Follow
Mohamed Saied Mohamed
Mohamed Saied Mohamed
Information Technology Security Specialist at Deutsche Telekom
No verified email - Homepage
Title
Cited by
Cited by
Year
MutantXL
J Ding, J Buchmann, MSE Mohamed, W Mohamed, RP Weinmann
Proceedings of the 1st international conference on Symbolic Computation and …, 2008
832008
MXL2: Solving Polynomial Equations over GF(2) Using an Improved Mutant Strategy
MSE Mohamed, WSAE Mohamed, J Ding, J Buchmann
Post-Quantum Cryptography: Second International Workshop, PQCrypto 2008 …, 2008
802008
Using SAT solving to improve differential fault analysis of trivium
MSE Mohamed, S Bulygin, J Buchmann
Information Security and Assurance: International Conference, ISA 2011, Brno …, 2011
702011
MXL3: An Efficient Algorithm for Computing Gröbner Bases of Zero-Dimensional Ideals
MSE Mohamed, D Cabarcas, J Ding, J Buchmann, S Bulygin
Information, Security and Cryptology–ICISC 2009: 12th International …, 2010
672010
Algebraic attack on the MQQ public key cryptosystem
MSE Mohamed, J Ding, J Buchmann, F Werner
Cryptology and Network Security: 8th International Conference, CANS 2009 …, 2009
452009
A practical multivariate blind signature scheme
A Petzoldt, A Szepieniec, MSE Mohamed
Financial Cryptography and Data Security: 21st International Conference, FC …, 2017
372017
Improved algebraic side-channel attack on AES
MSE Mohamed, S Bulygin, M Zohner, A Heuser, M Walter, J Buchmann
2012 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2012
372012
Improved algebraic side-channel attack on AES
MSE Mohamed, S Bulygin, M Zohner, A Heuser, M Walter, J Buchmann
Journal of Cryptographic Engineering 3, 139-156, 2013
302013
MutantXL: Solving multivariate polynomial equations for cryptanalysis
JA Buchmann, J Ding, MSE Mohamed, WSAE Mohamed
Dagstuhl seminar proceedings, 2009
282009
RingRainbow–an efficient multivariate ring signature scheme
MSE Mohamed, A Petzoldt
Progress in Cryptology-AFRICACRYPT 2017: 9th International Conference on …, 2017
212017
Flexible partial enlargement to accelerate Gröbner basis computation over
J Buchmann, D Cabarcas, J Ding, MSE Mohamed
International Conference on Cryptology in Africa, 69-81, 2010
212010
Initial recommendations of long-term secure post-quantum systems (2015)
D Augot, L Batina, DJ Bernstein, J Bos, J Buchmann, W Castryck, ...
URL: https://pqcrypto. eu. org/docs/initial-recommendations. pdf. Citations …, 0
20
MQSAS-a multivariate sequential aggregate signature scheme
R El Bansarkhani, MSE Mohamed, A Petzoldt
International Conference on Information Security, 426-439, 2016
182016
The shortest signatures ever
MSE Mohamed, A Petzoldt
Progress in Cryptology–INDOCRYPT 2016: 17th International Conference on …, 2016
102016
Towards algebraic cryptanalysis of HFE challenge 2
MSE Mohamed, J Ding, J Buchmann
Information Security and Assurance: International Conference, ISA 2011, Brno …, 2011
102011
Mutant differential fault analysis of Trivium MDFA
MSE Mohamed, J Buchmann
Information Security and Cryptology-ICISC 2014: 17th International …, 2015
92015
Algebraic cryptanalysis of MQQ public key cryptosystem by MutantXL
MSE Mohamed, J Ding, J Buchmann
Cryptology ePrint Archive, 2008
72008
The complexity analysis of the MutantXL family
MSE Mohamed, J Ding, J Buchmann
Cryptology ePrint Archive, 2011
42011
Efficient multivariate ring signature schemes
MSE Mohamed, A Petzoldt
Cryptology ePrint Archive, 2017
32017
SpatialVisVR: An Immersive, Multiplexed Medical Image Viewer With Contextual Similar-Patient Search
JP Veerla, PS Guttikonda, A Hajighasemi, JR Saurav, A Darji, ...
arXiv preprint arXiv:2401.02882, 2024
12024
The system can't perform the operation now. Try again later.
Articles 1–20