Mohsen Machhout

Orcid: 0000-0002-5629-0508

According to our database1, Mohsen Machhout authored at least 98 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A novel holographic technique for RFID localization in indoor environments.
Multim. Tools Appl., March, 2024

A lightweight and robust block cipher algorithm for real-time applications.
Signal Image Video Process., 2024

2023
An improvement of both security and reliability for elliptic curve scalar multiplication Montgomery algorithm.
Multim. Tools Appl., March, 2023

A Secure Hardware Implementation for Elliptic Curve Digital Signature Algorithm.
Comput. Syst. Sci. Eng., 2023

A Secure Chaos-Based Lightweight Cryptosystem for the Internet of Things.
IEEE Access, 2023

Secure Convolutional Neural Network-Based Internet-of-Healthcare Applications.
IEEE Access, 2023

Optimized CAD System for Breast Cancer Detection with Tabu Search and RNN.
Proceedings of the 11th IEEE International Conference on Systems and Control, 2023

An Optimized Computer-Aided Diagnosis System for MRI Classification.
Proceedings of the 11th IEEE International Conference on Systems and Control, 2023

A Selective Video Encryption Scheme Based on a Block Cipher Algorithm and a Chaos Generator.
Proceedings of the International Conference on Cyberworlds, 2023

Design of Novel Reciprocal Inverse Graded Index Fiber (R-IGIF) For OAM-SDM communication Systems.
Proceedings of the 20th International Multi-Conference on Systems, Signals & Devices, 2023

Optimized classification system for MRIs with MOO technique and SVM.
Proceedings of the 20th International Multi-Conference on Systems, Signals & Devices, 2023

Enhanced CNN Security based on Adversarial FGSM Attack Learning: Medical Image Classification.
Proceedings of the 20th International Multi-Conference on Systems, Signals & Devices, 2023

Integration of Lightweights Blocks Ciphers as an Extension into Microprocessor for IoT Security.
Proceedings of the 20th International Multi-Conference on Systems, Signals & Devices, 2023

2022
An improvement of both security and reliability for AES implementations.
J. King Saud Univ. Comput. Inf. Sci., November, 2022

Tele-Holography: a new concept for lossless compression and transmission of inline digital holograms.
Signal Image Video Process., 2022

Fast Constant-Time Modular Inversion over Fp Resistant to Simple Power Analysis Attacks for IoT Applications.
Sensors, 2022

An Efficient Lightweight Cryptographic Instructions Set Extension for IoT Device Security.
Secur. Commun. Networks, 2022

Real-time video security system using chaos- improved advanced encryption standard (IAES).
Multim. Tools Appl., 2022

Deep learning based neural network application for automatic ultrasonic computed tomographic bone image segmentation.
Multim. Tools Appl., 2022

Real-time arrhythmia heart disease detection system using CNN architecture based various optimizers-networks.
Multim. Tools Appl., 2022

Deep convolutional neural networks-based Hardware-Software on-chip system for computer vision application.
Comput. Electr. Eng., 2022

Real-time application based CNN architecture for automatic USCT bone image segmentation.
Biomed. Signal Process. Control., 2022

Holographic Multi-Reader RFID Localization Method for Static Tags.
Proceedings of the 8th International Conference on Control, 2022

2021
FPGA Implementation of Improved Security Approach for Medical Image Encryption and Decryption.
Sci. Program., 2021

Image encryption method based on improved ECC and modified AES algorithm.
Multim. Tools Appl., 2021

The DFA/DFT-based hacking techniques and countermeasures: Case study of the 32-bit AES encryption crypto-core.
IET Comput. Digit. Tech., 2021

CT-Scans Images Segmentation for COVID-19 Detection Based CNN Models.
Proceedings of the International Conference on Control, Automation and Diagnosis, 2021

COVID-19 Recognition Based on Patient's Coughing and Breathing Patterns Analysis: Deep Learning Approach.
Proceedings of the 29th Conference of Open Innovations Association, 2021

Secure Transmission of Medical Images using Improved Hybrid Cryptosystem: Authentication, Confidentiality and Integrity.
Proceedings of the International Conference on Cyberworlds, 2021

A Novel Inverse Gaussian Profile for Orbital Angular Momentum Mode Division Multiplexing Optical Networks.
Proceedings of the 18th International Multi-Conference on Systems, Signals & Devices, 2021

PYNQ FPGA Hardware implementation of LeNet-5-Based Traffic Sign Recognition Application.
Proceedings of the 18th International Multi-Conference on Systems, Signals & Devices, 2021

Performance trade-offs of hybrid cryptosystem for medical images encryption - decryption.
Proceedings of the 18th International Multi-Conference on Systems, Signals & Devices, 2021

Deep Pre-trained Models for Computer Vision Applications: Traffic sign recognition.
Proceedings of the 18th International Multi-Conference on Systems, Signals & Devices, 2021

