Zakaria Najm
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
showing all ?? records
2010 – today
- 2018
- [j5]Nicolas Bruneau, Sylvain Guilley, Zakaria Najm, Yannick Teglia:
Multivariate High-Order Attacks of Shuffled Tables Recomputation. J. Cryptology 31(2): 351-393 (2018) - 2017
- [j4]Margaux Dugardin, Sylvain Guilley, Martin Moreau, Zakaria Najm, Pablo Rauzy:
Using modular extension to provably protect Edwards curves against fault attacks. J. Cryptographic Engineering 7(4): 321-330 (2017) - [j3]Xuan Thuy Ngo, Jean-Luc Danger, Sylvain Guilley, Tarik Graba, Yves Mathieu, Zakaria Najm, Shivam Bhasin:
Cryptographically Secure Shield for Security IPs Protection. IEEE Trans. Computers 66(2): 354-360 (2017) - 2016
- [j2]Pablo Rauzy, Sylvain Guilley, Zakaria Najm:
Formally proved security of assembly code against power analysis - A case study on balanced logic. J. Cryptographic Engineering 6(3): 201-216 (2016) - [j1]Xuan Thuy Ngo, Zakaria Najm, Shivam Bhasin, Sylvain Guilley, Jean-Luc Danger:
Method taking into account process dispersion to detect hardware Trojan Horse by side-channel analysis. J. Cryptographic Engineering 6(3): 239-247 (2016) - [c19]Margaux Dugardin, Sylvain Guilley, Jean-Luc Danger, Zakaria Najm, Olivier Rioul:
Correlated Extra-Reductions Defeat Blinded Regular Exponentiation. CHES 2016: 3-22 - [c18]Margaux Dugardin, Louiza Papachristodoulou, Zakaria Najm, Lejla Batina, Jean-Luc Danger, Sylvain Guilley:
Dismantling Real-World ECC with Horizontal and Vertical Template Attacks. COSADE 2016: 88-108 - [c17]Noriyuki Miura, Zakaria Najm, Wei He, Shivam Bhasin, Xuan Thuy Ngo, Makoto Nagata, Jean-Luc Danger:
PLL to the rescue: a novel EM fault countermeasure. DAC 2016: 90:1-90:6 - [i11]Margaux Dugardin, Sylvain Guilley, Jean-Luc Danger, Zakaria Najm, Olivier Rioul:
Correlated Extra-Reductions Defeat Blinded Regular Exponentiation - Extended Version. IACR Cryptology ePrint Archive 2016: 597 (2016) - [i10]Pierre Belgarric, Shivam Bhasin, Nicolas Bruneau, Jean-Luc Danger, Nicolas Debande, Sylvain Guilley, Annelie Heuser, Zakaria Najm, Olivier Rioul:
Time-Frequency Analysis for Second-Order Attacks. IACR Cryptology ePrint Archive 2016: 772 (2016) - 2015
- [c16]Nicolas Bruneau, Sylvain Guilley, Zakaria Najm, Yannick Teglia:
Multi-variate High-Order Attacks of Shuffled Tables Recomputation. CHES 2015: 475-494 - [c15]Xuan Thuy Ngo, Ingrid Exurville, Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm, Jean-Baptiste Rigaud, Bruno Robisson:
Hardware trojan detection by delay and electromagnetic measurements. DATE 2015: 782-787 - [c14]Xuan Thuy Ngo, Zakaria Najm, Shivam Bhasin, Debapriya Basu Roy, Jean-Luc Danger, Sylvain Guilley:
Integrated Sensor: A Backdoor for Hardware Trojan Insertions? DSD 2015: 415-422 - [c13]Claude Carlet, Abderrahman Daif, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm, Xuan Thuy Ngo, Thibault Porteboeuf, Cédric Tavernier:
Optimized linear complementary codes implementation for hardware trojan prevention. ECCTD 2015: 1-4 - [c12]Xuan Thuy Ngo, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm, Olivier Emery:
Hardware property checker for run-time Hardware Trojan detection. ECCTD 2015: 1-4 - [c11]Lionel Rivière, Zakaria Najm, Pablo Rauzy, Jean-Luc Danger, Julien Bringer, Laurent Sauvage:
High precision fault injections on the instruction cache of ARMv7-M architectures. HOST 2015: 62-67 - [c10]Xuan Thuy Ngo, Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm:
Linear complementary dual code improvement to strengthen encoded circuit against hardware Trojan horses. HOST 2015: 82-87 - [c9]Henitsoa Rakotomalala, Xuan Thuy Ngo, Zakaria Najm, Jean-Luc Danger, Sylvain Guilley:
