-
1Academic Journal
المساهمون: The Pennsylvania State University CiteSeerX Archives
المصدر: https://eprint.iacr.org/2011/160.pdf.
مصطلحات موضوعية: ARMADILLO2, meet-in-the-middle, key recovery attack, preimage
وصف الملف: application/pdf
-
2
المؤلفون: Nasour Bagheri, Sadegh Sadeghi, Mohamed Ahmed Abdelraheem
المصدر: Microprocessors and Microsystems. 52:34-48
مصطلحات موضوعية: Theoretical computer science, Differential cryptanalysis, Computer Networks and Communications, Computer science, Contrast (statistics), 020206 networking & telecommunications, 02 engineering and technology, Higher-order differential cryptanalysis, law.invention, Piling-up lemma, Artificial Intelligence, Hardware and Architecture, law, Block (telecommunications), Linear cryptanalysis, 0202 electrical engineering, electronic engineering, information engineering, 020201 artificial intelligence & image processing, Cryptanalysis, Software, Block cipher
-
3
المؤلفون: Shahid Raza, Mohamed Ahmed Abdelraheem, Anass Sedrati
المصدر: Interoperability, Safety and Security in IoT ISBN: 9783319937960
مصطلحات موضوعية: Cryptocurrency, Core (game theory), Blockchain, Computer science, business.industry, Decentralized network, Internet of Things, business, Computer security, computer.software_genre, computer
-
4
المؤلفون: Mohamed Ahmed Abdelraheem, Spyros Mantzouratos, Jeremias Mechler, Sebastian Thomas Schork, Efi Papatheocharous, Thomas Carnehult, Kateryna Yurchenko, Gunther Schiefer, Panagiotis Gouvas, George Moldovan, Matthias Gabel
مصطلحات موضوعية: Structure (mathematical logic), Security framework, Information privacy, business.industry, Computer science, Economics, Data Security, Context (language use), Cloud computing, Data science, Task (project management), Software, Privacy, ddc:330, business, Implementation, Cloud, Key Management
وصف الملف: application/pdf
-
5
المصدر: Lecture Notes in Computer Science ISBN: 9783319678153
DPM/CBT@ESORICS
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Data Privacy Management, Cryptocurrencies and Blockchain Technologyمصطلحات موضوعية: 0301 basic medicine, Point (typography), Computer Sciences, business.industry, Relational database, Computer science, Privacy. SSE Database. Inference Attacks, Inference, Inference attack, computer.software_genre, Encryption, 03 medical and health sciences, Datavetenskap (datalogi), 030104 developmental biology, 0302 clinical medicine, Symmetric-key algorithm, 030220 oncology & carcinogenesis, Injection attacks, Data mining, business, computer
وصف الملف: application/pdf
-
6
المصدر: CCSW
Proceedings of the 2016 ACM on Cloud Computing Security Workshop
Proceedings of the 2016 ACM on Cloud Computing Security Workshop-CCSW 16
Proceedings of the 2016 ACM on Cloud Computing Security Workshop-CCSW '16مصطلحات موضوعية: 0301 basic medicine, Scheme (programming language), Theoretical computer science, Computer science, business.industry, Computation, 0102 computer and information sciences, Encryption, 01 natural sciences, 03 medical and health sciences, 030104 developmental biology, Symmetric-key algorithm, 010201 computation theory & mathematics, Simple (abstract algebra), Computer Science::Multimedia, Information system, Bitmap index, business, computer, Computer Science::Databases, Boolean conjunctive query, Computer Science::Cryptography and Security, computer.programming_language
-
7
المؤلفون: Mohamed Ahmed Abdelraheem, Christian Gehrmann
المصدر: 2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom)
CloudComمصطلحات موضوعية: business.industry, Computer science, Distributed computing, 020208 electrical & electronic engineering, 020206 networking & telecommunications, Cloud computing, Denial-of-service attack, 02 engineering and technology, Synchronization, High availability, Synchronization (computer science), 0202 electrical engineering, electronic engineering, information engineering, State (computer science), Internet of Things, business, Protocol (object-oriented programming)
