Zakaria Najm
Zakaria Najm
Research Associate,NTU Singapore
Verified email at ntu.edu.sg
Title
Cited by
Cited by
Year
High precision fault injections on the instruction cache of ARMv7-M architectures
L Riviere, Z Najm, P Rauzy, JL Danger, J Bringer, L Sauvage
2015 IEEE International Symposium on Hardware Oriented Security and Trust …, 2015
592015
NICV: normalized inter-class variance for detection of side-channel leakage
S Bhasin, JL Danger, S Guilley, Z Najm
2014 International Symposium on Electromagnetic Compatibility, Tokyo, 310-313, 2014
582014
Linear complementary dual code improvement to strengthen encoded circuit against hardware Trojan horses
XT Ngo, S Bhasin, JL Danger, S Guilley, Z Najm
2015 IEEE International Symposium on Hardware Oriented Security and Trust …, 2015
542015
Hardware Trojan detection by delay and electromagnetic measurements
XT Ngo, I Exurville, S Bhasin, JL Danger, S Guilley, Z Najm, JB Rigaud, ...
2015 Design, Automation & Test in Europe Conference & Exhibition (DATE), 782-787, 2015
382015
Analysis and improvements of the DPA contest v4 implementation
S Bhasin, N Bruneau, JL Danger, S Guilley, Z Najm
International Conference on Security, Privacy, and Applied Cryptography …, 2014
362014
Side-channel leakage and trace compression using normalized inter-class variance
S Bhasin, JL Danger, S Guilley, Z Najm
Proceedings of the Third Workshop on Hardware and Architectural Support for …, 2014
342014
Hardware property checker for run-time hardware trojan detection
XT Ngo, JL Danger, S Guilley, Z Najm, O Emery
2015 European Conference on Circuit Theory and Design (ECCTD), 1-4, 2015
322015
A look into SIMON from a side-channel perspective
S Bhasin, T Graba, JL Danger, Z Najm
2014 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2014
282014
Dismantling real-world ECC with horizontal and vertical template attacks
M Dugardin, L Papachristodoulou, Z Najm, L Batina, JL Danger, S Guilley
International Workshop on Constructive Side-Channel Analysis and Secure …, 2016
272016
Time-frequency analysis for second-order attacks
P Belgarric, S Bhasin, N Bruneau, JL Danger, N Debande, S Guilley, ...
International Conference on Smart Card Research and Advanced Applications …, 2013
272013
Cryptographically secure shield for security IPs protection
XT Ngo, JL Danger, S Guilley, T Graba, Y Mathieu, Z Najm, S Bhasin
IEEE Transactions on Computers 66 (2), 354-360, 2016
242016
Pll to the rescue: a novel em fault countermeasure
N Miura, Z Najm, W He, S Bhasin, XT Ngo, M Nagata, JL Danger
2016 53nd ACM/EDAC/IEEE Design Automation Conference (DAC), 1-6, 2016
232016
Multivariate high-order attacks of shuffled tables recomputation
N Bruneau, S Guilley, Z Najm, Y Teglia
Journal of Cryptology 31 (2), 351-393, 2018
192018
A low-entropy first-degree secure provable masking scheme for resource-constrained devices
S Bhasin, JL Danger, S Guilley, Z Najm
Proceedings of the Workshop on Embedded Systems Security, 1-10, 2013
192013
Formally Proved Security of Assembly Code Against Leakage.
P Rauzy, S Guilley, Z Najm
IACR Cryptol. ePrint Arch. 2013, 554, 2013
182013
Formally proved security of assembly code against power analysis
P Rauzy, S Guilley, Z Najm
Journal of Cryptographic Engineering 6 (3), 201-216, 2016
172016
Method taking into account process dispersion to detect hardware Trojan Horse by side-channel analysis
XT Ngo, Z Najm, S Bhasin, S Guilley, JL Danger
Journal of Cryptographic Engineering 6 (3), 239-247, 2016
152016
Integrated sensor: a backdoor for hardware Trojan insertions?
XT Ng, Z Naj, S Bhasin, DB Roy, JL Danger, S Guilley
2015 Euromicro Conference on Digital System Design, 415-422, 2015
142015
Encoding the state of integrated circuits: a proactive and reactive protection against hardware trojans horses
XT Ngo, S Guilley, S Bhasin, JL Danger, Z Najm
Proceedings of the 9th Workshop on Embedded Systems Security, 1-10, 2014
132014
Reconfigurable LUT: A double edged sword for security-critical applications
DB Roy, S Bhasin, S Guilley, JL Danger, D Mukhopadhyay, XT Ngo, ...
International Conference on Security, Privacy, and Applied Cryptography …, 2015
112015
The system can't perform the operation now. Try again later.
Articles 1–20