Zakaria Najm
According to our database1,
Zakaria Najm
authored at least 39 papers
between 2013 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
2013
2014
2015
2016
2017
2018
2019
2020
2021
0
5
10
2
2
2
2
4
4
1
2
1
4
3
7
3
2
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2021
Proceedings of the Topics in Cryptology - CT-RSA 2021, 2021
2020
Fixslicing: A New GIFT Representation Fast Constant-Time Implementations of GIFT and GIFT-COFB on ARM Cortex-M.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020
2019
IACR Cryptol. ePrint Arch., 2019
2018
J. Hardw. Syst. Secur., 2018
Proceedings of the 18th International Conference on Embedded Computer Systems: Architectures, 2018
Crack me if you can: hardware acceleration bridging the gap between practical and theoretical cryptanalysis?: a Survey.
Proceedings of the 18th International Conference on Embedded Computer Systems: Architectures, 2018
Proceedings of the 23rd IEEE International Conference on Digital Signal Processing, 2018
Proceedings of the 2018 IEEE Asia Pacific Conference on Circuits and Systems, 2018
2017
IEEE Trans. Computers, 2017
J. Cryptogr. Eng., 2017
2016
Formally proved security of assembly code against power analysis - A case study on balanced logic.
J. Cryptogr. Eng., 2016
Method taking into account process dispersion to detect hardware Trojan Horse by side-channel analysis.
J. Cryptogr. Eng., 2016
Correlated Extra-Reductions Defeat Blinded Regular Exponentiation - Extended Version.
IACR Cryptol. ePrint Arch., 2016
Proceedings of the 53rd Annual Design Automation Conference, 2016
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2016
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2016, 2016
2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2015
Proceedings of the International Conference on ReConFigurable Computing and FPGAs, 2015
Linear complementary dual code improvement to strengthen encoded circuit against hardware Trojan horses.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2015
Proceedings of the European Conference on Circuit Theory and Design, 2015
Proceedings of the European Conference on Circuit Theory and Design, 2015
Proceedings of the 2015 Euromicro Conference on Digital System Design, 2015
Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition, 2015
2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2014
Proceedings of the 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, 2014
Encoding the state of integrated circuits: a proactive and reactive protection against hardware Trojans horses.
Proceedings of the 9th Workshop on Embedded Systems Security, 2014
2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013
A low-entropy first-degree secure provable masking scheme for resource-constrained devices.
Proceedings of the Workshop on Embedded Systems Security, 2013