Hardware implementations of elliptic curve cryptography in wireless sensor networks H Houssain, M Badra, TF Al-Somani 2011 International Conference for Internet Technology and Secured …, 2011 | 18 | 2011 |
Towards Secure Communications: Review of Side Channel Attacks and Countermeasures on ECC LA Tawalbeh, TF Somani, H Houssain The International Conference for Internet Technology and Secured …, 2016 | 14 | 2016 |
Review of side channel attacks and countermeasures on ecc, rsa, and aes cryptosystems A Lo’ai, HH Tawalbeh, F Turki J Internet Technol Secured Trans, 2016 | 13 | 2016 |
Implementation of GF(2m) Elliptic Curve cryptoprocessor on a Nano FPGA TF Al-Somani, H Houssain 2011 International Conference for Internet Technology and Secured …, 2011 | 11 | 2011 |
Comparative study of elliptic curve cryptography hardware implementations in wireless sensor networks H Houssain, M Badra, TF Al-Somani International Journal of RFID Security and Cryptography (IJRFIDSC) 1 (1/2 …, 2012 | 10 | 2012 |
Power Analysis Attacks on ECC: A Major Security Threat H Houssain, M Badra, TF Al-Somani International Journal of Advanced Computer Science and Applications 3 (6), 2012 | 5 | 2012 |
Al-Somani “Elliptic Curve Cryptoprocessor Implementation on a Nano FPGA: Interesting for Resource-Constrained Devices” H Houssain, F Turki International Journal of RFID Security and Cryptography (IJRFIDSC) 1 (2), 45-50, 2012 | 4 | 2012 |
Software implementations of elliptic curve cryptography in wireless sensor networks H Houssain, M Badra, T Somani Journal of Communication and Computer 9, 712-720, 2012 | 4 | 2012 |
Hardware/software co-design implementations of elliptic curve cryptosystems TF Al-Somani, EA Khan, AM Qamar-ul-Islam, H Houssain Information Technology Journal 8 (4), 403-410, 2009 | 4 | 2009 |
Method and apparatus for scalar multiplication secure against differential power attacks TF Al-Somani, H Houssain US Patent 9,419,789, 2016 | 3 | 2016 |
Fast and secure key agreement protocol for the security of low power wireless networks B Bakhache, E El-Hamawi, H Houssain 2013 IEEE Faible Tension Faible Consommation, 1-4, 2013 | 3 | 2013 |
An efficiently secure ECC scalar multiplication method against power analysis attacks on resource constrained devices H Houssain, TF Al-Somani 2013 Third International Conference on Communications and Information …, 2013 | 3 | 2013 |
Elliptic curve cryptography algorithms resistant against power analysis attacks on resource constrained devices H Houssain Université Blaise Pascal-Clermont-Ferrand II, 2012 | 3 | 2012 |
Method for efficiently protecting elliptic curve cryptography against simple power analysis attacks H Houssain, TF Al-Somani US Patent 9,565,017, 2017 | 2 | 2017 |
Efficiently Secure ECC Scalar Multiplication Methods Against Power Analysis Attacks on Resource Constrained Devices TF Alsomani, H Houssain WSEAS Transactions on Computers 14, 241-251, 2017 | | 2017 |
Workshop 2: The 4th International workshop on Big Data and Social Networking Management and Security (BDSN-2016), Part 11 AT Lo'ai, TF Somani, H Houssain, A Rabab'ah, AIA Mahmoud, ... | | |