Flexible architectures for cryptographic algorithms—A systematic literature review M Rashid, M Imran, AR Jafri, TF Al-Somani Journal of Circuits, Systems and Computers 28 (03), 1930003, 2019 | 82 | 2019 |
Topological properties of hierarchical interconnection networks: a review and comparison M Abd-El-Barr, TF Al-Somani Journal of Electrical and Computer Engineering 2011, 1-12, 2011 | 52 | 2011 |
More secure Internet of Things using robust encryption algorithms against side channel attacks AT Lo'Ai, TF Somani 2016 IEEE/ACS 13th international conference of computer systems and …, 2016 | 41 | 2016 |
New systolic array architecture for finite field inversion A Ibrahim, TF Al-Somani, F Gebali Canadian Journal of Electrical and Computer Engineering 40 (1), 23-30, 2017 | 29 | 2017 |
Performance evaluation of three encryption/decryption algorithms NA Kofahi, T Al-Somani, K Al-Zamil 2003 46th Midwest Symposium on Circuits and Systems 2, 790-793, 2003 | 29 | 2003 |
Unified systolic array architecture for finite field multiplication and inversion A Ibrahim, T Alsomani, F Gebali Computers & Electrical Engineering 61, 104-115, 2017 | 22 | 2017 |
Systolic array architectures for Sunar–Koç optimal normal basis type II multiplier A Ibrahim, F Gebali, TF Al-Somani IEEE Transactions on Very Large Scale Integration (VLSI) Systems 23 (10 …, 2014 | 20 | 2014 |
Hardware implementations of GF (2^ m) arithmetic using normal basis A Amin, TF Al-Somani Journal of Applied Sciences 6 (6), 1362-1372, 2006 | 19 | 2006 |
Hardware implementations of elliptic curve cryptography in wireless sensor networks H Houssain, M Badra, TF Al-Somani 2011 International Conference for Internet Technology and Secured …, 2011 | 17 | 2011 |
Method for elliptic curve scalar multiplication TF Al-Somani, A Amin US Patent 8,422,685, 2013 | 15 | 2013 |
Generic-point parallel scalar multiplication without precomputations TF Al-Somani, MK Ibrahim IEICE Electronics Express 6 (24), 1732-1736, 2009 | 15 | 2009 |
Parallelizing GF (P) elliptic curve cryptography computations for security and speed AAA Gutub, MK Ibrahim, TF Al-Somani 2007 9th International Symposium on Signal Processing and Its Applications, 1-4, 2007 | 14 | 2007 |
Towards secure communications: Review of side channel attacks and countermeasures on ECC AT Lo'Ai, TF Somani, H Houssain 2016 11th International Conference for Internet Technology and Secured …, 2016 | 12 | 2016 |
Method for elliptic curve scalar multiplication TF Al-Somani, A Amin US Patent App. 12/071,779, 2009 | 12 | 2009 |
High performance elliptic curve GF (2m) crypto-processor TF Al-Somani, MK Ibrahim, A Gutub Information Technology Journal (ITJ) 5 (4), 742-748, 2006 | 12 | 2006 |
High performance elliptic curve GF (2m) cryptoprocessor secure against timing attacks TF Al-Somani, MK Ibrahim International Journal of Computer Science and Network Security-IJCSNS 6 (1B …, 2006 | 11 | 2006 |
Reliability optimization using genetics algorithms T Al-Somani, K Qureshi Saudi Arabia: King Abdul-Aziz University, 2000 | 11 | 2000 |
Review of side channel attacks and countermeasures on ecc, rsa, and aes cryptosystems A Lo’ai, HH Tawalbeh, F Turki Journal of Internet Technology and Secured Transaction, 2017 | 10 | 2017 |
Review of elliptic curve processor architectures IH Hazmi, F Zhou, F Gebali, TF Al-Somani 2015 IEEE Pacific Rim Conference on Communications, Computers and Signal …, 2015 | 10 | 2015 |
Comparative study of elliptic curve cryptography hardware implementations in wireless sensor networks H Houssain, M Badra, TF Al-Somani International Journal of RFID Security and Cryptography (IJRFIDSC) 1 (1/2 …, 2012 | 10 | 2012 |