-
8
المؤلفون: Nasour Bagheri, Mohammad Reza Aref, Praveen Gauravaram, Hoda AlKhzaimi, Javad Alizadeh, Mohamed Ahmed Abdelraheem
المصدر: Progress in Cryptology--INDOCRYPT 2015 ISBN: 9783319266169
INDOCRYPTمصطلحات موضوعية: Key-recovery attack, Computer Sciences, System of linear equations, Linear hull, Generalized linear mixed model, SIMON, High Energy Physics::Theory, Piling-up lemma, Mixed Integer Programming (MIP), Datavetenskap (datalogi), Linear cryptanalysis, Linear approximation, Hamming weight, Correlation matrix, Algorithm, GeneralLiterature_REFERENCE(e.g.,dictionaries,encyclopedias,glossaries), ComputingMilieux_MISCELLANEOUS, Block cipher, Mathematics
وصف الملف: application/pdf
-
9
المصدر: Advances in Cryptology--EUROCRYPT 2015 ISBN: 9783662467992
EUROCRYPT (1)مصطلحات موضوعية: Authenticated encryption, Polynomial, Theoretical computer science, Universal hashing, Algebraic structure, Open problem, Hash function, Disjoint sets, Computer security, computer.software_genre, computer, Cryptographic nonce, Mathematics
-
10
المؤلفون: Mohamed Ahmed Abdelraheem
المصدر: Lecture Notes in Computer Science ISBN: 9783642376818
ICISCمصطلحات موضوعية: Discrete mathematics, Matrix difference equation, Permutation, Branch and bound, Linear cryptanalysis, Block matrix, Differential (infinitesimal), Linear span, Mathematics, Block cipher
-
11
المؤلفون: Gregor Leander, Martin Ågren, Mohamed Ahmed Abdelraheem, Peter Beelen
المصدر: Lecture Notes in Computer Science ISBN: 9783642320088
CRYPTOمصطلحات موضوعية: S-box, Margin (machine learning), Computer science, business.industry, Perspective (graphical), Linear cryptanalysis, Cryptography, business, Computer security, computer.software_genre, computer, Block cipher
-
12
المؤلفون: Mathieu David, Erik Zenner, Julia Borghoff, Mohamed Ahmed Abdelraheem
المصدر: Cryptography and Coding ISBN: 9783642255151
IMA Int. Conf.مصطلحات موضوعية: Theoretical computer science, Dictionary attack, Differential cryptanalysis, Computer science, business.industry, Keystream, Stream cipher attack, Cryptography, Related-key attack, Impossible differential cryptanalysis, Higher-order differential cryptanalysis, law.invention, Cipher, law, Running key cipher, Weak key, Linear cryptanalysis, Fluhrer, Mantin and Shamir attack, Slide attack, Cryptanalysis, business, Stream cipher, Block cipher, Key size
-
13
المؤلفون: Erik Zenner, Hoda AlKhzaimi, Gregor Leander, Mohamed Ahmed Abdelraheem
المصدر: Advances in Cryptology – CRYPTO 2011 ISBN: 9783642227912
CRYPTOمصطلحات موضوعية: Discrete mathematics, Fluhrer, Mantin and Shamir attack, Meet-in-the-middle attack, Chosen-ciphertext attack, Related-key attack, Slide attack, Birthday attack, Ciphertext-only attack, Distinguishing attack, Mathematics
-
14
المؤلفون: Erik Zenner, Mohamed Ahmed Abdelraheem, Gregor Leander
المصدر: Fast Software Encryption ISBN: 9783642217012
FSEمصطلحات موضوعية: Discrete mathematics, Permutation, Differential cryptanalysis, Cipher, Symmetric-key algorithm, business.industry, Linear cryptanalysis, Key (cryptography), Higher-order differential cryptanalysis, business, Mathematics, Block cipher
-
15Academic Journal
المؤلفون: Mohamed Ahmed Abdelraheem, Julia Borghoff, Erik Zenner
المساهمون: The Pennsylvania State University CiteSeerX Archives
المصدر: https://eprint.iacr.org/2011/262.pdf.
وصف الملف: application/pdf
-
16Academic Journal
المؤلفون: Mohamed Ahmed Abdelraheem, Peter Beelen
المساهمون: The Pennsylvania State University CiteSeerX Archives
المصدر: https://eprint.iacr.org/2012/303.pdf.
وصف الملف: application/pdf
-
17Academic Journal
المساهمون: The Pennsylvania State University CiteSeerX Archives
المصدر: http://eprint.iacr.org/2014/226.pdf.
وصف الملف: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.491.2262; http://eprint.iacr.org/2014/226.pdf