Mohamed Layouni

Mohamed A. Layouni

Mohamed.Layouni"at"mail.mcgill.ca

Welcome!

I am a researcher and consultant in Cryptography and IT Security.

I completed my PhD at the Cryptography & Quantum Information Lab at McGill University.
The topic of my thesis is on privacy-preserving technologies, anonymous credentials, and symmetrically private information retrieval.

My research advisors were Professors Claude Crepeau and Stefan Brands.
I've also had the pleasure to work with Professors Hans Vanghelue, Bart De Decker, Maki Yoshida, and many other talented researchers.

My current research interests are in topics related to Cryptography, Privacy-preserving Technologies, Embedded Systems, Machine Learning, Signal Processing, etc.

I do also provide technical consulting services in areas such as Electronic Payment, EMV, HSMs, PKI, IT Security, Software Engineering, System Integration, System Architecture, Identity and Access Management, etc.


Research Interests

I am interested in various aspects of applied cryptography and IT Security, including topics such as:
  • Fully-Homomorphic Encryption; Searchable Encryption; Attribute-based Encryption; Crypto-computing.
  • Cloud Security; Cloud Computing; Secure Multi-party Computations.
  • Privacy-preserving Technologies; Privacy-preserving Credentials.
  • Smartcard-based Cryptography.
  • Efficient side-channel-secure Implementations of Cryptography.
  • Elliptic-Curve Cryptography.
  • Digital Rights Management, IP Protection, and Anti-counterfeit Technologies.
  • Whitebox Cryptography.
  • Applications such as Smart Metering, ePayment, eCommerce, eCash, eVoting, eHealth, eGovernment, Electronic Transit Fare Collection Systems, etc.
For enquiries on possible research or business collaborations, please feel free to contact me at the email address above.

Recent publications

  • Detection and Sizing of Metal-loss Defects in Oil and Gas Pipelines using Pattern-adapted Wavelets and Machine Learning.
    Mohamed Layouni, Mohamed Salah Hamdi, Sofične Tahar.
    Applied Soft Computing Journal (2016).
    Formal publication available at: http://dx.doi.org/10.1016/j.asoc.2016.10.040
    Preprint [pdf] © 2016. This manuscript version is made available under the CC-BY-NC-ND 4.0 license http://creativecommons.org/licenses/by-nc-nd/4.0/

  • A Survey on the Application of Neural Networks In the Safety Assessment of Oil and Gas Pipelines.
    Mohamed Layouni, Sofične Tahar, Mohamed Salah Hamdi.
    IEEE Symposium on Computational Intelligence for Engineering Solutions, CIES 2014, Orlando, FL, USA, December 2014. CIES 2014, pages: 95-102, IEEE 2014.
    [pdf] © IEEE, [BibTeX Citation]

  • Privacy-preserving Personal Information Management.
    PhD Thesis, School of Computer Science, McGill University, Dec 2009.
    Full Text: [pdf] | [BibTeX Citation]
    Defense Slides: [pdf]

  • Privacy-Preserving Telemonitoring for eHealth.
    Mohamed Layouni, Kristof Verslype, Mehmet Tahir Sandıkkaya, Bart De Decker, and Hans Vangheluwe.
    In Proc. of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, DBSec 2009, Montreal, Quebec, Canada, July 2009. Lecture Notes in Computer Science  5645, pages: 95-110, Springer 2009.
    [pdf] © Springer-Verlag, [BibTeX Citation]

  • Efficient Multi-Authorizer Accredited Symmetrically Private Information Retrieval.
    Mohamed Layouni, Maki Yoshida, and Shingo OKAMURA.
    In Proc. of the 10th International Conference on Information and Communications Security, ICICS 2008, Birmingham, UK, October 2008. Lecture Notes in Computer Science  5308, pages: 387-402, Springer 2008.
    [pdf] © Springer-Verlag, [BibTeX Citation]

  • A Privacy-Preserving eHealth Protocol compliant with the Belgian Healthcare System.
    Bart De Decker, Mohamed Layouni, Hans Vangheluwe, and Kristof Verslype.
    In Proc. Public Key Infrastructure, Fifth European PKI Workshop: Theory and Practice, EuroPKI 2008, Trondheim, Norway, June 2008. Lecture Notes in Computer Science  5057, pages: 118-133, Springer 2008.
    [pdf] © Springer-Verlag, [BibTeX Citation]

  • Accredited Symmetrically Private Information Retrieval.
    Mohamed Layouni.
    In Proc. of the 2nd International Workshop on Security, IWSEC 2007, Nara, Japan, October 2007. Lecture Notes in Computer Science  4752, pages: 262-277, Springer 2007.
    [pdf] © Springer-Verlag, [BibTeX Citation]

  • Anonymous k-show Credentials.
    Mohamed Layouni and Hans Vangheluwe.
    In Proc. Public Key Infrastructure, Fourth European PKI Workshop: Theory and Practice, EuroPKI 2007, Mallorca, Balearic Islands, Spain, June 2007. Lecture Notes in Computer Science  4582, pages: 181-192, Springer 2007.
    [pdf] © Springer-Verlag, [BibTeX Citation]

  • Controlling access to personal data through Accredited Symmetrically Private Information Retrieval.
    Mohamed Layouni.
    Cryptology ePrint Archive: Report 2008/129.
    [pdf], [BibTeX Citation]

  • Formal Specification and Verification of the Intrusion-Tolerant Enclaves Protocol.
    Mohamed Layouni, Jozef Hooman, and Sofične Tahar.
    International Journal of Network Security. Vol. 5, No. 3, 2007, pages: 288-298.
    [pdf] © IJSN, [BibTeX Citation]

  • On the Correctness of an Intrusion-Tolerant Group Communication Protocol.
    Mohamed Layouni, Jozef Hooman, and Sofične Tahar.
    In Proc. Correct Hardware Design and Verification Methods, 12th IFIP WG 10.5 Advanced Research Working Conference, CHARME 2003, L'Aquila, Italy, October, 2003. Lecture Notes in Computer Science 2860, pages: 231-246, Springer 2003.
    [pdf] © Springer-Verlag, [BibTeX Citation]


Other Unpublished Work

  • ADAPID Basic Research II.
    C. Diaz, B. De Decker, M. Layouni, G. Nigusse, B. Preneel, A. Rial, C. Troncoso,
    B. Van Alsenoy, H. Vangheluwe, and K. Verslype.
    ADAPID Deliverable D11, 2009.
    [pdf]

  • ADAPID E-Health I.
    B. De Decker, H. Dekeyser, M. Layouni, K. Verslype, and H. Vangheluwe.
    ADAPID Deliverable D6, 2007.
    [pdf]

  • ADAPID Basic Research.
    C. Diaz, B. De Decker, H. Dekeyser, S. Gevers, M. Layouni, S. Nikova, B. Preneel, X. Sun, C. Troncoso,
    S. Van Damme, H. Vangheluwe, K. Verslype, and M. Zia.
    ADAPID Deliverable D4, 2007.
    [pdf]

  • Requirements Study for Advanced e-ID applications.
    C. Diaz, C. D'Halluin, B. De Decker, H. Dekeyser, S. Gevers, X. Huysmans, M. Layouni, S. Nikova,
    B. Preneel, X. Sun, S. Van Damme, H. Van Es, H. Vangheluwe, K. Verslype, and M. Zia.
    ADAPID Deliverable D2, 2006.
    [pdf]


Past projects

I have previously worked on the following projects: