Follow
Hilal Houssain
Hilal Houssain
Blaise Pascal University
Verified email at isdb.org
Title
Cited by
Cited by
Year
Hardware implementations of elliptic curve cryptography in wireless sensor networks
H Houssain, M Badra, TF Al-Somani
2011 International Conference for Internet Technology and Secured …, 2011
172011
Towards Secure Communications: Review of Side Channel Attacks and Countermeasures on ECC
LA Tawalbeh, TF Somani, H Houssain
The International Conference for Internet Technology and Secured …, 2016
122016
Review of side channel attacks and countermeasures on ecc, rsa, and aes cryptosystems
A Lo’ai, HH Tawalbeh, F Turki
Journal of Internet Technology and Secured Transaction, 2017
102017
Comparative study of elliptic curve cryptography hardware implementations in wireless sensor networks
H Houssain, M Badra, TF Al-Somani
International Journal of RFID Security and Cryptography (IJRFIDSC) 1 (1/2 …, 2012
102012
Implementation of GF(2m) Elliptic Curve cryptoprocessor on a Nano FPGA
TF Al-Somani, H Houssain
2011 International Conference for Internet Technology and Secured …, 2011
102011
Al-Somani “Elliptic Curve Cryptoprocessor Implementation on a Nano FPGA: Interesting for Resource-Constrained Devices”
H Houssain, F Turki
International Journal of RFID Security and Cryptography (IJRFIDSC) 1 (2), 45-50, 2012
52012
Software implementations of elliptic curve cryptography in wireless sensor networks
H Houssain, M Badra, T Somani
Journal of Communication and Computer 9, 712-720, 2012
42012
Power Analysis Attacks on ECC: A Major Security Threat
H Houssain, M Badra, TF Al-Somani
International Journal of Advanced Computer Science and Applications 3 (6), 2012
42012
Hardware/software co-design implementations of elliptic curve cryptosystems
TF Al-Somani, EA Khan, AM Qamar-ul-Islam, H Houssain
Information Technology Journal 8 (4), 403-410, 2009
42009
Method and apparatus for scalar multiplication secure against differential power attacks
TF Al-Somani, H Houssain
US Patent 9,419,789, 2016
32016
Fast and secure key agreement protocol for the security of low power wireless networks
B Bakhache, E El-Hamawi, H Houssain
2013 IEEE Faible Tension Faible Consommation, 1-4, 2013
32013
An efficiently secure ECC scalar multiplication method against power analysis attacks on resource constrained devices
H Houssain, TF Al-Somani
2013 Third International Conference on Communications and Information …, 2013
32013
Method for efficiently protecting elliptic curve cryptography against simple power analysis attacks
H Houssain, TF Al-Somani
US Patent 9,565,017, 2017
22017
Elliptic curve cryptography algorithms resistant against power analysis attacks on resource constrained devices
H Houssain
Université Blaise Pascal-Clermont-Ferrand II, 2012
22012
Workshop 2: The 4th International workshop on Big Data and Social Networking Management and Security (BDSN-2016), Part 11
AT Lo'ai, TF Somani, H Houssain, A Rabab'ah, AIA Mahmoud, ...
The system can't perform the operation now. Try again later.
Articles 1–15