What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Amr M. Youssef
Google Scholar
56
publications in security and cryptology related venues
Year
Venue
Title
2024
journals/tifs
MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning.
Ahmed Aly
Shahrear Iqbal
Amr M. Youssef
Essam Mansour
2024
conf/uss
Racing for TLS Certificate Validation: A Hijacker's Guide to the Android TLS Galaxy.
Sajjad Pourali
Xiufen Yu
Lianying Zhao
Mohammad Mannan
Amr M. Youssef
2024
conf/eurosp
"Trust Me Over My Privacy Policy": Privacy Discrepancies in Romantic AI Chatbot Apps.
Abdelrahman Ragab
Mohammad Mannan
Amr M. Youssef
2023
conf/esorics
Try On, Spied On?: Privacy Analysis of Virtual Try-On Websites and Android Apps.
Abdelrahman Ragab
Mohammad Mannan
Amr M. Youssef
2023
conf/icbc2
vPass: Publicly Verifiable Fair Exchange Protocol for Vehicle Passports.
Ismail Afia
Hisham S. Galal
Riham AlTawy
Amr M. Youssef
2022
journals/compsec
Blindfold: Keeping private keys in PKIs and CDNs out of sight.
Hisham S. Galal
Mohammad Mannan
Amr M. Youssef
2022
conf/fc
Dispute-Free Scalable Open Vote Network Using zk-SNARKs.
Muhammad ElSheikh
Amr M. Youssef
2022
conf/eurosp
Got Sick and Tracked: Privacy Analysis of Hospital Websites.
Xiufen Yu
Nayanamana Samarasinghe
Mohammad Mannan
Amr M. Youssef
2022
conf/eurosp
SAUSAGE: Security Analysis of Unix domain Socket usAGE in Android.
Mounir Elgharabawy
Blas Kojusner
Mohammad Mannan
Kevin R. B. Butler
Byron Williams
Amr M. Youssef
2022
conf/esorics
No Salvation from Trackers: Privacy Analysis of Religious Websites and Mobile Apps.
Nayanamana Samarasinghe
Pranay Kapoor
Mohammad Mannan
Amr M. Youssef
2022
conf/asiaccs
On Measuring Vulnerable JavaScript Functions in the Wild.
Maryna Kluban
Mohammad Mannan
Amr M. Youssef
2021
journals/tifs
Threat Intelligence Generation Using Network Telescope Data for Industrial Control Systems.
Olivier Cabana
Amr M. Youssef
Mourad Debbabi
Bernard Lebel
Marthe Kassouf
Ribal Atallah
Basile L. Agba
2021
conf/acisp
On MILP-Based Automatic Search for Bit-Based Division Property for Ciphers with (Large) Linear Layers.
Muhammad ElSheikh
Amr M. Youssef
2021
conf/fc
Publicly Verifiable and Secrecy Preserving Periodic Auctions.
Hisham S. Galal
Amr M. Youssef
2020
journals/tifs
An Intrusion Detection Method for Line Current Differential Relays.
Amir Ameli
Ali Hooshyar
Ehab F. El-Saadany
Amr M. Youssef
2020
conf/fc
Scalable Open-Vote Network on Ethereum.
Mohamed Seifelnasr
Hisham S. Galal
Amr M. Youssef
2020
conf/esorics
Privacy Preserving Netting Protocol for Inter-bank Payments.
Hisham S. Galal
Amr M. Youssef
2020
conf/acsac
Betrayed by the Guardian: Security and Privacy Risks of Parental Control Solutions.
Suzan Ali
Mounir Elgharabawy
Quentin Duchaussoy
Mohammad Mannan
Amr M. Youssef
2020
conf/africacrypt
Impossible Differential Cryptanalysis of Reduced-Round Tweakable TWINE.
Mohamed Tolba
Muhammad ElSheikh
Amr M. Youssef
2020
conf/cans
Integral Cryptanalysis of Reduced-Round Tweakable TWINE.
