Follow
Riham AlTawy
Riham AlTawy
Associate Professor, Dept. ECE, University of Victoria
Verified email at uvic.ca - Homepage
Title
Cited by
Cited by
Year
Security, privacy, and safety aspects of civilian drones: A survey
R Altawy, AM Youssef
ACM Transactions on Cyber-Physical Systems 1 (2), 1-25, 2016
4472016
Security tradeoffs in cyber physical systems: A case study survey on implantable medical devices
R AlTawy, AM Youssef
Ieee Access 4, 959-979, 2016
1692016
Lelantos: A blockchain-based anonymous physical delivery system
R AlTawy, M ElSheikh, AM Youssef, G Gong
2017 15th Annual Conference on Privacy, Security and Trust (PST), 15-1509, 2017
632017
sLiSCP: Simeck-based permutations for lightweight sponge cryptographic primitives
R AlTawy, R Rohit, M He, K Mandal, G Yang, G Gong
Selected Areas in Cryptography–SAC 2017: 24th International Conference …, 2018
522018
ACE: An authenticated encryption and hash algorithm
M Aagaard, R AlTawy, G Gong, K Mandal, R Rohit
Submission to NIST-LWC, 8, 2019
382019
Lightweight broadcast authentication protocol for edge-based applications
M Nakkar, R Altawy, A Youssef
IEEE Internet of Things Journal 7 (12), 11766-11777, 2020
332020
SLISCP-light: Towards Hardware Optimized Sponge-specific Cryptographic Permutations
R Altawy, R Rohit, M He, K Mandal, G Yang, G Gong
ACM Transactions on Embedded Computing Systems (TECS) 17 (4), 1-26, 2018
332018
A meet in the middle attack on reduced round Kuznyechik
R AlTawy, AM Youssef
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2015
322015
Watch your constants: malicious Streebog
R AlTawy, AM Youssef
IET Information Security 9 (6), 328-333, 2015
312015
Preimage attacks on reduced-round stribog
R AlTawy, AM Youssef
Progress in Cryptology–AFRICACRYPT 2014: 7th International Conference on …, 2014
312014
Rebound attacks on Stribog
R AlTawy, A Kircanski, AM Youssef
International Conference on Information Security and Cryptology, 175-188, 2013
282013
WAGE: an authenticated encryption with a twist
R AlTawy, G Gong, K Mandal, R Rohit
IACR Transactions on Symmetric Cryptology, 132-159, 2020
232020
Differential fault analysis of Streebog
R AlTawy, AM Youssef
Information Security Practice and Experience: 11th International Conference …, 2015
212015
Fault analysis of Kuznyechik
R AlTawy, O Duman, AM Youssef
Cryptology ePrint Archive, 2015
182015
Spix: An authenticated cipher submission to the NIST LWC competition
R AlTawy, G Gong, M He, K Mandal, R Rohit
Submitted to NIST Lightweight Standardization Process, 2019
172019
Integral distinguishers for reduced-round Stribog
R AlTawy, AM Youssef
Information Processing Letters 114 (8), 426-431, 2014
162014
Mesh: A supply chain solution with locally private blockchain transactions
R AlTawy, G Gong
Proceedings on Privacy Enhancing Technologies, 2019
142019
Gase: A lightweight group authentication scheme with key agreement for edge computing applications
M Nakkar, R AlTawy, A Youssef
IEEE Internet of Things Journal 10 (1), 840-854, 2022
132022
WAGE: An authenticated cipher
M Aagaard, R AlTawy, G Gong, K Mandal, R Rohit, N Zidaric
Submission to NIST Lightweight Cryptography Standardization Project …, 2019
132019
Towards a cryptographic minimal design: The sLiSCP family of permutations
R AlTawy, R Rohit, M He, K Mandal, G Yang, G Gong
IEEE Transactions on Computers 67 (9), 1341-1358, 2018
112018
The system can't perform the operation now. Try again later.
Articles 1–20