Rasslan, Mohamed
20  results:
Search for persons X
?
1

Networking and cryptography library with a non-repudiation ..:

Rasslan, Mohamed ; Nasreldin, Mahmoud M. ; Abdelrahman, Doaa..
Journal of Computer Virology and Hacking Techniques.  20 (2023)  1 - p. 1-14 , 2023
 
?
5

Security Analysis of Zhang et al. Authenticated Encryption ..:

, In: Proceedings of the Future Technologies Conference (FTC) 2021, Volume 3; Lecture Notes in Networks and Systems,
 
?
8

On the Security of Hwang-Lo-Hsiao-Chu Authenticated Encrypt..:

Rasslan, Mohamed
Procedia Computer Science.  19 (2013)  - p. 565-569 , 2013
 
?
10

Cryptanalysis of a Public Key Encryption Scheme Using Ergod..:

RASSLAN, Mohamed ; YOUSSEF, Amr
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences.  E94-A (2011)  2 - p. 853-854 , 2011
 
?
11

Comments on the security of Chen's authenticated encryption..:

Rasslan, Mohamed ; Youssef, Amr
Computers & Electrical Engineering.  37 (2011)  1 - p. 71-74 , 2011
 
?
12

Cryptanalysis of Hwang-Lo-Hsiao-Chu Authenticated Encryptio..:

RASSLAN, Mohamed ; YOUSSEF, Amr
IEICE Transactions on Information and Systems.  E93-D (2010)  5 - p. 1301-1302 , 2010
 
1-15