Publications

Journal publications

  • AlTawy, R., Youssef. A.M. Security, Privacy, and Safety Aspects of Civilian Drones: A Survey. ACM Transactions on Cyber-Physical Systems, Vol.1,(2) (2016), (to appear).
  • AlTawy, R., Youssef. A.M. A Meet-in-the-Middle Attack on Reduced-Round Kalynab/2b. IEICE Transactions. Information and Systems, Vol.E99-D,(4) (2016), pp. 1246-1250.
  • AlTawy, R., Youssef. A.M. Security Tradeo s in Cyber Physical Systems: A Case Study Survey on Implantable Medical Devices. IEEE Access (4) (2016), pp. 959-979.
  • AlTawy, R., Youssef. A.M. A Meet in the Middle Attack on ReducedRound Kuznyechik. IEICE Transactions. Fundamentals, vol. E98-A, (10) (2015), pp. 2194-2198.
  • AlTawy, R., Youssef. A.M. Watch your Constants: Malicious Streebog.IET Information Security vol 9(6), (2015), pp. 328-333.
  • AlTawy, R., and Youssef, A. M. Integral distinguishers for reduced-roundStribog. Information Processing Letters, vol. 114, 8 (2014), pp. 426-431.
  • AlTawy, R., Kircanski, A., and Youssef, A. M. Second Order Collision for the 42-Step Reduced DHA-256 Hash Function. Information ProcessingLetters, vol. 113, (19-21) (2013), pp. 764-770.

Conference publications

  • AlTawy, R., Youssef. A.M. Preimage Analysis of the Maelstrom-0 Hash Function. In Security, Privacy, and Applied Cryptography Engineering (2015), R. Chakraborty, P. Schwabe, J. Solworth, Eds., vol. 9354 of Lecture Notes in Computer Science, Springer, pp 113-126.
  • Abdelkhalek, A., AlTawy, R., Tolba, M., Youssef. A.M. Meet-in-the- Middle Attacks on Reduced Round Hierocrypt-3. In Latincrypt (2015), K. Lauter, F. Rodriguez-Henriquez, Eds., vol. 9230 of Lecture Notes in Computer Science, Springer, pp. 187-203.
  • AlTawy, R., Onur, D., Youssef. A.M. Fault Analysis of Kuznyechik. In the proceedings of the 4th workshop on Current Trends in Cryptology, CTCrypt (2015), pp. 302-317. (One of the best 5 papers)
  • AlTawy, R., Tolba, M., Youssef. A.M. A Higher Order Key Partitioning Attack with Application to LBlock . In Codes, Cryptology and Information Security (2015), S. El Hajji, A. Nitaj, C. Carlet, E. Souidi, Eds., vol. 9084 of Lecture Notes in Computer Science, Springer, pp. 215-227.
  • Abdelkhalek, A., AlTawy, R., Youssef. A.M. Impossible Di erential Properties of Reduced Round Streebog. In Codes, Cryptology and Information Security (2015), S. El Hajji, A. Nitaj, C. Carlet, E. Souidi, Eds., vol. 9084 of Lecture Notes in Computer Science, Springer, pp. 274-286.
  • AlTawy, R., Youssef. A.M. Di erential Fault Analysis of Streebog. In ISPEC (2015), J. Lopez and Y. Wu, Eds., vol. 9065 of Lecture Notes in Computer Science, Springer, pp. 35-49.
  • AlTawy, R., and Youssef, A. M. Second Preimage Analysis of Whirlwind. In Inscrypt (2014), D. Lin, M. Yung, and J. Zhou, Eds., vol 8957 of Lecture Notes in Computer Science, Springer, pp. 311-328.
  • AlTawy, R., Youssef. A.M. Di erential Sieving for 2-step matching meet-in-the-middle attack with application to LBlock. In Lightsec (2014), T. Eisenbarth and E. Ozturk, Eds., vol. 8898 of Lecture Notes in Computer Science, Springer, pp. 126-139.
  • AlTawy, R., and Youssef, A.M. Preimage Attacks on Reduced-Round Stribog. In Africacrypt (2014), D. Pointcheval and D. Vergnaud, Eds., vol. 8469 of Lecture Notes in Computer Science, Springer, pp. 109-125. (Accep- tance Ratio: 26/83)
  • Kircanski, A., AlTawy, R., and Youssef, A. M. A heuristic for nding compatible di erential paths with application to HAS-160. In Asiacrypt (2013), K. Sako and P. Sarkar, Eds., vol. 8270 of Lecture Notes in Computer Science, Springer, pp. 175-188.
  • AlTawy, R., Kircanski, A., and Youssef, A. M. Rebound attacks on Stribog. In ICISC (2013), H.-S. Lee and D.-G. Han, Eds., vol. 8565 of Lecture Notes in Computer Science, Springer, pp. 464-483.
  • Trabelsi, Z., AlTawy, R., An Anomaly Intrusion Detection System Employing Associative String Processor, The 9th International Conference on Networks (2010), pp. 220-225.