Anissa Sghaier
YOU?
Author Swipe
View article: Power/Area-Efficient ECC Processor Implementation for Resource-Constrained Devices
Power/Area-Efficient ECC Processor Implementation for Resource-Constrained Devices Open
The use of resource-constrained devices is rising nowadays, and these devices mostly operate with sensitive data. Consequently, security is a key issue for these devices. In this paper, we propose a compact ECC (elliptic curve cryptography…
View article: Fast Constant-Time Modular Inversion over Fp Resistant to Simple Power Analysis Attacks for IoT Applications
Fast Constant-Time Modular Inversion over Fp Resistant to Simple Power Analysis Attacks for IoT Applications Open
The advent of the Internet of Things (IoT) has enabled millions of potential new uses for consumers and businesses. However, with these new uses emerge some of the more pronounced risks in the connected object domain. Finite fields play a …
View article: Efficient Hardware Implementation of Large Field-Size Elliptic Curve Cryptographic Processor
Efficient Hardware Implementation of Large Field-Size Elliptic Curve Cryptographic Processor Open
Due to rapid development in secured technological devices, the efficient implementation of a large field-size elliptic curve cryptosystem (ECC) is becoming demanding in many critical applications. Therefore, this paper presents a new Montg…
View article: Statistical Analysis and Security Evaluation of Chaotic RC5-CBC Symmetric Key Block Cipher Algorithm
Statistical Analysis and Security Evaluation of Chaotic RC5-CBC Symmetric Key Block Cipher Algorithm Open
In some previous research works, it has been theoretically proven that RC5-CBC encryption algorithm behaves as a Devaney topological chaos dynamical system. This unpre-dictable behavior has been experimentally illustrated through such sens…
View article: Design And Implementation of Low Area/Power Elliptic Curve Digital Signature Hardware Core
Design And Implementation of Low Area/Power Elliptic Curve Digital Signature Hardware Core Open
The Elliptic Curve Digital Signature Algorithm(ECDSA) is the analog to the Digital Signature Algorithm(DSA). Based on the elliptic curve, which uses a small key compared to the others public-key algorithms, ECDSA is the most suitable schem…
View article: Differential Fault Attacks and Countermeasures in Elliptic Curve Cryptography
Differential Fault Attacks and Countermeasures in Elliptic Curve Cryptography Open
In asymetric cryptography, Elliptic Curve Cryptography (ECC) is the fastest in term of computation and the strongest in term of security.It can be used in message encryption/decryption, digital signature or key exchange.ECC can be implemen…
View article: Area-Efficient Hardware Implementation of the Optimal Ate Pairing over BN curves. *
Area-Efficient Hardware Implementation of the Optimal Ate Pairing over BN curves. * Open
To have an efficient asymmetric key encryption scheme, such as el-liptic curves, hyperelliptic curves, pairing... etc we have to go through arithmetic optimization then hardware optimization. Regarding restricted environments ’ compromises…
View article: FPGA implementation of filtered image using 2D Gaussian filter
FPGA implementation of filtered image using 2D Gaussian filter Open
Image filtering is one of the very useful techniques in image processing and computer vision. It is used to eliminate useless details and noise from an image. In this paper, a hardware implementation of image filtered using 2D Gaussian Fil…