6-10, 2022},
  pages        = {572--586},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/EuroSP53844.2022.00042},
  doi          = {10.1109/EUROSP53844.2022.00042},
  timestamp    = {Wed, 29 Jun 2022 16:03:24 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/ElgharabawyKMBW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/ElSheikhY22,
  author       = {Muhammad ElSheikh and
                  Amr M. Youssef},
  editor       = {Shin'ichiro Matsuo and
                  Lewis Gudgeon and
                  Ariah Klages{-}Mundt and
                  Daniel Perez Hernandez and
                  Sam Werner and
                  Thomas Haines and
                  Aleksander Essex and
                  Andrea Bracciali and
                  Massimiliano Sala},
  title        = {Dispute-Free Scalable Open Vote Network Using zk-SNARKs},
  booktitle    = {Financial Cryptography and Data Security. {FC} 2022 International
                  Workshops - CoDecFin, DeFi, Voting, WTSC, Grenada, May 6, 2022, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13412},
  pages        = {499--515},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-32415-4\_31},
  doi          = {10.1007/978-3-031-32415-4\_31},
  timestamp    = {Wed, 26 Jul 2023 08:43:08 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/ElSheikhY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/KapoorPMY22,
  author       = {Pranay Kapoor and
                  Rohan Pagey and
                  Mohammad Mannan and
                  Amr M. Youssef},
  editor       = {Fengjun Li and
                  Kaitai Liang and
                  Zhiqiang Lin and
                  Sokratis K. Katsikas},
  title        = {Silver Surfers on the Tech Wave: Privacy Analysis of Android Apps
                  for the Elderly},
  booktitle    = {Security and Privacy in Communication Networks - 18th {EAI} International
                  Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {462},
  pages        = {673--691},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25538-0\_35},
  doi          = {10.1007/978-3-031-25538-0\_35},
  timestamp    = {Thu, 06 Jul 2023 17:45:42 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/KapoorPMY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/SamarasingheAMY22,
  author       = {Nayanamana Samarasinghe and
                  Aashish Adhikari and
                  Mohammad Mannan and
                  Amr M. Youssef},
  editor       = {Fr{\'{e}}d{\'{e}}rique Laforest and
                  Rapha{\"{e}}l Troncy and
                  Elena Simperl and
                  Deepak Agarwal and
                  Aristides Gionis and
                  Ivan Herman and
                  Lionel M{\'{e}}dini},
  title        = {Et tu, Brute? Privacy Analysis of Government Websites and Mobile Apps},
  booktitle    = {{WWW} '22: The {ACM} Web Conference 2022, Virtual Event, Lyon, France,
                  April 25 - 29, 2022},
  pages        = {564--575},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3485447.3512223},
  doi          = {10.1145/3485447.3512223},
  timestamp    = {Thu, 23 Jun 2022 19:54:34 +0200},
  biburl       = {https://dblp.org/rec/conf/www/SamarasingheAMY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2203-03363,
  author       = {Muhammad ElSheikh and
                  Amr M. Youssef},
  title        = {Dispute-free Scalable Open Vote Network using zk-SNARKs},
  journal      = {CoRR},
  volume       = {abs/2203.03363},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2203.03363},
  doi          = {10.48550/ARXIV.2203.03363},
  eprinttype    = {arXiv},
  eprint       = {2203.03363},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2203-03363.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2204-01516,
  author       = {Mounir Elgharabawy and
                  Blas Kojusner and
                  Mohammad Mannan and
                  Kevin R. B. Butler and
                  Byron Williams and
                  Amr M. Youssef},
  title        = {{SAUSAGE:} Security Analysis of Unix domain Socket Usage in Android},
  journal      = {CoRR},
  volume       = {abs/2204.01516},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2204.01516},
  doi          = {10.48550/ARXIV.2204.01516},
  eprinttype    = {arXiv},
  eprint       = {2204.01516},
  timestamp    = {Wed, 06 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2204-01516.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2207-09335,
  author       = {Hisham S. Galal and
                  Mohammad Mannan and
                  Amr M. Youssef},
  title        = {Blindfold: Keeping Private Keys in PKIs and CDNs out of Sight},
  journal      = {CoRR},
  volume       = {abs/2207.09335},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2207.09335},
  doi          = {10.48550/ARXIV.2207.09335},
  eprinttype    = {arXiv},
  eprint       = {2207.09335},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2207-09335.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ElSheikhY22,
  author       = {Muhammad ElSheikh and
                  Amr M. Youssef},
  title        = {Dispute-free Scalable Open Vote Network using zk-SNARKs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {310},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/310},
  timestamp    = {Tue, 22 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ElSheikhY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csysl/AbdelwahabLY21,
  author       = {Ahmed Abdelwahab and
                  Walter Lucia and
                  Amr M. Youssef},
  title        = {Covert Channels in Cyber-Physical Systems},
  journal      = {{IEEE} Control. Syst. Lett.},
  volume       = {5},
  number       = {4},
  pages        = {1273--1278},
  year         = {2021},
  url          = {https://doi.org/10.1109/LCSYS.2020.3033059},
  doi          = {10.1109/LCSYS.2020.3033059},
  timestamp    = {Thu, 17 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csysl/AbdelwahabLY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/AliEDMY21,
  author       = {Suzan Ali and
                  Mounir Elgharabawy and
                  Quentin Duchaussoy and
                  Mohammad Mannan and
                  Amr M. Youssef},
  title        = {Parental Controls: Safer Internet Solutions or New Pitfalls?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {6},
  pages        = {36--46},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3076150},
  doi          = {10.1109/MSEC.2021.3076150},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/AliEDMY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-cps/LuciaY21,
  author       = {Walter Lucia and
                  Amr M. Youssef},
  title        = {Covert channels in stochastic cyber-physical systems},
  journal      = {{IET} Cyper-Phys. Syst.: Theory {\&} Appl.},
  volume       = {6},
  number       = {4},
  pages        = {228--237},
  year         = {2021},
  url          = {https://doi.org/10.1049/cps2.12020},
  doi          = {10.1049/CPS2.12020},
  timestamp    = {Tue, 08 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iet-cps/LuciaY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcom/ElbayoumiHY21,
  author       = {Mohammed Elbayoumi and
                  Walaa Hamouda and
                  Amr M. Youssef},
  title        = {Multiple-Association Supporting {HTC/MTC} in Limited-Backhaul Capacity
                  Ultra-Dense Networks},
  journal      = {{IEEE} Trans. Commun.},
  volume       = {69},
  number       = {6},
  pages        = {4113--4127},
  year         = {2021},
  url          = {https://doi.org/10.1109/TCOMM.2021.3062649},
  doi          = {10.1109/TCOMM.2021.3062649},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcom/ElbayoumiHY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CabanaYDLKAA21,
  author       = {Olivier Cabana and
                  Amr M. Youssef and
                  Mourad Debbabi and
                  Bernard Lebel and
                  Marthe Kassouf and
                  Ribal Atallah and
                  Basile L. Agba},
  title        = {Threat Intelligence Generation Using Network Telescope Data for Industrial
                  Control Systems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {16},
  pages        = {3355--3370},
  year         = {2021},
  url          = {https://doi.org/10.1109/TIFS.2021.3078261},
  doi          = {10.1109/TIFS.2021.3078261},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/CabanaYDLKAA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/KhanEYS21,
  author       = {Omniyah Gul M. Khan and
                  Ehab F. El{-}Saadany and
                  Amr M. Youssef and
                  Mostafa F. Shaaban},
  title        = {Cyber Security of Market-Based Congestion Management Methods in Power
                  Distribution Systems},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {17},
  number       = {12},
  pages        = {8142--8153},
  year         = {2021},
  url          = {https://doi.org/10.1109/TII.2021.3065714},
  doi          = {10.1109/TII.2021.3065714},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/KhanEYS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/SeifelnasrAY21,
  author       = {Mohamed Seifelnasr and
                  Riham AlTawy and
                  Amr M. Youssef},
  title        = {Efficient Inter-Cloud Authentication and Micropayment Protocol for
                  IoT Edge Computing},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {18},
  number       = {4},
  pages        = {4420--4433},
  year         = {2021},
  url          = {https://doi.org/10.1109/TNSM.2021.3103509},
  doi          = {10.1109/TNSM.2021.3103509},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnsm/SeifelnasrAY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ElSheikhY21,
  author       = {Muhammad ElSheikh and
                  Amr M. Youssef},
  editor       = {Joonsang Baek and
                  Sushmita Ruj},
  title        = {On MILP-Based Automatic Search for Bit-Based Division Property for
                  Ciphers with (Large) Linear Layers},
  booktitle    = {Information Security and Privacy - 26th Australasian Conference, {ACISP}
                  2021, Virtual Event, December 1-3, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13083},
  pages        = {111--131},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90567-5\_6},
  doi          = {10.1007/978-3-030-90567-5\_6},
  timestamp    = {Mon, 08 Nov 2021 16:43:35 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ElSheikhY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcc/AbdelwahabLY21,
  author       = {Ahmed Abdelwahab and
                  Walter Lucia and
                  Amr M. Youssef},
  title        = {Covert Channels in Cyber-Physical Systems},
  booktitle    = {2021 American Control Conference, {ACC} 2021, New Orleans, LA, USA,
                  May 25-28, 2021},
  pages        = {4649--4654},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.23919/ACC50511.2021.9483078},
  doi          = {10.23919/ACC50511.2021.9483078},
  timestamp    = {Fri, 30 Jul 2021 11:11:12 +0200},
  biburl       = {https://dblp.org/rec/conf/amcc/AbdelwahabLY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/GalalY21,
  author       = {Hisham S. Galal and
                  Amr M. Youssef},
  editor       = {Matthew Bernhard and
                  Andrea Bracciali and
                  Lewis Gudgeon and
                  Thomas Haines and
                  Ariah Klages{-}Mundt and
                  Shin'ichiro Matsuo and
                  Daniel Perez and
                  Massimiliano Sala and
                  Sam Werner},
  title        = {Publicly Verifiable and Secrecy Preserving Periodic Auctions},
  booktitle    = {Financial Cryptography and Data Security. {FC} 2021 International
                  Workshops - CoDecFin, DeFi, VOTING, and WTSC, Virtual Event, March
                  5, 2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12676},
  pages        = {348--363},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-662-63958-0\_29},
  doi          = {10.1007/978-3-662-63958-0\_29},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/GalalY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/ElbayoumiHY21,
  author       = {Mohammed Elbayoumi and
                  Walaa Hamouda and
                  Amr M. Youssef},
  title        = {Ergodic Secrecy Rate Analysis of Ultra-Dense Networks with Multiple
                  Antennas},
  booktitle    = {{ICC} 2021 - {IEEE} International Conference on Communications, Montreal,
                  QC, Canada, June 14-23, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICC42927.2021.9500938},
  doi          = {10.1109/ICC42927.2021.9500938},
  timestamp    = {Mon, 09 Aug 2021 11:13:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/ElbayoumiHY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/UddinMY21,
  author       = {Md Shahab Uddin and
                  Mohammad Mannan and
                  Amr M. Youssef},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Shujun Li and
                  Radha Poovendran and
                  Herv{\'{e}} Debar and
                  Moti Yung},
  title        = {Horus: {A} Security Assessment Framework for Android Crypto Wallets},
  booktitle    = {Security and Privacy in Communication Networks - 17th {EAI} International
                  Conference, SecureComm 2021, Virtual Event, September 6-9, 2021, Proceedings,
                  Part {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {399},
  pages        = {120--139},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90022-9\_7},
  doi          = {10.1007/978-3-030-90022-9\_7},
  timestamp    = {Tue, 23 Nov 2021 14:40:29 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/UddinMY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wf-iot/NakkarAY21,
  author       = {Mouna Nakkar and
                  Riham AlTawy and
                  Amr M. Youssef},
  title        = {Lightweight Authentication and Key Agreement Protocol for Edge Computing
                  Applications},
  booktitle    = {7th {IEEE} World Forum on Internet of Things, WF-IoT 2021, New Orleans,
                  LA, USA, June 14 - July 31, 2021},
  pages        = {415--420},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/WF-IoT51360.2021.9595939},
  doi          = {10.1109/WF-IOT51360.2021.9595939},
  timestamp    = {Tue, 16 Nov 2021 08:53:09 +0100},
  biburl       = {https://dblp.org/rec/conf/wf-iot/NakkarAY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-09153,
  author       = {Omniyah Gul M. Khan and
                  Ehab F. El{-}Saadany and
                  Amr M. Youssef and
                  Mostafa F. Shaaban},
  title        = {Impact of Electric Vehicles Botnets on the Power Grid},
  journal      = {CoRR},
  volume       = {abs/2103.09153},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.09153},
  eprinttype    = {arXiv},
  eprint       = {2103.09153},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-09153.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2104-01011,
  author       = {Amir Mohammad Naseri and
                  Walter Lucia and
                  Mohammad Mannan and
                  Amr M. Youssef},
  title        = {On Securing Cloud-hosted Cyber-physical Systems Using Trusted Execution
                  Environments},
  journal      = {CoRR},
  volume       = {abs/2104.01011},
  year         = {2021},
  url          = {https://arxiv.org/abs/2104.01011},
  eprinttype    = {arXiv},
  eprint       = {2104.01011},
  timestamp    = {Mon, 12 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2104-01011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-03509,
  author       = {Walter Lucia and
                  Amr M. Youssef},
  title        = {Wyner wiretap-like encoding scheme for cyber-physical systems},
  journal      = {CoRR},
  volume       = {abs/2105.03509},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.03509},
  eprinttype    = {arXiv},
  eprint       = {2105.03509},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-03509.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2109-13312,
  author       = {Omniyah Gul M. Khan and
                  Amr M. Youssef and
                  Ehab F. El{-}Saadany and
                  Magdy M. A. Salama},
  title        = {LSTM-based approach to detect cyber attacks on market-based congestion
                  management methods},
  journal      = {CoRR},
  volume       = {abs/2109.13312},
  year         = {2021},
  url          = {https://arxiv.org/abs/2109.13312},
  eprinttype    = {arXiv},
  eprint       = {2109.13312},
  timestamp    = {Mon, 04 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2109-13312.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ElSheikhY21,
  author       = {Muhammad ElSheikh and
                  Amr M. Youssef},
  title        = {On MILP-based Automatic Search for Bit-Based Division Property for
                  Ciphers with (large) Linear Layers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {643},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/643},
  timestamp    = {Mon, 07 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ElSheikhY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/AlrabaeeDSWYRNMHH20,
  author       = {Saed Alrabaee and
                  Mourad Debbabi and
                  Paria Shirani and
                  Lingyu Wang and
                  Amr M. Youssef and
                  Ashkan Rahimian and
                  Lina Nouh and
                  Djedjiga Mouheb and
                  He Huang and
                  Aiman Hanna},
  title        = {Binary Code Fingerprinting for Cybersecurity - Application to Malicious
                  Code Fingerprinting},
  series       = {Advances in Information Security},
  volume       = {78},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-34238-8},
  doi          = {10.1007/978-3-030-34238-8},
  isbn         = {978-3-030-34237-1},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/AlrabaeeDSWYRNMHH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/ElbayoumiKHY20,
  author       = {Mohammed Elbayoumi and
                  Mahmoud I. Kamel and
                  Walaa Hamouda and
                  Amr M. Youssef},
  title        = {NOMA-Assisted Machine-Type Communications in {UDN:} State-of-the-Art
                  and Challenges},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {22},
  number       = {2},
  pages        = {1276--1304},
  year         = {2020},
  url          = {https://doi.org/10.1109/COMST.2020.2977845},
  doi          = {10.1109/COMST.2020.2977845},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsur/ElbayoumiKHY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-cps/AyadFYE20,
  author       = {Abdelrahman Ayad and
                  Hany E. Z. Farag and
                  Amr M. Youssef and
