Edited Books
Antoine Joux and Amr Youssef, Proceedings of the 21st annual conference on Selected Areas in Cryptography, (SAC'2014), Lecture Notes in Computer Science, Springer-Verlag, volume 8781, 2014.
AmrYoussef, Abderrahmane Nitaj and Aboul Ella
Hassanien, Proceedings of the 6th International Conference on Cryptology in
Africa, (Africacrypt 2013), Lecture Notes in Computer Science,
Springer-Verlag, volume 7918, 2013.
Eli Biham and Amr Youssef, Editors, Proceedings of the thirteenth annual workshop on Selected Areas in
Cryptography, (SAC'2006), Lecture Notes
in Computer Science, Springer-Verlag, volume 4356, 2007.
Serge Vaudenay and Amr Youssef, Editors, Proceedings
of the eighth annual workshop on Selected Areas in Cryptography, (SAC'2001)”, Lecture Notes in Computer Science,
Springer-Verlag, volume 2259, 2001.
Publications in Lecture Notes in Computer Science
Mohamed Tolba, Ahmed Abdelkhalek, and Amr Youssef, Impossible Differential Cryptanalysis of Reduced-Round SKINNY, Africacrypt 2017, LNCS 10239 , 2017 (Acceptance Ratio 13/40).
Ahmed Abdelkhalek, Mohamed Tolba, and Amr Youssef, Impossible Differential Attack on Reduced Round SPARX-64/128, Africacrypt 2017, LNCS 10239, 2017. (Acceptance Ratio 13/40).
Mohamed Tolba, Ahmed Abdelkhalek and Amr Youssef, Truncated and Multiple Differential Cryptanalysis of Reduced Round Midori128, ISC 2016, LNCS Volume 9866, pp 3-17, 2016.
Ahmed Abdelkhalek , Mohamed Tolba, and Amr
Youssef, Improved Linear Cryptanalysis of Round-reduced ARIA, (Erratum) ISC 2016, LNCS Volume
9866, pp 18-24, 2016.
Mohamed Tolba, Ahmed Abdelkhalek and Amr Youssef, Meet-in-the-Middle Attacks on Reduced Round Piccolo, Lightsec 2015, to appear.
Riham AlTawy and Amr Youssef, Preimage Analysis of the Maelstrom-0 Hash Function, International Conference on Security, Privacy and Applied Cryptographic Engineering (SPACE 2015), LNCS 9354, pp. 113-126, 2015 (Acceptance Ratio 17/57).
Ahmed Abdelkhalek, Mohamed Tolba, and Amr Youssef, Improved Key Recovery Attack on Round-reduced Hierocrypt-L1 in the Single-Key Setting, International Conference on Security, Privacy and Applied Cryptographic Engineering, (SPACE 2015), LNCS 9354, pp. 139-150, 2015 (Acceptance Ratio 17/57).
Mohamed Tolba, Ahmed Abdelkhalek and Amr Youssef, Meet-in-the-Middle Attacks on Round-reduced Khudra, International Conference on Security, Privacy and Applied Cryptographic Engineering, (SPACE 2015), LNCS 9354, pp. 127-138, 2015 (Acceptance Ratio 17/57).
Ahmed Abdelkhalek, Riham AlTawy, Mohamed Tolba, and Amr Youssef, Meet-in-the-Middle Attacks on Reduced Round Hierocrypt-3, Proc. of Latincrypt 2015, LNCS 9230, pp. 187-203, 2015, (Acceptance Ratio 20/49).
Ahmed Abdelkhalek, Riham AlTawy and Amr Youssef, Impossible Differential Properties of Reduced Round Streebog, Proc of the International Conference in Codes, Cryptology and Information Security (C2SI 2015), LNCS 9084, pp. 274–286, 2015 (Acceptance Ratio: 22/59).
Riham AlTawy, Moahmed Tolba and Amr Youssef, A Higher Order Key Partitioning Attack with Application to LBlock, Proc of the International Conference in Codes, Cryptology and Information Security (C2SI 2015), LNCS 9084, pp. 215–227, 2015. (Acceptance Ratio: 22/59).
Riahm AlTawy and Amr Youssef, Differential Fault Analysis of Streebog, Information Security Practice & Experience Conference (ISPEC 2015), LNCS 9065, pp. 35–49, 2015, (Acceptance Ratio: 38/117).
Riham AlTawy and Amr Youssef , Second Preimage Analysis of Whirlwind, Proceedings of Information Security and Cryptography (Inscrypt 2014), LNCS 8957, pp. 311-328, 2015 (Acceptance Ratio: 29/93).
Riham AlTawy and Amr Youssef , Differential sieving for 2-step matching meet-in-the-middle attack with application to LBlock, Third International Workshop on Lightweight Cryptography for Security & Privacy, LightSec 2014, LNCS 8898, pp. 126–139, 2015 (Acceptance Ratio: 10/24).
Riham AlTawy and Amr Youssef , Preimage Attacks on Reduced-round Stribog, AFRICACRYPT 2014, LNCS 8469, pp. 109–125, 2014 (Acceptance Ratio: 26/83).
Riham
AlTawy,
Aleksandar Kircanski
and Amr Youssef, Rebound attacks on Stribog, 16th Annual International
Conference on Information Security and Cryptology, ICISC 2013, LNCS 8565, 2014
(Acceptance Ratio 31/126).
