UP - logo

Search results

Basic search    Expert search   

Currently you are NOT authorised to access e-resources UPUK. For full access, REGISTER.

1 2 3
hits: 23
1.
  • Real-time video security sy... Real-time video security system using chaos- improved advanced encryption standard (IAES)
    Hafsa, Amal; Fradi, Marwa; Sghaier, Anissa ... Multimedia tools and applications, 2022/1, Volume: 81, Issue: 2
    Journal Article
    Peer reviewed

    Real-time multimedia applications are increasingly achieving success in the everyday world. Thereby, multimedia information relies on security to protect private life. The Advanced Encryption ...
Full text
2.
  • Efficient Hardware Implemen... Efficient Hardware Implementation of Large Field-Size Elliptic Curve Cryptographic Processor
    Lee, Chiou-Yng; Zeghid, Medien; Sghaier, Anissa ... IEEE access, 2022, Volume: 10
    Journal Article
    Peer reviewed
    Open access

    Due to rapid development in secured technological devices, the efficient implementation of a large field-size elliptic curve cryptosystem (ECC) is becoming demanding in many critical applications. ...
Full text

PDF
3.
  • Design And Implementation o... Design And Implementation of Low Area/Power Elliptic Curve Digital Signature Hardware Core
    Sghaier, Anissa; Zeghid, Medien; Massoud, Chiraz ... Electronics, 06/2017, Volume: 6, Issue: 2
    Journal Article
    Peer reviewed
    Open access

    The Elliptic Curve Digital Signature Algorithm(ECDSA) is the analog to the Digital Signature Algorithm(DSA). Based on the elliptic curve, which uses a small key compared to the others public-key ...
Full text

PDF
4.
  • Novel Systolization of Subq... Novel Systolization of Subquadratic Space Complexity Multipliers Based on Toeplitz Matrix-Vector Product Approach
    Pan, Jeng-Shyang; Lee, Chiou-Yng; Sghaier, Anissa ... IEEE transactions on very large scale integration (VLSI) systems, 07/2019, Volume: 27, Issue: 7
    Journal Article
    Peer reviewed

    Systolic finite field multiplier over <inline-formula> <tex-math notation="LaTeX">GF(2^{m}) </tex-math></inline-formula>, because of its superior features such as high throughput and regularity, is ...
Full text
5.
  • Speed/Area-Efficient ECC Pr... Speed/Area-Efficient ECC Processor Implementation Over GF(2 ^m) on FPGA via Novel Algorithm-Architecture Co-Design
    Zeghid, Medien; Ahmed, Hassan Yousif; Chehri, Abdellah ... IEEE transactions on very large scale integration (VLSI) systems, 08/2023, Volume: 31, Issue: 8
    Journal Article
    Peer reviewed

    With the rapid evolution of security technology, small field-size elliptic curve-based point multiplication (PM) has gradually become obsolete, leading to the implementation of PM with large field ...
Full text
6.
  • Two dimensional Fixed Right... Two dimensional Fixed Right Shift (FRS) code for SAC-OCDMA systems
    Ahmed, Hassan Yousif; Zeghid, Medien; Imtiaz, Waqas A. ... Optical fiber technology, January 2019, 2019-01-00, Volume: 47
    Journal Article
    Peer reviewed

    •Development of a new 2D-FRS code.•Gaussian approximation is used to analyze performance analysis of 2D-FRS system.•Simulation validation of 2D-FRS numerical model.•Power saving feature at 2D-FRS ...
Full text
7.
  • Fast Constant-Time Modular ... Fast Constant-Time Modular Inversion over Fp Resistant to Simple Power Analysis Attacks for IoT Applications
    Sghaier, Anissa; Zeghid, Medien; Massoud, Chiraz ... Sensors, 03/2022, Volume: 22, Issue: 7
    Journal Article
    Peer reviewed
    Open access

    The advent of the Internet of Things (IoT) has enabled millions of potential new uses for consumers and businesses. However, with these new uses emerge some of the more pronounced risks in the ...
Full text
8.
  • Fast Constant-Time Modular ... Fast Constant-Time Modular Inversion over F[sub.p] Resistant to Simple Power Analysis Attacks for IoT Applications
    Sghaier, Anissa; Zeghid, Medien; Massoud, Chiraz ... Sensors (Basel, Switzerland), 03/2022, Volume: 22, Issue: 7
    Journal Article
    Peer reviewed

    The advent of the Internet of Things (IoT) has enabled millions of potential new uses for consumers and businesses. However, with these new uses emerge some of the more pronounced risks in the ...
Full text
9.
  • Power/Area-Efficient ECC Pr... Power/Area-Efficient ECC Processor Implementation for Resource-Constrained Devices
    Zeghid, Medien; Sghaier, Anissa; Ahmed, Hassan Yousif ... Electronics (Basel), 10/2023, Volume: 12, Issue: 19
    Journal Article
    Peer reviewed
    Open access

    The use of resource-constrained devices is rising nowadays, and these devices mostly operate with sensitive data. Consequently, security is a key issue for these devices. In this paper, we propose a ...
Full text
10.
  • Fast Constant-Time Modular Inversion over Resistant to Simple Power Analysis Attacks for IoT Applications
    Anissa Sghaier; Medien Zeghid; Chiraz Massoud ... Sensors (Basel, Switzerland), 03/2022, Volume: 22, Issue: 7
    Journal Article
    Peer reviewed
    Open access

    The advent of the Internet of Things (IoT) has enabled millions of potential new uses for consumers and businesses. However, with these new uses emerge some of the more pronounced risks in the ...
Full text
1 2 3
hits: 23

Load filters