                  Ehab F. El{-}Saadany},
  title        = {Cyber-physical attacks on power distribution systems},
  journal      = {{IET} Cyper-Phys. Syst.: Theory {\&} Appl.},
  volume       = {5},
  number       = {2},
  pages        = {218--225},
  year         = {2020},
  url          = {https://doi.org/10.1049/iet-cps.2019.0032},
  doi          = {10.1049/IET-CPS.2019.0032},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-cps/AyadFYE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-cps/LuciaY20,
  author       = {Walter Lucia and
                  Amr M. Youssef},
  title        = {Wyner wiretap-like encoding scheme for cyber-physical systems},
  journal      = {{IET} Cyper-Phys. Syst.: Theory {\&} Appl.},
  volume       = {5},
  number       = {4},
  pages        = {359--365},
  year         = {2020},
  url          = {https://doi.org/10.1049/iet-cps.2020.0012},
  doi          = {10.1049/IET-CPS.2020.0012},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iet-cps/LuciaY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/KamelHY20,
  author       = {Mahmoud I. Kamel and
                  Walaa Hamouda and
                  Amr M. Youssef},
  title        = {Uplink Performance of NOMA-Based Combined {HTC} and {MTC} in Ultradense
                  Networks},
  journal      = {{IEEE} Internet Things J.},
  volume       = {7},
  number       = {8},
  pages        = {7319--7333},
  year         = {2020},
  url          = {https://doi.org/10.1109/JIOT.2020.2984805},
  doi          = {10.1109/JIOT.2020.2984805},
  timestamp    = {Wed, 26 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/KamelHY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/NakkarAY20,
  author       = {Mouna Nakkar and
                  Riham AlTawy and
                  Amr M. Youssef},
  title        = {Lightweight Broadcast Authentication Protocol for Edge-Based Applications},
  journal      = {{IEEE} Internet Things J.},
  volume       = {7},
  number       = {12},
  pages        = {11766--11777},
  year         = {2020},
  url          = {https://doi.org/10.1109/JIOT.2020.3002221},
  doi          = {10.1109/JIOT.2020.3002221},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/NakkarAY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AmeliHEY20,
  author       = {Amir Ameli and
                  Ali Hooshyar and
                  Ehab F. El{-}Saadany and
                  Amr M. Youssef},
  title        = {An Intrusion Detection Method for Line Current Differential Relays},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {329--344},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2916331},
  doi          = {10.1109/TIFS.2019.2916331},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/AmeliHEY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/KamelHY20,
  author       = {Mahmoud I. Kamel and
                  Walaa Hamouda and
                  Amr M. Youssef},
  title        = {Uplink Coverage and Capacity Analysis of mMTC in Ultra-Dense Networks},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {69},
  number       = {1},
  pages        = {746--759},
  year         = {2020},
  url          = {https://doi.org/10.1109/TVT.2019.2954233},
  doi          = {10.1109/TVT.2019.2954233},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/KamelHY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AliEDMY20,
  author       = {Suzan Ali and
                  Mounir Elgharabawy and
                  Quentin Duchaussoy and
                  Mohammad Mannan and
                  Amr M. Youssef},
  title        = {Betrayed by the Guardian: Security and Privacy Risks of Parental Control
                  Solutions},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {69--83},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427287},
  doi          = {10.1145/3427228.3427287},
  timestamp    = {Tue, 15 Dec 2020 12:22:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/AliEDMY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/TolbaEY20,
  author       = {Mohamed Tolba and
                  Muhammad ElSheikh and
                  Amr M. Youssef},
  editor       = {Abderrahmane Nitaj and
                  Amr M. Youssef},
  title        = {Impossible Differential Cryptanalysis of Reduced-Round Tweakable {TWINE}},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2020 - 12th International Conference
                  on Cryptology in Africa, Cairo, Egypt, July 20-22, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12174},
  pages        = {91--113},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-51938-4\_5},
  doi          = {10.1007/978-3-030-51938-4\_5},
  timestamp    = {Tue, 07 Jul 2020 13:21:59 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/TolbaEY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/ElSheikhY20,
  author       = {Muhammad ElSheikh and
                  Amr M. Youssef},
  editor       = {Stephan Krenn and
                  Haya Schulmann and
                  Serge Vaudenay},
  title        = {Integral Cryptanalysis of Reduced-Round Tweakable {TWINE}},
  booktitle    = {Cryptology and Network Security - 19th International Conference, {CANS}
                  2020, Vienna, Austria, December 14-16, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12579},
  pages        = {485--504},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65411-5\_24},
  doi          = {10.1007/978-3-030-65411-5\_24},
  timestamp    = {Tue, 17 Oct 2023 10:41:56 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/ElSheikhY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccta/AbdelwahabLY20,
  author       = {Ahmed Abdelwahab and
                  Walter Lucia and
                  Amr M. Youssef},
  title        = {Set-Theoretic Control for Active Detection of Replay Attacks with
                  Applications to Smart Grid},
  booktitle    = {2020 {IEEE} Conference on Control Technology and Applications, {CCTA}
                  2020, Montreal, QC, Canada, August 24-26, 2020},
  pages        = {1004--1009},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CCTA41146.2020.9206373},
  doi          = {10.1109/CCTA41146.2020.9206373},
  timestamp    = {Wed, 02 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccta/AbdelwahabLY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudnet/SeifelnasrNYA20,
  author       = {Mohamed Seifelnasr and
                  Mouna Nakkar and
                  Amr M. Youssef and
                  Riham AlTawy},
  editor       = {Oscar M. Caicedo},
  title        = {A Lightweight Authentication and Inter-Cloud Payment Protocol for
                  Edge Computing},
  booktitle    = {9th {IEEE} International Conference on Cloud Networking, CloudNet
                  2020, Piscataway, NJ, USA, November 9-11, 2020},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CloudNet51028.2020.9335814},
  doi          = {10.1109/CLOUDNET51028.2020.9335814},
  timestamp    = {Mon, 15 Feb 2021 11:28:43 +0100},
  biburl       = {https://dblp.org/rec/conf/cloudnet/SeifelnasrNYA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/GalalY20,
  author       = {Hisham S. Galal and
                  Amr M. Youssef},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Guillermo Navarro{-}Arribas and
                  Jordi Herrera{-}Joancomart{\'{\i}}},
  title        = {Privacy Preserving Netting Protocol for Inter-bank Payments},
  booktitle    = {Data Privacy Management, Cryptocurrencies and Blockchain Technology
                  - {ESORICS} 2020 International Workshops, {DPM} 2020 and {CBT} 2020,
                  Guildford, UK, September 17-18, 2020, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12484},
  pages        = {319--334},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-66172-4\_21},
  doi          = {10.1007/978-3-030-66172-4\_21},
  timestamp    = {Tue, 12 Jan 2021 14:44:40 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/GalalY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/SeifelnasrGY20,
  author       = {Mohamed Seifelnasr and
                  Hisham S. Galal and
                  Amr M. Youssef},
  editor       = {Matthew Bernhard and
                  Andrea Bracciali and
                  L. Jean Camp and
                  Shin'ichiro Matsuo and
                  Alana Maurushat and
                  Peter B. R{\o}nne and
                  Massimiliano Sala},
  title        = {Scalable Open-Vote Network on Ethereum},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2020 International
                  Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia,
                  February 14, 2020, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12063},
  pages        = {436--450},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-54455-3\_31},
  doi          = {10.1007/978-3-030-54455-3\_31},
  timestamp    = {Sun, 09 Aug 2020 16:11:05 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/SeifelnasrGY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/ElbayoumiHY20,
  author       = {Mohammed Elbayoumi and
                  Walaa Hamouda and
                  Amr M. Youssef},
  title        = {A Hybrid {NOMA/OMA} Scheme for {MTC} in Ultra-Dense Networks},
  booktitle    = {{IEEE} Global Communications Conference, {GLOBECOM} 2020, Virtual
                  Event, Taiwan, December 7-11, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/GLOBECOM42002.2020.9322207},
  doi          = {10.1109/GLOBECOM42002.2020.9322207},
  timestamp    = {Mon, 01 Feb 2021 08:43:43 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/ElbayoumiHY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/ElbayoumiHY20a,
  author       = {Mohammed Elbayoumi and
                  Walaa Hamouda and
                  Amr M. Youssef},
  title        = {Secrecy Performance in Ultra-Dense Networks with Multiple Associations},
  booktitle    = {{IEEE} Globecom Workshops, {GLOBECOM} Workshops 2020, Virtual Event,
                  Taiwan, December 7-11, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/GCWkshps50303.2020.9367510},
  doi          = {10.1109/GCWKSHPS50303.2020.9367510},
  timestamp    = {Thu, 11 Mar 2021 09:42:16 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/ElbayoumiHY20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/StobertSMMY20,
  author       = {Elizabeth Stobert and
                  Tina Safaie and
                  Heather Molyneaux and
                  Mohammad Mannan and
                  Amr M. Youssef},
  editor       = {Noseong Park and
                  Kun Sun and
                  Sara Foresti and
                  Kevin R. B. Butler and
                  Nitesh Saxena},
  title        = {ByPass: Reconsidering the Usability of Password Managers},
  booktitle    = {Security and Privacy in Communication Networks - 16th {EAI} International
                  Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020,
                  Proceedings, Part {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {335},
  pages        = {446--466},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-63086-7\_24},
  doi          = {10.1007/978-3-030-63086-7\_24},
  timestamp    = {Tue, 15 Dec 2020 15:14:02 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/StobertSMMY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/africacrypt/2020,
  editor       = {Abderrahmane Nitaj and
                  Amr M. Youssef},
  title        = {Progress in Cryptology - {AFRICACRYPT} 2020 - 12th International Conference
                  on Cryptology in Africa, Cairo, Egypt, July 20-22, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12174},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-51938-4},
  doi          = {10.1007/978-3-030-51938-4},
  isbn         = {978-3-030-51937-7},
  timestamp    = {Tue, 07 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2009-13456,
  author       = {Mohammed Elbayoumi and
                  Walaa Hamouda and
                  Amr M. Youssef},
  title        = {Multiple-Association Supporting {HTC/MTC} in Limited-Backhaul Capacity
                  Ultra-Dense Networks},
  journal      = {CoRR},
  volume       = {abs/2009.13456},
  year         = {2020},
  url          = {https://arxiv.org/abs/2009.13456},
  eprinttype    = {arXiv},
  eprint       = {2009.13456},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2009-13456.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2012-06502,
  author       = {Suzan Ali and
                  Mounir Elgharabawy and
                  Quentin Duchaussoy and
                  Mohammad Mannan and
                  Amr M. Youssef},
  title        = {Betrayed by the Guardian: Security and Privacy Risks of Parental Control
                  Solutions},
  journal      = {CoRR},
  volume       = {abs/2012.06502},
  year         = {2020},
  url          = {https://arxiv.org/abs/2012.06502},
  eprinttype    = {arXiv},
  eprint       = {2012.06502},
  timestamp    = {Wed, 03 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2012-06502.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SeifelnasrGY20,
  author       = {Mohamed Seifelnasr and
                  Hisham S. Galal and
                  Amr M. Youssef},
  title        = {Scalable Open-Vote Network on Ethereum},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {33},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/033},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SeifelnasrGY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TolbaEY20,
  author       = {Mohamed Tolba and
                  Muhammad ElSheikh and
                  Amr M. Youssef},
  title        = {Impossible Differential Cryptanalysis of Reduced-Round Tweakable {TWINE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {52},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/052},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TolbaEY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ElSheikhY20,
  author       = {Muhammad ElSheikh and
                  Amr M. Youssef},
  title        = {A cautionary note on the use of Gurobi for cryptanalysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1112},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1112},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ElSheikhY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ElSheikhY20a,
  author       = {Muhammad ElSheikh and
                  Amr M. Youssef},
  title        = {Integral Cryptanalysis of Reduced-Round Tweakable {TWINE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1227},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1227},
  timestamp    = {Fri, 30 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ElSheikhY20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ShashaMMY19,
  author       = {Sharon Shasha and
                  Moustafa Mahmoud and
                  Mohammad Mannan and
                  Amr M. Youssef},
  title        = {Playing With Danger: {A} Taxonomy and Evaluation of Threats to Smart
                  Toys},
  journal      = {{IEEE} Internet Things J.},
  volume       = {6},
  number       = {2},
  pages        = {2986--3002},
  year         = {2019},
  url          = {https://doi.org/10.1109/JIOT.2018.2877749},
  doi          = {10.1109/JIOT.2018.2877749},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/ShashaMMY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/KhalafYE19,
  author       = {Mohsen Khalaf and
                  Amr M. Youssef and
                  Ehab F. El{-}Saadany},
  title        = {Joint Detection and Mitigation of False Data Injection Attacks in
                  {AGC} Systems},
  journal      = {{IEEE} Trans. Smart Grid},
  volume       = {10},
  number       = {5},
  pages        = {4985--4995},
  year         = {2019},
  url          = {https://doi.org/10.1109/TSG.2018.2872120},
  doi          = {10.1109/TSG.2018.2872120},
  timestamp    = {Mon, 14 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsg/KhalafYE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/OsmanMHY19,
  author       = {Tousif Osman and
                  Mohammad Mannan and
                  Urs Hengartner and
                  Amr M. Youssef},
  editor       = {David Balenson},
  title        = {AppVeto: mobile application self-defense through resource access veto},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {366--377},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359839},
  doi          = {10.1145/3359789.3359839},
  timestamp    = {Tue, 26 Nov 2019 09:46:34 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/OsmanMHY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/ElSheikh0Y19,
  author       = {Muhammad ElSheikh and
                  Ahmed Abdelkhalek and
                  Amr M. Youssef},
  editor       = {Johannes Buchmann and
                  Abderrahmane Nitaj and
                  Tajje{-}eddine Rachidi},
  title        = {On MILP-Based Automatic Search for Differential Trails Through Modular
                  Additions with Application to Bel-T},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2019 - 11th International Conference
                  on Cryptology in Africa, Rabat, Morocco, July 9-11, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11627},
  pages        = {273--296},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-23696-0\_14},
  doi          = {10.1007/978-3-030-23696-0\_14},
  timestamp    = {Tue, 02 Jul 2019 13:10:56 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/ElSheikh0Y19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/CabanaYDLKA19,
  author       = {Olivier Cabana and
                  Amr M. Youssef and
                  Mourad Debbabi and
                  Bernard Lebel and
                  Marthe Kassouf and
                  Basile L. Agba},
  editor       = {Roberto Perdisci and
                  Cl{\'{e}}mentine Maurice and
                  Giorgio Giacinto and
                  Magnus Almgren},
  title        = {Detecting, Fingerprinting and Tracking Reconnaissance Campaigns Targeting
                  Industrial Control Systems},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 16th International Conference, {DIMVA} 2019, Gothenburg, Sweden,
                  June 19-20, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11543},
  pages        = {89--108},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-22038-9\_5},
  doi          = {10.1007/978-3-030-22038-9\_5},
  timestamp    = {Tue, 29 Dec 2020 18:36:17 +0100},
  biburl       = {https://dblp.org/rec/conf/dimva/CabanaYDLKA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AliOMY19,
  author       = {Suzan Ali and
                  Tousif Osman and
                  Mohammad Mannan and
                  Amr M. Youssef},
  editor       = {Cristina P{\'{e}}rez{-}Sol{\`{a}} and
                  Guillermo Navarro{-}Arribas and
                  Alex Biryukov and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {On Privacy Risks of Public WiFi Captive Portals},
