Zakaria Najm

According to our database1, Zakaria Najm authored at least 39 papers between 2013 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
On the Cost of ASIC Hardware Crackers: A SHA-1 Case Study.
Proceedings of the Topics in Cryptology - CT-RSA 2021, 2021

2020
Fixslicing: A New GIFT Representation Fast Constant-Time Implementations of GIFT and GIFT-COFB on ARM Cortex-M.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

Fixslicing: A New GIFT Representation.
IACR Cryptol. ePrint Arch., 2020

2019
Security is an architectural design constraint.
Microprocess. Microsystems, 2019

SoK : On DFA Vulnerabilities of Substitution-Permutation Networks.
IACR Cryptol. ePrint Arch., 2019

2018
Multivariate High-Order Attacks of Shuffled Tables Recomputation.
J. Cryptol., 2018

The Conflicted Usage of RLUTs for Security-Critical Applications on FPGA.
J. Hardw. Syst. Secur., 2018

Session details: Security threats caused by novel technologies.
Proceedings of the 18th International Conference on Embedded Computer Systems: Architectures, 2018

Crack me if you can: hardware acceleration bridging the gap between practical and theoretical cryptanalysis?: a Survey.
Proceedings of the 18th International Conference on Embedded Computer Systems: Architectures, 2018

Feature Selection Methods for Non-Profiled Side-Channel Attacks on ECC.
Proceedings of the 23rd IEEE International Conference on Digital Signal Processing, 2018

On Comparing Side-channel Properties of AES and ChaCha20 on Microcontrollers.
Proceedings of the 2018 IEEE Asia Pacific Conference on Circuits and Systems, 2018

2017
Cryptographically Secure Shield for Security IPs Protection.
IEEE Trans. Computers, 2017

Using modular extension to provably protect Edwards curves against fault attacks.
J. Cryptogr. Eng., 2017

2016
Formally proved security of assembly code against power analysis - A case study on balanced logic.
J. Cryptogr. Eng., 2016

Method taking into account process dispersion to detect hardware Trojan Horse by side-channel analysis.
J. Cryptogr. Eng., 2016

Correlated Extra-Reductions Defeat Blinded Regular Exponentiation - Extended Version.
IACR Cryptol. ePrint Arch., 2016

Time-Frequency Analysis for Second-Order Attacks.
IACR Cryptol. ePrint Arch., 2016

PLL to the rescue: a novel EM fault countermeasure.
Proceedings of the 53rd Annual Design Automation Conference, 2016

Dismantling Real-World ECC with Horizontal and Vertical Template Attacks.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2016

Correlated Extra-Reductions Defeat Blinded Regular Exponentiation.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2016, 2016

2015
High Precision Fault Injections on the Instruction Cache of ARMv7-M Architectures.
IACR Cryptol. ePrint Arch., 2015

A Generic Countermeasure Against Fault Injection Attacks on Asymmetric Cryptography.
IACR Cryptol. ePrint Arch., 2015

Dismantling real-world ECC with Horizontal and Vertical Template Attacks.
IACR Cryptol. ePrint Arch., 2015

Multi-Variate High-Order Attacks of Shuffled Tables Recomputation.
IACR Cryptol. ePrint Arch., 2015

Reconfigurable LUT: A Double Edged Sword for Security-Critical Applications.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2015

Private circuits II versus fault injection attacks.
Proceedings of the International Conference on ReConFigurable Computing and FPGAs, 2015

Linear complementary dual code improvement to strengthen encoded circuit against hardware Trojan horses.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2015

Hardware property checker for run-time Hardware Trojan detection.
Proceedings of the European Conference on Circuit Theory and Design, 2015

Optimized linear complementary codes implementation for hardware trojan prevention.
Proceedings of the European Conference on Circuit Theory and Design, 2015

Integrated Sensor: A Backdoor for Hardware Trojan Insertions?
Proceedings of the 2015 Euromicro Conference on Digital System Design, 2015

Hardware trojan detection by delay and electromagnetic measurements.
Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition, 2015

2014
Side-Channel Leakage and Trace Compression using Normalized Inter-Class Variance.
IACR Cryptol. ePrint Arch., 2014

Analysis and Improvements of the DPA Contest v4 Implementation.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2014

A look into SIMON from a side-channel perspective.
Proceedings of the 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, 2014

Encoding the state of integrated circuits: a proactive and reactive protection against hardware Trojans horses.
Proceedings of the 9th Workshop on Embedded Systems Security, 2014

2013
Formally Proved Security of Assembly Code Against Leakage.
IACR Cryptol. ePrint Arch., 2013

NICV: Normalized Inter-Class Variance for Detection of Side-Channel Leakage.
IACR Cryptol. ePrint Arch., 2013

Software Camouflage.
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013

A low-entropy first-degree secure provable masking scheme for resource-constrained devices.
Proceedings of the Workshop on Embedded Systems Security, 2013


  Loading...