Aleksandar
Kircanski,
Riham AlTawy and Amr Youssef, A heuristic for finding
compatible differential paths with application to HAS-160, Proc. of ASIACRYPT
2013, LNCS 8270, pp. 465–484, 2013. (Acceptance Ratio 54/269)
Roger
Zahno,
Abdel Alim Kamal,
Amr M. Youssef, A Comparison Between Two off-the-shelf
Algebraic Tools for Extraction of Cryptographic Keys from Corrupted Memory
Images, ARES 2013, LNCS 8128, pp. 75–90,
2013.
Aleksandar
Kircanski,
Yanzhao Shen, Gaoli Wang, and Amr Youssef, Boomerang and Slide-Rotational
Analysis of the SM3 Hash Function, Proc. of SAC 2012, Lectures Notes in Computer Science, LNCS 7707,
Springer-Verlag, pp. 304-320, 2013 (Acceptance Ratio 24/87).
Alex
Biryukov, Aleksandar Kircanski and Amr M. Youssef, Cryptanalysis of the Loiss Stream Cipher,
Proc. of SAC 2012, Lectures
Notes in Computer Science, LNCS 7707, Springer-Verlag, pp. 119-134, 2013 (Acceptance Ratio 24/87)
Aleksandar
Kircanski and Amr Youssef, On the Sosemanuk related
key-IV sets, Proc. of Latincrypt 2012, LNCS 7533, pp. 271--287. Springer, Heidelberg
(2012) Acceptance Ratio 17/47.
Yaser
Esmaeili-Salehani,
Aleksandar Kircanski and Amr Youssef, Differential Fault Analysis
of Sosemanuk, Proc. of
Africacrypt 2011, Lectures Notes in Computer Science, LNCS 6737,
Springer-Verlag, pp. 316-331, 2011 (Acceptance Ration 23/76)
Aleksandar Kircanski and Amr Youssef, Differential Fault Analysis
of HC-128, Proc. of Africacrypt 2010, Lectures Notes in Computer Science, LNCS
6055, Springer-Verlag, pp. 261-278, 2010 (Acceptance rate 25/82)
Aleksandar Kircanski and Amr Youssef, Differential Fault Analysis of Rabbit, Proc. of the 7th annual workshop
on Selected Areas in Cryptography (SAC 2009), Lectures Notes in Computer
Science, LNCS 5867, Springer-Verlag, pp. 197-214, 2009 (Acceptance rate 28/86)
Xuxin Xu, Lingyu Wang,
Amr Youssef, Bo Zhu, Preventing Collusion Attacks on the
One-Way Function Tree (OFT) Scheme, Proc. 5 th International Conference on Applied
Cryptography and Network Security (ACNS 2007), Springer Lecture Notes in
Computer Science, LNCS 4521, Springer-Verlag, pp. 177-193, June 5-8, 2007. (Acceptance rate 31/260)
S.S. Mohamed, A.M. Youssef , E.F.
El-Saadany and M.M.A. Salama, Prostate Tissue
Characterization using TRUS Image Spectral Features, Proc.
of third International Conference
on Image Analysis and Recognition, ICIAR
2006, Póvoa de Varzim, Portugal, LNCS 4142, Springer-Verlag, pp. 589-601, 2006.
S.S. Mohamed, A.M. Youssef , E.F.
El-Saadany and M.M.A. Salama, Artificial Life Feature Selection Techniques for Prostrate Cancer
Diagnosis Using TRUS Images, Proceedings of
Second International Conference on
Image Analysis and Recognition, ICIAR 2005, Toronto, Canada, LNCS 3656,
Springer-Verlag, pp. 28-30, 2005 (Acceptance rate 166/295)
A.M. Youssef and Guang Gong, Cryptanalysis of
Imai and Matsumoto scheme B asymmetric cryptosystem, Proc. of Indocrypt 2001,
LNCS 2247, pp. 214-222, Springer-Verlag 2001. (Acceptance rate 32/102)
A.M. Youssef and G. Gong, Boolean
functions with large distance to all bijective monomials: N odd case, Proc. of
the 8th annual Workshop on Selected Areas in Cryptography (SAC’ 2001), Lecture
Notes in Computer Science, LNCS 2259, Springer-Verlag, pp. 49-59, 2001. (Acceptance
rate 25/57)
A.M. Youssef and G. Gong, Cryptanalysis of a
public key cryptosystem proposed at ACISP 2000, Proc. of the 6th Australian
conference on information security and privacy, ACISP’ 2001, Lectures Notes in
Computer Science, LNCS2119, Springer-Verlag, pp. 15-20, 2001. (Acceptance rate
37/81)
Youssef and G. Gong, On the
Interpolation Attacks on Block Ciphers, Proceedings of Fast Software
Encryption (FSE’ 2000), Lectures Notes in Computer Science, LNCS 1978, Springer-Verlag,
pp. 109-120, 2001.
A.M. Youssef and G. Gong, Hyper-bent Functions, Proc. of Eurocrypt' 2001, Lectures Notes in Computer
Science, LNCS2045, Springer-Verlag, pp.