  booktitle    = {Data Privacy Management, Cryptocurrencies and Blockchain Technology
                  - {ESORICS} 2019 International Workshops, {DPM} 2019 and {CBT} 2019,
                  Luxembourg, September 26-27, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11737},
  pages        = {80--98},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31500-9\_6},
  doi          = {10.1007/978-3-030-31500-9\_6},
  timestamp    = {Mon, 05 Feb 2024 20:29:40 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/AliOMY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/GalalEY19,
  author       = {Hisham S. Galal and
                  Muhammad ElSheikh and
                  Amr M. Youssef},
  editor       = {Cristina P{\'{e}}rez{-}Sol{\`{a}} and
                  Guillermo Navarro{-}Arribas and
                  Alex Biryukov and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {An Efficient Micropayment Channel on Ethereum},
  booktitle    = {Data Privacy Management, Cryptocurrencies and Blockchain Technology
                  - {ESORICS} 2019 International Workshops, {DPM} 2019 and {CBT} 2019,
                  Luxembourg, September 26-27, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11737},
  pages        = {211--218},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31500-9\_13},
  doi          = {10.1007/978-3-030-31500-9\_13},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/GalalEY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/ElSheikhCY19,
  author       = {Muhammad ElSheikh and
                  Jeremy Clark and
                  Amr M. Youssef},
  editor       = {Andrea Bracciali and
                  Jeremy Clark and
                  Federico Pintore and
                  Peter B. R{\o}nne and
                  Massimiliano Sala},
  title        = {Short Paper: Deploying PayWord on Ethereum},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2019 International
                  Workshops, {VOTING} and WTSC, St. Kitts, St. Kitts and Nevis, February
                  18-22, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11599},
  pages        = {82--90},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-43725-1\_7},
  doi          = {10.1007/978-3-030-43725-1\_7},
  timestamp    = {Mon, 03 Jan 2022 22:29:34 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/ElSheikhCY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/GalalY19,
  author       = {Hisham S. Galal and
                  Amr M. Youssef},
  editor       = {Andrea Bracciali and
                  Jeremy Clark and
                  Federico Pintore and
                  Peter B. R{\o}nne and
                  Massimiliano Sala},
  title        = {Trustee: Full Privacy Preserving Vickrey Auction on Top of Ethereum},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2019 International
                  Workshops, {VOTING} and WTSC, St. Kitts, St. Kitts and Nevis, February
                  18-22, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11599},
  pages        = {190--207},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-43725-1\_14},
  doi          = {10.1007/978-3-030-43725-1\_14},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/GalalY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccspa/ElbayoumiKHY19,
  author       = {Mohammed Elbayoumi and
                  Mahmoud I. Kamel and
                  Walaa Hamouda and
                  Amr M. Youssef},
  title        = {Capacity Analysis of Downlink NOMA-Based Coexistent {HTC/MTC} in {UDN}},
  booktitle    = {International Conference on Communications, Signal Processing, and
                  their Applications, {ICCSPA} 2019, Sharjah, United Arab Emirates,
                  March 19-21, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICCSPA.2019.8713691},
  doi          = {10.1109/ICCSPA.2019.8713691},
  timestamp    = {Tue, 09 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccspa/ElbayoumiKHY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartgridcomm/AlbarakatiRKKHD19,
  author       = {Abdullah Albarakati and
                  Chantale Robillard and
                  Mark Karanfil and
                  Marthe Kassouf and
                  Rachid Hadjidj and
                  Mourad Debbabi and
                  Amr M. Youssef},
  title        = {Security Monitoring of {IEC} 61850 Substations Using {IEC} 62351-7
                  Network and System Management\({}^{\mbox{1}}\)},
  booktitle    = {2019 {IEEE} International Conference on Communications, Control, and
                  Computing Technologies for Smart Grids, SmartGridComm 2019, Beijing,
                  China, October 21-23, 2019},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SmartGridComm.2019.8909710},
  doi          = {10.1109/SMARTGRIDCOMM.2019.8909710},
  timestamp    = {Sun, 08 Dec 2019 17:30:04 +0100},
  biburl       = {https://dblp.org/rec/conf/smartgridcomm/AlbarakatiRKKHD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/space/ElSheikhY19,
  author       = {Muhammad ElSheikh and
                  Amr M. Youssef},
  editor       = {Shivam Bhasin and
                  Avi Mendelson and
                  Mridul Nandi},
  title        = {Related-Key Differential Cryptanalysis of Full Round {CRAFT}},
  booktitle    = {Security, Privacy, and Applied Cryptography Engineering - 9th International
                  Conference, {SPACE} 2019, Gandhinagar, India, December 3-7, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11947},
  pages        = {50--66},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-35869-3\_6},
  doi          = {10.1007/978-3-030-35869-3\_6},
  timestamp    = {Fri, 22 Nov 2019 13:35:40 +0100},
  biburl       = {https://dblp.org/rec/conf/space/ElSheikhY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1905-06280,
  author       = {Hisham S. Galal and
                  Amr M. Youssef},
  title        = {Trustee: Full Privacy Preserving Vickrey Auction on top of Ethereum},
  journal      = {CoRR},
  volume       = {abs/1905.06280},
  year         = {2019},
  url          = {http://arxiv.org/abs/1905.06280},
  eprinttype    = {arXiv},
  eprint       = {1905.06280},
  timestamp    = {Tue, 28 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1905-06280.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1907-02142,
  author       = {Suzan Ali and
                  Tousif Osman and
                  Mohammad Mannan and
                  Amr M. Youssef},
  title        = {On Privacy Risks of Public WiFi Captive Portals},
  journal      = {CoRR},
  volume       = {abs/1907.02142},
  year         = {2019},
  url          = {http://arxiv.org/abs/1907.02142},
  eprinttype    = {arXiv},
  eprint       = {1907.02142},
  timestamp    = {Mon, 14 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1907-02142.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalalY19,
  author       = {Hisham S. Galal and
                  Amr M. Youssef},
  title        = {Trustee: Full Privacy Preserving Vickrey Auction on top of Ethereum},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {102},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/102},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalalY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ElSheikhAY19,
  author       = {Muhammad ElSheikh and
                  Ahmed Abdelkhalek and
                  Amr M. Youssef},
  title        = {On MILP-Based Automatic Search for Differential Trails Through Modular
                  Additions with Application to Bel-T},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {476},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/476},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ElSheikhAY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ElSheikhY19,
  author       = {Muhammad ElSheikh and
                  Amr M. Youssef},
  title        = {Related-key Differential Cryptanalysis of Full Round {CRAFT}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {932},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/932},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ElSheikhY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalalEY19,
  author       = {Hisham S. Galal and
                  Muhammad ElSheikh and
                  Amr M. Youssef},
  title        = {An Efficient Micropayment Channel on Ethereum},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1322},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1322},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalalEY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ElSheikhTY18,
  author       = {Muhammad ElSheikh and
                  Mohamed Tolba and
                  Amr M. Youssef},
  title        = {Impossible Differential Attack on Reduced Round {SPARX-128/256}},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {101-A},
  number       = {4},
  pages        = {731--733},
  year         = {2018},
  url          = {https://doi.org/10.1587/transfun.E101.A.731},
  doi          = {10.1587/TRANSFUN.E101.A.731},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ElSheikhTY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/AbdelkhalekTY18,
  author       = {Ahmed Abdelkhalek and
                  Mohamed Tolba and
                  Amr M. Youssef},
  title        = {Related-Key Differential Attack on Round-Reduced Bel-T-256},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {101-A},
  number       = {5},
  pages        = {859--862},
  year         = {2018},
  url          = {https://doi.org/10.1587/transfun.E101.A.859},
  doi          = {10.1587/TRANSFUN.E101.A.859},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/AbdelkhalekTY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AmeliHYEY18,
  author       = {Amir Ameli and
                  Ali Hooshyar and
                  Ameen Hassan Yazdavar and
                  Ehab F. El{-}Saadany and
                  Amr M. Youssef},
  title        = {Attack Detection for Load Frequency Control Systems Using Stochastic
                  Unknown Input Estimators},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {10},
  pages        = {2575--2590},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2824253},
  doi          = {10.1109/TIFS.2018.2824253},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/AmeliHYEY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WakedMY18,
  author       = {Louis Waked and
                  Mohammad Mannan and
                  Amr M. Youssef},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {To Intercept or Not to Intercept: Analyzing {TLS} Interception in
                  Network Appliances},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {399--412},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196528},
  doi          = {10.1145/3196494.3196528},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WakedMY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/GalalY18,
  author       = {Hisham S. Galal and
                  Amr M. Youssef},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Jordi Herrera{-}Joancomart{\'{\i}} and
                  Giovanni Livraga and
                  Ruben Rios},
  title        = {Succinctly Verifiable Sealed-Bid Auction Smart Contract},
  booktitle    = {Data Privacy Management, Cryptocurrencies and Blockchain Technology
                  - {ESORICS} 2018 International Workshops, {DPM} 2018 and {CBT} 2018,
                  Barcelona, Spain, September 6-7, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11025},
  pages        = {3--19},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00305-0\_1},
  doi          = {10.1007/978-3-030-00305-0\_1},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/GalalY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/GalalY18,
  author       = {Hisham S. Galal and
                  Amr M. Youssef},
  editor       = {Aviv Zohar and
                  Ittay Eyal and
                  Vanessa Teague and
                  Jeremy Clark and
                  Andrea Bracciali and
                  Federico Pintore and
                  Massimiliano Sala},
  title        = {Verifiable Sealed-Bid Auction on the Ethereum Blockchain},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2018 International
                  Workshops, BITCOIN, VOTING, and WTSC, Nieuwpoort, Cura{\c{c}}ao, March
                  2, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10958},
  pages        = {265--278},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-662-58820-8\_18},
  doi          = {10.1007/978-3-662-58820-8\_18},
  timestamp    = {Wed, 16 Mar 2022 23:55:54 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/GalalY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/DumanY18,
  author       = {Onur Duman and
                  Amr M. Youssef},
  editor       = {Nur Zincir{-}Heywood and
                  Guillaume Bonfante and
                  Mourad Debbabi and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Fault Analysis of the New Ukrainian Hash Function Standard: Kupyna},
  booktitle    = {Foundations and Practice of Security - 11th International Symposium,
                  {FPS} 2018, Montreal, QC, Canada, November 13-15, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11358},
  pages        = {225--240},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-18419-3\_15},
  doi          = {10.1007/978-3-030-18419-3\_15},
  timestamp    = {Fri, 08 Dec 2023 07:53:07 +0100},
  biburl       = {https://dblp.org/rec/conf/fps/DumanY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/KamelHY18,
  author       = {Mahmoud I. Kamel and
                  Walaa Hamouda and
                  Amr M. Youssef},
  title        = {Uplink Coverage of Machine-Type Communications in Ultra-Dense Networks},
  booktitle    = {{IEEE} Global Communications Conference, {GLOBECOM} 2018, Abu Dhabi,
                  United Arab Emirates, December 9-13, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/GLOCOM.2018.8648146},
  doi          = {10.1109/GLOCOM.2018.8648146},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/KamelHY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isgt/AyadFYE18,
  author       = {Abdelrahman Ayad and
                  Hany E. Z. Farag and
                  Amr M. Youssef and
                  Ehab F. El{-}Saadany},
  title        = {Detection of false data injection attacks in smart grids using Recurrent
                  Neural Networks},
  booktitle    = {2018 {IEEE} Power {\&} Energy Society Innovative Smart Grid Technologies
                  Conference, {ISGT} 2018, Washington, DC, USA, February 19-22, 2018},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ISGT.2018.8403355},
  doi          = {10.1109/ISGT.2018.8403355},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isgt/AyadFYE18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/ElSheikhTY18,
  author       = {Muhammad ElSheikh and
                  Mohamed Tolba and
                  Amr M. Youssef},
  editor       = {Carlos Cid and
                  Michael J. Jacobson Jr.},
  title        = {Integral Attacks on Round-Reduced Bel-T-256},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2018 - 25th International Conference,
                  Calgary, AB, Canada, August 15-17, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11349},
  pages        = {73--91},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-10970-7\_4},
  doi          = {10.1007/978-3-030-10970-7\_4},
  timestamp    = {Wed, 25 Sep 2019 18:08:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/ElSheikhTY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartgridcomm/AlbarakatiMDYAK18,
  author       = {Abdullah Albarakati and
                  Bassam Moussa and
                  Mourad Debbabi and
                  Amr M. Youssef and
                  Basile L. Agba and
                  Marthe Kassouf},
  title        = {OpenStack-Based Evaluation Framework for Smart Grid Cyber Security},
  booktitle    = {2018 {IEEE} International Conference on Communications, Control, and
                  Computing Technologies for Smart Grids, SmartGridComm 2018, Aalborg,
                  Denmark, October 29-31, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/SmartGridComm.2018.8587420},
  doi          = {10.1109/SMARTGRIDCOMM.2018.8587420},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/smartgridcomm/AlbarakatiMDYAK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1809-05556,
  author       = {Sharon Shasha and
                  Moustafa Mahmoud and
                  Mohammad Mannan and
                  Amr M. Youssef},
  title        = {Smart But Unsafe: Experimental Evaluation of Security and Privacy
                  Practices in Smart Toys},
  journal      = {CoRR},
  volume       = {abs/1809.05556},
  year         = {2018},
  url          = {http://arxiv.org/abs/1809.05556},
  eprinttype    = {arXiv},
  eprint       = {1809.05556},
  timestamp    = {Mon, 14 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1809-05556.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1809-08729,
  author       = {Louis Waked and
                  Mohammad Mannan and
                  Amr M. Youssef},
  title        = {The Sorry State of {TLS} Security in Enterprise Interception Appliances},
  journal      = {CoRR},
  volume       = {abs/1809.08729},
  year         = {2018},
  url          = {http://arxiv.org/abs/1809.08729},
  eprinttype    = {arXiv},
  eprint       = {1809.08729},
  timestamp    = {Fri, 05 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1809-08729.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalalY18,
  author       = {Hisham S. Galal and
                  Amr M. Youssef},
  title        = {Verifiable Sealed-Bid Auction on the Ethereum Blockchain},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {704},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/704},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalalY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/Tolba0Y17,
  author       = {Mohamed Tolba and
                  Ahmed Abdelkhalek and
                  Amr M. Youssef},
  title        = {Improved Multiple Impossible Differential Cryptanalysis of Midori128},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {100-A},
  number       = {8},
  pages        = {1733--1737},
  year         = {2017},
  url          = {https://doi.org/10.1587/transfun.E100.A.1733},
  doi          = {10.1587/TRANSFUN.E100.A.1733},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/Tolba0Y17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/DumanY17,
  author       = {Onur Duman and
                  Amr M. Youssef},
  title        = {Fault analysis on Kalyna},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {26},
  number       = {5},
  pages        = {249--265},
  year         = {2017},
