Zakaria Najm Coauthor index pubzone.org

Facets and more with CompleteSearch

Listing of the DBLP Bibliography Server - FAQ
Other views (modern): by type - by year
Other mirrors: Trier I - Trier II


Ask others: ACM DL/Guide - CiteSeerx - CSB - MetaPress - Google - Bing - Yahoo
DBLP keys2017
j3Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLXuan Thuy Ngo, Jean-Luc Danger, Sylvain Guilley, Tarik Graba, Yves Mathieu, Zakaria Najm, Shivam Bhasin: Cryptographically Secure Shield for Security IPs Protection. IEEE Trans. Computers 66(2): 354-360 (2017)
2016
j2Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPablo Rauzy, Sylvain Guilley, Zakaria Najm: Formally proved security of assembly code against power analysis - A case study on balanced logic. J. Cryptographic Engineering 6(3): 201-216 (2016)
j1Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLXuan Thuy Ngo, Zakaria Najm, Shivam Bhasin, Sylvain Guilley, Jean-Luc Danger: Method taking into account process dispersion to detect hardware Trojan Horse by side-channel analysis. J. Cryptographic Engineering 6(3): 239-247 (2016)
c19Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMargaux Dugardin, Sylvain Guilley, Jean-Luc Danger, Zakaria Najm, Olivier Rioul: Correlated Extra-Reductions Defeat Blinded Regular Exponentiation. CHES 2016: 3-22
c18Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMargaux Dugardin, Louiza Papachristodoulou, Zakaria Najm, Lejla Batina, Jean-Luc Danger, Sylvain Guilley: Dismantling Real-World ECC with Horizontal and Vertical Template Attacks. COSADE 2016: 88-108
c17Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLNoriyuki Miura, Zakaria Najm, Wei He, Shivam Bhasin, Xuan Thuy Ngo, Makoto Nagata, Jean-Luc Danger: PLL to the rescue: a novel EM fault countermeasure. DAC 2016: 90:1-90:6
i11Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMargaux Dugardin, Sylvain Guilley, Jean-Luc Danger, Zakaria Najm, Olivier Rioul: Correlated Extra-Reductions Defeat Blinded Regular Exponentiation - Extended Version. IACR Cryptology ePrint Archive 2016: 597 (2016)
i10Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPierre Belgarric, Shivam Bhasin, Nicolas Bruneau, Jean-Luc Danger, Nicolas Debande, Sylvain Guilley, Annelie Heuser, Zakaria Najm, Olivier Rioul: Time-Frequency Analysis for Second-Order Attacks. IACR Cryptology ePrint Archive 2016: 772 (2016)
2015
c16Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLNicolas Bruneau, Sylvain Guilley, Zakaria Najm, Yannick Teglia: Multi-variate High-Order Attacks of Shuffled Tables Recomputation. CHES 2015: 475-494
c15Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLXuan Thuy Ngo, Ingrid Exurville, Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm, Jean-Baptiste Rigaud, Bruno Robisson: Hardware trojan detection by delay and electromagnetic measurements. DATE 2015: 782-787
c14Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLXuan Thuy Ngo, Zakaria Najm, Shivam Bhasin, Debapriya Basu Roy, Jean-Luc Danger, Sylvain Guilley: Integrated Sensor: A Backdoor for Hardware Trojan Insertions? DSD 2015: 415-422
c13Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLClaude Carlet, Abderrahman Daif, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm, Xuan Thuy Ngo, Thibault Porteboeuf, Cédric Tavernier: Optimized linear complementary codes implementation for hardware trojan prevention. ECCTD 2015: 1-4
c12Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLXuan Thuy Ngo, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm, Olivier Emery: Hardware property checker for run-time Hardware Trojan detection. ECCTD 2015: 1-4
c11Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLionel Rivière, Zakaria Najm, Pablo Rauzy, Jean-Luc Danger, Julien Bringer, Laurent Sauvage: High precision fault injections on the instruction cache of ARMv7-M architectures. HOST 2015: 62-67
c10Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLXuan Thuy Ngo, Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm: Linear complementary dual code improvement to strengthen encoded circuit against hardware Trojan horses. HOST 2015: 82-87
c9Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLHenitsoa Rakotomalala, Xuan Thuy Ngo, Zakaria Najm, Jean-Luc Danger, Sylvain Guilley: Private circuits II versus fault injection attacks. ReConFig 2015: 1-9
c8Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDebapriya Basu Roy, Shivam Bhasin, Sylvain Guilley, Jean-Luc Danger, Debdeep Mukhopadhyay, Xuan Thuy Ngo, Zakaria Najm: Reconfigurable LUT: A Double Edged Sword for Security-Critical Applications. SPACE 2015: 248-268
i9Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPablo Rauzy, Sylvain Guilley, Zakaria Najm: Formally Proved Security of Assembly Code Against Power Analysis: A Case Study on Balanced Logic. CoRR abs/1506.05285 (2015)
i8Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLionel Rivière, Zakaria Najm, Pablo Rauzy, Jean-Luc Danger, Julien Bringer, Laurent Sauvage: High Precision Fault Injections on the Instruction Cache of ARMv7-M Architectures. CoRR abs/1510.01537 (2015)
i7Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLionel Rivière, Zakaria Najm, Pablo Rauzy, Jean-Luc Danger, Julien Bringer, Laurent Sauvage: High Precision Fault Injections on the Instruction Cache of ARMv7-M Architectures. IACR Cryptology ePrint Archive 2015: 147 (2015)
i6Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLNicolas Bruneau, Sylvain Guilley, Zakaria Najm, Yannick Teglia: Multi-Variate High-Order Attacks of Shuffled Tables Recomputation. IACR Cryptology ePrint Archive 2015: 837 (2015)
i5Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPablo Rauzy, Martin Moreau, Sylvain Guilley, Zakaria Najm: A Generic Countermeasure Against Fault Injection Attacks on Asymmetric Cryptography. IACR Cryptology ePrint Archive 2015: 882 (2015)
i4Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMargaux Dugardin, Louiza Papachristodoulou, Zakaria Najm, Lejla Batina, Jean-Luc Danger, Sylvain Guilley, Jean-Christophe Courrège, Carine Therond: Dismantling real-world ECC with Horizontal and Vertical Template Attacks. IACR Cryptology ePrint Archive 2015: 1001 (2015)
2014
c7Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLXuan Thuy Ngo, Sylvain Guilley, Shivam Bhasin, Jean-Luc Danger, Zakaria Najm: Encoding the state of integrated circuits: a proactive and reactive protection against hardware Trojans horses. WESS 2014: 7:1-7:10
c6Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLShivam Bhasin, Tarik Graba, Jean-Luc Danger, Zakaria Najm: A look into SIMON from a side-channel perspective. HOST 2014: 56-59
c5Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLShivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm: Side-channel leakage and trace compression using normalized inter-class variance. HASP@ISCA 2014: 7:1-7:9
c4Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLShivam Bhasin, Nicolas Bruneau, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm: Analysis and Improvements of the DPA Contest v4 Implementation. SPACE 2014: 201-218
i3Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLShivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm: Side-Channel Leakage and Trace Compression using Normalized Inter-Class Variance. IACR Cryptology ePrint Archive 2014: 1020 (2014)
2013
c3Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPierre Belgarric, Shivam Bhasin, Nicolas Bruneau, Jean-Luc Danger, Nicolas Debande, Sylvain Guilley, Annelie Heuser, Zakaria Najm, Olivier Rioul: Time-Frequency Analysis for Second-Order Attacks. CARDIS 2013: 108-122
c2Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLShivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm: A low-entropy first-degree secure provable masking scheme for resource-constrained devices. WESS 2013: 7:1-7:10
c1Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLSylvain Guilley, Damien Marion, Zakaria Najm, Youssef Souissi, Antoine Wurcker: Software Camouflage. FPS 2013: 122-139
i2Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPablo Rauzy, Sylvain Guilley, Zakaria Najm: Formally Proved Security of Assembly Code Against Leakage. IACR Cryptology ePrint Archive 2013: 554 (2013)
i1Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLShivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm: NICV: Normalized Inter-Class Variance for Detection of Side-Channel Leakage. IACR Cryptology ePrint Archive 2013: 717 (2013)

