Monjur Alam

According to our database1, Monjur Alam authored at least 19 papers between 2007 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Making Crypto Libraries Robust Against Physical Side-channel Attacks.
PhD thesis, 2021

Nonce@Once: A Single-Trace EM Side Channel Attack on Several Constant-Time Elliptic Curve Implementations in Mobile Platforms.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

2020
REMOTE: Robust External Malware Detection Framework by Using Electromagnetic Signals.
IEEE Trans. Computers, 2020

2018
Exposing Search and Advertisement Abuse Tactics and Infrastructure of Technical Support Scammers.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

One&Done: A Single-Decryption EM-Based Attack on OpenSSL's Constant-Time Blinded RSA.
Proceedings of the 27th USENIX Security Symposium, 2018

Syndrome: Spectral analysis for anomaly detection on medical IoT and embedded devices.
Proceedings of the 2018 IEEE International Symposium on Hardware Oriented Security and Trust, 2018

2017
By Hook or by Crook: Exposing the Diverse Abuse Tactics of Technical Support Scammers.
CoRR, 2017

EDDIE: EM-Based Detection of Deviations in Program Execution.
Proceedings of the 44th Annual International Symposium on Computer Architecture, 2017

2016
HDFI: Hardware-Assisted Data-Flow Isolation.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

2015
A biomarker ensemble ranking framework for prioritizing depression candidate genes.
Proceedings of the IEEE Conference on Computational Intelligence in Bioinformatics and Computational Biology, 2015

2013
Design of an Intelligent SHA-1 Based Cryptographic System: A CPSO Based Approach.
Int. J. Netw. Secur., 2013

First-order DPA Vulnerability of Rijndael: Security and Area-delay Optimization Trade-off.
Int. J. Netw. Secur., 2013

2011
An Adaptive Hebbian Learning Based Neural Network Scheme to Solve Discrete Logarithm Problem.
Proceedings of the 5th Indian International Conference on Artificial Intelligence, 2011

2009
Effect of glitches against masked AES S-box implementation and countermeasure.
IET Inf. Secur., 2009

Parallel crypto-devices for GF(p) elliptic curve multiplication resistant against side channel attacks.
Comput. Electr. Eng., 2009

2008
Single Chip Encryptor/Decryptor Core Implementation of AES Algorithm.
Proceedings of the 21st International Conference on VLSI Design (VLSI Design 2008), 2008

A GF(p) elliptic curve group operator resistant against side channel attacks.
Proceedings of the 18th ACM Great Lakes Symposium on VLSI 2008, 2008

2007
A Robust GF(p) Parallel Arithmetic Unit for Public Key Cryptography.
Proceedings of the Tenth Euromicro Conference on Digital System Design: Architectures, 2007

An area optimized reconfigurable encryptor for AES-Rijndael.
Proceedings of the 2007 Design, Automation and Test in Europe Conference and Exposition, 2007


  Loading...