406-419, 2001. (Acceptance rate 33/155)
A.M. Youssef, Cryptanalysis of the
Augmented Family of Cryptographic Parity Circuits, Proc. of the 7th annual
workshop on Selected Areas in Cryptography (SAC’ 2000), Lectures Notes in
Computer Science, LNCS2012, Springer-Verlag, pp. 29-38, 2000. (Acceptance rate
24/41)
G. Gong and A.M. Youssef, On
Welch-Gong Transformation Sequence Generators, Proc. of the 7th annual
workshop on Selected Areas in Cryptography (SAC’ 2000), Lectures Notes in
Computer Science, LNCS2012, Springer-Verlag, pp. 217-232, 2000. (Acceptance
rate 24/41)
A.M. Youssef and S.E. Tavares, Information Leakage of Randomly Selected Boolean Functions, 4th
Canadian Workshop On Information Theory.
May 1995, LNCS 1133, pp. 41,
Springer-Verlag 1996.
Referred Journal
Publications
Riham AlTawy, and Amr Youssef, Security, Privacy, and Safety Aspects of Civilian Drones: A Survey, ACM Transactions on Cyber-Physical Systems (TCPS), Volume 1, Issue 2, 2017
Mohamed Tolba, Ahmed Abdel Khalek and Amr Youssef, A Meet in the Middle Attack on Reduced Round Kiasu-BC, EICE TRANS. on Fundamentals of Electronics, Communications and Computer Sciences, Vol 99, Issue 10, pp. 1888-1890, 2016
Mahmoud Kamel, Walaa Hamouda and Amr Youssef, Ultra-Dense Networks: A Survey, IEEE Communications Surveys and Tutorials, Volume: 18, Issue: 4, pp. 2522 – 2545, 2016
Riham AlTawy, and Amr Youssef, Security Trade-offs in Cyber Physical Systems: A Case Study Survey on Implantable Medical Devices, IEEE Access, Vol. 4, pp.959-979, 2016.
Riham AlTawy, Ahmed Abdel Khalek and Amr
Youssef, A Meet-in-the-Middle Attack on Reduced-Round Kalyna-b/2b, IEICE TRANS.
INF. & SYST. Vol.E99-D, No.4, pp.1246-1250, 2016
Moahmed Tolba and Amr Youssef, Generalized MitM Attacks on Full TWINE, , Information Processing Letters, Volume 116, Issue 2, February 2016, Pages 128–135.
Riham AlTawy and Amr Youssef, A Meet in the Middle Attack on Reduced Round Kuznyechik, Accepted, IEICE Transactions, 2015.
Riham AlTawy and Amr Youssef, Watch your Constants: Malicious Streebog, Accepted, IET (formerly IEE) Information security, 2015.
Riham AlTawy and Amr Youssef, Integral Distinguishers for Reduced-round Stribog, Information Processing Letters, Information Processing Letters, vol. 114, pp. 426–431, 2014.
Riham AlTawy, Aleksandar Kircanski and Amr Youssef, Second Order Collision for the 42-Step Reduced DHA-256 Hash Function, Information Processing Letters, vol. 113, pp. 764–770, 2013
Abdel Alim Kamal and Amr Youssef, Strengthening Hardware Implementations of NTRUEncrypt Against Fault Analysis Attacks, Journal of Cryptographic Engineering, Volume 3, Issue 4, pp. 227-240 , 2013.
Osama Hayatle, Hadi Otrok, and Amr Youssef, A Markov Decision Process Model for High Interaction Honeypots, Information Security Journal: A Global Perspective, Volume 22, Issue 4, pp. 159-170, 2013.
Abdel Alim Kamal and Amr Youssef, Cryptanalysis of Alvarez et al. key exchange scheme, Information Sciences, Volume 223, 20, pp. 317–321, 2013.
Osama Hayatle, Amr Youssef and Hadi Otrok, Dempster-Shafer Evidence Combining for (Anti)-Honeypot Technologies, Information Security Journal: A Global Perspective, 21, no. 6 pp. 306-316, 2012.
Abdel Alim Kamal and Amr
Youssef, Cryptanalysis of a key exchange protocol based on the endomorphisms
ring End (Zp x Zp2), Applicable Algebra in Engineering, Communication and
Computing, AAECC, Vol. 23, no.
3-4, pp. 143-149, 2012.
R.
Al-Zaidy,
B. C. M. Fung, A. M. Youssef, and F. Fortin. Mining criminal networks from unstructured text documents, Digital Investigation, Vol. 8, pp. 147-160,
2012.
Abdel
Alim Kamal
and Amr Youssef, Cryptanalysis
of a GL(r,Zn)-based Public Key System, IEICE Trans.
Fundamentals,Vol.E95-A, No. 4, April 2012.
Abdel
Alim Kamal
and Amr Youssef, Fault Analysis
of the NTRUSign Digital Signature Scheme, Cryptography and Communications, Springer, Vol. 4, no. 2, pp.
131-144, 2012.
Merwais Shinwari, Amr Youssef and Walaa Hamouda, A Water-Filling Based Scheduling Algorithm for the Smart Grid, IEEE Transactions on Smart Grid, Volume: 3 , Issue: 2 pp. 710-719, 2012.
