Подписаться
Riham AlTawy
Riham AlTawy
Associate Professor, Dept. ECE, University of Victoria
Подтвержден адрес электронной почты в домене uvic.ca - Главная страница
Название
Процитировано
Процитировано
Год
Security, privacy, and safety aspects of civilian drones: A survey
R Altawy, AM Youssef
ACM Transactions on Cyber-Physical Systems 1 (2), 1-25, 2016
5092016
Security tradeoffs in cyber physical systems: A case study survey on implantable medical devices
R AlTawy, AM Youssef
Ieee Access 4, 959-979, 2016
1832016
Lelantos: A blockchain-based anonymous physical delivery system
R AlTawy, M ElSheikh, AM Youssef, G Gong
2017 15th Annual Conference on Privacy, Security and Trust (PST), 15-1509, 2017
712017
sLiSCP: Simeck-based permutations for lightweight sponge cryptographic primitives
R AlTawy, R Rohit, M He, K Mandal, G Yang, G Gong
Selected Areas in Cryptography–SAC 2017: 24th International Conference …, 2018
522018
ACE: An authenticated encryption and hash algorithm
M Aagaard, R AlTawy, G Gong, K Mandal, R Rohit
Submission to NIST-LWC (announced as round 2 candidate on August 30, 2019), 2019
402019
Lightweight broadcast authentication protocol for edge-based applications
M Nakkar, R Altawy, A Youssef
IEEE Internet of Things Journal 7 (12), 11766-11777, 2020
382020
SLISCP-light: Towards Hardware Optimized Sponge-specific Cryptographic Permutations
R Altawy, R Rohit, M He, K Mandal, G Yang, G Gong
ACM Transactions on Embedded Computing Systems (TECS) 17 (4), 1-26, 2018
342018
A meet in the middle attack on reduced round Kuznyechik
R AlTawy, AM Youssef
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2015
342015
Preimage attacks on reduced-round Stribog
R AlTawy, AM Youssef
Progress in Cryptology–AFRICACRYPT 2014: 7th International Conference on …, 2014
332014
Watch your constants: malicious Streebog
R AlTawy, AM Youssef
IET Information Security 9 (6), 328-333, 2015
312015
Rebound attacks on Stribog
R AlTawy, A Kircanski, AM Youssef
International Conference on Information Security and Cryptology, 175-188, 2013
312013
WAGE: an authenticated encryption with a twist
R AlTawy, G Gong, K Mandal, R Rohit
IACR transactions on symmetric cryptology, 132-159, 2020
242020
GASE: A lightweight group authentication scheme with key agreement for edge computing applications
M Nakkar, R AlTawy, A Youssef
IEEE Internet of Things Journal 10 (1), 840-854, 2022
212022
Differential fault analysis of Streebog
R AlTawy, AM Youssef
International Conference on Information Security Practice and Experience, 35-49, 2015
212015
Fault analysis of Kuznyechik
R AlTawy, O Duman, AM Youssef
Cryptology ePrint Archive, 2015
192015
Integral distinguishers for reduced-round Stribog
R AlTawy, AM Youssef
Information Processing Letters 114 (8), 426-431, 2014
172014
Spix: An authenticated cipher submission to the NIST LWC competition
R AlTawy, G Gong, M He, K Mandal, R Rohit
Submitted to NIST Lightweight Standardization Process, 2019
162019
WAGE: An authenticated cipher
M Aagaard, R AlTawy, G Gong, K Mandal, R Rohit, N Zidaric
Submission to NIST Lightweight Cryptography Standardization Project …, 2019
142019
Mesh: A supply chain solution with locally private blockchain transactions
R AlTawy, G Gong
Proceedings on Privacy Enhancing Technologies, 2019
142019
Efficient inter-cloud authentication and micropayment protocol for IoT edge computing
M Seifelnasr, R AlTawy, A Youssef
IEEE Transactions on Network and Service Management 18 (4), 4420-4433, 2021
132021
В данный момент система не может выполнить эту операцию. Повторите попытку позднее.
Статьи 1–20