Publications

Edited books

  • AlTawy, R., Hulsing, A., Selected Areas in Cryptography. Lecture Notes in Computer Science 13203, Springer 2022, ISBN 978-3-030-99276-7

Journal publications

  • Seifelnasr, M., AlTawy, R., Youssef, A.SKAFS: Symmetric Key Authentication Protocol with Forward Secrecy for Edge Computing. IEEE Internet of Things Journal (2023), (to appear).
  • Shihab, S., AlTawy, R., Lightweight Authentication Scheme for Healthcare with Robustness to Desynchronization Attacks. IEEE Internet of Things Journal (2023), doi: 10.1109/JIOT.2023.3279035.
  • AlTawy, R., Galal, H., Youssef, A. Mjolnir: Breaking the Glass in a Publicly Veri able yet Private Manner. IEEE Transactions on Network and Service Management (2023), doi: 10.1109/TNSM.2023.3244506
  • Nakkar, M., AlTawy, R., Youssef, A. GASE: A Lightweight Group Authentication Scheme with Key Agreement for Edge Computing Applications. IEEE Internet of Things Journal, (2023), vol. 10, no. 1, pp.840-854.
  • Seifelnasr, M., AlTawy, R., Youssef, A.Efficient Inter-cloud Authentication and Micropayment Protocol for IoT Edge Computing. IEEE Transactions on Network and Service Management (2021), vol. 18, no. 4, pp. 4420-4433.
  • AlTawy, R., Gong, G., Mandal, K, Rohit, R. WAGE: An Authenticated Encryption with a Twist. IACR Transactions on Symmetric Cryptology. 2020(S1): 132-159.
  • Nakkar, M., AlTawy, R., Youssef, A. Lightweight Broadcast Authentication Protocol for Edge-based Applications. IEEE Internet of Things Journal, (2020), 7 (12), 11766-11777
  • AlTawy, R. and Gong, G. Mesh: A Supply Chain Solution with Locally Private Blockchain Transactions.. Proceedings on Privacy Enhancing Technologies (PETs). 2019(4): 149-169.
  • AlTawy, R., Rohit, R., He, M., Mandal, K., Yang, G., Gong, G. Towards a Cryptographic Minimal Design: The sLiSCP Family of Permutations. IEEE Transactions on Computers, (2018), 67(9): 1341-1358.
  • AlTawy, R., Rohit, R., He, M., Mandal, K., Yang, G., Gong, G. sLiSCP-light: Towards Hardware Optimized Sponge-specific Cryptographic Permutations. ACM Transactions on Embedded Computing Systems.(2018) 17(4): 81:1-81:26.
  • AlTawy, R., Youssef. A.M. Security, Privacy, and Safety Aspects of Civilian Drones: A Survey. ACM Transactions on Cyber-Physical Systems, Vol.1, (2) (2017), pp. 7:1-7:25 .
  • AlTawy, R., Abdelkhalek, A., Youssef. A.M. A Meet-in-the-Middle Attack on Reduced-Round Kalynab/2b. IEICE Transactions. Information and Systems, Vol.E99-D, (4) (2016), pp. 1246-1250.
  • AlTawy, R., Youssef. A.M. Security Tradeoffs in Cyber Physical Systems: A Case Study Survey on Implantable Medical Devices. IEEE Access (4) (2016), pp. 959-979.
  • AlTawy, R., Youssef. A.M. A Meet in the Middle Attack on ReducedRound Kuznyechik. IEICE Transactions. Fundamentals, vol. E98-A, (10) (2015), pp. 2194-2198.
  • AlTawy, R., Youssef. A.M. Watch your Constants: Malicious Streebog. IET Information Security vol 9(6), (2015), pp. 328-333.
  • AlTawy, R., and Youssef, A. M. Integral distinguishers for reduced-round Stribog. Information Processing Letters, vol. 114, 8 (2014), pp. 426-431.
  • AlTawy, R., Kircanski, A., and Youssef, A. M. Second Order Collision for the 42-Step Reduced DHA-256 Hash Function. Information Processing Letters, vol. 113, (19-21) (2013), pp. 764-770.

