2008 |
21 | EE | Aleksandar Kircanski,
Amr M. Youssef:
A Related-Key Attack on TREYFER.
SECURWARE 2008: 213-217 |
2007 |
20 | | Eli Biham,
Amr M. Youssef:
Selected Areas in Cryptography, 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers
Springer 2007 |
19 | EE | Xuxin Xu,
Lingyu Wang,
Amr M. Youssef,
Bo Zhu:
Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme.
ACNS 2007: 177-193 |
2006 |
18 | EE | Mohammad Faisal Uddin,
Amr M. Youssef:
An Artificial Life Technique for the Cryptanalysis of Simple Substitution Ciphers.
CCECE 2006: 1582-1585 |
17 | EE | Ren Wang,
Amr M. Youssef,
Ahmed K. Elhakeem:
On Some Feature Selection Strategies for Spam Filter Design.
CCECE 2006: 2186-2189 |
16 | | Ren Wang,
Amr M. Youssef,
Ahmed K. Elhakeem:
Artificial life feature selection techniques for spam e-mail filters.
Computational Intelligence 2006: 102-107 |
15 | EE | Amr M. Youssef,
Stafford E. Tavares,
Guang Gong:
On some probabilistic approximations for AES-like s-boxes.
Discrete Mathematics 306(16): 2016-2020 (2006) |
14 | EE | Z. Saber,
Mohammad Faisal Uddin,
Amr M. Youssef:
On the existence of (9, 3, 5, 240) resilient functions.
IEEE Transactions on Information Theory 52(5): 2269-2270 (2006) |
2005 |
13 | EE | Amr M. Youssef,
Stafford E. Tavares:
Affine equivalence in the AES round function.
Discrete Applied Mathematics 148(2): 161-170 (2005) |
2002 |
12 | | Guang Gong,
Amr M. Youssef:
Cryptographic properties of the Welch-Gong transformation sequence generators.
IEEE Transactions on Information Theory 48(11): 2837-2846 (2002) |
2001 |
11 | | Serge Vaudenay,
Amr M. Youssef:
Selected Areas in Cryptography, 8th Annual International Workshop, SAC 2001 Toronto, Ontario, Canada, August 16-17, 2001, Revised Papers
Springer 2001 |
10 | EE | Amr M. Youssef,
Guang Gong:
Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP 2000.
ACISP 2001: 15-20 |
9 | EE | Amr M. Youssef,
Guang Gong:
Hyper-bent Functions.
EUROCRYPT 2001: 406-419 |
8 | EE | Amr M. Youssef,
Guang Gong:
Cryptanalysis of Imai and Matsumoto Scheme B Asymmetric Cryptosystem.
INDOCRYPT 2001: 214-222 |
7 | EE | Amr M. Youssef,
Guang Gong:
Boolean Functions with Large Distance to All Bijective Monomials: N Odd Case.
Selected Areas in Cryptography 2001: 49-59 |
2000 |
6 | EE | Amr M. Youssef,
Guang Gong:
On the Interpolation Attacks on Block Ciphers.
FSE 2000: 109-120 |
5 | EE | Guang Gong,
Amr M. Youssef:
On Welch-Gong Transformation Sequence Generators.
Selected Areas in Cryptography 2000: 217-232 |
4 | EE | Amr M. Youssef:
Cryptanalysis of the ``Augmented Family of Cryptographic Parity Circuits'' Proposed at ISW'97.
Selected Areas in Cryptography 2000: 29-38 |
1996 |
3 | EE | Amr M. Youssef,
Stafford E. Tavares:
Comment on "Bounds on the Number of Functions Satisfying the Strict Avalanche Criterion".
Inf. Process. Lett. 60(5): 271-275 (1996) |
1995 |
2 | | Amr M. Youssef,
Stafford E. Tavares:
Information Leakage of a Randomly Selected Boolean Function.
Information Theory and Applications 1995: 41-52 |
1 | EE | Amr M. Youssef,
Stafford E. Tavares:
Resistance of Balanced s-Boxes to Linear and Differential Cryptanalysis.
Inf. Process. Lett. 56(5): 249-252 (1995) |