Muhammad ElSheikh
Muhammad ElSheikh
PhD student, Concordia University, Canada
Verified email at nis.sci.eg
Title
Cited by
Cited by
Year
Lelantos: A blockchain-based anonymous physical delivery system
R AlTawy, M ElSheikh, AM Youssef, G Gong
2017 15th Annual Conference on Privacy, Security and Trust (PST), 15-1509, 2017
192017
Botcap: machine learning approach for botnet detection based on statistical features
MS Gadelrab, M ElSheikh, MA Ghoneim, M Rashwan
International Journal of Computer Network and Information Security (IJCNIS …, 2018
72018
An efficient micropayment channel on ethereum
HS Galal, M ElSheikh, AM Youssef
Data Privacy Management, Cryptocurrencies and Blockchain Technology, 211-218, 2019
32019
On MILP-Based Automatic Search for Differential Trails Through Modular Additions with Application to Bel-T
M ElSheikh, A Abdelkhalek, AM Youssef
International Conference on Cryptology in Africa, 273-296, 2019
32019
BoTGen: A new approach for in-lab generation of botnet datasets
MH ElSheikh, MS Gadelrab, MA Ghoneim, M Rashwan
2014 9th International Conference on Malicious and Unwanted Software: The …, 2014
32014
Related-Key Differential Cryptanalysis of Full Round CRAFT
M ElSheikh, AM Youssef
International Conference on Security, Privacy, and Applied Cryptography …, 2019
22019
Short Paper: Deploying PayWord on Ethereum
M Elsheikh, J Clark, AM Youssef
International Conference on Financial Cryptography and Data Security, 82-90, 2019
2*2019
Integral Attacks on Round-Reduced Bel-T-256
M ElSheikh, M Tolba, AM Youssef
International Conference on Selected Areas in Cryptography, 73-91, 2018
22018
Impossible Differential Attack on Reduced Round SPARX-128/256
M Elsheikh, M Tolba, AM Youssef
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2018
12018
Impossible Differential Cryptanalysis of Reduced-Round Tweakable TWINE.
M Tolba, M ElSheikh, AM Youssef
IACR Cryptol. ePrint Arch. 2020, 52, 2020
2020
A cautionary note on the use of Gurobi for cryptanalysis
M ElSheikh, AM Youssef
The system can't perform the operation now. Try again later.
Articles 1–11