  url          = {https://doi.org/10.1080/19393555.2017.1371361},
  doi          = {10.1080/19393555.2017.1371361},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/DumanY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcom/KamelHY17,
  author       = {Mahmoud I. Kamel and
                  Walaa Hamouda and
                  Amr M. Youssef},
  title        = {Performance Analysis of Multiple Association in Ultra-Dense Networks},
  journal      = {{IEEE} Trans. Commun.},
  volume       = {65},
  number       = {9},
  pages        = {3818--3831},
  year         = {2017},
  url          = {https://doi.org/10.1109/TCOMM.2017.2706261},
  doi          = {10.1109/TCOMM.2017.2706261},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcom/KamelHY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcps/AlTawyY17,
  author       = {Riham AlTawy and
                  Amr M. Youssef},
  title        = {Security, Privacy, and Safety Aspects of Civilian Drones: {A} Survey},
  journal      = {{ACM} Trans. Cyber Phys. Syst.},
  volume       = {1},
  number       = {2},
  pages        = {7:1--7:25},
  year         = {2017},
  url          = {https://doi.org/10.1145/3001836},
  doi          = {10.1145/3001836},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcps/AlTawyY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/0001STTY17,
  author       = {Ahmed Abdelkhalek and
                  Yu Sasaki and
                  Yosuke Todo and
                  Mohamed Tolba and
                  Amr M. Youssef},
  title        = {{MILP} Modeling for (Large) S-boxes to Optimize Probability of Differential
                  Characteristics},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {4},
  pages        = {99--129},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i4.99-129},
  doi          = {10.13154/TOSC.V2017.I4.99-129},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/0001STTY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wcl/KamelHY17,
  author       = {Mahmoud I. Kamel and
                  Walaa Hamouda and
                  Amr M. Youssef},
  title        = {Physical Layer Security in Ultra-Dense Networks},
  journal      = {{IEEE} Wirel. Commun. Lett.},
  volume       = {6},
  number       = {5},
  pages        = {690--693},
  year         = {2017},
  url          = {https://doi.org/10.1109/LWC.2017.2731840},
  doi          = {10.1109/LWC.2017.2731840},
  timestamp    = {Mon, 24 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wcl/KamelHY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/Tolba0Y17,
  author       = {Mohamed Tolba and
                  Ahmed Abdelkhalek and
                  Amr M. Youssef},
  editor       = {Marc Joye and
                  Abderrahmane Nitaj},
  title        = {Impossible Differential Cryptanalysis of Reduced-Round {SKINNY}},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2017 - 9th International Conference
                  on Cryptology in Africa, Dakar, Senegal, May 24-26, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10239},
  pages        = {117--134},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-57339-7\_7},
  doi          = {10.1007/978-3-319-57339-7\_7},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/Tolba0Y17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/0001TY17,
  author       = {Ahmed Abdelkhalek and
                  Mohamed Tolba and
                  Amr M. Youssef},
  editor       = {Marc Joye and
                  Abderrahmane Nitaj},
  title        = {Impossible Differential Attack on Reduced Round {SPARX-64/128}},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2017 - 9th International Conference
                  on Cryptology in Africa, Dakar, Senegal, May 24-26, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10239},
  pages        = {135--146},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-57339-7\_8},
  doi          = {10.1007/978-3-319-57339-7\_8},
  timestamp    = {Wed, 10 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/0001TY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HuangYD17,
  author       = {He Huang and
                  Amr M. Youssef and
                  Mourad Debbabi},
  editor       = {Ramesh Karri and
                  Ozgur Sinanoglu and
                  Ahmad{-}Reza Sadeghi and
                  Xun Yi},
  title        = {BinSequence: Fast, Accurate and Scalable Binary Code Reuse Detection},
  booktitle    = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
                  2017},
  pages        = {155--166},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3052973.3052974},
  doi          = {10.1145/3052973.3052974},
  timestamp    = {Sun, 12 Nov 2023 02:11:41 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HuangYD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/KamelHY17,
  author       = {Mahmoud I. Kamel and
                  Walaa Hamouda and
                  Amr M. Youssef},
  title        = {Coverage and Capacity Analysis with Stretched Exponential Path Loss
                  in Ultra-Dense Networks},
  booktitle    = {2017 {IEEE} Global Communications Conference, {GLOBECOM} 2017, Singapore,
                  December 4-8, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/GLOCOM.2017.8254566},
  doi          = {10.1109/GLOCOM.2017.8254566},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/KamelHY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/KamelHY17,
  author       = {Mahmoud I. Kamel and
                  Walaa Hamouda and
                  Amr M. Youssef},
  title        = {Average downlink rate in Ultra-Dense Networks},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2017, Paris,
                  France, May 21-25, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICC.2017.7996629},
  doi          = {10.1109/ICC.2017.7996629},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/KamelHY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/TolbaY17,
  author       = {Mohamed Tolba and
                  Amr M. Youssef},
  editor       = {Howon Kim and
                  Dong{-}Chan Kim},
  title        = {Improved Meet-in-the-Middle Attacks on Reduced Round Kuznyechik},
  booktitle    = {Information Security and Cryptology - {ICISC} 2017 - 20th International
                  Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10779},
  pages        = {26--38},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-78556-1\_2},
  doi          = {10.1007/978-3-319-78556-1\_2},
  timestamp    = {Thu, 02 Mar 2023 10:53:05 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/TolbaY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icm2/MahmoudNY17,
  author       = {Moustafa Mahmoud and
                  Mouna Nakkar and
                  Amr M. Youssef},
  title        = {A power analysis resistant {FPGA} implementation of NTRUEncrypt},
  booktitle    = {29th International Conference on Microelectronics, {ICM} 2017, Beirut,
                  Lebanon, December 10-13, 2017},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICM.2017.8268818},
  doi          = {10.1109/ICM.2017.8268818},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icm2/MahmoudNY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icm2/NakkarMY17,
  author       = {Mouna Nakkar and
                  Moustafa Mahmoud and
                  Amr M. Youssef},
  title        = {Fault analysis-resistant implementation of Rainbow Signature scheme},
  booktitle    = {29th International Conference on Microelectronics, {ICM} 2017, Beirut,
                  Lebanon, December 10-13, 2017},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICM.2017.8268841},
  doi          = {10.1109/ICM.2017.8268841},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icm2/NakkarMY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pimrc/KamelHY17,
  author       = {Mahmoud I. Kamel and
                  Walaa Hamouda and
                  Amr M. Youssef},
  title        = {Downlink coverage and average cell load of {M2M} and {H2H} in ultra-dense
                  networks},
  booktitle    = {28th {IEEE} Annual International Symposium on Personal, Indoor, and
                  Mobile Radio Communications, {PIMRC} 2017, Montreal, QC, Canada, October
                  8-13, 2017},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/PIMRC.2017.8292419},
  doi          = {10.1109/PIMRC.2017.8292419},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/pimrc/KamelHY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/AlTawyEYG17,
  author       = {Riham AlTawy and
                  Muhammad ElSheikh and
                  Amr M. Youssef and
                  Guang Gong},
  title        = {Lelantos: {A} Blockchain-Based Anonymous Physical Delivery System},
  booktitle    = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017,
                  Calgary, AB, Canada, August 28-30, 2017},
  pages        = {15--24},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PST.2017.00013},
  doi          = {10.1109/PST.2017.00013},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/AlTawyEYG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/Tolba0Y17,
  author       = {Mohamed Tolba and
                  Ahmed Abdelkhalek and
                  Amr M. Youssef},
  editor       = {Carlisle Adams and
                  Jan Camenisch},
  title        = {Multidimensional Zero-Correlation Linear Cryptanalysis of Reduced
                  Round {SPARX-128}},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2017 - 24th International Conference,
                  Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10719},
  pages        = {423--441},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72565-9\_22},
  doi          = {10.1007/978-3-319-72565-9\_22},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/Tolba0Y17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stast/MahmoudHBMY17,
  author       = {Moustafa Mahmoud and
                  Md Zakir Hossen and
                  Hesham Barakat and
                  Mohammad Mannan and
                  Amr M. Youssef},
  editor       = {Giampaolo Bella and
                  Gabriele Lenzini},
  title        = {Towards a comprehensive analytical framework for smart toy privacy
                  practices},
  booktitle    = {Proceedings of the 7th Workshop on Socio-Technical Aspects in Security
                  and Trust, {STAST} 2017, Orlando, FL, USA, December 5, 2017},
  pages        = {64--75},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3167996.3168002},
  doi          = {10.1145/3167996.3168002},
  timestamp    = {Wed, 21 Apr 2021 15:28:24 +0200},
  biburl       = {https://dblp.org/rec/conf/stast/MahmoudHBMY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlTawyEYG17,
  author       = {Riham AlTawy and
                  Muhammad ElSheikh and
                  Amr M. Youssef and
                  Guang Gong},
  title        = {Lelantos: {A} Blockchain-based Anonymous Physical Delivery System},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {465},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/465},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlTawyEYG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AlTawyY16,
  author       = {Riham AlTawy and
                  Amr M. Youssef},
  title        = {Security Tradeoffs in Cyber Physical Systems: {A} Case Study Survey
                  on Implantable Medical Devices},
  journal      = {{IEEE} Access},
  volume       = {4},
  pages        = {959--979},
  year         = {2016},
  url          = {https://doi.org/10.1109/ACCESS.2016.2521727},
  doi          = {10.1109/ACCESS.2016.2521727},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/AlTawyY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/KamelHY16,
  author       = {Mahmoud I. Kamel and
                  Walaa Hamouda and
                  Amr M. Youssef},
  title        = {Ultra-Dense Networks: {A} Survey},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {18},
  number       = {4},
  pages        = {2522--2545},
  year         = {2016},
  url          = {https://doi.org/10.1109/COMST.2016.2571730},
  doi          = {10.1109/COMST.2016.2571730},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsur/KamelHY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/AlTawy0Y16,
  author       = {Riham AlTawy and
                  Ahmed Abdelkhalek and
                  Amr M. Youssef},
  title        = {A Meet-in-the-Middle Attack on Reduced-Round Kalyna-\emph{b}/2\emph{b}},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {99-D},
  number       = {4},
  pages        = {1246--1250},
  year         = {2016},
  url          = {https://doi.org/10.1587/transinf.2015EDL8174},
  doi          = {10.1587/TRANSINF.2015EDL8174},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/AlTawy0Y16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/TolbaAY16,
  author       = {Mohamed Tolba and
                  Ahmed Abdelkhalek and
                  Amr M. Youssef},
  title        = {A Meet in the Middle Attack on Reduced Round Kiasu-BC},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {99-A},
  number       = {10},
  pages        = {1888--1890},
  year         = {2016},
  url          = {https://doi.org/10.1587/transfun.E99.A.1888},
  doi          = {10.1587/TRANSFUN.E99.A.1888},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/TolbaAY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/TolbaY16,
  author       = {Mohamed Tolba and
                  Amr M. Youssef},
  title        = {Generalized MitM attacks on full {TWINE}},
  journal      = {Inf. Process. Lett.},
  volume       = {116},
  number       = {2},
  pages        = {128--135},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.ipl.2015.09.011},
  doi          = {10.1016/J.IPL.2015.09.011},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/TolbaY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/KamelHY16,
  author       = {Mahmoud I. Kamel and
                  Walaa Hamouda and
                  Amr M. Youssef},
  title        = {Multiple association in ultra-dense networks},
  booktitle    = {2016 {IEEE} International Conference on Communications, {ICC} 2016,
                  Kuala Lumpur, Malaysia, May 22-27, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICC.2016.7511520},
  doi          = {10.1109/ICC.2016.7511520},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/KamelHY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/Tolba0Y16,
  author       = {Mohamed Tolba and
                  Ahmed Abdelkhalek and
                  Amr M. Youssef},
  editor       = {Matt Bishop and
                  Anderson C. A. Nascimento},
  title        = {Truncated and Multiple Differential Cryptanalysis of Reduced Round
                  Midori128},
  booktitle    = {Information Security - 19th International Conference, {ISC} 2016,
                  Honolulu, HI, USA, September 3-6, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9866},
  pages        = {3--17},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45871-7\_1},
  doi          = {10.1007/978-3-319-45871-7\_1},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/Tolba0Y16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/0001TY16,
  author       = {Ahmed Abdelkhalek and
                  Mohamed Tolba and
                  Amr M. Youssef},
  editor       = {Matt Bishop and
                  Anderson C. A. Nascimento},
  title        = {Improved Linear Cryptanalysis of Round-Reduced {ARIA}},
  booktitle    = {Information Security - 19th International Conference, {ISC} 2016,
                  Honolulu, HI, USA, September 3-6, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9866},
  pages        = {18--34},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45871-7\_2},
  doi          = {10.1007/978-3-319-45871-7\_2},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/0001TY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mownet/ZhuYH16,
  author       = {Fu Zhu and
                  Amr M. Youssef and
                  Walaa Hamouda},
  title        = {Detection techniques for data-level spoofing in GPS-based phasor measurement
                  units},
  booktitle    = {International Conference on Selected Topics in Mobile {\&} Wireless
                  Networking, MoWNeT 2016, Cairo, Egypt, April 11-13, 2016},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.ieeecomputersociety.org/10.1109/MoWNet.2016.7496634},
  doi          = {10.1109/MOWNET.2016.7496634},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mownet/ZhuYH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TolbaAY16,
  author       = {Mohamed Tolba and
                  Ahmed Abdelkhalek and
                  Amr M. Youssef},
  title        = {Impossible Differential Cryptanalysis of Reduced-Round {SKINNY}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1115},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1115},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TolbaAY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/AlTawyY15,
  author       = {Riham AlTawy and
                  Amr M. Youssef},
  title        = {A Meet in the Middle Attack on Reduced Round Kuznyechik},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {98-A},
  number       = {10},
  pages        = {2194--2198},
  year         = {2015},
  url          = {https://doi.org/10.1587/transfun.E98.A.2194},
  doi          = {10.1587/TRANSFUN.E98.A.2194},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/AlTawyY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/AlTawyY15,
  author       = {Riham AlTawy and
                  Amr M. Youssef},
  title        = {Watch your constants: malicious Streebog},
  journal      = {{IET} Inf. Secur.},
  volume       = {9},
  number       = {6},
  pages        = {328--333},
  year         = {2015},
  url          = {https://doi.org/10.1049/iet-ifs.2014.0540},
  doi          = {10.1049/IET-IFS.2014.0540},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/AlTawyY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/c2si/AlTawyTY15,
  author       = {Riham AlTawy and
                  Mohamed Tolba and
                  Amr M. Youssef},
  editor       = {Said El Hajji and
                  Abderrahmane Nitaj and
                  Claude Carlet and
                  El Mamoun Souidi},
  title        = {A Higher Order Key Partitioning Attack with Application to LBlock},
  booktitle    = {Codes, Cryptology, and Information Security - First International
                  Conference, {C2SI} 2015, Rabat, Morocco, May 26-28, 2015, Proceedings
                  - In Honor of Thierry Berger},
  series       = {Lecture Notes in Computer Science},
  volume       = {9084},
  pages        = {215--227},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18681-8\_17},
  doi          = {10.1007/978-3-319-18681-8\_17},
  timestamp    = {Tue, 27 Aug 2019 17:49:45 +0200},
