Follow
Zakaria Najm
Zakaria Najm
Research Associate,NTU Singapore
Verified email at ntu.edu.sg
Title
Cited by
Cited by
Year
NICV: normalized inter-class variance for detection of side-channel leakage
S Bhasin, JL Danger, S Guilley, Z Najm
2014 International Symposium on Electromagnetic Compatibility, Tokyo, 310-313, 2014
1162014
High precision fault injections on the instruction cache of ARMv7-M architectures
L Riviere, Z Najm, P Rauzy, JL Danger, J Bringer, L Sauvage
2015 IEEE International Symposium on Hardware Oriented Security and Trust …, 2015
1132015
Linear complementary dual code improvement to strengthen encoded circuit against hardware Trojan horses
XT Ngo, S Bhasin, JL Danger, S Guilley, Z Najm
2015 IEEE International Symposium on Hardware Oriented Security and Trust …, 2015
982015
Analysis and improvements of the DPA contest v4 implementation
S Bhasin, N Bruneau, JL Danger, S Guilley, Z Najm
Security, Privacy, and Applied Cryptography Engineering: 4th International …, 2014
662014
Hardware Trojan detection by delay and electromagnetic measurements
XT Ngo, I Exurville, S Bhasin, JL Danger, S Guilley, Z Najm, JB Rigaud, ...
2015 Design, Automation & Test in Europe Conference & Exhibition (DATE), 782-787, 2015
652015
Pll to the rescue: a novel em fault countermeasure
N Miura, Z Najm, W He, S Bhasin, XT Ngo, M Nagata, JL Danger
Proceedings of the 53rd Annual Design Automation Conference, 1-6, 2016
562016
Fixslicing: A new gift representation
A Adomnicai, Z Najm, T Peyrin
Cryptology ePrint Archive, 2020
532020
Hardware property checker for run-time hardware trojan detection
XT Ngo, JL Danger, S Guilley, Z Najm, O Emery
2015 European Conference on Circuit Theory and Design (ECCTD), 1-4, 2015
532015
Cryptographically secure shield for security IPs protection
XT Ngo, JL Danger, S Guilley, T Graba, Y Mathieu, Z Najm, S Bhasin
IEEE Transactions on Computers 66 (2), 354-360, 2016
482016
Side-channel leakage and trace compression using normalized inter-class variance
S Bhasin, JL Danger, S Guilley, Z Najm
Proceedings of the Third Workshop on Hardware and Architectural Support for …, 2014
472014
Dismantling real-world ECC with horizontal and vertical template attacks
M Dugardin, L Papachristodoulou, Z Najm, L Batina, JL Danger, S Guilley
International Workshop on Constructive Side-Channel Analysis and Secure …, 2016
452016
Method taking into account process dispersion to detect hardware Trojan Horse by side-channel analysis
XT Ngo, Z Najm, S Bhasin, S Guilley, JL Danger
Journal of Cryptographic Engineering 6, 239-247, 2016
43*2016
Time-frequency analysis for second-order attacks
P Belgarric, S Bhasin, N Bruneau, JL Danger, N Debande, S Guilley, ...
Smart Card Research and Advanced Applications: 12th International Conference …, 2014
352014
A look into SIMON from a side-channel perspective
S Bhasin, T Graba, JL Danger, Z Najm
2014 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2014
342014
Multivariate high-order attacks of shuffled tables recomputation
N Bruneau, S Guilley, Z Najm, Y Teglia
Journal of Cryptology 31, 351-393, 2018
332018
Formally proved security of assembly code against power analysis: A case study on balanced logic
P Rauzy, S Guilley, Z Najm
Journal of Cryptographic Engineering 6, 201-216, 2016
242016
A low-entropy first-degree secure provable masking scheme for resource-constrained devices
S Bhasin, JL Danger, S Guilley, Z Najm
Proceedings of the Workshop on Embedded Systems Security, 1-10, 2013
232013
Integrated sensor: a backdoor for hardware Trojan insertions?
XT Ng, Z Naj, S Bhasin, DB Roy, JL Danger, S Guilley
2015 Euromicro conference on digital system design, 415-422, 2015
212015
Encoding the state of integrated circuits: a proactive and reactive protection against hardware trojans horses
XT Ngo, S Guilley, S Bhasin, JL Danger, Z Najm
Proceedings of the 9th Workshop on Embedded Systems Security, 1-10, 2014
212014
Formally Proved Security of Assembly Code Against Leakage.
P Rauzy, S Guilley, Z Najm
IACR Cryptol. ePrint Arch. 2013, 554, 2013
212013
The system can't perform the operation now. Try again later.
Articles 1–20