Muhammad ElSheikh
Amr M. Youssef
2019
conf/fc
Trustee: Full Privacy Preserving Vickrey Auction on Top of Ethereum.
Hisham S. Galal
Amr M. Youssef
2019
conf/fc
Short Paper: Deploying PayWord on Ethereum.
Muhammad ElSheikh
Jeremy Clark
Amr M. Youssef
2019
conf/esorics
An Efficient Micropayment Channel on Ethereum.
Hisham S. Galal
Muhammad ElSheikh
Amr M. Youssef
2019
conf/esorics
On Privacy Risks of Public WiFi Captive Portals.
Suzan Ali
Tousif Osman
Mohammad Mannan
Amr M. Youssef
2019
conf/acsac
AppVeto: mobile application self-defense through resource access veto.
Tousif Osman
Mohammad Mannan
Urs Hengartner
Amr M. Youssef
2019
conf/africacrypt
On MILP-Based Automatic Search for Differential Trails Through Modular Additions with Application to Bel-T.
Muhammad ElSheikh
Ahmed Abdelkhalek
Amr M. Youssef
2018
journals/tifs
Attack Detection for Load Frequency Control Systems Using Stochastic Unknown Input Estimators.
Amir Ameli
Ali Hooshyar
Ameen Hassan Yazdavar
Ehab F. El-Saadany
Amr M. Youssef
2018
conf/ccs
To Intercept or Not to Intercept: Analyzing TLS Interception in Network Appliances.
Louis Waked
Mohammad Mannan
Amr M. Youssef
2018
conf/fc
Verifiable Sealed-Bid Auction on the Ethereum Blockchain.
Hisham S. Galal
Amr M. Youssef
2018
conf/esorics
Succinctly Verifiable Sealed-Bid Auction Smart Contract.
Hisham S. Galal
Amr M. Youssef
2018
conf/sacrypt
Integral Attacks on Round-Reduced Bel-T-256.
Muhammad ElSheikh
Mohamed Tolba
Amr M. Youssef
2017
journals/tosc
MILP Modeling for (Large) S-boxes to Optimize Probability of Differential Characteristics.
Ahmed Abdelkhalek
Yu Sasaki
Yosuke Todo
Mohamed Tolba
Amr M. Youssef
2017
conf/ccs
BinSequence: Fast, Accurate and Scalable Binary Code Reuse Detection.
He Huang
Amr M. Youssef
Mourad Debbabi
2017
conf/icisc
Improved Meet-in-the-Middle Attacks on Reduced Round Kuznyechik.
Mohamed Tolba
Amr M. Youssef
2017
conf/africacrypt
Impossible Differential Attack on Reduced Round SPARX-64/128.
Ahmed Abdelkhalek
Mohamed Tolba
Amr M. Youssef
2017
conf/africacrypt
Impossible Differential Cryptanalysis of Reduced-Round SKINNY.
Mohamed Tolba
Ahmed Abdelkhalek
Amr M. Youssef
2017
conf/sacrypt
Multidimensional Zero-Correlation Linear Cryptanalysis of Reduced Round SPARX-128.
Mohamed Tolba
Ahmed Abdelkhalek
Amr M. Youssef
2015
conf/latincrypt
Meet-in-the-Middle Attacks on Reduced-Round Hierocrypt-3.
Ahmed Abdelkhalek
Riham AlTawy
Mohamed Tolba
Amr M. Youssef
2015
conf/lightsec
Meet-in-the-Middle Attacks on Reduced Round Piccolo.
Mohamed Tolba
Ahmed Abdelkhalek
Amr M. Youssef
2014
conf/lightsec
Differential Sieving for 2-Step Matching Meet-in-the-Middle Attack with Application to LBlock.
Riham AlTawy
Amr M. Youssef
2014
conf/africacrypt
Preimage Attacks on Reduced-Round Stribog.
Riham AlTawy
Amr M. Youssef
2013
conf/icisc
Rebound Attacks on Stribog.