  biburl       = {https://dblp.org/rec/conf/c2si/AlTawyTY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/c2si/AbdelkhalekAY15,
  author       = {Ahmed Abdelkhalek and
                  Riham AlTawy and
                  Amr M. Youssef},
  editor       = {Said El Hajji and
                  Abderrahmane Nitaj and
                  Claude Carlet and
                  El Mamoun Souidi},
  title        = {Impossible Differential Properties of Reduced Round Streebog},
  booktitle    = {Codes, Cryptology, and Information Security - First International
                  Conference, {C2SI} 2015, Rabat, Morocco, May 26-28, 2015, Proceedings
                  - In Honor of Thierry Berger},
  series       = {Lecture Notes in Computer Science},
  volume       = {9084},
  pages        = {274--286},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18681-8\_22},
  doi          = {10.1007/978-3-319-18681-8\_22},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/c2si/AbdelkhalekAY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/AlTawyY15,
  author       = {Riham AlTawy and
                  Amr M. Youssef},
  editor       = {Javier L{\'{o}}pez and
                  Yongdong Wu},
  title        = {Differential Fault Analysis of Streebog},
  booktitle    = {Information Security Practice and Experience - 11th International
                  Conference, {ISPEC} 2015, Beijing, China, May 5-8, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9065},
  pages        = {35--49},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-17533-1\_3},
  doi          = {10.1007/978-3-319-17533-1\_3},
  timestamp    = {Thu, 29 Aug 2019 08:10:02 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/AlTawyY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latincrypt/AbdelkhalekATY15,
  author       = {Ahmed Abdelkhalek and
                  Riham AlTawy and
                  Mohamed Tolba and
                  Amr M. Youssef},
  editor       = {Kristin E. Lauter and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez},
  title        = {Meet-in-the-Middle Attacks on Reduced-Round Hierocrypt-3},
  booktitle    = {Progress in Cryptology - {LATINCRYPT} 2015 - 4th International Conference
                  on Cryptology and Information Security in Latin America, Guadalajara,
                  Mexico, August 23-26, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9230},
  pages        = {187--203},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22174-8\_11},
  doi          = {10.1007/978-3-319-22174-8\_11},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/latincrypt/AbdelkhalekATY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lightsec/TolbaAY15,
  author       = {Mohamed Tolba and
                  Ahmed Abdelkhalek and
                  Amr M. Youssef},
  editor       = {Tim G{\"{u}}neysu and
                  Gregor Leander and
                  Amir Moradi},
  title        = {Meet-in-the-Middle Attacks on Reduced Round Piccolo},
  booktitle    = {Lightweight Cryptography for Security and Privacy - 4th International
                  Workshop, LightSec 2015, Bochum, Germany, September 10-11, 2015, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9542},
  pages        = {3--20},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-29078-2\_1},
  doi          = {10.1007/978-3-319-29078-2\_1},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/lightsec/TolbaAY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/space/AlTawyY15,
  author       = {Riham AlTawy and
                  Amr M. Youssef},
  editor       = {Rajat Subhra Chakraborty and
                  Peter Schwabe and
                  Jon A. Solworth},
  title        = {Preimage Analysis of the Maelstrom-0 Hash Function},
  booktitle    = {Security, Privacy, and Applied Cryptography Engineering - 5th International
                  Conference, {SPACE} 2015, Jaipur, India, October 3-7, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9354},
  pages        = {113--126},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24126-5\_7},
  doi          = {10.1007/978-3-319-24126-5\_7},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/space/AlTawyY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/space/TolbaAY15,
  author       = {Mohamed Tolba and
                  Ahmed Abdelkhalek and
                  Amr M. Youssef},
  editor       = {Rajat Subhra Chakraborty and
                  Peter Schwabe and
                  Jon A. Solworth},
  title        = {Meet-in-the-Middle Attacks on Round-Reduced Khudra},
  booktitle    = {Security, Privacy, and Applied Cryptography Engineering - 5th International
                  Conference, {SPACE} 2015, Jaipur, India, October 3-7, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9354},
  pages        = {127--138},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24126-5\_8},
  doi          = {10.1007/978-3-319-24126-5\_8},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/space/TolbaAY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/space/AbdelkhalekTY15,
  author       = {Ahmed Abdelkhalek and
                  Mohamed Tolba and
                  Amr M. Youssef},
  editor       = {Rajat Subhra Chakraborty and
                  Peter Schwabe and
                  Jon A. Solworth},
  title        = {Improved Key Recovery Attack on Round-reduced Hierocrypt-L1 in the
                  Single-Key Setting},
  booktitle    = {Security, Privacy, and Applied Cryptography Engineering - 5th International
                  Conference, {SPACE} 2015, Jaipur, India, October 3-7, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9354},
  pages        = {139--150},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24126-5\_9},
  doi          = {10.1007/978-3-319-24126-5\_9},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/space/AbdelkhalekTY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlTawyY15,
  author       = {Riham AlTawy and
                  Amr M. Youssef},
  title        = {Meet in the Middle Attacks on Reduced Round Kuznyechik},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {96},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/096},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlTawyY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlTawyDY15,
  author       = {Riham AlTawy and
                  Onur Duman and
                  Amr M. Youssef},
  title        = {Fault Analysis of Kuznyechik},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {347},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/347},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlTawyDY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlTawyAY15,
  author       = {Riham AlTawy and
                  Ahmed Abdelkhalek and
                  Amr M. Youssef},
  title        = {A Meet-in-the-Middle Attack on Reduced-Round Kalyna-b/2b},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {762},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/762},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlTawyAY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/AlTawyY14,
  author       = {Riham AlTawy and
                  Amr M. Youssef},
  title        = {Integral distinguishers for reduced-round Stribog},
  journal      = {Inf. Process. Lett.},
  volume       = {114},
  number       = {8},
  pages        = {426--431},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ipl.2014.03.005},
  doi          = {10.1016/J.IPL.2014.03.005},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/AlTawyY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/AlTawyY14,
  author       = {Riham AlTawy and
                  Amr M. Youssef},
  editor       = {David Pointcheval and
                  Damien Vergnaud},
  title        = {Preimage Attacks on Reduced-Round Stribog},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2014 - 7th International Conference
                  on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8469},
  pages        = {109--125},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06734-6\_7},
  doi          = {10.1007/978-3-319-06734-6\_7},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/AlTawyY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/AlTawyY14,
  author       = {Riham AlTawy and
                  Amr M. Youssef},
  editor       = {Dongdai Lin and
                  Moti Yung and
                  Jianying Zhou},
  title        = {Second Preimage Analysis of Whirlwind},
  booktitle    = {Information Security and Cryptology - 10th International Conference,
                  Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8957},
  pages        = {311--328},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-16745-9\_17},
  doi          = {10.1007/978-3-319-16745-9\_17},
  timestamp    = {Fri, 09 Apr 2021 18:52:22 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/AlTawyY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/KaraBMYD14,
  author       = {A. Mert Kara and
                  Hamad Binsalleeh and
                  Mohammad Mannan and
                  Amr M. Youssef and
                  Mourad Debbabi},
  title        = {Detection of malicious payload distribution channels in {DNS}},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2014, Sydney,
                  Australia, June 10-14, 2014},
  pages        = {853--858},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICC.2014.6883426},
  doi          = {10.1109/ICC.2014.6883426},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/KaraBMYD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lightsec/AlTawyY14,
  author       = {Riham AlTawy and
                  Amr M. Youssef},
  editor       = {Thomas Eisenbarth and
                  Erdin{\c{c}} {\"{O}}zt{\"{u}}rk},
  title        = {Differential Sieving for 2-Step Matching Meet-in-the-Middle Attack
                  with Application to LBlock},
  booktitle    = {Lightweight Cryptography for Security and Privacy - Third International
                  Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8898},
  pages        = {126--139},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-16363-5\_8},
  doi          = {10.1007/978-3-319-16363-5\_8},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/lightsec/AlTawyY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ntms/BinsalleehKYD14,
  author       = {Hamad Binsalleeh and
                  A. Mert Kara and
                  Amr M. Youssef and
                  Mourad Debbabi},
  editor       = {Mohamad Badra and
                  Omar Alfandi},
  title        = {Characterization of Covert Channels in {DNS}},
  booktitle    = {6th International Conference on New Technologies, Mobility and Security,
                  {NTMS} 2014, Dubai, United Arab Emirates, March 30 - April 2, 2014},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/NTMS.2014.6814008},
  doi          = {10.1109/NTMS.2014.6814008},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/ntms/BinsalleehKYD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacrypt/2014,
  editor       = {Antoine Joux and
                  Amr M. Youssef},
  title        = {Selected Areas in Cryptography - {SAC} 2014 - 21st International Conference,
                  Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8781},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13051-4},
  doi          = {10.1007/978-3-319-13051-4},
  isbn         = {978-3-319-13050-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlTawyY14,
  author       = {Riham AlTawy and
                  Amr M. Youssef},
  title        = {Preimage attacks on Reduced-round Stribog},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {319},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/319},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlTawyY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlTawyY14a,
  author       = {Riham AlTawy and
                  Amr M. Youssef},
  title        = {Watch your Constants: Malicious Streebog},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {879},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/879},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlTawyY14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/AlTawyKY13,
  author       = {Riham AlTawy and
                  Aleksandar Kircanski and
                  Amr M. Youssef},
  title        = {Second order collision for the 42-step reduced {DHA-256} hash function},
  journal      = {Inf. Process. Lett.},
  volume       = {113},
  number       = {19-21},
  pages        = {764--770},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.ipl.2013.07.015},
  doi          = {10.1016/J.IPL.2013.07.015},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/AlTawyKY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/KamalY13,
  author       = {Abdel Alim Kamal and
                  Amr M. Youssef},
  title        = {Cryptanalysis of {\'{A}}lvarez et al. key exchange scheme},
  journal      = {Inf. Sci.},
  volume       = {223},
  pages        = {317--321},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.ins.2012.10.010},
  doi          = {10.1016/J.INS.2012.10.010},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/KamalY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/HayatleOY13,
  author       = {Osama Hayatle and
                  Hadi Otrok and
                  Amr M. Youssef},
  title        = {A Markov Decision Process Model for High Interaction Honeypots},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {22},
  number       = {4},
  pages        = {159--170},
  year         = {2013},
  url          = {https://doi.org/10.1080/19393555.2013.828802},
  doi          = {10.1080/19393555.2013.828802},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/HayatleOY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/KamalY13,
  author       = {Abdel Alim Kamal and
                  Amr M. Youssef},
  title        = {Strengthening hardware implementations of NTRUEncrypt against fault
                  analysis attacks},
  journal      = {J. Cryptogr. Eng.},
  volume       = {3},
  number       = {4},
  pages        = {227--240},
  year         = {2013},
  url          = {https://doi.org/10.1007/s13389-013-0061-7},
  doi          = {10.1007/S13389-013-0061-7},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/KamalY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/KamalZY13,
  author       = {Abdel Alim Kamal and
                  Roger Zahno and
                  Amr M. Youssef},
  editor       = {Alfredo Cuzzocrea and
                  Christian Kittl and
                  Dimitris E. Simos and
                  Edgar R. Weippl and
                  Lida Xu},
  title        = {A Comparison between Two Off-the-Shelf Algebraic Tools for Extraction
                  of Cryptographic Keys from Corrupted Memory Images},
  booktitle    = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013
                  Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6,
                  2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8128},
  pages        = {75--90},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40588-4\_6},
  doi          = {10.1007/978-3-642-40588-4\_6},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/KamalZY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KircanskiAY13,
  author       = {Aleksandar Kircanski and
                  Riham AlTawy and
                  Amr M. Youssef},
  editor       = {Kazue Sako and
                  Palash Sarkar},
  title        = {A Heuristic for Finding Compatible Differential Paths with Application
                  to {HAS-160}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Bengaluru, India, December 1-5, 2013, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8270},
  pages        = {464--483},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-42045-0\_24},
  doi          = {10.1007/978-3-642-42045-0\_24},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/KircanskiAY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/AlTawyKY13,
  author       = {Riham AlTawy and
                  Aleksandar Kircanski and
                  Amr M. Youssef},
  editor       = {Hyang{-}Sook Lee and
                  Dong{-}Guk Han},
  title        = {Rebound Attacks on Stribog},
  booktitle    = {Information Security and Cryptology - {ICISC} 2013 - 16th International
                  Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8565},
  pages        = {175--188},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-12160-4\_11},
  doi          = {10.1007/978-3-319-12160-4\_11},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/AlTawyKY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secnet/ShinwariYH13,
  author       = {Merwais Shinwari and
                  Amr M. Youssef and
                  Walaa Hamouda},
  editor       = {Ali Ismail Awad and
                  Aboul Ella Hassanien and
                  Kensuke Baba},
  title        = {A Privacy Preserving Approach to Smart Metering},
  booktitle    = {Advances in Security of Information and Communication Networks - First
                  International Conference, SecNet 2013, Cairo, Egypt, September 3-5,
                  2013. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {381},
  pages        = {164--176},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40597-6\_14},
  doi          = {10.1007/978-3-642-40597-6\_14},
  timestamp    = {Wed, 19 May 2021 08:32:23 +0200},
  biburl       = {https://dblp.org/rec/conf/secnet/ShinwariYH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/africacrypt/2013,
  editor       = {Amr M. Youssef and
                  Abderrahmane Nitaj and
                  Aboul Ella Hassanien},
  title        = {Progress in Cryptology - {AFRICACRYPT} 2013, 6th International Conference
                  on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7918},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38553-7},
  doi          = {10.1007/978-3-642-38553-7},
  isbn         = {978-3-642-38552-0},
  timestamp    = {Fri, 31 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/africacrypt/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KircanskiAY13,
  author       = {Aleksandar Kircanski and
                  Riham AlTawy and
                  Amr M. Youssef},
  title        = {A heuristic for finding compatible differential paths with application
                  to {HAS-160}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {359},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/359},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KircanskiAY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlTawyKY13,
  author       = {Riham AlTawy and
                  Aleksandar Kircanski and
                  Amr M. Youssef},
  title        = {Rebound attacks on Stribog},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {539},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/539},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlTawyKY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlTawyY13,
