dblp.uni-trier.dewww.uni-trier.de

Amr M. Youssef

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
21EEAleksandar Kircanski, Amr M. Youssef: A Related-Key Attack on TREYFER. SECURWARE 2008: 213-217
2007
20 Eli Biham, Amr M. Youssef: Selected Areas in Cryptography, 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers Springer 2007
19EEXuxin Xu, Lingyu Wang, Amr M. Youssef, Bo Zhu: Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme. ACNS 2007: 177-193
2006
18EEMohammad Faisal Uddin, Amr M. Youssef: An Artificial Life Technique for the Cryptanalysis of Simple Substitution Ciphers. CCECE 2006: 1582-1585
17EERen Wang, Amr M. Youssef, Ahmed K. Elhakeem: On Some Feature Selection Strategies for Spam Filter Design. CCECE 2006: 2186-2189
16 Ren Wang, Amr M. Youssef, Ahmed K. Elhakeem: Artificial life feature selection techniques for spam e-mail filters. Computational Intelligence 2006: 102-107
15EEAmr M. Youssef, Stafford E. Tavares, Guang Gong: On some probabilistic approximations for AES-like s-boxes. Discrete Mathematics 306(16): 2016-2020 (2006)
14EEZ. Saber, Mohammad Faisal Uddin, Amr M. Youssef: On the existence of (9, 3, 5, 240) resilient functions. IEEE Transactions on Information Theory 52(5): 2269-2270 (2006)
2005
13EEAmr M. Youssef, Stafford E. Tavares: Affine equivalence in the AES round function. Discrete Applied Mathematics 148(2): 161-170 (2005)
2002
12 Guang Gong, Amr M. Youssef: Cryptographic properties of the Welch-Gong transformation sequence generators. IEEE Transactions on Information Theory 48(11): 2837-2846 (2002)
2001
11 Serge Vaudenay, Amr M. Youssef: Selected Areas in Cryptography, 8th Annual International Workshop, SAC 2001 Toronto, Ontario, Canada, August 16-17, 2001, Revised Papers Springer 2001
10EEAmr M. Youssef, Guang Gong: Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP 2000. ACISP 2001: 15-20
9EEAmr M. Youssef, Guang Gong: Hyper-bent Functions. EUROCRYPT 2001: 406-419
8EEAmr M. Youssef, Guang Gong: Cryptanalysis of Imai and Matsumoto Scheme B Asymmetric Cryptosystem. INDOCRYPT 2001: 214-222
7EEAmr M. Youssef, Guang Gong: Boolean Functions with Large Distance to All Bijective Monomials: N Odd Case. Selected Areas in Cryptography 2001: 49-59
2000
6EEAmr M. Youssef, Guang Gong: On the Interpolation Attacks on Block Ciphers. FSE 2000: 109-120
5EEGuang Gong, Amr M. Youssef: On Welch-Gong Transformation Sequence Generators. Selected Areas in Cryptography 2000: 217-232
4EEAmr M. Youssef: Cryptanalysis of the ``Augmented Family of Cryptographic Parity Circuits'' Proposed at ISW'97. Selected Areas in Cryptography 2000: 29-38
1996
3EEAmr M. Youssef, Stafford E. Tavares: Comment on "Bounds on the Number of Functions Satisfying the Strict Avalanche Criterion". Inf. Process. Lett. 60(5): 271-275 (1996)
1995
2 Amr M. Youssef, Stafford E. Tavares: Information Leakage of a Randomly Selected Boolean Function. Information Theory and Applications 1995: 41-52
1EEAmr M. Youssef, Stafford E. Tavares: Resistance of Balanced s-Boxes to Linear and Differential Cryptanalysis. Inf. Process. Lett. 56(5): 249-252 (1995)

Coauthor Index

1Eli Biham [20]
2Ahmed K. Elhakeem [16] [17]
3Guang Gong [5] [6] [7] [8] [9] [10] [12] [15]
4Aleksandar Kircanski [21]
5Z. Saber [14]
6Stafford E. Tavares [1] [2] [3] [13] [15]
7Mohammad Faisal Uddin [14] [18]
8Serge Vaudenay [11]
9Lingyu Wang [19]
10Ren Wang [16] [17]
11Xuxin Xu [19]
12Bo Zhu [19]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)