default search action
Mohamed El-Hadedy 0001
Person information
- affiliation: California State Polytechnic University, Department of Electrical and Computer Engineering, Pomona, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j6]Mohamed El-Hadedy, Xinfei Guo, Kazutomo Yoshii, Yichen Cai, Robert Herndon, Bryan Banta, Wen-Mei Hwu:
RECO-ASCON: Reconfigurable ASCON hash functions for IoT applications. Integr. 93: 102061 (2023) - [c24]Mohamed El-Hadedy, Russell Hua, Kazutomo Yoshii, Wen-Mei Hwu, Martin Margala:
RECO-LFSR: Reconfigurable Low-power Cryptographic processor based on LFSR for Trusted IoT platforms. ISQED 2023: 1-7 - [c23]Mohamed El-Hadedy, Russell Hua, Shahzman Saqib, Kazutomo Yoshii, Wen-Mei Hwu, Martin Margala:
BLTESTI: Benchmarking Lightweight TinyJAMBU on Embedded Systems for Trusted IoT. SOCC 2023: 1-6 - 2022
- [j5]Xinfei Guo, Mohamed El-Hadedy, Sergiu Mosanu, Xiangdong Wei, Kevin Skadron, Mircea R. Stan:
Agile-AES: Implementation of configurable AES primitive with agile design approach. Integr. 85: 87-96 (2022) - [c22]Xiangdong Wei, Mohamed El-Hadedy, Sergiu Mosanu, Zhengping Zhu, Wen-Mei Hwu, Xinfei Guo:
RECO-HCON: A High-Throughput Reconfigurable Compact ASCON Processor for Trusted IoT. SOCC 2022: 1-6 - 2021
- [c21]Yuta Akiya, Kyle Thomas Le, Megan Luong, Justin C. Wilson, Anas Salah Eddin, Valerio Formicola, Mohamed El-Hadedy:
SHA-3-LPHP: Hardware Acceleration of SHA-3 for Low-Power High-Performance Systems. ISSRE Workshops 2021: 393-398 - 2020
- [c20]Mohamed El-Hadedy, Martin Margala, Sergiu Mosanu, Danilo Gligoroski, Jinjun Xiong, Wen-Mei Hwu:
Micro - GAGE: A Low-power Compact GAGE Hash Function Processor for IoT Applications. ICECS 2020: 1-4 - [c19]Ryan Omidi, Ali Moghimi, Alireza Pourreza, Mohamed El-Hadedy, Anas Salah Eddin:
Ensemble Hyperspectral Band Selection for Detecting Nitrogen Status in Grape Leaves. ICMLA 2020: 286-293 - [i7]Ryan Omidi, Ali Moghimi, Alireza Pourreza, Mohamed El-Hadedy, Anas Salah Eddin:
Ensemble Hyperspectral Band Selection for Detecting Nitrogen Status in Grape Leaves. CoRR abs/2010.04225 (2020)
2010 – 2019
- 2019
- [j4]Mohamed El-Hadedy, Amit Kulkarni, Dirk Stroobandt, Kevin Skadron:
Reco-Pi: A reconfigurable Cryptoprocessor for π-Cipher. J. Parallel Distributed Comput. 133: 420-431 (2019) - [j3]Subho S. Banerjee, Mohamed El-Hadedy, Jong Bin Lim, Zbigniew T. Kalbarczyk, Deming Chen, Steven S. Lumetta, Ravishankar K. Iyer:
ASAP: Accelerated Short-Read Alignment on Programmable Hardware. IEEE Trans. Computers 68(3): 331-346 (2019) - [c18]Sergiu Mosanu, Xinfei Guo, Mohamed El-Hadedy, Lorena Anghel, Mircea Stan:
Flexi-AES: A Highly-Parameterizable Cipher for a Wide Range of Design Constraints. FCCM 2019: 338 - [c17]Seungwon Min, Sitao Huang, Mohamed El-Hadedy, Jinjun Xiong, Deming Chen, Wen-Mei Hwu:
Analysis and Optimization of I/O Cache Coherency Strategies for SoC-FPGA Device. FPL 2019: 301-306 - [c16]Sitao Huang, Li-Wen Chang, Izzat El Hajj, Simon Garcia De Gonzalo, Juan Gómez-Luna, Sai Rahul Chalamalasetti, Mohamed El-Hadedy, Dejan S. Milojicic, Onur Mutlu, Deming Chen, Wen-Mei W. Hwu:
Analysis and Modeling of Collaborative Execution Strategies for Heterogeneous CPU-FPGA Architectures. ICPE 2019: 79-90 - [i6]Seungwon Min, Sitao Huang, Mohamed El-Hadedy, Jinjun Xiong, Deming Chen, Wen-Mei Hwu:
Analysis and Optimization of I/O Cache Coherency Strategies for SoC-FPGA Device. CoRR abs/1908.01261 (2019) - 2018
- [c15]Sitao Huang, Mohamed El-Hadedy, Cong Hao, Qin Li, Vikram S. Mailthody, Ketan Date, Jinjun Xiong, Deming Chen, Rakesh Nagi, Wen-Mei Hwu:
Triangle Counting and Truss Decomposition using FPGA. HPEC 2018: 1-7 - [i5]Subho S. Banerjee, Mohamed El-Hadedy, Jong Bin Lim, Zbigniew T. Kalbarczyk, Deming Chen, Steven S. Lumetta, Ravishankar K. Iyer:
ASAP: Accelerated Short-Read Alignment on Programmable Hardware. CoRR abs/1803.02657 (2018) - 2017
- [j2]Qiong Wang, Mohamed El-Hadedy, Kevin Skadron, Ke Wang:
Accelerating Weeder: A DNA Motif Search Tool Using the Micron Automata Processor and FPGA. IEICE Trans. Inf. Syst. 100-D(10): 2470-2477 (2017) - [j1]Mohamed El-Hadedy, Xinfei Guo, Martin Margala, Mircea R. Stan, Kevin Skadron:
Dual-Data Rate Transpose-Memory Architecture Improves the Performance, Power and Area of Signal-Processing Systems. J. Signal Process. Syst. 88(2): 167-184 (2017) - [c14]Mohamed El-Hadedy, Xinfei Guo, Mircea R. Stan, Kevin Skadron:
PPE-ARX: Area- and power-efficient VLIW programmable processing element for IoT crypto-systems. AHS 2017: 153-160 - [c13]Subho S. Banerjee, Mohamed El-Hadedy, Jong Bin Lim, Daniel Chen, Zbigniew T. Kalbarczyk, Deming Chen, Ravishankar K. Iyer:
ASAP: Accelerated Short Read Alignment on Programmable Hardware (Abstract Only). FPGA 2017: 293-294 - [c12]Subho S. Banerjee, Mohamed El-Hadedy, Ching Y. Tan, Zbigniew T. Kalbarczyk, Steven S. Lumetta, Ravishankar K. Iyer:
On accelerating pair-HMM computations in programmable hardware. FPL 2017: 1-8 - 2016
- [c11]Jack Wadden, Nathan Brunelle, Ke Wang, Mohamed El-Hadedy, Gabriel Robins, Mircea Stan, Kevin Skadron:
Generating efficient and high-quality pseudo-random behavior on Automata Processors. ICCD 2016: 622-629 - [c10]Mohamed El-Hadedy, Hristina Mihajloska, Danilo Gligoroski, Amit Kulkarni, Dirk Stroobandt, Kevin Skadron:
A 16-Bit Reconfigurable Encryption Processor for p-Cipher. IPDPS Workshops 2016: 162-171 - [i4]Georgios K. Pitsilis, Mohamed El-Hadedy:
Posting with credibility in Micro-blogging systems using Digital Signatures and Watermarks: A case study on Twitter. CoRR abs/1612.09480 (2016) - 2015
- [c9]Mohamed El-Hadedy, Kevin Skadron:
Hardware overhead analysis of programmability in ARX crypto processing. HASP@ISCA 2015: 8:1-8:4 - 2014
- [c8]Danilo Gligoroski, Hristina Mihajloska, Simona Samardjiska, Håkon Jacobsen, Rune Erlend Jensen, Mohamed El-Hadedy:
π-Cipher: Authenticated Encryption for Big Data. NordSec 2014: 110-128 - 2013
- [i3]Mohamed El-Hadedy, Georgios Pitsilis, Svein J. Knapskog:
An Efficient Authorship Protection Scheme for Shared Multimedia Content. CoRR abs/1309.7640 (2013) - 2012
- [b1]Mohamed Ezzat El-Hadedy Aly:
Implementing Algorithms on FPGA Platforms. Norwegian University of Science and Technology, Trondheim, Norway, 2012 - 2011
- [c7]Mohamed El-Hadedy, Danilo Gligoroski, Svein Johan Knapskog:
Area efficient processing element architecture for compact hash functions systems on VIRTEX5 FPGA platform. AHS 2011: 240-247 - [c6]Mohamed El-Hadedy, Georgios Pitsilis, Svein J. Knapskog:
An Efficient Authorship Protection Scheme for Shared Multimedia Content. ICIG 2011: 914-919 - 2010
- [c5]Mohamed El-Hadedy, Martin Margala, Danilo Gligoroski, Svein J. Knapskog:
Resource-efficient implementation of Blue Midnight Wish-256 hash function on Xilinx FPGA platform. IAS 2010: 44-47 - [c4]Mohamed El-Hadedy, Sohan Purohit, Martin Margala, Svein J. Knapskog:
Performance and area efficient transpose memory architecture for high throughput adaptive signal processing systems. AHS 2010: 113-120 - [c3]Mohamed El-Hadedy, Martin Margala, Danilo Gligoroski, Svein J. Knapskog:
Implementing the Blue Midnight Wish Hash Function on Xilinx Virtex-5 FPGA Platform. ReConFig 2010: 394-399 - [i2]Mohamed El-Hadedy, Danilo Gligoroski, Svein J. Knapskog:
Single Core Implementation of Blue Midnight Wish Hash Function on VIRTEX 5 Platform. IACR Cryptol. ePrint Arch. 2010: 571 (2010)
2000 – 2009
- 2009
- [c2]Mohamed El-Hadedy, Danilo Gligoroski, Svein J. Knapskog:
Low Area Implementation of the Hash Function "Blue Midnight Wish 256" for FPGA Platforms. INCoS 2009: 100-104 - 2008
- [c1]Mohamed El-Hadedy, Danilo Gligoroski, Svein J. Knapskog:
High Performance Implementation of a Public Key Block Cipher - MQQ, for FPGA Platforms. ReConFig 2008: 427-432 - [i1]Mohamed El-Hadedy, Danilo Gligoroski, Svein J. Knapskog:
High Performance Implementation of a Public Key Block Cipher - MQQ, for FPGA Platforms. IACR Cryptol. ePrint Arch. 2008: 339 (2008)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint