A comparative study of power consumption models for cpa attack H Mestiri, N Benhadjyoussef, M Machhout, R Tourki International Journal of Computer Network and Information Security 5 (3), 25, 2013 | 32 | 2013 |
Implementation of CPA analysis against AES design on FPGA N Benhadjyoussef, H Mestiri, M Machhout, R Tourki 2012 International Conference on Communications and Information Technology …, 2012 | 32 | 2012 |
A robust fault detection scheme for the advanced encryption standard H Mestiri, N Benhadjyoussef, M Machhout, R Tourki International Journal of Computer Network and Information Security 5 (6), 49-55, 2013 | 22 | 2013 |
High performance and reliable fault detection scheme for the advanced encryption standard H Mestiri, N Benhadjyoussef, M Machhout, R Tourki International Review on Computers & Software (IRECOS) 8 (3), 730-746, 2013 | 20 | 2013 |
Location and positioning systems: Performance and comparison K Mannay, N Benhadjyoussef, M Machhout, J Urena 2016 4th International Conference on Control Engineering & Information …, 2016 | 15 | 2016 |
An FPGA implementation of the AES with fault detection countermeasure H Mestiri, N Benhadjyoussef, M Machhout, R Tourki 2013 International Conference on Control, Decision and Information …, 2013 | 14 | 2013 |
Low power elliptic curve digital signature design for constrained devices E Wajih, B Noura, M Mohsen, T Rached International Journal of security (IJS) 6 (2), 1-14, 2012 | 14 | 2012 |
Optimized power trace numbers in CPA attacks N Benhadjyoussef, M Machhout, R Tourki Eighth International Multi-Conference on Systems, Signals & Devices, 1-5, 2011 | 12 | 2011 |
Fault attacks resistant aes hardware implementation H Mestiri, N Benhadjyoussef, M Machhout 2019 IEEE International Conference on Design & Test of Integrated Micro …, 2019 | 9 | 2019 |
A Hybrid Countermeasure-Based Fault-Resistant AES Implementation N Benhadjyoussef, M Karmani, M Machhout, B Hamdi Journal of Circuits, Systems and Computers, 2020 | 8 | 2020 |
A cryptographic processor for 32 bit embedded system with resource-constraints N Benhadjyoussef, W Elhadjyoussef, M Machhout, K Torki, R Tourki International Review on Computers and Software 8 (1), 132-143, 2013 | 8 | 2013 |
A compact 32-Bit AES design for embedded system N Benhadjyoussef, M Machhout, R Tourki 7th International Conference on Design & Technology of Integrated Systems in …, 2012 | 8 | 2012 |
Power-based side-channel analysis against aes implementations: Evaluation and comparison N Benhadjyoussef, M Karmani, M Machhout International Journal of Computer Science & Network Security 21 (4), 264-271, 2021 | 5 | 2021 |
A low-resource 32-bit datapath ECDSA design for embedded applications NBH Youssef, WEH Youssef, M Machhout, R Tourki, K Torki 2014 International Carnahan Conference on Security Technology (ICCST), 1-6, 2014 | 5 | 2014 |
The DFA/DFT‐based hacking techniques and countermeasures: Case study of the 32‐bit AES encryption crypto‐core M Karmani, N Benhadjyoussef, B Hamdi, M Machhout IET Computers & Digital Techniques 15 (2), 160-170, 2021 | 4 | 2021 |
The SHA3-512 Cryptographic Hash Algorithm Analysis And Implementation On The Leon3 Processor M Karmani, N Benhadjyoussef, B Hamdi, M Machhout | 4 | 2021 |
A fault detection AES scheme for resource-constrained embedded systems N Benhadjyoussef, M Karmani, H Mestiri 2019 International Conference on Advanced Systems and Emergent Technologies …, 2019 | 4 | 2019 |
Enhancing a 32-bit processor core with efficient cryptographic instructions N Benhadjyoussef, W Elhadjyoussef, M Machhout, R Tourki, K Torki Journal of Circuits, Systems and Computers 24 (10), 1550158, 2015 | 4 | 2015 |
Instruction set extensions of AES algorithms for 32-bit processors NBH Youssef, WEH Youssef, M Machhout, R Tourki, K Torki 2014 International Carnahan Conference on Security Technology (ICCST), 1-5, 2014 | 3 | 2014 |
The secured AES designs against fault injection attacks: A comparative study N Benhadjyoussef, M Karmani, M Machhout 2020 5th International Conference on Advanced Technologies for Signal and …, 2020 | 2 | 2020 |