What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Abdelrahaman Aly
Google Scholar
ORCID:
0000-0003-2038-5668
15
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tches
FANNG-MPC: Framework for Artificial Neural Networks and Generic MPC.
Najwa Aaraj
Abdelrahaman Aly
Tim Güneysu
Chiara Marcolla
Johannes Mono
Rogerio Paludo
Iván Santos-González
Mireia Scholz
Eduardo Soria-Vazquez
Victor Sucasas
Ajith Suresh
2022
conf/esorics
A Fast, Practical and Simple Shortest Path Protocol for Multiparty Computation.
Abdelrahaman Aly
Sara Cleemput
2022
conf/cans
Through the Looking-Glass: Benchmarking Secure Multi-party Computation Comparisons for ReLU 's.
Abdelrahaman Aly
Kashif Nawaz
Eugenio Salazar
Victor Sucasas
2020
journals/tosc
Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols.
Abdelrahaman Aly
Tomer Ashur
Eli Ben-Sasson
Siemen Dhooghe
Alan Szepieniec
2019
conf/ccs
Zaphod: Efficiently Combining LSSS and Garbled Circuits in SCALE.
Abdelrahaman Aly
Emmanuela Orsini
Dragos Rotaru
Nigel P. Smart
Tim Wood
2019
conf/acns
Benchmarking Privacy Preserving Scientific Operations.
Abdelrahaman Aly
Nigel P. Smart
2019
conf/esorics
Collaborative Authentication Using Threshold Cryptography.
Aysajan Abidin
Abdelrahaman Aly
Mustafa A. Mustafa
2018
conf/fc
Practically Efficient Secure Distributed Exponentiation Without Bit-Decomposition.
Abdelrahaman Aly
Aysajan Abidin
Svetla Nikova
2017
conf/esorics
SePCAR: A Secure and Privacy-Enhancing Protocol for Car Access Provision.
Iraklis Symeonidis
Abdelrahaman Aly
Mustafa A. Mustafa
Bart Mennink
Siemen Dhooghe
Bart Preneel
2016
conf/fc
Practically Efficient Secure Single-Commodity Multi-market Auctions.
Abdelrahaman Aly
Mathieu Van Vyve
2016
conf/cans
Efficient Verifiable Computation of XOR for Biometric Authentication.
Aysajan Abidin
Abdelrahaman Aly
Enrique Argones-Rúa
Aikaterini Mitrokotsa
2016
conf/cans
An MPC-Based Privacy-Preserving Protocol for a Local Electricity Trading Market.
Aysajan Abidin
Abdelrahaman Aly
Sara Cleemput
Mustafa A. Mustafa
2016
conf/cans
A Privacy-Preserving Model for Biometric Fusion.
Christina-Angeliki Toli
Abdelrahaman Aly
Bart Preneel
2014
conf/icisc
Securely Solving Classical Network Flow Problems.
Abdelrahaman Aly
Mathieu Van Vyve
2013
conf/fc
Securely Solving Simple Combinatorial Graph Problems.
Abdelrahaman Aly
Edouard Cuvelier
Sophie Mawet
Olivier Pereira
Mathieu Van Vyve
Coauthors
Abdelrahaman Aly
(15)
Aikaterini Mitrokotsa
(1)
Ajith Suresh
(1)
Alan Szepieniec
(1)
Aysajan Abidin
(4)
Bart Mennink
(1)
Bart Preneel
(2)
Chiara Marcolla
(1)
Christina-Angeliki Toli
(1)
Dragos Rotaru
(1)
Edouard Cuvelier
(1)
Eduardo Soria-Vazquez
(1)
Eli Ben-Sasson
(1)
Emmanuela Orsini
(1)
Enrique Argones-Rúa
(1)
Eugenio Salazar
(1)
Iraklis Symeonidis
(1)
Iván Santos-González
(1)
Johannes Mono
(1)
Kashif Nawaz
(1)
Mathieu Van Vyve
(3)
Mireia Scholz
(1)
Mustafa A. Mustafa
(3)
Najwa Aaraj
(1)
Nigel P. Smart
(2)
Olivier Pereira
(1)
Rogerio Paludo
(1)
Sara Cleemput
(2)
Siemen Dhooghe
(2)
Sophie Mawet
(1)
Svetla Nikova
(1)
Tim Güneysu
(1)
Tim Wood
(1)
Tomer Ashur
(1)
Victor Sucasas
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to