Riham AlTawy
Riham AlTawy
Verified email at uvic.ca - Homepage
TitleCited byYear
Security, privacy, and safety aspects of civilian drones: A survey
R Altawy, AM Youssef
ACM Transactions on Cyber-Physical Systems 1 (2), 1-25, 2016
862016
Security tradeoffs in cyber physical systems: A case study survey on implantable medical devices
R AlTawy, AM Youssef
IEEE Access 4, 959-979, 2016
582016
Watch your constants: malicious Streebog
R AlTawy, AM Youssef
IET Information Security 9 (6), 328-333, 2015
212015
Rebound attacks on Stribog
R AlTawy, A Kircanski, AM Youssef
International Conference on Information Security and Cryptology, 175-188, 2013
212013
A meet in the middle attack on reduced round Kuznyechik
R AlTawy, AM Youssef
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2015
202015
Preimage attacks on reduced-round stribog
R AlTawy, AM Youssef
International Conference on Cryptology in Africa, 109-125, 2014
202014
sLiSCP: Simeck-based permutations for lightweight sponge cryptographic primitives
R AlTawy, R Rohit, M He, K Mandal, G Yang, G Gong
International Conference on Selected Areas in Cryptography, 129-150, 2017
192017
Differential fault analysis of Streebog
R AlTawy, AM Youssef
International Conference on Information Security Practice and Experience, 35-49, 2015
142015
Integral distinguishers for reduced-round Stribog
R AlTawy, AM Youssef
Information Processing Letters 114 (8), 426-431, 2014
142014
Lelantos: A blockchain-based anonymous physical delivery system
R AlTawy, M ElSheikh, AM Youssef, G Gong
2017 15th Annual Conference on Privacy, Security and Trust (PST), 15-1509, 2017
112017
SLISCP-light: Towards Hardware Optimized Sponge-specific Cryptographic Permutations
R Altawy, R Rohit, M He, K Mandal, G Yang, G Gong
ACM Transactions on Embedded Computing Systems (TECS) 17 (4), 1-26, 2018
102018
Fault analysis of Kuznyechik
R AlTawy, O Duman, AM Youssef
Математические вопросы криптографии 7 (2), 21-34, 2016
102016
A Meet-in-the-Middle Attack on Reduced-Round Kalyna-b/2b
R AlTawy, A Abdelkhalek, AM Youssef
IEICE TRANSACTIONS on Information and Systems 99 (4), 1246-1250, 2016
82016
Second preimage analysis of Whirlwind
R AlTawy, AM Youssef
International Conference on Information Security and Cryptology, 311-328, 2014
72014
Meet-in-the-middle attacks on reduced-round Hierocrypt-3
A Abdelkhalek, R Altawy, M Tolba, AM Youssef
International Conference on Cryptology and Information Security in Latin …, 2015
62015
Towards a cryptographic minimal design: The sLiSCP family of permutations
R AlTawy, R Rohit, M He, K Mandal, G Yang, G Gong
IEEE Transactions on Computers 67 (9), 1341-1358, 2018
52018
Differential Sieving for 2-step matching meet-in-the-middle attack with application to LBlock
R AlTawy, AM Youssef
International Workshop on Lightweight Cryptography for Security and Privacy …, 2014
52014
A heuristic for finding compatible differential paths with application to HAS-160
A Kircanski, R AlTawy, AM Youssef
International Conference on the Theory and Application of Cryptology and …, 2013
52013
Second order collision for the 42-step reduced DHA-256 hash function
R AlTawy, A Kircanski, A Youssef
Information Processing Letters 113 (19-21), 764-770, 2013
52013
ACE: An authenticated encryption and hash algorithm
M Aagaard, R AlTawy, G Gong, K Mandal, R Rohit
Submission to NIST-LWC, 2019
32019
The system can't perform the operation now. Try again later.
Articles 1–20