Aleksandar Kircanski and
Amr Youssef, On the Sliding Property of SNOW 3G and SNOW 2.0, IET
(formerly IEE) Information Security, vol 5, no.
4 199-206, 2011.
Amr Youssef, Cryptanalysis of a Quadratic Knapsack Cryptosystem, Computers & Mathematics with Applications, Volume 61 Issue 4, pp. 1261-1265, 2011.
Esam Elsheha and Amr Youssef, Cryptanalysis of a public key cryptosystem based on Boolean permutations, Journal of Discrete Mathematical Sciences and Cryptography, Volume 14, Issue 2, pages 107-115, 2011
Abdel Alim Kamal and Amr Youssef, Fault analysis of NTRUEncrypt, IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences Vol.E94-A No.4 pp.1156-1158, 2011
M. Rasslan and Amr Youssef, Comments on the Security of Chen's Authenticated Encryption Scheme, Computers and Electrical Engineering, Volume 37, Issue 1, January 2011, pp. 71-74.
Ayda Basyouni, Walaa Hamouda and Amr Youssef, Cooperative Relaying Protocol for Energy-constrained Ad-hoc Networks, IET (formerly IEE) Communications, Volume: 5, Issue 4, pp. 418 - 424 , 2011.
Ayda Basyouni, Walaa Hamouda and Amr Youssef, Improved Channel Access Protocol for Cooperative Ad-Hoc Networks, IET (formerly IEE) Communications, Volume 4, Issue 8, pp. 915-923, 2010.
M. Rasslan and Amr Youssef, Cryptanalysis of a Public Key Encryption Scheme Using Ergodic Matrices, IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences Vol.E94-A No.2 pp.853-854, 2011.
Ayman Assra, Walaa
Hamouda and Amr Youssef, A Channel Estimation and Data
Detection Scheme for Multiuser MIMO-CDMA Systems in Fading Channels, IEEE
Transactions on Vehicular Technology, Volume 59, Issue 6, pp. 2830-2844, 2010.
M. Rasslan and Amr
Youssef, Cryptanalysis of
Hwang-Lo-Hsiao-Chu Authenticated Encryption Schemes, IEICE Transactions
on Information and Systems, Vol.E93-D No.5 pp.1301-1302,
2010.
Ayman Assra, Walaa Hamouda and Amr Youssef, EM-Based Joint Channel Estimation and Data Detection for MIMO-CDMA Systems, IEEE Transactions on Vehicular Technology, Volume 59, Issue 3, pp. 1205-1216, 2010.
L. A. Khan, M. S. Baig, and Amr Youssef, Speaker Recognition from Encrypted VoIP Communications, Digital Investigation, Vol. 7, pp. 65-73, 2010.
Aleksandar Kircanski and Amr M. Youssef, On the structural weakness of the GGHN stream cipher, Cryptography and Communications, Vol. 2, No. 1, pp. 1-17, Springer-Verlag, 2009.
Amr Youssef, Cryptanalysis of a Knapsack-based Probabilistic Encryption Scheme, Information Sciences, Volume 179, Issue 18, Pages 3116-3121, 2009.
Amr Youssef, Cryptanalysis of
Boolean Permutation-based Key Escrow Scheme, Computers and Electrical Engineering, Volume 36, Issue 1, January 2010,
Pages 56-60.
Aleksandar Kircanski, Rabeah
Al-Zaidy, and Amr M. Youssef, A New
Distinguishing and Key Recovery Attack on NGG stream cipher, Vol.1, No.
2, pp. 269-282, Cryptography and Communications, Springer, 2009.
Ayman Assra, Walaa Hamouda, and Amr M. Youssef, BER Analysis of Space-Time Diversity in CDMA Systems over Frequency-Selective Fading Channels, IET (formerly IEE) Proceedings-Communications, vol. 3, no. 7, pp. 1216-1226, July 2009.
Rabeah Al-Zaidy,
Aleksandar Kircanski and Amr
M. Youssef, Cryptanalysis of the Parameterized Improved Fast Encryption
Algorithm for Multimedia,
IEEE communications letters,
Volume: 12, Issue: 12, pp.
886-887, 2008
Wen Ming Liu and Amr
Youssef, On the existence of (10,2,7,488)
Resilient Functions,
IEEE transactions on information theory, vol 55, no. 1, pp. 411-412, 2009.
Amr M.
Youssef, A comment on cryptographic applications of Brahmagupta-Bhakara
equation, IEEE Transactions on Circuits and Systems-II: Express Briefs, Volume
55, Issue 2, Feb. 2008 pp. 166-167
Amr M. Youssef, On the
security of a cryptosystem based on Multiple-Parameters Discrete Fractional
Fourier Transform, IEEE signal processing letters, Volume 15, Issue , 2008
pp.:77 – 78
Kun Liu, Walaa Hamouda,
and Amr Youssef, Performance of a MANET Directional
MAC Protocol with Angle-of-Arrival Estimation, Journal of Wireless
Communications and Mobile Computing, vol. 8, no. 6, pp. 759-769, 2008.
Amr M.
Youssef, Generalized Hyper-Bent Functions over GF(p), Discrete Applied Mathematics,
Volume 155, Issue 8, 15 April 2007, Pages 1066-1070
Amr M.
