Survey on fully homomorphic encryption, theory, and applications C Marcolla, V Sucasas, M Manzano, R Bassoli, FHP Fitzek, N Aaraj Proceedings of the IEEE 110 (10), 1572-1609, 2022 | 187 | 2022 |
Optimizing performance of integrity monitoring DLS Najwa Aaraj, Mihai Christodorescu, Dimitrios Pendarakis, Reiner Sailer US Patent US8949797B2, 2015 | 101* | 2015 |
Analysis and design of a hardware/software trusted platform module for embedded systems N Aaraj, A Raghunathan, NK Jha ACM Transactions on Embedded Computing Systems (TECS) 8 (1), 1-31, 2009 | 75 | 2009 |
SHARKS: Smart hacking approaches for risk scanning in Internet-of-Things and cyber-physical systems based on machine learning T Saha, N Aaraj, N Ajjarapu, NK Jha IEEE Transactions on Emerging Topics in Computing 10 (2), 870-885, 2021 | 50 | 2021 |
Energy and execution time analysis of a software-based trusted platform module N Aaraj, A Raghunathan, S Ravi, NK Jha 2007 Design, Automation & Test in Europe Conference & Exhibition, 1-6, 2007 | 41 | 2007 |
Machine learning assisted security analysis of 5g-network-connected systems T Saha, N Aaraj, NK Jha IEEE Transactions on Emerging Topics in Computing 10 (4), 2006-2024, 2022 | 39 | 2022 |
Hardware architectures for post-quantum digital signature schemes D Soni, K Basu, M Nabeel, N Aaraj, M Manzano, R Karri Springer, 2021 | 35 | 2021 |
Dynamic binary instrumentation-based framework for malware defense N Aaraj, A Raghunathan, NK Jha Detection of Intrusions and Malware, and Vulnerability Assessment: 5th …, 2008 | 34 | 2008 |
Architectures for efficient face authentication in embedded systems N Aaraj, S Ravi, S Raghunathan, NK Jha Proceedings of the Design Automation & Test in Europe Conference 2, 6 pp., 2006 | 26 | 2006 |
Finding and evaluating parameters for BGV J Mono, C Marcolla, G Land, T Güneysu, N Aaraj International Conference on Cryptology in Africa, 370-394, 2023 | 25 | 2023 |
Hybrid architectures for efficient and secure face authentication in embedded systems N Aaraj, S Ravi, A Raghunathan, NK Jha IEEE transactions on very large scale integration (VLSI) systems 15 (3), 296-308, 2007 | 22 | 2007 |
Falcon D Soni, K Basu, M Nabeel, N Aaraj, M Manzano, R Karri, D Soni, K Basu, ... Hardware Architectures for Post-Quantum Digital Signature Schemes, 31-41, 2021 | 21 | 2021 |
Secure multi-party computation-based privacy-preserving authentication for smart cities V Sucasas, A Aly, G Mantas, J Rodriguez, N Aaraj IEEE Transactions on Cloud Computing, 2023 | 20 | 2023 |
System and method for security in internet-of-things and cyber-physical systems based on machine learning T Saha, N Aaraj, NK Jha US Patent 11,973,771, 2024 | 18 | 2024 |
PERK N Aaraj, S Bettaieb, L Bidoux, A Budroni, V Dyseryn, A Esser, P Gaborit, ... | 16 | 2023 |
Modular inverse for integers using fast constant time GCD algorithm and its applications S Deshpande, SM Del Pozo, V Mateu, M Manzano, N Aaraj, J Szefer 2021 31st International Conference on Field-Programmable Logic and …, 2021 | 15 | 2021 |
CRYSTALS-dilithium D Soni, K Basu, M Nabeel, N Aaraj, M Manzano, R Karri, D Soni, K Basu, ... Hardware Architectures for Post-Quantum Digital Signature Schemes, 13-30, 2021 | 12 | 2021 |
Secure reconfiguration of software-defined radio C Li, NK Jha, A Raghunathan ACM Transactions on Embedded Computing Systems (TECS) 11 (1), 1-22, 2012 | 10 | 2012 |
Transient current testing of dynamic CMOS circuits N Aaraj, A Nazer, A Chehab, A Kayssi 19th IEEE International Symposium on Defect and Fault Tolerance in VLSI …, 2004 | 10 | 2004 |
Survey on fully homomorphic encryption, theory C Marcolla, V Sucasas, M Manzano, R Bassoli, FHP Fitzek, N Aaraj and applications. Cryptology ePrint Archive, Report 2022/1602, 2022. https …, 2022 | 8 | 2022 |