Publications

Journal publications

  • AlTawy, R., Youssef. A.M. Security, Privacy, and Safety Aspects of Civilian Drones: A Survey. ACM Transactions on Cyber-Physical Systems, Vol.1, (2) (2017), pp. 7:1-7:25 .
  • AlTawy, R., Youssef. A.M. A Meet-in-the-Middle Attack on Reduced-Round Kalynab/2b. IEICE Transactions. Information and Systems, Vol.E99-D, (4) (2016), pp. 1246-1250.
  • AlTawy, R., Youssef. A.M. Security Tradeo s in Cyber Physical Systems: A Case Study Survey on Implantable Medical Devices. IEEE Access (4) (2016), pp. 959-979.
  • AlTawy, R., Youssef. A.M. A Meet in the Middle Attack on ReducedRound Kuznyechik. IEICE Transactions. Fundamentals, vol. E98-A, (10) (2015), pp. 2194-2198.
  • AlTawy, R., Youssef. A.M. Watch your Constants: Malicious Streebog. IET Information Security vol 9(6), (2015), pp. 328-333.
  • AlTawy, R., and Youssef, A. M. Integral distinguishers for reduced-round Stribog. Information Processing Letters, vol. 114, 8 (2014), pp. 426-431.
  • AlTawy, R., Kircanski, A., and Youssef, A. M. Second Order Collision for the 42-Step Reduced DHA-256 Hash Function. Information Processing Letters, vol. 113, (19-21) (2013), pp. 764-770.

Conference publications

  • AlTawy, R., Rohit, R., He, M., Mandal, K., Yang, G., Gong, G. sLiSCP: Simeck-based Permutations for Lightweight Sponge Cryptographic Primitives. In Selected Areas in Cryptography (2017), C. Adams and J. Camenisch, Eds., vol. 10719 of Lecture Notes in Computer Science, Springer. (to appear)
  • Rohit, R., AlTawy, R., Gong, G. MILP-Based Cube Attack on the Reduced-Round WG-5 Lightweight Stream Cipher. In Cryptography and Coding (2017), M. O’Neill, Eds., vol. 10655 of Lecture Notes in Computer Science, Springer, pp333-351.
  • AlTawy, R., ElSheikh, M., Youssef, A.M., Gong, G. Lelantos: A Blockchain-based Anonymous Physical Delivery System. In Privacy, Security and Trust (2017). (to appear)
  • AlTawy, R., Youssef. A.M. Preimage Analysis of the Maelstrom-0 Hash Function. In Security, Privacy, and Applied Cryptography Engineering (2015), R. Chakraborty, P. Schwabe, J. Solworth, Eds., vol. 9354 of Lecture Notes in Computer Science, Springer, pp 113-126.
  • Abdelkhalek, A., AlTawy, R., Tolba, M., Youssef. A.M. Meet-in-the- Middle Attacks on Reduced Round Hierocrypt-3. In Latincrypt (2015), K. Lauter, F. Rodriguez-Henriquez, Eds., vol. 9230 of Lecture Notes in Computer Science, Springer, pp. 187-203.
  • AlTawy, R., Onur, D., Youssef. A.M. Fault Analysis of Kuznyechik. In Current Trends in Cryptology, CTCrypt (2015), pp. 302-317. (One of the best 5 papers)
  • AlTawy, R., Tolba, M., Youssef. A.M. A Higher Order Key Partitioning Attack with Application to LBlock . In Codes, Cryptology and Information Security (2015), S. El Hajji, A. Nitaj, C. Carlet, E. Souidi, Eds., vol. 9084 of Lecture Notes in Computer Science, Springer, pp. 215-227.
  • Abdelkhalek, A., AlTawy, R., Youssef. A.M. Impossible Differential Properties of Reduced Round Streebog. In Codes, Cryptology and Information Security (2015), S. El Hajji, A. Nitaj, C. Carlet, E. Souidi, Eds., vol. 9084 of Lecture Notes in Computer Science, Springer, pp. 274-286.
  • AlTawy, R., Youssef. A.M. Differential Fault Analysis of Streebog. In ISPEC (2015), J. Lopez and Y. Wu, Eds., vol. 9065 of Lecture Notes in Computer Science, Springer, pp. 35-49.
  • AlTawy, R., and Youssef, A. M. Second Preimage Analysis of Whirlwind. In Inscrypt (2014), D. Lin, M. Yung, and J. Zhou, Eds., vol 8957 of Lecture Notes in Computer Science, Springer, pp. 311-328.
  • AlTawy, R., Youssef. A.M. Differential Sieving for 2-step matching meet-in-the-middle attack with application to LBlock. In Lightsec (2014), T. Eisenbarth and E. Ozturk, Eds., vol. 8898 of Lecture Notes in Computer Science, Springer, pp. 126-139.
  • AlTawy, R., and Youssef, A.M. Preimage Attacks on Reduced-Round Stribog. In Africacrypt (2014), D. Pointcheval and D. Vergnaud, Eds., vol. 8469 of Lecture Notes in Computer Science, Springer, pp. 109-125.
  • Kircanski, A., AlTawy, R., and Youssef, A. M. A heuristic for finding compatible differential paths with application to HAS-160. In Asiacrypt (2013), K. Sako and P. Sarkar, Eds., vol. 8270 of Lecture Notes in Computer Science, Springer, pp. 175-188.
  • AlTawy, R., Kircanski, A., and Youssef, A. M. Rebound attacks on Stribog. In ICISC (2013), H.-S. Lee and D.-G. Han, Eds., vol. 8565 of Lecture Notes in Computer Science, Springer, pp. 464-483.