Youssef, Cryptanalysis of a cryptosystem based on Brahmagupta Bhãskara
Equation, IEEE Transactions on Circuits and Systems I: Fundamental Theory and
Applications, Volume 54, Issue 4, 2007.
Amr M. Youssef, Cryptanalysis of a public key cryptosystem
based on two cryptographic assumptions, IEE Proceedings - Information
Security, Volume 153, Issue 4, pp. p.
163-165, 2006.
A. Youssef, S. E. Tavares, and G.
Gong, On Some Probabilistic Approximations for
AES-like S-boxes, Discrete Mathematics,
Vol. 306, pp. 2016-2020, 2006.
Z. Saber, M. Uddin and
Amr Youssef, On the existence of (9,3,5,240) resilient functions, IEEE Transactions on Information Theory,
Volume 52, Issue 5, pp. 2269 – 2270,
2006.
Amr Youssef and Guang Gong, On
linear complexity of sequences over GF(2n), Theoretical computer science, Volume: 352,
Issue: 1-3, , pp. 288-292, 2006 .
A.M. Youssef and S.E. Tavares, Affine Equivalence in the AES Round Function, Journal of Discrete Applied
Mathematics, Volume: 148, Issue: 2, May 15, 2005, pp. 161-170, 2006.
T. K. Abdel-Galil, E. F.
El-Saadany, A. M. Youssef, and M. M. A. Salama, Disturbance Classification
Using Hidden Markov Models and Vector Quantization, IEEE Transaction on Power Delivery, Vol. 20,
No. 3, pp. 2129-2135, 2005
T. K. Abdel-Galil, M. Kamel, E.F.
El-Saadany, A.M. Youssef and M.M.A. Salama, Power Quality Disturbance
Identification using Inductive Inference Approach, IEEE Transaction on Power
Delivery, Volume: 19, issue: 4, pp.1812– 1818, 2004.
A. M.
Youssef, T.
K. Abdel-Galil, E. F. El-Saadany, and M.
M. A. Salama, Disturbance classification utilizing dynamic time warping
classifier, IEEE Transaction on Power Delivery, Volume: 19,
issue: 1, pp.272– 278, 2004.
A. .M. Youssef and S.E. Tavares, Comments on the security of fast encryption algorithm for multimedia (FEA-M),
IEEE Transactions on Consumer Electronics, Volume: 49 Issue: 1, pp. 168 -170,
2003
G. Gong and A.M. Youssef, Cryptographic properties of the Welch-Gong transformation sequence
generators, IEEE Transactions on Information Theory, vol. 48, No. 11, pp.
2837, 2846, 2002.
A.M. Youssef and S.E. Tavares, Cryptanalysis of key agreement scheme
based on generalized inverses of matrices, IEE Electronics Letters, Vol.33,
No. 21, pp. 1777-1778, 1997.
A.M. Youssef and S.E. Tavares, Cryptanalysis of
the Nonlinear Parity Circuits Proposed at Crypto '90, IEE Electronics Letters,
Vol.33, No. 7, pp. 585-586, 1997.
A.M. Youssef and S.E. Tavares, Comments on Bounds on the Number of
Functions Satisfying the Strict Avalanche Criterion, Information Processing
Letters 60, pp. 271-275, 1996.
A.M. Youssef and S.E. Tavares, Resistance of Balanced S-boxes to Linear and Differential Cryptanalysis,
Information Processing Letters,
56(1995), pp. 249-252,1995.
A.M. Youssef, S.E. Tavares, S.
Mister and C.M. Adams, Linear approximation of Injective S-boxes, IEE Electronics
Letters, Vol.31, No. 25, pp. 2168-2169
,1995.
A.M. Youssef and S.E. Tavares, Number of Nonlinear Regular S-boxes, IEE Electronics Letters, Vol.31,
No. 19, pp. 1643-1644, 1995.
Riham AlTawy, Onur Duman, and Amr M. Youssef, Fault Analysis of Kuznyechik, 4th workshop on Current Trends in Cryptology, CTCrypt’15.
Saurabh Oberoi, Weilong Song and Amr Youssef, AndroSAT: Security Analysis Tool for Android Applications, Securware 2014
A. Mert Kara, Hamad Binsalleeh, Amr Youssef, and Mourad Debbabi, Characterization of Malicious Payload Distribution Channels in DNS, Poc. of the Sixth IFIP International Conference on New Technologies, Mobility and Security, NTMS'2014.
A. Mert Kara, Hamad Binsalleeh, Mohammad Mannan, Amr Youssef, and Mourad Debbabi, Detection of Malicious Payload Distribution Channels in DNS, Poc. of the IEEE ICC 2014 - Communication and Information Systems Security Symposium
Merwais Shinwari, Amr Youssef, and Walaa Hamouda, A Privacy Preserving Approach to Smart Metering, Advances in Security of Information and Communication Networks, (SecNet 2013), SecNet 2013, CCIS 381, Springer-Verlag, pp. 164–176, 2013
Aleksandar Kircanski and
Amr Youssef, On the Weak State in GGHN-like Ciphers, in Proc. of the seventh International
Conference on Availability, Reliability and Security (ARES 2012), Workshop on
Modern Cryptography and Security Engineering (MoCrySEn), 2012.