Conference publications

  • Afia, I., AlTawy, R. Unlinkable Policy-based Sanitizable Signatures. In Cryptographers' Track at RSA Conference (CT-RSA 2023), in LNCS Vol 13871, Springer, pp 191-221.
  • Afia, I., Galal, H., AlTawy, R., Youssef, A., vPass: Publicly Veri able Fair Exchange Protocol for Vehicle Passports. In IEEE International Conference on Blockchain and Cryptocurrency (ICBC 2023). (to appear)
  • Ghanem, A., AlTawy, R. Garage Door Openers: A Rolling Code Protocol Case Study. In Privacy, Security and Trust (PST 2022), doi: 10.1109/PST55820.2022.9851991.
  • Yehia, M., AlTawy, R., Gulliver, T.A. GMMT: A Revocable Group Merkle Multi-Tree Signature Scheme. In the International International Conference on Cryptology And Network Security (CANS 2021).
  • Yehia, M., AlTawy, R., Gulliver, T.A. Security Analysis Of DGM and GM Group Signature Schemes Instantiated With XMSS-T. In the International Conference on Information Security and Cryptology (Inscrypt 2021)
  • Yehia, M., AlTawy, R., Gulliver, T.A. Verifiable Obtained Random Subsets for Improving SPHINCS+. In the Australasian Conference on Information Security and Privacy (ACISP 2021).
  • Nakkar, M., AlTawy, R., Youssef, A. Lightweight Authentication and Key Agreement Protocol for Edge Computing Applications. In IEEE World Forum on Internet of Things (WF-IoT 2021).
  • Seifelnasr, M., Nakkar, M., Youssef, A., AlTawy, R.A Lightweight Authentication and Inter-Cloud Payment Protocol for Edge Computing. In IEEE 9th International Conference on Cloud Networking (CloudNet), (2020), pp. 1- 4.
  • Yehia, M., AlTawy, R., Gulliver, T.A. Hash-based Signatures Revisited: A Dynamic FORS with Adaptive Chosen Message Security. In Progress in Cryptology: Africacrypt (2020), Nitaj A., Youssef A., Eds., vol. 12174 of Lecture Notes in Computer Science, Springer, pp. 239-257.
  • AlTawy, R., Rohit, R., He, M., Mandal, K., Yang, G., Gong, G. sLiSCP: Simeck-based Permutations for Lightweight Sponge Cryptographic Primitives. In Selected Areas in Cryptography (2017), C. Adams and J. Camenisch, Eds., vol. 10719 of Lecture Notes in Computer Science, Springer, pp. 129-150.
  • Rohit, R., AlTawy, R., Gong, G. MILP-Based Cube Attack on the Reduced-Round WG-5 Lightweight Stream Cipher. In Cryptography and Coding (2017), M. O’Neill, Eds., vol. 10655 of Lecture Notes in Computer Science, Springer, pp. 333-351.
  • AlTawy, R., ElSheikh, M., Youssef, A.M., Gong, G. Lelantos: A Blockchain-based Anonymous Physical Delivery System. In Privacy, Security and Trust (2017), pp. 15-24.
  • AlTawy, R., Youssef. A.M. Preimage Analysis of the Maelstrom-0 Hash Function. In Security, Privacy, and Applied Cryptography Engineering (2015), R. Chakraborty, P. Schwabe, J. Solworth, Eds., vol. 9354 of Lecture Notes in Computer Science, Springer, pp 113-126.
  • Abdelkhalek, A., AlTawy, R., Tolba, M., Youssef. A.M. Meet-in-the- Middle Attacks on Reduced Round Hierocrypt-3. In Latincrypt (2015), K. Lauter, F. Rodriguez-Henriquez, Eds., vol. 9230 of Lecture Notes in Computer Science, Springer, pp. 187-203.
  • AlTawy, R., Onur, D., Youssef. A.M. Fault Analysis of Kuznyechik. In Current Trends in Cryptology, CTCrypt (2015), pp. 302-317. (One of the best 5 papers)
  • AlTawy, R., Tolba, M., Youssef. A.M. A Higher Order Key Partitioning Attack with Application to LBlock . In Codes, Cryptology and Information Security (2015), S. El Hajji, A. Nitaj, C. Carlet, E. Souidi, Eds., vol. 9084 of Lecture Notes in Computer Science, Springer, pp. 215-227.
  • Abdelkhalek, A., AlTawy, R., Youssef. A.M. Impossible Differential Properties of Reduced Round Streebog. In Codes, Cryptology and Information Security (2015), S. El Hajji, A. Nitaj, C. Carlet, E. Souidi, Eds., vol. 9084 of Lecture Notes in Computer Science, Springer, pp. 274-286.
  • AlTawy, R., Youssef. A.M. Differential Fault Analysis of Streebog. In ISPEC (2015), J. Lopez and Y. Wu, Eds., vol. 9065 of Lecture Notes in Computer Science, Springer, pp. 35-49.
  • AlTawy, R., and Youssef, A. M. Second Preimage Analysis of Whirlwind. In Inscrypt (2014), D. Lin, M. Yung, and J. Zhou, Eds., vol 8957 of Lecture Notes in Computer Science, Springer, pp. 311-328.
  • AlTawy, R., Youssef. A.M. Differential Sieving for 2-step matching meet-in-the-middle attack with application to LBlock. In Lightsec (2014), T. Eisenbarth and E. Ozturk, Eds., vol. 8898 of Lecture Notes in Computer Science, Springer, pp. 126-139.
  • AlTawy, R., and Youssef, A.M. Preimage Attacks on Reduced-Round Stribog. In Africacrypt (2014), D. Pointcheval and D. Vergnaud, Eds., vol. 8469 of Lecture Notes in Computer Science, Springer, pp. 109-125.
  • Kircanski, A., AlTawy, R., and Youssef, A. M. A heuristic for finding compatible differential paths with application to HAS-160. In Asiacrypt (2013), K. Sako and P. Sarkar, Eds., vol. 8270 of Lecture Notes in Computer Science, Springer, pp. 175-188.
  • AlTawy, R., Kircanski, A., and Youssef, A. M. Rebound attacks on Stribog. In ICISC (2013), H.-S. Lee and D.-G. Han, Eds., vol. 8565 of Lecture Notes in Computer Science, Springer, pp. 464-483.