2020
Characterization of an Ultrasonic Local Positioning System for 3D Measurements.
Sensors, 2020

Hardware Implementation of Secure Lightweight Cryptographic Designs for IoT Applications.
Secur. Commun. Networks, 2020

A Hybrid Countermeasure-Based Fault-Resistant AES Implementation.
J. Circuits Syst. Comput., 2020

An improved co-designed AES-ECC cryptosystem for secure data transmission.
Int. J. Inf. Comput. Secur., 2020

A Novel Hyperbolic Tangent Profile for Optical Fiber for Next Generation OAM-MDM Systems.
IEEE Access, 2020

Deep Learning-Based Approach for Atrial Fibrillation Detection.
Proceedings of the Impact of Digital Technologies on Public Health in Developed and Developing Countries, 2020

A High-Speed KECCAK Architecture Resistant to Fault Attacks.
Proceedings of the 32nd International Conference on Microelectronics, 2020

Design and Implementation on FPGA Board of a Chaos-based Stream Cipher.
Proceedings of the 15th International Conference for Internet Technology and Secured Transactions, 2020

Transfer-Deep Learning Application for Ultrasonic Computed Tomographic Image Classification.
Proceedings of the International Conference on Control, Automation and Diagnosis, 2020

A Hardware-Software Codesign Case Study: The SHA3-512 algorithm Implementation on the LEON3 Processor.
Proceedings of the 5th International Conference on Advanced Technologies for Signal and Image Processing, 2020

The Secured AES designs against Fault Injection Attacks: A comparative Study.
Proceedings of the 5th International Conference on Advanced Technologies for Signal and Image Processing, 2020

Orbital Angular Momentum Mode Coupling Analysis due to Ellipticity and Birefringence in Inverse-raised Cosine Fiber.
Proceedings of the 17th International Multi-Conference on Systems, Signals & Devices, 2020

Numerical Investigation of orbital angular momentum mode purity in Inverse Parabolic Graded index fiber.
Proceedings of the 17th International Multi-Conference on Systems, Signals & Devices, 2020

2019
FPGA Implementation of a Pseudo-Chaotic Number Generator and Evaluation of its Performance.
Proceedings of the International Conference on Internet of Things, 2019

2018
A novel chaotic image cryptosystem based on DNA sequence operations and single neuron model.
Multim. Tools Appl., 2018

High speed and efficient area optimal ate pairing processor implementation over BN and BLS12 curves on FPGA.
Microprocess. Microsystems, 2018

Security Enhancements of a Mutual Authentication Protocol Used in a HF Full-Fledged RFID Tag.
J. Electron. Test., 2018

ElectroMagnetic Attack Test Platform for Validating RFID Tag Architectures.
Proceedings of the 6th International EURASIP Workshop on RFID Technology, 2018

Hardware implementation of a fingerprint recognition algorithm on FPGA cyclone II.
Proceedings of the First International Conference on Data Science, 2018

Hash Key-Based Image Cryptosystem Using Chaotic Maps and Cellular Automata.
Proceedings of the 15th International Multi-Conference on Systems, Signals & Devices, 2018

2017
A Scalable and Systolic Architectures of Montgomery Modular Multiplication for Public Key Cryptosystems Based on DSPs.
J. Hardw. Syst. Secur., 2017

High-Level Implementation of a Chaotic and AES Based Crypto-System.
J. Circuits Syst. Comput., 2017

Lyapunov Exponent Evaluation of the CBC Mode of Operation.
CoRR, 2017

Lightweight Encryption Algorithm Based on Modified XTEA for Low-Resource Embedded Devices.
Proceedings of the 21st International Database Engineering & Applications Symposium, 2017

Design and SystemC Implementation of Chaos-Based Enhancements for the Advanced Encryption Standard.
Proceedings of the 27th International Conference on Computer Theory and Applications, 2017

A novel image encryption scheme using chaos, hyper-chaos systems and the secure Hash algorithm SHA-1.
Proceedings of the International Conference on Control, Automation and Diagnosis, 2017

The design of an embedded system (SOPC) for an image processing application.
Proceedings of the International Conference on Control, Automation and Diagnosis, 2017

Conditions to Have a Well-Disordered Dynamics in the CBC Mode of Operation.
Proceedings of the 14th IEEE/ACS International Conference on Computer Systems and Applications, 2017

2016
A high-speed AES design resistant to fault injection attacks.
Microprocess. Microsystems, 2016

High Speed FPGA Implementation of Cryptographic KECCAK Hash Function Crypto-Processor.
J. Circuits Syst. Comput., 2016

Proving Chaotic Behavior of CBC Mode of Operation.
Int. J. Bifurc. Chaos, 2016

A Systolic Hardware Architectures of Montgomery Modular Multiplication for Public Key Cryptosystems.
IACR Cryptol. ePrint Arch., 2016