Abdel Alim and Amr
Youssef, A Scan-Based Side Channel Attack on the NTRUEncrypt
Cryptosystem, in Proc. of the
seventh International Conference on Availability, Reliability and Security
(ARES 2012), Workshop on Modern Cryptography and Security Engineering (MoCrySEn),
2012.
Roger Zahno and Amr
Youssef, An obfuscated implementation of RC4, Proc. Of the fifth International Conference on
Network Security & Applications (CNSA-2012), Advances in Computing and
Information Technology, Springer-Verlag, Volume 176, pp 113-129, 2012.
Osama Hayatle, Hadi Otrok
and Amr Youssef, A Game Theoretic Investigation for High Interaction Honeypots,
IEEE International Workshop on Security and Forensics in Communication Systems
('ICC'12 WS - SFCS'), in the Proceedings
of IEEE ICC 2012 workshops (acceptance rate 45.83%.).
Yaser Esmaeili Salehani
and Amr Youssef, Differential Fault Analysis of HUMMINGBIRD, Proc. of SECRYPT
2011, 2011.
Rabeah Al-Zaidy,
Benjamin C. M. Fung and Amr M. Youssef, Towards Discovering Criminal
Communities from Textual Data, Proc. of the 26th ACM Symposium on Applied
Computing, (SAC 2011), Computer Forensics Track.
Peipei Shi, Bo Zhu and Amr Youssef, A Framework to
Strengthen Password Authentication Using
Mobile Devices and Browser Extensions, Proc. of the 10th IEEE International
Symposium on Signal Processing and Information Technology, ISSPIT 2010.
Esam Elsheh and Amr
Youssef, On the security of image encryption schemes based on Multiple
Parameters Transforms, Proc. of the 10th IEEE International Symposium on
Signal Processing and Information Technology, ISSPIT 2010.
Abdel Alim Kamal and Amr
Youssef, Enhanced Implementation of the NTRU-Encrypt Algorithm Using Graphics
Cards, Proc. of the International Conference on Parallel, Distributed and Grid
Computing Conference (PDGC 2010).
Ayda Basyouni, Walaa Hamouda and Amr
Youssef, A New Rate Control Technique for cdma2000 1xEV, Proc. of Globecom’10
Ayman Assra, Walaa
Hamouda and Amr Youssef, Joint Iterative Channel Estimation and Data Detection
for MIMO-CDMA Systems over Frequency-Selective Fading Channels, Proc. of
Globecom’10
H. Binsalleeh, T.
Ormerod, A. Boukhtouta, P. Sinha, A. Youssef, M. Debbabi, and L. Wang, On the
Analysis of the Zeus Botnet Crimeware Toolkit, Eight International Conference
on Privacy, Security and Trust, PST 2010 (Best
Paper Award).
Ayman Assra, Walaa
Hamouda and Amr Youssef, EM Channel Estimation and Data Detection for
MIMO-CDMA Systems over Slow-Fading Channels, IEEE VTC2010-Fall, Ottawa, Canada
Mohamed Rasslan and Amr
Youssef, A bilinear pairing based hidden signature scheme, The second
international conference on wireless & mobile networks (WiMo-2010):
workshop on communication security & information assurance, Communications
in computer and information science (CCIS), Springer-verlag, 2010.
Thomas Ormerod, Lingyu Wang, Mourad
Debbabi, Amr Youssef, Hamad Binsalleeh, Amine Boukhtouta, and
Prosenjit Sinha, Defaming Botnet Toolkits: A Bottom-Up Approach to Mitigating
the Threat, SECURWARE 2010
Abdel Alim Kamal and Amr
Youssef, Applications of SAT Solvers to AES key Recovery from Decayed Key
Schedule Images, SECURWARE 2010
Abdel Alim Kamal and Amr
Youssef, An FPGA Implementation of AES with
Fault Analysis Countermeasures, Proc. of the 20th IEEE International
Conference on Microelectronics, ICM 2009.
Abdel Alim Kamal and Amr
Youssef, An FPGA Implementation of the
NTRUEncrypt Cryptosystem, Proc. of the
20th IEEE International Conference on Microelectronics, ICM 2009.
Ayman Assra, Walaa
Hamouda and Amr Youssef, Performance of Superimposed Training-Based Channel
Estimation in MIMI CDMA systems, Proc. of Globecom’09
Ayda Basyouni, Walaa Hamouda and Amr
Youssef, On Reducing Blocking Probability in Cooperative Ad-hoc Networks,
Proc. of Globecom’09
Peipei Shi, Bo Zhu, and Amr Youssef, A Rotary PIN Entry Scheme Resilient to Shoulder-Surfing, Proc. Internet Technology and Secured Transactions Conference 2009, ICITST-2009.
Abdel Alim Kamal and Amr Youssef, An Area-optimized Implementation for AES
with Hybrid Countermeasures against Power Analysis, Proc. of the IEEE
International Symposium on Signals, Circuits and Systems (ISSCS 2009)
Peipei Shi, Bo Zhu, and Amr
Youssef, A New PIN Entry Scheme
Resistant to Recording-based Shoulder-Surfing, Proc. of SECURWARE 2009
Abdel Alim Kamal and Amr
Youssef, An Area Optimized Implementation of
the Advanced Encryption Standard, Proc. of the 20th International Conference
on Microelectronics, ICM 2008
Aleksandar Kircanski and Amr M. Youssef, A Related-Key Attack on TREYFER, Proc. of Secureware 2008.