  author       = {Riham AlTawy and
                  Amr M. Youssef},
  title        = {Integral Distinguishers for Reduced-round Stribog},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {648},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/648},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlTawyY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aaecc/KamalY12,
  author       = {Abdel Alim Kamal and
                  Amr M. Youssef},
  title        = {Cryptanalysis of a key exchange protocol based on the endomorphisms
                  ring End ({\(\mathbb{Z}\)}\({}_{\mbox{p}}\) {\texttimes} {\(\mathbb{Z}\)}\({}_{\mbox{p\({}^{\mbox{2}}\)}}\))},
  journal      = {Appl. Algebra Eng. Commun. Comput.},
  volume       = {23},
  number       = {3-4},
  pages        = {143--149},
  year         = {2012},
  url          = {https://doi.org/10.1007/s00200-012-0170-z},
  doi          = {10.1007/S00200-012-0170-Z},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/aaecc/KamalY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/KamalY12,
  author       = {Abdel Alim Kamal and
                  Amr M. Youssef},
  title        = {Fault analysis of the NTRUSign digital signature scheme},
  journal      = {Cryptogr. Commun.},
  volume       = {4},
  number       = {2},
  pages        = {131--144},
  year         = {2012},
  url          = {https://doi.org/10.1007/s12095-011-0061-3},
  doi          = {10.1007/S12095-011-0061-3},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/KamalY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Al-ZaidyFYF12,
  author       = {Rabeah Al{-}Zaidy and
                  Benjamin C. M. Fung and
                  Amr M. Youssef and
                  Francis Fortin},
  title        = {Mining criminal networks from unstructured text documents},
  journal      = {Digit. Investig.},
  volume       = {8},
  number       = {3-4},
  pages        = {147--160},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.diin.2011.12.001},
  doi          = {10.1016/J.DIIN.2011.12.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Al-ZaidyFYF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KamalY12,
  author       = {Abdel Alim Kamal and
                  Amr M. Youssef},
  title        = {Cryptanalysis of a \emph{GL}(\emph{r}, \emph{Z\({}_{\mbox{n}}\)})-Based
                  Public Key System},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {95-A},
  number       = {4},
  pages        = {829--831},
  year         = {2012},
  url          = {https://doi.org/10.1587/transfun.E95.A.829},
  doi          = {10.1587/TRANSFUN.E95.A.829},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KamalY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/HayatleYO12,
  author       = {Osama Hayatle and
                  Amr M. Youssef and
                  Hadi Otrok},
  title        = {Dempster-Shafer Evidence Combining for (Anti)-Honeypot Technologies},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {21},
  number       = {6},
  pages        = {306--316},
  year         = {2012},
  url          = {https://doi.org/10.1080/19393555.2012.738375},
  doi          = {10.1080/19393555.2012.738375},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/HayatleYO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/ShinwariYH12,
  author       = {Merwais Shinwari and
                  Amr M. Youssef and
                  Walaa Hamouda},
  title        = {A Water-Filling Based Scheduling Algorithm for the Smart Grid},
  journal      = {{IEEE} Trans. Smart Grid},
  volume       = {3},
  number       = {2},
  pages        = {710--719},
  year         = {2012},
  url          = {https://doi.org/10.1109/TSG.2011.2177103},
  doi          = {10.1109/TSG.2011.2177103},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsg/ShinwariYH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/KircanskiY12,
  author       = {Aleksandar Kircanski and
                  Amr M. Youssef},
  title        = {On the Weak State in GGHN-like Ciphers},
  booktitle    = {Seventh International Conference on Availability, Reliability and
                  Security, Prague, {ARES} 2012, Czech Republic, August 20-24, 2012},
  pages        = {397--401},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ARES.2012.32},
  doi          = {10.1109/ARES.2012.32},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/KircanskiY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/KamalY12,
  author       = {Abdel Alim Kamal and
                  Amr M. Youssef},
  title        = {A Scan-Based Side Channel Attack on the NTRUEncrypt Cryptosystem},
  booktitle    = {Seventh International Conference on Availability, Reliability and
                  Security, Prague, {ARES} 2012, Czech Republic, August 20-24, 2012},
  pages        = {402--409},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ARES.2012.14},
  doi          = {10.1109/ARES.2012.14},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/KamalY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acity/ZahnoY12,
  author       = {Roger Zahno and
                  Amr M. Youssef},
  editor       = {Natarajan Meghanathan and
                  Dhinaharan Nagamalai and
                  Nabendu Chaki},
  title        = {An Obfuscated Implementation of {RC4}},
  booktitle    = {Advances in Computing and Information Technology - Proceedings of
                  the Second International Conference on Advances in Computing and Information
                  Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {176},
  pages        = {113--129},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31513-8\_13},
  doi          = {10.1007/978-3-642-31513-8\_13},
  timestamp    = {Sat, 05 Sep 2020 18:05:32 +0200},
  biburl       = {https://dblp.org/rec/conf/acity/ZahnoY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/HayatleOY12,
  author       = {Osama Hayatle and
                  Hadi Otrok and
                  Amr M. Youssef},
  title        = {A game theoretic investigation for high interaction honeypots},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2012, Ottawa, ON, Canada, June 10-15, 2012},
  pages        = {6662--6667},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICC.2012.6364760},
  doi          = {10.1109/ICC.2012.6364760},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/HayatleOY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latincrypt/KircanskiY12,
  author       = {Aleksandar Kircanski and
                  Amr M. Youssef},
  editor       = {Alejandro Hevia and
                  Gregory Neven},
  title        = {On the Sosemanuk Related Key-IV Sets},
  booktitle    = {Progress in Cryptology - {LATINCRYPT} 2012 - 2nd International Conference
                  on Cryptology and Information Security in Latin America, Santiago,
                  Chile, October 7-10, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7533},
  pages        = {271--287},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33481-8\_15},
  doi          = {10.1007/978-3-642-33481-8\_15},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/latincrypt/KircanskiY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/BiryukovKY12,
  author       = {Alex Biryukov and
                  Aleksandar Kircanski and
                  Amr M. Youssef},
  editor       = {Lars R. Knudsen and
                  Huapeng Wu},
  title        = {Cryptanalysis of the Loiss Stream Cipher},
  booktitle    = {Selected Areas in Cryptography, 19th International Conference, {SAC}
                  2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7707},
  pages        = {119--134},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35999-6\_9},
  doi          = {10.1007/978-3-642-35999-6\_9},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/BiryukovKY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/KircanskiSWY12,
  author       = {Aleksandar Kircanski and
                  Yanzhao Shen and
                  Gaoli Wang and
                  Amr M. Youssef},
  editor       = {Lars R. Knudsen and
                  Huapeng Wu},
  title        = {Boomerang and Slide-Rotational Analysis of the {SM3} Hash Function},
  booktitle    = {Selected Areas in Cryptography, 19th International Conference, {SAC}
                  2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7707},
  pages        = {304--320},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35999-6\_20},
  doi          = {10.1007/978-3-642-35999-6\_20},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/KircanskiSWY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KircanskiY12,
  author       = {Aleksandar Kircanski and
                  Amr M. Youssef},
  title        = {Boomerang and Slide-Rotational Analysis of the {SM3} Hash Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {274},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/274},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KircanskiY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/RasslanY11,
  author       = {Mohamed M. Nasreldin Rasslan and
                  Amr M. Youssef},
  title        = {Comments on the security of Chen's authenticated encryption scheme},
  journal      = {Comput. Electr. Eng.},
  volume       = {37},
  number       = {1},
  pages        = {71--74},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.compeleceng.2010.09.001},
  doi          = {10.1016/J.COMPELECENG.2010.09.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/RasslanY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cma/Youssef11,
  author       = {Amr M. Youssef},
  title        = {Cryptanalysis of a quadratic knapsack cryptosystem},
  journal      = {Comput. Math. Appl.},
  volume       = {61},
  number       = {4},
  pages        = {1261--1265},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.camwa.2011.01.006},
  doi          = {10.1016/J.CAMWA.2011.01.006},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cma/Youssef11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/RasslanY11,
  author       = {Mohamed M. Nasreldin Rasslan and
                  Amr M. Youssef},
  title        = {Cryptanalysis of a Public Key Encryption Scheme Using Ergodic Matrices},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {94-A},
  number       = {2},
  pages        = {853--854},
  year         = {2011},
  url          = {https://doi.org/10.1587/transfun.E94.A.853},
  doi          = {10.1587/TRANSFUN.E94.A.853},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/RasslanY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KamalY11,
  author       = {Abdel Alim Kamal and
                  Amr M. Youssef},
  title        = {Fault Analysis of the NTRUEncrypt Cryptosystem},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {94-A},
  number       = {4},
  pages        = {1156--1158},
  year         = {2011},
  url          = {https://doi.org/10.1587/transfun.E94.A.1156},
  doi          = {10.1587/TRANSFUN.E94.A.1156},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KamalY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-com/BasyouniHY11,
  author       = {Ayda Basyouni and
                  Walaa Hamouda and
                  Amr M. Youssef},
  title        = {Cooperative relaying protocol for energy-constrained ad hoc networks},
  journal      = {{IET} Commun.},
  volume       = {5},
  number       = {4},
  pages        = {418--424},
  year         = {2011},
  url          = {https://doi.org/10.1049/iet-com.2010.0035},
  doi          = {10.1049/IET-COM.2010.0035},
  timestamp    = {Tue, 08 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-com/BasyouniHY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/KircanskiY11,
  author       = {Aleksandar Kircanski and
                  Amr M. Youssef},
  title        = {On the sliding property of {SNOW} 3 {G} and {SNOW} 2.0},
  journal      = {{IET} Inf. Secur.},
  volume       = {5},
  number       = {4},
  pages        = {199--206},
  year         = {2011},
  url          = {https://doi.org/10.1049/iet-ifs.2011.0033},
  doi          = {10.1049/IET-IFS.2011.0033},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/KircanskiY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/SalehaniKY11,
  author       = {Yaser Esmaeili Salehani and
                  Aleksandar Kircanski and
                  Amr M. Youssef},
  editor       = {Abderrahmane Nitaj and
                  David Pointcheval},
  title        = {Differential Fault Analysis of Sosemanuk},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2011 - 4th International Conference
                  on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6737},
  pages        = {316--331},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21969-6\_20},
  doi          = {10.1007/978-3-642-21969-6\_20},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/SalehaniKY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/Al-ZaidyFY11,
  author       = {Rabeah Al{-}Zaidy and
                  Benjamin C. M. Fung and
                  Amr M. Youssef},
  editor       = {William C. Chu and
                  W. Eric Wong and
                  Mathew J. Palakal and
                  Chih{-}Cheng Hung},
  title        = {Towards discovering criminal communities from textual data},
  booktitle    = {Proceedings of the 2011 {ACM} Symposium on Applied Computing (SAC),
                  TaiChung, Taiwan, March 21 - 24, 2011},
  pages        = {172--177},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1982185.1982225},
  doi          = {10.1145/1982185.1982225},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/Al-ZaidyFY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SalehaniY11,
  author       = {Yaser Esmaeili Salehani and
                  Amr M. Youssef},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {Differential Fault Analysis of Hummingbird},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {357--361},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 29 Aug 2019 08:10:02 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SalehaniY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/KircanskiY10,
  author       = {Aleksandar Kircanski and
                  Amr M. Youssef},
  title        = {On the structural weakness of the {GGHN} stream cipher},
  journal      = {Cryptogr. Commun.},
  volume       = {2},
  number       = {1},
  pages        = {1--17},
  year         = {2010},
  url          = {https://doi.org/10.1007/s12095-009-0013-3},
  doi          = {10.1007/S12095-009-0013-3},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/KircanskiY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/Youssef10,
  author       = {Amr M. Youssef},
  title        = {Cryptanalysis of Boolean permutation-based key escrow scheme},
  journal      = {Comput. Electr. Eng.},
  volume       = {36},
  number       = {1},
  pages        = {56--60},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.compeleceng.2009.04.004},
  doi          = {10.1016/J.COMPELECENG.2009.04.004},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cee/Youssef10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KhanBY10,
  author       = {Liaqat Ali Khan and
                  Muhammad Shamim Baig and
                  Amr M. Youssef},
  title        = {Speaker recognition from encrypted VoIP communications},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {1-2},
  pages        = {65--73},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2009.10.001},
  doi          = {10.1016/J.DIIN.2009.10.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/KhanBY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/RasslanY10,
  author       = {Mohamed M. Nasreldin Rasslan and
                  Amr M. Youssef},
  title        = {Cryptanalysis of Hwang-Lo-Hsiao-Chu Authenticated Encryption Schemes},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {93-D},
  number       = {5},
  pages        = {1301--1302},
  year         = {2010},
  url          = {https://doi.org/10.1587/transinf.E93.D.1301},
  doi          = {10.1587/TRANSINF.E93.D.1301},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/RasslanY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-com/BasyouniHY10,
  author       = {Ayda Basyouni and
                  Walaa Hamouda and
                  Amr M. Youssef},
  title        = {Improved channel access protocol for cooperative ad hoc networks},
  journal      = {{IET} Commun.},
  volume       = {4},
  number       = {8},
  pages        = {915--923},
  year         = {2010},
  url          = {https://doi.org/10.1049/iet-com.2009.0461},
  doi          = {10.1049/IET-COM.2009.0461},
  timestamp    = {Tue, 08 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-com/BasyouniHY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/AssraHY10,
  author       = {Ayman Assra and
                  Walaa Hamouda and
                  Amr M. Youssef},
  title        = {EM-Based Joint Channel Estimation and Data Detection for {MIMO-CDMA}
                  Systems},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {59},
  number       = {3},
  pages        = {1205--1216},
  year         = {2010},
  url          = {https://doi.org/10.1109/TVT.2009.2038925},
  doi          = {10.1109/TVT.2009.2038925},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/AssraHY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/AssraHY10a,
  author       = {Ayman Assra and
                  Walaa Hamouda and
                  Amr M. Youssef},
  title        = {A Channel-Estimation and Data-Detection Scheme for Multiuser {MIMO-CDMA}
                  Systems in Fading Channels},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {59},
  number       = {6},
  pages        = {2830--2844},
  year         = {2010},
  url          = {https://doi.org/10.1109/TVT.2010.2047417},
  doi          = {10.1109/TVT.2010.2047417},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/AssraHY10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/KircanskiY10,
  author       = {Aleksandar Kircanski and
                  Amr M. Youssef},
  editor       = {Daniel J. Bernstein and
                  Tanja Lange},
  title        = {Differential Fault Analysis of {HC-128}},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference
                  on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6055},
  pages        = {261--278},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12678-9\_16},
  doi          = {10.1007/978-3-642-12678-9\_16},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/KircanskiY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/AssraHY10,
  author       = {Ayman Assra and
                  Walaa Hamouda and
                  Amr M. Youssef},
  title        = {Joint Iterative Channel Estimation and Data Detection for {MIMO-CDMA}