Proving chaotic behaviour of CBC mode of operation.
CoRR, 2016

The dynamics of the CBC Mode of Operation.
CoRR, 2016

Simulation-based verification of large-integer arithmetic circuits.
Proceedings of the 1st IEEE International Verification and Security Workshop, 2016

Fast hardware implementation of ECDSA signature scheme.
Proceedings of the International Symposium on Signal, Image, Video and Communications, 2016

High throughput pipelined hardware implementation of the KECCAK hash function.
Proceedings of the International Symposium on Signal, Image, Video and Communications, 2016

A reliable fault detection scheme for the AES hardware implementation.
Proceedings of the International Symposium on Signal, Image, Video and Communications, 2016

Efficient software implementation of RNS-montgomery modular multiplication for embedded system.
Proceedings of the International Image Processing, Applications and Systems, 2016

Efficient software implementation of the final exponentiation for pairing.
Proceedings of the International Image Processing, Applications and Systems, 2016

A flexible RNS-based large polynomial multiplier for Fully Homomorphic Encryption.
Proceedings of the 11th International Design & Test Symposium, 2016

Implementation of a secured digital ultralight 14443-type A RFID tag with an FPGA platform.
Proceedings of the 2016 International Conference on Design and Technology of Integrated Systems in Nanoscale Era, 2016

Summary of Topological Study of Chaotic CBC Mode of Operation.
Proceedings of the 2016 IEEE Intl Conference on Computational Science and Engineering, 2016

High-Performance Elliptic Curve Cryptography by Using the CIOS Method for Modular Multiplication.
Proceedings of the Risks and Security of Internet and Systems, 2016

On Elliptic Curve Cryptography implementations and evaluation.
Proceedings of the 2nd International Conference on Advanced Technologies for Signal and Image Processing, 2016

Quantitative evaluation of chaotic CBC mode of operation.
Proceedings of the 2nd International Conference on Advanced Technologies for Signal and Image Processing, 2016

Performance evaluation and design considerations of lightweight block cipher for low-cost embedded devices.
Proceedings of the 13th IEEE/ACS International Conference of Computer Systems and Applications, 2016

A Selective Encryption Scheme with Multiple Security Levels for the H.264/AVC Video Coding Standard.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016

Efficient Hybrid Encryption System Based on Block Cipher and Chaos Generator.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016

2015
An AOP-Based Fault Injection Environment for Cryptographic SystemC Designs.
J. Circuits Syst. Comput., 2015

Enhancing a 32-Bit Processor Core with Efficient Cryptographic Instructions.
J. Circuits Syst. Comput., 2015

Area-Efficient Hardware Implementation of the Optimal Ate Pairing over BN curves.
IACR Cryptol. ePrint Arch., 2015

Proposed efficient arithmetic operations architectures for Hyperelliptic Curves Cryptosystems (HECC).
Proceedings of the 12th IEEE International Multi-Conference on Systems, Signals & Devices, 2015

Efficient FPGA hardware implementation of secure hash function SHA-256/Blake-256.
Proceedings of the 12th IEEE International Multi-Conference on Systems, Signals & Devices, 2015

2014
A low-resource 32-bit datapath ECDSA design for embedded applications.
Proceedings of the International Carnahan Conference on Security Technology, 2014

Instruction set extensions of AES algorithms for 32-bit processors.
Proceedings of the International Carnahan Conference on Security Technology, 2014

Implementation of faster miller over Barreto-Naehrig curves in Jacobian cordinates.
Proceedings of the Global Summit on Computer & Information Technology, 2014

2013
Effects of a magnetic field environment on quantum cloning of qubits.
Quantum Inf. Process., 2013

An FPGA implementation of the SHA-3: The BLAKE hash function.
Proceedings of the 10th International Multi-Conferences on Systems, Signals & Devices, 2013

2012
Implementation of CPA analysis against AES design on FPGA.
Proceedings of the International Conference on Communications and Information Technology, 2012

Performances of the AES design in 0.18μm CMOS technology.
Proceedings of the 7th International Conference on Design & Technology of Integrated Systems in Nanoscale Era, 2012

A compact 32-bit AES design for embedded system.
Proceedings of the 7th International Conference on Design & Technology of Integrated Systems in Nanoscale Era, 2012

2010
Design and Hardware Implementation of QoSS - AES Processor for Multimedia applications.
Trans. Data Priv., 2010

2009
Design of Reconfigurable Image Encryption Processor Using 2-D Cellular Automata Generator.
Int. J. Comput. Sci. Appl., 2009

2007
A Reconfigurable Implementation of the New Secure Hash Algorithm.
Proceedings of the The Second International Conference on Availability, 2007


  Loading...