Belgacem Bouallegue

Orcid: 0000-0001-7292-6345

According to our database1, Belgacem Bouallegue authored at least 38 papers between 2001 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Offshore wind farms interfacing using HVAC-HVDC schemes: A review.
Comput. Electr. Eng., 2024

Chaos Fractal Digital Image Encryption Transmission in Underwater Optical Wireless Communication System.
IEEE Access, 2024

Positional Analysis of Spectrum Sharing Between IEEE 80.16 and TV Band.
Proceedings of the 7th IEEE International Conference on Advanced Technologies, 2024

2023
An improvement of both security and reliability for elliptic curve scalar multiplication Montgomery algorithm.
Multim. Tools Appl., March, 2023

Integrated Mediapipe with a CNN Model for Arabic Sign Language Recognition.
J. Electr. Comput. Eng., 2023

A Hybrid Regularization-Based Multi-Frame Super-Resolution Using Bayesian Framework.
Comput. Syst. Sci. Eng., 2023

A Secure Hardware Implementation for Elliptic Curve Digital Signature Algorithm.
Comput. Syst. Sci. Eng., 2023

2022
An improvement of both security and reliability for AES implementations.
J. King Saud Univ. Comput. Inf. Sci., November, 2022

2021
Arabic Sign Language Recognition System for Alphabets Using Machine Learning Techniques.
J. Electr. Comput. Eng., 2021

Regularized Multiframe Super-Resolution Image Reconstruction Using Linear and Nonlinear Filters.
J. Electr. Comput. Eng., 2021

Two hardware implementations for modular multiplication in the AMNS: Sequential and semi-parallel.
J. Inf. Secur. Appl., 2021

2019
Hardware Optimization on FPGA for the Modular Multiplication in the AMNS Representation.
Proceedings of the Risks and Security of Internet and Systems, 2019

2017
A Scalable and Systolic Architectures of Montgomery Modular Multiplication for Public Key Cryptosystems Based on DSPs.
J. Hardw. Syst. Secur., 2017

Lyapunov Exponent Evaluation of the CBC Mode of Operation.
CoRR, 2017

Conditions to Have a Well-Disordered Dynamics in the CBC Mode of Operation.
Proceedings of the 14th IEEE/ACS International Conference on Computer Systems and Applications, 2017

2016
A high-speed AES design resistant to fault injection attacks.
Microprocess. Microsystems, 2016

High Speed FPGA Implementation of Cryptographic KECCAK Hash Function Crypto-Processor.
J. Circuits Syst. Comput., 2016

Proving Chaotic Behavior of CBC Mode of Operation.
Int. J. Bifurc. Chaos, 2016

Cryptography of medical images based on a combination between chaotic and neural network.
IET Image Process., 2016

A Systolic Hardware Architectures of Montgomery Modular Multiplication for Public Key Cryptosystems.
IACR Cryptol. ePrint Arch., 2016

Proving chaotic behaviour of CBC mode of operation.
CoRR, 2016

The dynamics of the CBC Mode of Operation.
CoRR, 2016

High throughput pipelined hardware implementation of the KECCAK hash function.
Proceedings of the International Symposium on Signal, Image, Video and Communications, 2016

A reliable fault detection scheme for the AES hardware implementation.
Proceedings of the International Symposium on Signal, Image, Video and Communications, 2016

Summary of Topological Study of Chaotic CBC Mode of Operation.
Proceedings of the 2016 IEEE Intl Conference on Computational Science and Engineering, 2016

High-Performance Elliptic Curve Cryptography by Using the CIOS Method for Modular Multiplication.
Proceedings of the Risks and Security of Internet and Systems, 2016

Software application for simulation-based AES, RSA and elliptic-curve algorithms.
Proceedings of the 2nd International Conference on Advanced Technologies for Signal and Image Processing, 2016

Quantitative evaluation of chaotic CBC mode of operation.
Proceedings of the 2nd International Conference on Advanced Technologies for Signal and Image Processing, 2016

2015
Efficient FPGA hardware implementation of secure hash function SHA-256/Blake-256.
Proceedings of the 12th IEEE International Multi-Conference on Systems, Signals & Devices, 2015

2014
Implementation of faster miller over Barreto-Naehrig curves in Jacobian cordinates.
Proceedings of the Global Summit on Computer & Information Technology, 2014

Crypto-compression of medical image based on DCT and chaotic system.
Proceedings of the Global Summit on Computer & Information Technology, 2014

Joint Watermarking\Encryption image for safe transmission: Application on medical imaging.
Proceedings of the Global Summit on Computer & Information Technology, 2014

Implementation of elliptic curve digital signature algorithm (ECDSA).
Proceedings of the Global Summit on Computer & Information Technology, 2014

2013
An FPGA implementation of the SHA-3: The BLAKE hash function.
Proceedings of the 10th International Multi-Conferences on Systems, Signals & Devices, 2013

2010
Design and Hardware Implementation of QoSS - AES Processor for Multimedia applications.
Trans. Data Priv., 2010

2007
A Reconfigurable Implementation of the New Secure Hash Algorithm.
Proceedings of the The Second International Conference on Availability, 2007

2004
High performance architecture of integrated protocols for encoded video application.
Comput. Stand. Interfaces, 2004

2001
A Flow Control Approach for Encoded Video Applications Over ATM Network.
Proceedings of the Sixth IEEE Symposium on Computers and Communications (ISCC 2001), 2001


  Loading...