Private circuits II versus fault injection attacks. ReConFig 2015: 1-9 - [c8]Debapriya Basu Roy, Shivam Bhasin, Sylvain Guilley, Jean-Luc Danger, Debdeep Mukhopadhyay, Xuan Thuy Ngo, Zakaria Najm:
Reconfigurable LUT: A Double Edged Sword for Security-Critical Applications. SPACE 2015: 248-268 - [i9]Pablo Rauzy, Sylvain Guilley, Zakaria Najm:
Formally Proved Security of Assembly Code Against Power Analysis: A Case Study on Balanced Logic. CoRR abs/1506.05285 (2015) - [i8]Lionel Rivière, Zakaria Najm, Pablo Rauzy, Jean-Luc Danger, Julien Bringer, Laurent Sauvage:
High Precision Fault Injections on the Instruction Cache of ARMv7-M Architectures. CoRR abs/1510.01537 (2015) - [i7]Lionel Rivière, Zakaria Najm, Pablo Rauzy, Jean-Luc Danger, Julien Bringer, Laurent Sauvage:
High Precision Fault Injections on the Instruction Cache of ARMv7-M Architectures. IACR Cryptology ePrint Archive 2015: 147 (2015) - [i6]Nicolas Bruneau, Sylvain Guilley, Zakaria Najm, Yannick Teglia:
Multi-Variate High-Order Attacks of Shuffled Tables Recomputation. IACR Cryptology ePrint Archive 2015: 837 (2015) - [i5]Pablo Rauzy, Martin Moreau, Sylvain Guilley, Zakaria Najm:
A Generic Countermeasure Against Fault Injection Attacks on Asymmetric Cryptography. IACR Cryptology ePrint Archive 2015: 882 (2015) - [i4]Margaux Dugardin, Louiza Papachristodoulou, Zakaria Najm, Lejla Batina, Jean-Luc Danger, Sylvain Guilley, Jean-Christophe Courrège, Carine Therond:
Dismantling real-world ECC with Horizontal and Vertical Template Attacks. IACR Cryptology ePrint Archive 2015: 1001 (2015) - 2014
- [c7]Xuan Thuy Ngo, Sylvain Guilley, Shivam Bhasin, Jean-Luc Danger, Zakaria Najm:
Encoding the state of integrated circuits: a proactive and reactive protection against hardware Trojans horses. WESS 2014: 7:1-7:10 - [c6]Shivam Bhasin, Tarik Graba, Jean-Luc Danger, Zakaria Najm:
A look into SIMON from a side-channel perspective. HOST 2014: 56-59 - [c5]Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm:
Side-channel leakage and trace compression using normalized inter-class variance. HASP@ISCA 2014: 7:1-7:9 - [c4]Shivam Bhasin, Nicolas Bruneau, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm:
Analysis and Improvements of the DPA Contest v4 Implementation. SPACE 2014: 201-218 - [i3]Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm:
Side-Channel Leakage and Trace Compression using Normalized Inter-Class Variance. IACR Cryptology ePrint Archive 2014: 1020 (2014) - 2013
- [c3]Pierre Belgarric, Shivam Bhasin, Nicolas Bruneau, Jean-Luc Danger, Nicolas Debande, Sylvain Guilley, Annelie Heuser, Zakaria Najm, Olivier Rioul:
Time-Frequency Analysis for Second-Order Attacks. CARDIS 2013: 108-122 - [c2]Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm:
A low-entropy first-degree secure provable masking scheme for resource-constrained devices. WESS 2013: 7:1-7:10 - [c1]Sylvain Guilley, Damien Marion, Zakaria Najm, Youssef Souissi, Antoine Wurcker:
Software Camouflage. FPS 2013: 122-139 - [i2]Pablo Rauzy, Sylvain Guilley, Zakaria Najm:
Formally Proved Security of Assembly Code Against Leakage. IACR Cryptology ePrint Archive 2013: 554 (2013) - [i1]Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm:
NICV: Normalized Inter-Class Variance for Detection of Side-Channel Leakage. IACR Cryptology ePrint Archive 2013: 717 (2013)
Coauthor Index
data released under the ODC-BY 1.0 license; see also our legal information page
last updated on 2018-03-13 23:10 CET by the dblp team