Amr M. Youssef

 

1515 St. Catherine Street West
S-EV 007.638
Montreal, Quebec, CANADA
H3G 2W1

 

Email: (my last name) at ciise dot concordia dot ca

Phone: (514) 848-2424 - ext 5441

Fax: (514) 848-3171

 

 

  About Me

 

"I am old enough to know that a red carpet is just a rug",  Al Gore 

 

 

 

Research interests

 

  •  Cryptography and Network Security
  •  Sequence Design for FH-CDMA
  •  Software Protection
  •  Information Hiding
  •  Hardware  Implementation of Cryptographic Algorithms

 
 

Teaching

 

  • Data Communication & Computer Networks (COMP445)
  • System Hardware (Winter 2004, Fall 2005, Winter 2006)  (COMP228).
  • Foundation of Cryptography (Fall 2005, Winter 2006, Fall 2006, Winter 2007, Winter 2008, Fall 2008, Fall 2009, Winter 2010, Fall 2010, Winter 2011, Fall2012) (INSE6110)
  • Information Systems Security ( Fall 2007, Fall 2008, Fall2009) (SOEN321)
  • Operating System Security (INSE6130 Fall 2012)
  • System Hardware (SOEN228, Winter 2013)

 

 

Education

 

  • Ph.D. (1997)  Department of Electrical and Computer Engineering , Queen's University, Canada.
  • M.Sc. (1993)  Department of Electronics and Communication Engineering, Cairo University, Egypt
  • B.Sc. (1990)  Department of Electronics and Communication Engineering, Cairo University, Egypt

 

Work Experience

 

Before joining CIISE at Concordia University, I worked for the following companies and institutions

 

Professional Activities

 

Program Committee member

 

·          SECURWARE 2013

·          LightSec 2013

·         The Second International Workshop on Modern Cryptography and Security Engineering (MoCrySEn 2013)

·          First IEEE International Workshop on Security and Forensics in Communication Systems (SFCS  2012)             

·          IEEE ICC 2011

·         The 6th IEEE International Workshop on Security, Trust, and Privacy for Software Applications (STPSA 2011)

·         International Conference on Security Aspects in Information Technology, High Performance Computing and Networking (InfoSecHiComNet 2011)

·         IEEE Globecom 2011

·         IEEE WCNC 2011

·         The Third International Conference on Wireless & Mobile Networks (WiMo-2011)

·         SECURWARE 2011

·         IEEE ICC 2011

·         AFRICACRYPT 2011

·         Eighth Annual Conference on Privacy, Security and Trust, PST 2010

·         11th International Conference on Cryptology in India, Indocrypt 2010

·         17th workshop on Selected Areas in Cryptography (SAC 2010)    

·         The Second International Workshop on Network Assurance and Security Services in Ubiquitous Environments (NASSUE 2010)

·         IEEE Globecom 2010

·         IEEE ICC 2010

·         SECURWARE 2010

·         AFRICACRYPT 2010

·         The Second International Symposium on Data, Privacy and E-commerce (ISDPE-2010)    

·         16th workshop on Selected Areas in Cryptography (SAC 2009)    

·         IEEE Globecom'09

·         SECURWARE 2009

·         Canadian Workshop on Information Theory (CWIT 2009)

·         IEEE ICC 2009

·         15th workshop on Selected Areas in Cryptography (SAC 2008)    

·         IEEE Globecom'08

·         IEEE ICC 2008

·         AFRICACRYPT 2008

·         SETA'08

·         IEEE Globecom' 07

·         IEEE ICC 2007

·         IEEE Globecom' 06

·         Sixth International Conference on Sequences and Their Applications, SETA'06, China.

·         IASTED Communication, Network and Information Security workshop, CNIS 2005, Phoenix, Arizona, USA

·         12th workshop on Selected Areas in Cryptography (SAC 2005), Waterloo, Canada.       

·         Second International Conference on Secure Communications and the Internet (SeCi 2004), Cairo, Egypt, Dec 2004.