Hamad Binsalleeh and Amr
Youssef, An Implementation for a Worm
Detection and Mitigation System, Proc. of the 24th Biennial Symposium on
Communications, 2008.
Saad Inshi and Amr
Youssef, Design and Implementation of an
Online Anonymous Feedback System, Proc. of the 24th Biennial Symposium on
Communications, 2008.
Esam Elsheh, A. Ben
Hamza and Amr Youssef, On the Nonlinearity Profile of
Cryptographic Boolean Functions, Proc.
of 21st Canadian Conference on Electrical and Computer Engineering, 2008.
Ayman Assra, Walaa
Hamouda and Amr Youssef, Joint Channel and Data Estimation
for Space-Time Spreading Systems, Proc. of Vehicular Technology Conference,
VTC 2008, Spring, Singapore
Kun Liu, Amr Youssef,
and Walaa Hamouda , A Directional Routing Protocol for
Ad Hoc Networks with Angle-of-Arrival Estimation, The 7th IEEE International
Symposium on Signal Processing and Information Technology (ISSPIT 2007), Dec
2007.
James S. Grabowski and
Amr Youssef, An FPGA Implementation of
Mohammad Faisal Uddin, and Amr Youssef, Cryptanalysis of Pointcheval's Identification Scheme Using Ant Colony
Optimization, IEEE Congress on Evolutionary Computation (
Kun Liu, Amr Youssef,
and Walaa Hamouda, Performance of
Directional MAC Protocols in Ad Hoc Networks with Position Estimation Errors,
In Proc. of Wireless and Optical
Communications, WOC’2007.
Ayman Assra, Walaa Hamouda and Amr Youssef, Performance of Space-Time Diversity in CDMA over Frequency-Selective Fading Channels, Proc. of GlobeCom 2007.
Saif M. A. Kabir, Amr M.
Youssef and Ahmed K. Elhakeem, On the use of wavelet transform for
privacy preserving data mining, Proc. the International Conference on
Computational Intelligence (CI 2007)
Saif M. A. Kabir, Amr M.
Youssef and Ahmed K. Elhakeem, On Data Distortion for Privacy
Preserving Data Mining, Proc. of CCECE 2007
Kun Liu, Walaa Hamouda and
Amr Youssef, ESPRIT-Based Directional MAC Protocol for Mobile Ad Hoc
Networks, Proc. of ICC 2007
Ayman Assra, Walaa
Hamouda, and Amr Youssef, Space-Time
Spreading and Diversity In Asynchronous CDMA Systems Over Frequency-Selective
Fading Channels, Proc. of the International Symposium on Signal Processing and
its Applications (ISSPA 2007)
Osama Abdel-Mannan, A.
Ben Hamza and Amr Youssef, Incremental dimensionality-Reduction Algorithm
Using Hessian Locally Linear Embedding, International Symposium on Signal
Processing and its Applications (ISSPA
2007)
O. Abdel-Mannan, A. Ben
Hamza, A. Youssef, Incremental Line
Tangent Space Alignment Algorithm, Proc. IEEE Canadian Conference on Electrical and Computer
Engineering, Vancouver, Canada, 2007.
Kun Liu, Walaa Hamouda,
and Amr Youssef, Performance of Directional MAC Protocols in Ad-Hoc Networks
over Fading Channels, Proc. of GLOBCOM 2006.
Mohammad Faisal Uddin,
and Amr Youssef, Cryptanalysis of Simple Substitution Ciphers Using Particle
Swarm Optimization, proc. of the IEEE world congress on computational
intelligence (WCCI 2006), Vancouver, Canada, 2006.
Z. Saber, M. Faisal
Uddin and Amr Youssef, On Some Resilient Functions Constructions
using PSO-based Spectral Inversion, Proc. of IEEE swarm intelligence symposium, special
session of applications of swarm intelligence to number theory, pp. 38-42,
2006.
Ziad Saber, Amr Youssef,
and Walaa Hamouda, On Bent-Based and Linear-Based
Functions, proc. of the IEEE International Conference on Information and
Communications Technologies: From Theory to Applications, (ICTA/06), Apr. 2006.
Ren Wang, Amr M.
Youssef, Ahmed K. Elhakeem, Artificial Life Feature Selection
Techniques for Spam E-mail Filters, Proc. the International Conference
on Computational Intelligence (CI 2006).
Ren Wang, Amr M.
Youssef, Ahmed K. Elhakeem, On Improving the Performance of Spam
Filters Using Heuristic Feature Selection Techniques, in Proc. of the
23rd Biennial Symposium on Communications, Queen’s University, Kingston,
Ontario, 2006.
Y. Geng, W. Hamouda and
A. Youssef, Performance of Hybrid FH/DS CDMA Systems with Transmitter
Diversity, in Proc. of the 23rd Biennial Symposium on Communications,
Queen’s University, Kingston, Ontario, 2006.
Mohammad Faisal Uddin,
Amr M. Youssef, An Artificial Life Technique for the
Cryptanalysis of Simple Substitution Ciphers, in Proc. of the Canadian
conference in electrical and computer engineering (CCECE 2006), 2006.