                  Systems over Frequency-Selective Fading Channels},
  booktitle    = {Proceedings of the Global Communications Conference, 2010. {GLOBECOM}
                  2010, 6-10 December 2010, Miami, Florida, {USA}},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/GLOCOM.2010.5683248},
  doi          = {10.1109/GLOCOM.2010.5683248},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/AssraHY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/BasyouniHY10,
  author       = {Ayda Basyouni and
                  Walaa Hamouda and
                  Amr M. Youssef},
  title        = {A New Rate Control Technique for cdma2000 1xEV},
  booktitle    = {Proceedings of the Global Communications Conference, 2010. {GLOBECOM}
                  2010, 6-10 December 2010, Miami, Florida, {USA}},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/GLOCOM.2010.5683712},
  doi          = {10.1109/GLOCOM.2010.5683712},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/BasyouniHY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isspit/ShiZY10,
  author       = {Peipei Shi and
                  Bo Zhu and
                  Amr M. Youssef},
  title        = {A framework to strengthen password authentication using mobile devices
                  and browser extensions},
  booktitle    = {Proceedings of the {IEEE} International Symposium on Signal Processing
                  and Information Technology, {ISSPIT} 2010, December 15-18,2010, Luxor,
                  Egypt},
  pages        = {73--78},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ISSPIT.2010.5711728},
  doi          = {10.1109/ISSPIT.2010.5711728},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isspit/ShiZY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isspit/ElshehY10,
  author       = {Esam Elsheh and
                  Amr M. Youssef},
  title        = {On the security of image encryption schemes based on Multiple Parameters
                  Transforms},
  booktitle    = {Proceedings of the {IEEE} International Symposium on Signal Processing
                  and Information Technology, {ISSPIT} 2010, December 15-18,2010, Luxor,
                  Egypt},
  pages        = {97--101},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ISSPIT.2010.5711735},
  doi          = {10.1109/ISSPIT.2010.5711735},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isspit/ElshehY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/BinsalleehOBSYDW10,
  author       = {Hamad Binsalleeh and
                  Thomas C. Ormerod and
                  Amine Boukhtouta and
                  Prosenjit Sinha and
                  Amr M. Youssef and
                  Mourad Debbabi and
                  Lingyu Wang},
  title        = {On the analysis of the Zeus botnet crimeware toolkit},
  booktitle    = {Eighth Annual Conference on Privacy, Security and Trust, {PST} 2010,
                  August 17-19, 2010, Ottawa, Ontario, Canada},
  pages        = {31--38},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/PST.2010.5593240},
  doi          = {10.1109/PST.2010.5593240},
  timestamp    = {Sat, 27 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pst/BinsalleehOBSYDW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securware/OrmerodWDYBBS10,
  author       = {Thomas C. Ormerod and
                  Lingyu Wang and
                  Mourad Debbabi and
                  Amr M. Youssef and
                  Hamad Binsalleeh and
                  Amine Boukhtouta and
                  Prosenjit Sinha},
  editor       = {Reijo Savola and
                  Masaru Takesue and
                  Rainer Falk and
                  Manuela Popescu},
  title        = {Defaming Botnet Toolkits: {A} Bottom-Up Approach to Mitigating the
                  Threat},
  booktitle    = {Fourth International Conference on Emerging Security Information Systems
                  and Technologies, {SECURWARE} 2010, Venice, Italy, July 18-25, 2010},
  pages        = {195--200},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SECURWARE.2010.39},
  doi          = {10.1109/SECURWARE.2010.39},
  timestamp    = {Sat, 27 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securware/OrmerodWDYBBS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securware/KamalY10,
  author       = {Abdel Alim Kamal and
                  Amr M. Youssef},
  editor       = {Reijo Savola and
                  Masaru Takesue and
                  Rainer Falk and
                  Manuela Popescu},
  title        = {Applications of {SAT} Solvers to {AES} Key Recovery from Decayed Key
                  Schedule Images},
  booktitle    = {Fourth International Conference on Emerging Security Information Systems
                  and Technologies, {SECURWARE} 2010, Venice, Italy, July 18-25, 2010},
  pages        = {216--220},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SECURWARE.2010.42},
  doi          = {10.1109/SECURWARE.2010.42},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securware/KamalY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/AssraHY10,
  author       = {Ayman Assra and
                  Walaa Hamouda and
                  Amr M. Youssef},
  title        = {{EM} Channel Estimation and Data Detection for {MIMO-CDMA} Systems
                  over Slow-Fading Channels},
  booktitle    = {Proceedings of the 72nd {IEEE} Vehicular Technology Conference, {VTC}
                  Fall 2010, 6-9 September 2010, Ottawa, Canada},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/VETECF.2010.5594161},
  doi          = {10.1109/VETECF.2010.5594161},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vtc/AssraHY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wimo/RasslanY10,
  author       = {Mohamed Rasslan and
                  Amr M. Youssef},
  editor       = {Abdulkadir {\"{O}}zcan and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {A Bilinear Pairing Based Hidden-Signature Scheme},
  booktitle    = {Recent Trends in Wireless and Mobile Networks - Second International
                  Conference, WiMo 2010, Ankara, Turkey, June 26-28, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {84},
  pages        = {389--397},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14171-3\_34},
  doi          = {10.1007/978-3-642-14171-3\_34},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wimo/RasslanY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KamalY10,
  author       = {Abdel Alim Kamal and
                  Amr M. Youssef},
  title        = {Applications of {SAT} Solvers to {AES} key Recovery from Decayed Key
                  Schedule Images},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {324},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/324},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KamalY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/KircanskiAY09,
  author       = {Aleksandar Kircanski and
                  Rabeah Al{-}Zaidy and
                  Amr M. Youssef},
  title        = {A new distinguishing and key recovery attack on {NGG} stream cipher},
  journal      = {Cryptogr. Commun.},
  volume       = {1},
  number       = {2},
  pages        = {269--282},
  year         = {2009},
  url          = {https://doi.org/10.1007/s12095-009-0012-4},
  doi          = {10.1007/S12095-009-0012-4},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/KircanskiAY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-com/AssraHY09,
  author       = {Ayman Assra and
                  Walaa Hamouda and
                  Amr M. Youssef},
  title        = {{BER} analysis of space-time diversity in {CDMA} systems over frequency-selective
                  fading channels},
  journal      = {{IET} Commun.},
  volume       = {3},
  number       = {7},
  pages        = {1216--1226},
  year         = {2009},
  url          = {https://doi.org/10.1049/iet-com.2008.0559},
  doi          = {10.1049/IET-COM.2008.0559},
  timestamp    = {Tue, 08 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-com/AssraHY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/Youssef09,
  author       = {Amr M. Youssef},
  title        = {Cryptanalysis of a knapsack-based probabilistic encryption scheme},
  journal      = {Inf. Sci.},
  volume       = {179},
  number       = {18},
  pages        = {3116--3121},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.ins.2009.05.015},
  doi          = {10.1016/J.INS.2009.05.015},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/Youssef09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/LiuY09,
  author       = {Wen Ming Liu and
                  Amr M. Youssef},
  title        = {On the Existence of (10, 2, 7, 488) Resilient Functions},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {55},
  number       = {1},
  pages        = {411--412},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIT.2008.2008140},
  doi          = {10.1109/TIT.2008.2008140},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/LiuY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/AssraHY09,
  author       = {Ayman Assra and
                  Walaa Hamouda and
                  Amr M. Youssef},
  title        = {Performance of Superimposed Training-Based Channel Estimation in {MIMO-CDMA}
                  Systems},
  booktitle    = {Proceedings of the Global Communications Conference, 2009. {GLOBECOM}
                  2009, Honolulu, Hawaii, USA, 30 November - 4 December 2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/GLOCOM.2009.5426268},
  doi          = {10.1109/GLOCOM.2009.5426268},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/AssraHY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/BasyouniHY09,
  author       = {Ayda Basyouni and
                  Walaa Hamouda and
                  Amr M. Youssef},
  title        = {On Reducing Blocking Probability in Cooperative Ad-hoc Networks},
  booktitle    = {Proceedings of the Global Communications Conference, 2009. {GLOBECOM}
                  2009, Honolulu, Hawaii, USA, 30 November - 4 December 2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/GLOCOM.2009.5425571},
  doi          = {10.1109/GLOCOM.2009.5425571},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/BasyouniHY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ShiZY09,
  author       = {Peipei Shi and
                  Bo Zhu and
                  Amr M. Youssef},
  title        = {A rotary {PIN} entry scheme resilient to shoulder-surfing},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402625},
  doi          = {10.1109/ICITST.2009.5402625},
  timestamp    = {Mon, 09 Aug 2021 17:01:45 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ShiZY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/KircanskiY09,
  author       = {Aleksandar Kircanski and
                  Amr M. Youssef},
  editor       = {Michael J. Jacobson Jr. and
                  Vincent Rijmen and
                  Reihaneh Safavi{-}Naini},
  title        = {Differential Fault Analysis of Rabbit},
  booktitle    = {Selected Areas in Cryptography, 16th Annual International Workshop,
                  {SAC} 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5867},
  pages        = {197--214},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-05445-7\_13},
  doi          = {10.1007/978-3-642-05445-7\_13},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/KircanskiY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securware/ShiZY09,
  author       = {Peipei Shi and
                  Bo Zhu and
                  Amr M. Youssef},
  editor       = {Rainer Falk and
                  Wilson Goudalo and
                  Eric Y. Chen and
                  Reijo Savola and
                  Manuela Popescu},
  title        = {A {PIN} Entry Scheme Resistant to Recording-Based Shoulder-Surfing},
  booktitle    = {The Third International Conference on Emerging Security Information,
                  Systems and Technologies, {SECURWARE} 2009, 18-23 June 2009, Athens/Glyfada,
                  Greece},
  pages        = {237--241},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SECURWARE.2009.43},
  doi          = {10.1109/SECURWARE.2009.43},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securware/ShiZY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icl/Al-ZaidyKY08,
  author       = {Rabeah Al{-}Zaidy and
                  Aleksandar Kircanski and
                  Amr M. Youssef},
  title        = {Cryptanalysis of the parameterized improved fast encryption algorithm
                  for multimedia},
  journal      = {{IEEE} Commun. Lett.},
  volume       = {12},
  number       = {12},
  pages        = {886--887},
  year         = {2008},
  url          = {https://doi.org/10.1109/LCOMM.2008.081335},
  doi          = {10.1109/LCOMM.2008.081335},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/icl/Al-ZaidyKY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spl/Youssef08,
  author       = {Amr M. Youssef},
  title        = {On the Security of a Cryptosystem Based on Multiple-Parameters Discrete
                  Fractional Fourier Transform},
  journal      = {{IEEE} Signal Process. Lett.},
  volume       = {15},
  pages        = {77--78},
  year         = {2008},
  url          = {https://doi.org/10.1109/LSP.2007.910299},
  doi          = {10.1109/LSP.2007.910299},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/spl/Youssef08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcas/Youssef08,
  author       = {Amr M. Youssef},
  title        = {An Attack Against the Revised Murthy-Swamy Cryptosystem},
  journal      = {{IEEE} Trans. Circuits Syst. {II} Express Briefs},
  volume       = {55-II},
  number       = {2},
  pages        = {166--167},
  year         = {2008},
  url          = {https://doi.org/10.1109/TCSII.2007.911833},
  doi          = {10.1109/TCSII.2007.911833},
  timestamp    = {Wed, 27 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcas/Youssef08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/LiuHY08,
  author       = {Kun Liu and
                  Walaa Hamouda and
                  Amr M. Youssef},
  title        = {Performance of a {MANET} directional {MAC} protocol with angle-of-arrival
                  estimation},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {8},
  number       = {6},
  pages        = {759--769},
  year         = {2008},
  url          = {https://doi.org/10.1002/wcm.523},
  doi          = {10.1002/WCM.523},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wicomm/LiuHY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securware/KircanskiY08,
  author       = {Aleksandar Kircanski and
                  Amr M. Youssef},
  editor       = {Andr{\'{e}} Cotton and
                  Oana Dini and
                  Antonio Fernandez G{\'{o}}mez{-}Skarmeta and
                  Mihaela Ion and
                  Manuela Popescu and
                  Masaru Takesue},
  title        = {A Related-Key Attack on {TREYFER}},
  booktitle    = {Proceedings of the Second International Conference on Emerging Security
                  Information, Systems and Technologies, {SECURWARE} 2008, August 25-31,
                  2008, Cap Esterel, France},
  pages        = {213--217},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SECURWARE.2008.51},
  doi          = {10.1109/SECURWARE.2008.51},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securware/KircanskiY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/AssraHY08,
  author       = {Ayman Assra and
                  Walaa Hamouda and
                  Amr M. Youssef},
  title        = {Joint Decorrelating Channel and Data Estimation for Space-Time Spreading
                  Systems},
  booktitle    = {Proceedings of the 67th {IEEE} Vehicular Technology Conference, {VTC}
                  Spring 2008, 11-14 May 2008, Singapore},
  pages        = {1399--1403},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/VETECS.2008.294},
  doi          = {10.1109/VETECS.2008.294},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vtc/AssraHY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcas/Youssef07,
  author       = {Amr M. Youssef},
  title        = {A Comment on "Cryptographic Applications of Brahmagupta-Bh{\~{a}}skara
                  Equation"},
  journal      = {{IEEE} Trans. Circuits Syst. {I} Regul. Pap.},
  volume       = {54-I},
  number       = {4},
  pages        = {927--928},
  year         = {2007},
  url          = {https://doi.org/10.1109/TCSI.2007.893508},
  doi          = {10.1109/TCSI.2007.893508},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcas/Youssef07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/XuWYZ07,
  author       = {Xuxin Xu and
                  Lingyu Wang and
                  Amr M. Youssef and
                  Bo Zhu},
  editor       = {Jonathan Katz and
                  Moti Yung},
  title        = {Preventing Collusion Attacks on the One-Way Function Tree {(OFT)}
                  Scheme},
  booktitle    = {Applied Cryptography and Network Security, 5th International Conference,
                  {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4521},
  pages        = {177--193},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72738-5\_12},
  doi          = {10.1007/978-3-540-72738-5\_12},
  timestamp    = {Thu, 15 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/XuWYZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/AssraHY07,
  author       = {Ayman Assra and
                  Walaa Hamouda and
                  Amr M. Youssef},
  title        = {Performance of Space-Time Diversity in {CDMA} Over Frequency-Selective
                  Fading Channels},
  booktitle    = {Proceedings of the Global Communications Conference, 2007. {GLOBECOM}
                  '07, Washington, DC, USA, 26-30 November 2007},
  pages        = {1514--1518},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/GLOCOM.2007.291},
  doi          = {10.1109/GLOCOM.2007.291},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/AssraHY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/LiuHY07,
  author       = {Kun Liu and
                  Walaa Hamouda and
                  Amr M. Youssef},
  title        = {ESPRIT-Based Directional {MAC} Protocol for Mobile Ad Hoc Networks},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2007, Glasgow, Scotland, UK, 24-28 June 2007},
  pages        = {3654--3659},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICC.2007.602},
  doi          = {10.1109/ICC.2007.602},
  timestamp    = {Tue, 19 Jun 2018 07:53:33 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/LiuHY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isspa/Abdel-MannanHY07,
  author       = {Osama Abdel{-}Mannan and
                  A. Ben Hamza and
                  Amr M. Youssef},
  title        = {Incremental Hessian Locally Linear Embedding algorithm},
  booktitle    = {9th International Symposium on Signal Processing and Its Applications,