Coauthor Index

1Lejla Batina[c18] [i4]
2Pierre Belgarric[i10] [c3]
3Shivam Bhasin[j3] [j1] [c17] [i10] [c15] [c14] [c10] [c8] [c7] [c6] [c5] [c4] [i3] [c3] [c2] [i1]
4Julien Bringer[c11] [i8] [i7]
5Nicolas Bruneau[i10] [c16] [i6] [c4] [c3]
6Claude Carlet[c13]
7Jean-Christophe Courrège[i4]
8Abderrahman Daif[c13]
9Jean-Luc Danger[j3] [j1] [c19] [c18] [c17] [i11] [i10] [c15] [c14] [c13] [c12] [c11] [c10] [c9] [c8] [i8] [i7] [i4] [c7] [c6] [c5] [c4] [i3] [c3] [c2] [i1]
10Nicolas Debande[i10] [c3]
11Margaux Dugardin[c19] [c18] [i11] [i4]
12Olivier Emery[c12]
13Ingrid Exurville[c15]
14Tarik Graba[j3] [c6]
15Sylvain Guilley[j3] [j2] [j1] [c19] [c18] [i11] [i10] [c16] [c15] [c14] [c13] [c12] [c10] [c9] [c8] [i9] [i6] [i5] [i4] [c7] [c5] [c4] [i3] [c3] [c2] [c1] [i2] [i1]
16Wei He[c17]
17Annelie Heuser[i10] [c3]
18Damien Marion[c1]
19Yves Mathieu[j3]
20Noriyuki Miura[c17]
21Martin Moreau[i5]
22Debdeep Mukhopadhyay[c8]
23Makoto Nagata[c17]
24Xuan Thuy Ngo[j3] [j1] [c17] [c15] [c14] [c13] [c12] [c10] [c9] [c8] [c7]
25Louiza Papachristodoulou[c18] [i4]
26Thibault Porteboeuf[c13]
27Henitsoa Rakotomalala[c9]
28Pablo Rauzy[j2] [c11] [i9] [i8] [i7] [i5] [i2]
29Jean-Baptiste Rigaud[c15]
30Olivier Rioul[c19] [i11] [i10] [c3]
31Lionel Rivière[c11] [i8] [i7]
32Bruno Robisson[c15]
33Debapriya Basu Roy[c14] [c8]
34Laurent Sauvage[c11] [i8] [i7]
35Youssef Souissi[c1]
36Cédric Tavernier[c13]
37Yannick Teglia[c16] [i6]
38Carine Therond[i4]
39Antoine Wurcker[c1]

 

Last update 2017-02-03 04:43 CET by the DBLP TeamThis material is Open Data Data released under the ODC-BY 1.0 license — See also our legal information page