Ren Wang, Amr M.
Youssef, Ahmed K. Elhakeem, On Some Feature Selection Strategies
for Spam Filter Design, in Proc. of the Canadian conference in electrical
and computer engineering (CCECE 2006), pp. 2155-2158, 2006.
S.S. Mohamed, A.M.Youssef, E.F
El-Saadany, M.M.A. Salama, AIS TLS-ESPRIT feature selection for
prostate tissue characterization, SPIE medical Imaging, Vol. 6144, pp.
614451-1 614451-11, 2006.
S. S. Mohamed, A. M. Youssef, E. F.
El-Saadany, and M. M. A. Salama, On the use of spectral clustering
for prostate tissue charchterization,
in Proc. of the Canadian conference in electrical and computer
engineering (CCECE 2006), pp. 157-160, 2006.
S. S. Mohamed, A. M. Youssef , E. F. EL-Sadaany , and M. M. A. Salama , LLE Based TRUS Image Features Dimensionality Reduction for Prostate Cancer Diagnosis, GVIP 2005, Cairo,
Egypt, 11-19 December 2005 pp.107:111
Z. Saber, A. M. Youssef
and W. Hamouda, On the Construction of Bent Functions , Proc. Of the ninth
Canadian Workshop on Information Theory (CWIT 2005), Montreal, Quebec,2005.
Y. Geng, T. Gad, W.
Hamouda, and A. M. Youssef, Frequency Hopping Sequences Based on a Generalized
Version of RC4, Proc. Of the ninth
Canadian Workshop on Information Theory (CWIT 2005), Montreal, Quebec,2005.
L. Xiao, S. E. Tavares, A. Youssef,
and G. Gong, Improved Cascade Stream Ciphers Using Feedback, Proc, of the
IEEE Canadian Conference in Electrical and Computer Engineering, 2005.
A.M Youssef and S.E. Tavares, Decision Trees of Cryptographic Boolean Functions, in proc. of the Canadian
Conference in Electrical and Computer Engineering, CCECE2004.
A.M. Youssef and O. Emam, An Arabic
TTS System Based on the IBM Trainable Speech Synthesizer, in proc. of Le
traitement automatique de l’arabe, JEP-TALN 2004, pp. 375-383, Morocco, 2004.
A.M. Youssef, M. A. Azer and M.S. El
Soudani, A known plaintext attack on the nonlinear feedforward generators,
Proc. of the International Conference on Communications and Information
Technology (ICCIT 2003), pp.63-76, 2003.
T. Abdel-Galil, E. El-Saadany, A.M.
Youssef, and M. Salama, On-line disturbance recognition utilizing vector
quantization based fast match, Power Engineering Society Summer Meeting, 2002
IEEE , Volume: 2 , 21-25, pp.1027-1032, 2002.
A. Youssef and G. Gong, On the
Quadratic Span of Binary Sequences, Proc. of the 20th Biennial Symposium on
Communications, Queen’s university, Kingston, On., pp. 159-163, 2000.
A.M. Youssef, Z. Chen and S.E.
Tavares, Differential-like cryptanalysis of a class of
Substitution-Permutation Networks, Proc. of the Canadian Conference in
Electrical and Computer Engineering, vol.1, pp. 433-436, 1998.
A.M. Youssef, S. Mister and S.E.
Tavares, On the Design of Linear Transformations for Substitution Permutation
Encryption Networks, Workshop on
Selected Areas in Cryptography (SAC '97),
Workshop record, 1997.
A.M. Youssef and S.E. Tavares, Modeling Avalanche Characteristics of Substitution-Permutation Networks Using
Markov Chains, Proceedings of the 5th Canadian Workshop on
Information Theory, pp. 48-55, 1997.
A.M. Youssef, Z. Chen and S.E.
Tavares, Construction of Highly Nonlinear Injective S-boxes with Application
to CAST-like Encryption Algorithm, Proceedings of the Canadian Conference
on Electrical and Computer Engineering, pp. 330-333, 1997.
A.M. Youssef and S.E. Tavares, Modeling Avalanche Characteristics of a class Substitution-Permutation Networks,
Proceedings of Pragocrypt '96, part I, pp. 18-29, 1996.
A.M. Youssef, T.W. Cusick, P.
Stanica and S.E. Tavares, New Bounds on the Number of Functions Satisfying
the Strict Avalanche Criterion,
Workshop on Selected Areas in Cryptography, SAC '96, Workshop Record, pp.49-60,
1996.
A.M. Youssef, S.E. Tavares and H.M.
Heys, A New Class of Substitution-Permutation Networks, Workshop on
Selected Areas in Cryptography, SAC ' 96,Workshop Record, pp.132-147, Aug.
1996
A.M. Youssef and S.E. Tavares, A
Comparison of Two Families of Block Ciphers, Proceedings of the 18th
Biennial Symposium on Communications, Kingston, Ontario, pp. 200-203, June
1996.
A.M. Youssef and S.E. Tavares, Spectral Properties and Information Leakage Of Multi-output Boolean Functions, Proceedings of the IEEE International Symposium On Information Theory. Whistler, B.C., Canada, Sept. 17-22, 1995.