                  {ISSPA} 2007, Sharjah, United Arab Emirates, February 12-15, 2007},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/ISSPA.2007.4555395},
  doi          = {10.1109/ISSPA.2007.4555395},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isspa/Abdel-MannanHY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isspa/AssraHY07,
  author       = {Ayman Assra and
                  Walaa Hamouda and
                  Amr M. Youssef},
  title        = {Space-time spreading and diversity in asynchronous {CDMA} systems
                  over frequency-selective fading channels},
  booktitle    = {9th International Symposium on Signal Processing and Its Applications,
                  {ISSPA} 2007, Sharjah, United Arab Emirates, February 12-15, 2007},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/ISSPA.2007.4555515},
  doi          = {10.1109/ISSPA.2007.4555515},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isspa/AssraHY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacrypt/2006,
  editor       = {Eli Biham and
                  Amr M. Youssef},
  title        = {Selected Areas in Cryptography, 13th International Workshop, {SAC}
                  2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4356},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74462-7},
  doi          = {10.1007/978-3-540-74462-7},
  isbn         = {978-3-540-74461-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dm/YoussefTG06,
  author       = {Amr M. Youssef and
                  Stafford E. Tavares and
                  Guang Gong},
  title        = {On some probabilistic approximations for AES-like s-boxes},
  journal      = {Discret. Math.},
  volume       = {306},
  number       = {16},
  pages        = {2016--2020},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.disc.2006.03.055},
  doi          = {10.1016/J.DISC.2006.03.055},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dm/YoussefTG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/YoussefG06,
  author       = {Amr M. Youssef and
                  Guang Gong},
  title        = {On linear complexity of sequences over \emph{GF}(2\({}^{\mbox{\emph{n}}}\))},
  journal      = {Theor. Comput. Sci.},
  volume       = {352},
  number       = {1-3},
  pages        = {288--292},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.tcs.2005.11.044},
  doi          = {10.1016/J.TCS.2005.11.044},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/YoussefG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/SaberUY06,
  author       = {Z. Saber and
                  Mohammad Faisal Uddin and
                  Amr M. Youssef},
  title        = {On the existence of (9, 3, 5, 240) resilient functions},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {52},
  number       = {5},
  pages        = {2269--2270},
  year         = {2006},
  url          = {https://doi.org/10.1109/TIT.2006.872862},
  doi          = {10.1109/TIT.2006.872862},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/SaberUY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccece/MohamedYES06,
  author       = {S. S. Mohamed and
                  Amr M. Youssef and
                  E. F. El{-}Saadany and
                  Magdy M. A. Salama},
  title        = {On the Use of Spectral Clustering for Prostate Tissue Characterization},
  booktitle    = {Proceedings of the Canadian Conference on Electrical and Computer
                  Engineering, {CCECE} 2006, May 7-10, 2006, Ottawa Congress Centre,
                  Ottawa, Canada},
  pages        = {979--982},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/CCECE.2006.277317},
  doi          = {10.1109/CCECE.2006.277317},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ccece/MohamedYES06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccece/UddinY06,
  author       = {Mohammad Faisal Uddin and
                  Amr M. Youssef},
  title        = {An Artificial Life Technique for the Cryptanalysis of Simple Substitution
                  Ciphers},
  booktitle    = {Proceedings of the Canadian Conference on Electrical and Computer
                  Engineering, {CCECE} 2006, May 7-10, 2006, Ottawa Congress Centre,
                  Ottawa, Canada},
  pages        = {1582--1585},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/CCECE.2006.277769},
  doi          = {10.1109/CCECE.2006.277769},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccece/UddinY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccece/WangYE06,
  author       = {Ren Wang and
                  Amr M. Youssef and
                  Ahmed K. Elhakeem},
  title        = {On Some Feature Selection Strategies for Spam Filter Design},
  booktitle    = {Proceedings of the Canadian Conference on Electrical and Computer
                  Engineering, {CCECE} 2006, May 7-10, 2006, Ottawa Congress Centre,
                  Ottawa, Canada},
  pages        = {2186--2189},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/CCECE.2006.277770},
  doi          = {10.1109/CCECE.2006.277770},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccece/WangYE06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cec/UddinY06,
  author       = {Mohammad Faisal Uddin and
                  Amr M. Youssef},
  title        = {Cryptanalysis of Simple Substitution Ciphers Using Particle Swarm
                  Optimization},
  booktitle    = {{IEEE} International Conference on Evolutionary Computation, {CEC}
                  2006, part of {WCCI} 2006, Vancouver, BC, Canada, 16-21 July 2006},
  pages        = {677--680},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/CEC.2006.1688376},
  doi          = {10.1109/CEC.2006.1688376},
  timestamp    = {Thu, 16 Dec 2021 14:00:41 +0100},
  biburl       = {https://dblp.org/rec/conf/cec/UddinY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/LiuHY06,
  author       = {Kun Liu and
                  Walaa Hamouda and
                  Amr M. Youssef},
  title        = {Performance of Directional {MAC} Protocols in Ad-Hoc Networks over
                  Fading Channels},
  booktitle    = {Proceedings of the Global Telecommunications Conference, 2006. {GLOBECOM}
                  '06, San Francisco, CA, USA, 27 November - 1 December 2006},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/GLOCOM.2006.504},
  doi          = {10.1109/GLOCOM.2006.504},
  timestamp    = {Fri, 21 Feb 2020 18:38:36 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/LiuHY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iastedCI/WangYE06,
  author       = {Ren Wang and
                  Amr M. Youssef and
                  Ahmed K. Elhakeem},
  editor       = {Boris Kovalerchuk},
  title        = {Artificial life feature selection techniques for spam e-mail filters},
  booktitle    = {Proceedings of the Second {IASTED} International Conference on Computational
                  Intelligence, San Francisco, California, USA, November 20-22, 2006},
  pages        = {102--107},
  publisher    = {{IASTED/ACTA} Press},
  year         = {2006},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iastedCI/WangYE06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciar/MohamedYES06,
  author       = {S. S. Mohamed and
                  Amr M. Youssef and
                  E. F. El{-}Saadany and
                  Magdy M. A. Salama},
  editor       = {Aur{\'{e}}lio C. Campilho and
                  Mohamed S. Kamel},
  title        = {Prostate Tissue Characterization Using {TRUS} Image Spectral Features},
  booktitle    = {Image Analysis and Recognition, Third International Conference, {ICIAR}
                  2006, P{\'{o}}voa de Varzim, Portugal, September 18-20, 2006,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4142},
  pages        = {589--601},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11867661\_53},
  doi          = {10.1007/11867661\_53},
  timestamp    = {Mon, 14 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciar/MohamedYES06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/miip/MohamedYES06,
  author       = {S. S. Mohamed and
                  Amr M. Youssef and
                  E. F. El{-}Saadany and
                  M. M. A. Salama},
  editor       = {Joseph M. Reinhardt and
                  Josien P. W. Pluim},
  title        = {{AIS} {TLS-ESPRIT} feature selection for prostate tissue characterization},
  booktitle    = {Medical Imaging 2006: Image Processing, {MEDICAL} IMAGING, San Diego,
                  California, United States, 11-16 February 2006},
  series       = {{SPIE} Proceedings},
  volume       = {6144},
  pages        = {614451},
  publisher    = {{SPIE}},
  year         = {2006},
  url          = {https://doi.org/10.1117/12.649274},
  doi          = {10.1117/12.649274},
  timestamp    = {Mon, 14 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/miip/MohamedYES06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dam/YoussefT05,
  author       = {Amr M. Youssef and
                  Stafford E. Tavares},
  title        = {Affine equivalence in the {AES} round function},
  journal      = {Discret. Appl. Math.},
  volume       = {148},
  number       = {2},
  pages        = {161--170},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.dam.2005.02.001},
  doi          = {10.1016/J.DAM.2005.02.001},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dam/YoussefT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciar/MohamedYES05,
  author       = {S. S. Mohamed and
                  Amr M. Youssef and
                  E. F. El{-}Saadany and
                  Magdy M. A. Salama},
  editor       = {Mohamed S. Kamel and
                  Aur{\'{e}}lio C. Campilho},
  title        = {Artificial Life Feature Selection Techniques for Prostrate Cancer
                  Diagnosis Using {TRUS} Images},
  booktitle    = {Image Analysis and Recognition, Second International Conference, {ICIAR}
                  2005, Toronto, Canada, September 28-30, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3656},
  pages        = {903--913},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11559573\_110},
  doi          = {10.1007/11559573\_110},
  timestamp    = {Mon, 14 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciar/MohamedYES05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tce/YoussefT03,
  author       = {Amr M. Youssef and
                  Stafford E. Tavares},
  title        = {Comments on the security of fast encryption algorithm for multimedia
                  {(FEA-M)}},
  journal      = {{IEEE} Trans. Consumer Electron.},
  volume       = {49},
  number       = {1},
  pages        = {168--170},
  year         = {2003},
  url          = {https://doi.org/10.1109/TCE.2003.1205471},
  doi          = {10.1109/TCE.2003.1205471},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tce/YoussefT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/GongY02,
  author       = {Guang Gong and
                  Amr M. Youssef},
  title        = {Cryptographic properties of the Welch-Gong transformation sequence
                  generators},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {48},
  number       = {11},
  pages        = {2837--2846},
  year         = {2002},
  url          = {https://doi.org/10.1109/TIT.2002.804043},
  doi          = {10.1109/TIT.2002.804043},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/GongY02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YoussefT02,
  author       = {Amr M. Youssef and
                  Stafford E. Tavares},
  title        = {On Some Algebraic Structures in the {AES} Round Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {144},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/144},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YoussefT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YoussefG01,
  author       = {Amr M. Youssef and
                  Guang Gong},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Cryptanalysis of a Public Key Cryptosystem Proposed at {ACISP} 2000},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {15--20},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_3},
  doi          = {10.1007/3-540-47719-5\_3},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YoussefG01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/YoussefG01,
  author       = {Amr M. Youssef and
                  Guang Gong},
  editor       = {Birgit Pfitzmann},
  title        = {Hyper-bent Functions},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2001, International Conference
                  on the Theory and Application of Cryptographic Techniques, Innsbruck,
                  Austria, May 6-10, 2001, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {2045},
  pages        = {406--419},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44987-6\_25},
  doi          = {10.1007/3-540-44987-6\_25},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/YoussefG01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/YoussefG01,
  author       = {Amr M. Youssef and
                  Guang Gong},
  editor       = {C. Pandu Rangan and
                  Cunsheng Ding},
  title        = {Cryptanalysis of Imai and Matsumoto Scheme {B} Asymmetric Cryptosystem},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2001, Second International Conference
                  on Cryptology in India, Chennai, India, December 16-20, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2247},
  pages        = {214--222},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45311-3\_20},
  doi          = {10.1007/3-540-45311-3\_20},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/YoussefG01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/YoussefG01,
  author       = {Amr M. Youssef and
                  Guang Gong},
  editor       = {Serge Vaudenay and
                  Amr M. Youssef},
  title        = {Boolean Functions with Large Distance to All Bijective Monomials:
                  {N} Odd Case},
  booktitle    = {Selected Areas in Cryptography, 8th Annual International Workshop,
                  {SAC} 2001 Toronto, Ontario, Canada, August 16-17, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2259},
  pages        = {49--59},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45537-X\_4},
  doi          = {10.1007/3-540-45537-X\_4},
  timestamp    = {Tue, 01 Jun 2021 15:22:31 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/YoussefG01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacrypt/2001,
  editor       = {Serge Vaudenay and
                  Amr M. Youssef},
  title        = {Selected Areas in Cryptography, 8th Annual International Workshop,
                  {SAC} 2001 Toronto, Ontario, Canada, August 16-17, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2259},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45537-X},
  doi          = {10.1007/3-540-45537-X},
  isbn         = {3-540-43066-0},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/2001.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/YoussefG00,
  author       = {Amr M. Youssef and
                  Guang Gong},
  editor       = {Bruce Schneier},
  title        = {On the Interpolation Attacks on Block Ciphers},
  booktitle    = {Fast Software Encryption, 7th International Workshop, {FSE} 2000,
                  New York, NY, USA, April 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1978},
  pages        = {109--120},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44706-7\_8},
  doi          = {10.1007/3-540-44706-7\_8},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/YoussefG00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/Youssef00,
  author       = {Amr M. Youssef},
  editor       = {Douglas R. Stinson and
                  Stafford E. Tavares},
  title        = {Cryptanalysis of the "Augmented Family of Cryptographic Parity
                  Circuits" Proposed at ISW'97},
  booktitle    = {Selected Areas in Cryptography, 7th Annual International Workshop,
                  {SAC} 2000, Waterloo, Ontario, Canada, August 14-15, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2012},
  pages        = {29--38},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44983-3\_3},
  doi          = {10.1007/3-540-44983-3\_3},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/Youssef00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/GongY00,
  author       = {Guang Gong and
                  Amr M. Youssef},
  editor       = {Douglas R. Stinson and
                  Stafford E. Tavares},
  title        = {On Welch-Gong Transformation Sequence Generators},
  booktitle    = {Selected Areas in Cryptography, 7th Annual International Workshop,
                  {SAC} 2000, Waterloo, Ontario, Canada, August 14-15, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2012},
  pages        = {217--232},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44983-3\_16},
  doi          = {10.1007/3-540-44983-3\_16},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/GongY00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/YoussefT96,
  author       = {Amr M. Youssef and
                  Stafford E. Tavares},
  title        = {Comment on "Bounds on the Number of Functions Satisfying the
                  Strict Avalanche Criterion"},
  journal      = {Inf. Process. Lett.},
  volume       = {60},
  number       = {5},
  pages        = {271--275},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0020-0190(96)00166-4},
  doi          = {10.1016/S0020-0190(96)00166-4},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/YoussefT96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/YoussefT95,
  author       = {Amr M. Youssef and
                  Stafford E. Tavares},
  title        = {Resistance of Balanced s-Boxes to Linear and Differential Cryptanalysis},
  journal      = {Inf. Process. Lett.},
  volume       = {56},
  number       = {5},
  pages        = {249--252},
  year         = {1995},
  url          = {https://doi.org/10.1016/0020-0190(95)00156-6},
  doi          = {10.1016/0020-0190(95)00156-6},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/YoussefT95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ita/YoussefT95,
  author       = {Amr M. Youssef and
                  Stafford E. Tavares},
  editor       = {Jean{-}Yves Chouinard and
                  Paul Fortier and
                  T. Aaron Gulliver},
  title        = {Information Leakage of a Randomly Selected Boolean Function},
  booktitle    = {Information Theory and Applications II, 4th Canadian Workshop, Lac
                  Delage, Qu{\'{e}}bec, Canada, May 28-30, 1995, Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {1133},
  pages        = {41--52},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/BFb0025134},
  doi          = {10.1007/BFB0025134},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ita/YoussefT95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics