关注
Noura Benhadjyoussef
Noura Benhadjyoussef
Laboratory of Electronics and Microelectronics (EμE), University of Monastir
在 fsm.rnu.tn 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
A comparative study of power consumption models for cpa attack
H Mestiri, N Benhadjyoussef, M Machhout, R Tourki
International Journal of Computer Network and Information Security 5 (3), 25, 2013
322013
Implementation of CPA analysis against AES design on FPGA
N Benhadjyoussef, H Mestiri, M Machhout, R Tourki
2012 International Conference on Communications and Information Technology …, 2012
322012
A robust fault detection scheme for the advanced encryption standard
H Mestiri, N Benhadjyoussef, M Machhout, R Tourki
International Journal of Computer Network and Information Security 5 (6), 49-55, 2013
222013
High performance and reliable fault detection scheme for the advanced encryption standard
H Mestiri, N Benhadjyoussef, M Machhout, R Tourki
International Review on Computers & Software (IRECOS) 8 (3), 730-746, 2013
202013
Location and positioning systems: Performance and comparison
K Mannay, N Benhadjyoussef, M Machhout, J Urena
2016 4th International Conference on Control Engineering & Information …, 2016
152016
An FPGA implementation of the AES with fault detection countermeasure
H Mestiri, N Benhadjyoussef, M Machhout, R Tourki
2013 International Conference on Control, Decision and Information …, 2013
142013
Low power elliptic curve digital signature design for constrained devices
E Wajih, B Noura, M Mohsen, T Rached
International Journal of security (IJS) 6 (2), 1-14, 2012
142012
Optimized power trace numbers in CPA attacks
N Benhadjyoussef, M Machhout, R Tourki
Eighth International Multi-Conference on Systems, Signals & Devices, 1-5, 2011
122011
Fault attacks resistant aes hardware implementation
H Mestiri, N Benhadjyoussef, M Machhout
2019 IEEE International Conference on Design & Test of Integrated Micro …, 2019
92019
A Hybrid Countermeasure-Based Fault-Resistant AES Implementation
N Benhadjyoussef, M Karmani, M Machhout, B Hamdi
Journal of Circuits, Systems and Computers, 2020
82020
A cryptographic processor for 32 bit embedded system with resource-constraints
N Benhadjyoussef, W Elhadjyoussef, M Machhout, K Torki, R Tourki
International Review on Computers and Software 8 (1), 132-143, 2013
82013
A compact 32-Bit AES design for embedded system
N Benhadjyoussef, M Machhout, R Tourki
7th International Conference on Design & Technology of Integrated Systems in …, 2012
82012
Power-based side-channel analysis against aes implementations: Evaluation and comparison
N Benhadjyoussef, M Karmani, M Machhout
International Journal of Computer Science & Network Security 21 (4), 264-271, 2021
52021
A low-resource 32-bit datapath ECDSA design for embedded applications
NBH Youssef, WEH Youssef, M Machhout, R Tourki, K Torki
2014 International Carnahan Conference on Security Technology (ICCST), 1-6, 2014
52014
The DFA/DFT‐based hacking techniques and countermeasures: Case study of the 32‐bit AES encryption crypto‐core
M Karmani, N Benhadjyoussef, B Hamdi, M Machhout
IET Computers & Digital Techniques 15 (2), 160-170, 2021
42021
The SHA3-512 Cryptographic Hash Algorithm Analysis And Implementation On The Leon3 Processor
M Karmani, N Benhadjyoussef, B Hamdi, M Machhout
42021
A fault detection AES scheme for resource-constrained embedded systems
N Benhadjyoussef, M Karmani, H Mestiri
2019 International Conference on Advanced Systems and Emergent Technologies …, 2019
42019
Enhancing a 32-bit processor core with efficient cryptographic instructions
N Benhadjyoussef, W Elhadjyoussef, M Machhout, R Tourki, K Torki
Journal of Circuits, Systems and Computers 24 (10), 1550158, 2015
42015
Instruction set extensions of AES algorithms for 32-bit processors
NBH Youssef, WEH Youssef, M Machhout, R Tourki, K Torki
2014 International Carnahan Conference on Security Technology (ICCST), 1-5, 2014
32014
The secured AES designs against fault injection attacks: A comparative study
N Benhadjyoussef, M Karmani, M Machhout
2020 5th International Conference on Advanced Technologies for Signal and …, 2020
22020
系统目前无法执行此操作,请稍后再试。
文章 1–20