Riham AlTawy
Aleksandar Kircanski
Amr M. Youssef
2013
conf/asiacrypt
A Heuristic for Finding Compatible Differential Paths with Application to HAS-160.
Aleksandar Kircanski
Riham AlTawy
Amr M. Youssef
2012
conf/latincrypt
On the Sosemanuk Related Key-IV Sets.
Aleksandar Kircanski
Amr M. Youssef
2012
conf/sacrypt
Boomerang and Slide-Rotational Analysis of the SM3 Hash Function.
Aleksandar Kircanski
Yanzhao Shen
Gaoli Wang
Amr M. Youssef
2012
conf/sacrypt
Cryptanalysis of the Loiss Stream Cipher.
Alex Biryukov
Aleksandar Kircanski
Amr M. Youssef
2011
conf/africacrypt
Differential Fault Analysis of Sosemanuk.
Yaser Esmaeili Salehani
Aleksandar Kircanski
Amr M. Youssef
2010
conf/africacrypt
Differential Fault Analysis of HC-128.
Aleksandar Kircanski
Amr M. Youssef
2009
conf/sacrypt
Differential Fault Analysis of Rabbit.
Aleksandar Kircanski
Amr M. Youssef
2007
conf/acns
Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme.
Xuxin Xu
Lingyu Wang
Amr M. Youssef
Bo Zhu
2001
conf/acisp
Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP 2000.
Amr M. Youssef
Guang Gong
2001
conf/eurocrypt
Hyper-bent Functions.
Amr M. Youssef
Guang Gong
2001
conf/sacrypt
Boolean Functions with Large Distance to All Bijective Monomials: N Odd Case.
Amr M. Youssef
Guang Gong
2000
conf/fse
On the Interpolation Attacks on Block Ciphers.
Amr M. Youssef
Guang Gong
2000
conf/sacrypt
On Welch-Gong Transformation Sequence Generators.
Guang Gong
Amr M. Youssef
2000
conf/sacrypt
Cryptanalysis of the "Augmented Family of Cryptographic Parity Circuits" Proposed at ISW'97.
Amr M. Youssef
Coauthors
Abdelrahman Ragab
(2)
Ahmed Abdelkhalek
(7)
Ahmed Aly
(1)
Aleksandar Kircanski
(8)
Alex Biryukov
(1)
Ali Hooshyar
(2)
Ameen Hassan Yazdavar
(1)
Amir Ameli
(2)
Amr M. Youssef
(56)
Basile L. Agba
(1)
Bernard Lebel
(1)
Blas Kojusner
(1)
Bo Zhu
(1)
Byron Williams
(1)
Ehab F. El-Saadany
(2)
Essam Mansour
(1)
Gaoli Wang
(1)
Guang Gong
(5)
He Huang
(1)
Hisham S. Galal
(9)
Ismail Afia
(1)
Jeremy Clark
(1)
Kevin R. B. Butler
(1)
Lianying Zhao
(1)
Lingyu Wang
(1)
Louis Waked
(1)
Marthe Kassouf
(1)
Maryna Kluban
(1)
Mohamed Seifelnasr
(1)
Mohamed Tolba
(9)
Mohammad Mannan
(12)
Mounir Elgharabawy
(2)
Mourad Debbabi
(2)
Muhammad ElSheikh
(8)
Nayanamana Samarasinghe
(2)
Olivier Cabana
(1)
Pranay Kapoor
(1)
Quentin Duchaussoy
(1)
Ribal Atallah
(1)
Riham AlTawy
(6)
Sajjad Pourali
(1)
Shahrear Iqbal
(1)
Suzan Ali
(2)
Tousif Osman
(2)
Urs Hengartner
(1)
Xiufen Yu
(2)
Xuxin Xu
(1)
Yanzhao Shen
(1)
Yaser Esmaeili Salehani
(1)
Yosuke Todo
(1)
Yu Sasaki
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to