Najm, Zakaria
45  results:
Search for persons X
?
1

On the Cost of ASIC Hardware Crackers: A SHA-1 Case Study:

, In: Topics in Cryptology – CT-RSA 2021; Lecture Notes in Computer Science,
 
?
2

Fixslicing: A New GIFT Representation: Fast Constant-Time I..:

Adomnicai, Alexandre ; Najm, Zakaria ; Peyrin, Thomas
IACR Transactions on Cryptographic Hardware and Embedded Systems.  , 2020
 
?
3

SoK : On DFA Vulnerabilities of Substitution-Permutation..:

, In: Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security,
Khairallah, Mustafa ; Hou, Xiaolu ; Najm, Zakaria... - p. 403-414 , 2019
 
?
4

Security is an architectural design constraint:

Ravi, Prasanna ; Najm, Zakaria ; Bhasin, Shivam...
Microprocessors and Microsystems.  68 (2019)  - p. 17-27 , 2019
 
?
5

Session details: Security threats caused by novel technolog..:

, In: Proceedings of the 18th International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation,
 
?
6

Crack me if you can: hardware acceleration bridging the gap..:

, In: Proceedings of the 18th International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation,
 
?
7

The Conflicted Usage of RLUTs for Security-Critical Applica..:

Roy, Debapriya Basu ; Bhasin, Shivam ; Danger, Jean-Luc...
Journal of Hardware and Systems Security.  2 (2018)  2 - p. 162-178 , 2018
 
?
8

Using modular extension to provably protect Edwards curves ..:

Dugardin, Margaux ; Guilley, Sylvain ; Moreau, Martin..
Journal of Cryptographic Engineering.  7 (2017)  4 - p. 321-330 , 2017
 
?
10

Method taking into account process dispersion to detect har..:

Ngo, Xuan Thuy ; Najm, Zakaria ; Bhasin, Shivam..
Journal of Cryptographic Engineering.  6 (2016)  3 - p. 239-247 , 2016
 
?
11

PLL to the rescue : a novel EM fault countermeasure:

, In: Proceedings of the 53rd Annual Design Automation Conference,
Miura, Noriyuki ; Najm, Zakaria ; He, Wei... - p. 1-6 , 2016
 
?
12

Linear complementary dual code improvement to strengthen en..:

, In: 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST),
 
?
13

Formally proved security of assembly code against power ana..:

Rauzy, Pablo ; Guilley, Sylvain ; Najm, Zakaria
Journal of Cryptographic Engineering.  6 (2015)  3 - p. 201-216 , 2015
 
?
14

Side-channel leakage and trace compression using normalized..:

, In: Proceedings of the Third Workshop on Hardware and Architectural Support for Security and Privacy,
 
?
15

Encoding the state of integrated circuits : a proactive ..:

, In: Proceedings of the 9th Workshop on Embedded Systems Security,
 
1-15