·         International Conference on Communications and Information Technology (ICICT2003), Cairo, Egypt.

·         Third International Conference on Cryptology in India (INDOCRYPT 2002), India.

·         17th International Conference on Information Security (IFIP/SEC 2002), Cairo, Egypt.

·         Seventh workshop on Selected Areas in Cryptography (SAC 2000), Waterloo, Canada.

 

 

 

 

(Co)-Supervised Thesis (Green are sole supervision)

 

·           M. Azer, Cryptanalysis of Linear Feedback Shift Register (LFSR)-based Stream Ciphers, M.Sc. Thesis, Cairo University, 2003

·          R. Abdel latif, An FPGA Implementation of the Advanced Encryption Standard, M.Sc. Thesis, Cairo University, 2004

·         G. Farouk,  A Study and Realization Of  the RSA Algorithm Using FPGA, , M.Sc. Thesis, Cairo University, 2005

·         T. Gad, M.Sc. Thesis, Cairo University, 2005

·         Z. Saber, M.A.Sc. Thesis, Concordia University, 2005 (Currently working for Suncor)

·         Ren Wang, M.A.Sc. Thesis, Concordia University, 2006 (Currently working for Research In Motion (RIM))

·         M. Faisal Uddin, M.A.Sc. Thesis, Concordia University, 2006 (Currently a Ph.D. Student)

·         K. Liu, M.A.Sc. Thesis, Concordia University, 2006, (Currently working for IBM, Calgary)

·         O. Abdel-Mannan,  M.A.Sc. Thesis, Concordia University, 2007 (Currently working for Future Electronics)

·         S. Kabir,  M.A.Sc. Thesis, Concordia University, 2007 (Currently working for SNC-Lavalin)

·         James S. Grabowski, M.A.Sc. Thesis, Concordia University, 2007

·         Xuxin Xu, M.A.Sc. Thesis, Concordia University, 2007  (MIS security director with Soltron Group, Montreal,  then a  Security Manager  in freeborders, China)

·         Hamad Bin Salleeh, M.A.Sc. Thesis, Concordia University, 2008  (Currently a Ph.D. Student)

·         Yazan El-Hamwi, M.A.Sc. Thesis, Concordia University, 2008 (Currently working for Matrikon)

·         Assad Sakha, M.A.Sc. Thesis, Concordia University, 2008 (Currently working for PricewaterhouseCoopers LLP)

·         Saad Inshi, M.A.Sc. Thesis, Concordia University, 2008

·         Wen Ming Liu, M.A.Sc. Thesis, Concordia University, 2008  (Currently a Ph.D. Student)

·         Aleksandar Kircanski, M.A.Sc. Thesis, Concordia University, 2009 (Currently a Ph.D. Student)

·         Ayman Assra, Ph.D. Thesis, Concordia University, 2010 (Currently a postdoc with the French National Institute for Transport and Safety Research
(INRETS), Lille, France)

·         Mohamed Rasslan, Ph.D. Thesis, Concordia University, 2010 (Currently, Assistant professor, Egypt)

·         Pei Pei Shi, M.A.Sc. Thesis, Concordia University, 2010 (Currently software developer with Infinity Labs, Montreal)

·         Rabeah Al-Zaidy, M.A.Sc. Thesis, Concordia University, 2010

·         Esam  Elsheh, Ph.D. Thesis, Concordia University, 2011 (Currently, Assistant professor, Libya)

·         Yaser Esmaeili Salehani, M.A.Sc. Thesis, Concordia University, 2011 (Currently a Ph.D. Student, Queen's University)

·         Merwais Shinwari,  M.A.Sc. Thesis, Concordia University, 2012(Currently with Morgan Stanley, Montreal)

·         Roger Zahno,  M.A.Sc. Thesis, Concordia University, 2012 (Currently with Morgan Stanley, Montreal)

·         Abdel Alim Kamal, Ph.D. Thesis, Concordia University, 2012 (Currently, Assistant professor, Egypt)

·         Osama Hayatle,  M.A.Sc. Thesis, Concordia University, 2013 

·         Samira Baouti, M.A.Sc. Thesis, Concordia University, 2013, (Currently with Ericson, Montreal)

·         Aleksandar Kircanski, Ph.D. Thesis, Concordia University, 2013

 

 

 

 

Edited Books

 

Selected Publications

 

·         Amr Youssef, Cryptanalysis of a knapsack-based probabilistic encryption scheme, Information Sciences, Volume 179, Issue 18,  Pages 3116-3121, 2009

·         Wen Ming Liu and Amr Youssef, On the existence of (10, 2,7,488) resilient functions, IEEE Transactions on Information Theory, vol. 55, no. 1, pp. 411-412, 2009

·         Amr Youssef, On the Security of a Cryptosystem Based on Multiple-Parameters Discrete Fractional Fourier Transform,  IEEE Signal Processing Letters, Vol. 15, 2008

·         R. Al-Zaidy, A. Kircanski, and A.M.  Youssef, Cryptanalysis of the parameterized improved fast encryption algorithm for multimedia,  IEEE Communications Letters, Volume 12, Issue 12, December 2008 Page(s):886 - 887

·         Amr Youssef, An Attack Against the Revised Murthy–Swamy Cryptosystem, IEEE Transactions on Circuits and Systems—II: Express briefs, Vol . 55, No. 2, Feb2008

·         Amr Youssef, Generalized hyper-bent functions over GF(p), Discrete Applied MathematicsVolume 155, Issue 815 April 2007Pages 1066-1070

·         Amr Youssef, A Comment on Cryptographic Applications of Brahmagupta–Bhãskara Equation, IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, Volume 54,  Issue 4,  April 2007

·         Amr Youssef, Cryptanalysis of a public key cryptosystem based on two cryptographic assumptions,  IEE Proceedings - Information Security,  Volume 153, Issue 4, pp. p. 163-165, 2006

·         Z. Saber, M. F. Uddin, and Amr Youssef,,  On the existence of (9,3,5,240) resilient functions, IEEE Transactions on Information Theory, Volume 52, Issue 5, May 2006 Page(s):2269 - 2270

·         A.M. Youssef, S.E. Tavares and G. Gong, On some probabilistic approximations for AES-like s-boxes, Discrete MathematicsVolume 306, Issue 1628 August 2006Pages 2016-2020

·         A.M. Youssef and G. Gong, On linear complexity of sequences over GF(2n), Theoretical Computer ScienceVolume 352, Issues 1-37 March 2006Pages 288-292

·         A.M. Youssef and S.E. TavareAffine equivalence in the AES round function, Discrete Applied MathematicsVolume 148, Issue 215 May 2005Pages 161-170

·         G. Gong and A.M. Youssef, ``On Welch-Gong Transformation Sequence Generators", IEEE Transactions on Information Theory, vol. 48, No. 11, pp. 2837, 2846, 2002.

·         A.M. Youssef and G. Gong, “Cryptanalysis of a public key cryptosystem proposed at ACISP 2000,” Proc. of the 6th Australian conference on information security and privacy, ACISP’ 2001, Lectures Notes in Computer Science, LNCS2119, Springer-Verlag, pp. 15-20, 2001.

·         Youssef and G. Gong, “On the Interpolation Attacks on Block Ciphers,” Proceedings of Fast Software Encryption (FSE’ 2000), Lectures Notes in Computer Science, LNCS 1978, Springer-Verlag, pp. 109-120, 2001.

·         A.M. Youssef and G. Gong, “Hyper-bent Functions'',  Proc. of  Eurocrypt' 2001, Lectures Notes in Computer Science, LNCS2045,  Springer-Verlag, pp. 406-419, 2001.

 

A note to Prospective Students

 

Due to the large number of the emails I receive from potential applicants, I will reply to your email only if I am interested in your application.