Follow
Najwa Aaraj
Najwa Aaraj
Technology Innovation Institute, Princeton University
Verified email at tii.ae
Title
Cited by
Cited by
Year
Optimizing performance of integrity monitoring
DLS Najwa Aaraj, Mihai Christodorescu, Dimitrios Pendarakis, Reiner Sailer
US Patent US8949797B2, 2015
100*2015
Survey on fully homomorphic encryption, theory, and applications
C Marcolla, V Sucasas, M Manzano, R Bassoli, FHP Fitzek, N Aaraj
Proceedings of the IEEE 110 (10), 1572-1609, 2022
972022
Analysis and design of a hardware/software trusted platform module for embedded systems
N Aaraj, A Raghunathan, NK Jha
ACM Transactions on Embedded Computing Systems (TECS) 8 (1), 1-31, 2009
722009
SHARKS: Smart hacking approaches for risk scanning in Internet-of-Things and cyber-physical systems based on machine learning
T Saha, N Aaraj, N Ajjarapu, NK Jha
IEEE Transactions on Emerging Topics in Computing 10 (2), 870-885, 2021
412021
Energy and execution time analysis of a software-based trusted platform module
N Aaraj, A Raghunathan, S Ravi, NK Jha
2007 Design, Automation & Test in Europe Conference & Exhibition, 1-6, 2007
412007
Machine learning assisted security analysis of 5g-network-connected systems
T Saha, N Aaraj, NK Jha
IEEE Transactions on Emerging Topics in Computing 10 (4), 2006-2024, 2022
322022
Dynamic binary instrumentation-based framework for malware defense
N Aaraj, A Raghunathan, NK Jha
Detection of Intrusions and Malware, and Vulnerability Assessment: 5th …, 2008
322008
Hardware architectures for post-quantum digital signature schemes
D Soni, K Basu, M Nabeel, N Aaraj, M Manzano, R Karri
Springer, 2021
292021
Architectures for efficient face authentication in embedded systems
N Aaraj, S Ravi, S Raghunathan, NK Jha
Proceedings of the Design Automation & Test in Europe Conference 2, 6 pp., 2006
262006
Hybrid architectures for efficient and secure face authentication in embedded systems
N Aaraj, S Ravi, A Raghunathan, NK Jha
IEEE transactions on very large scale integration (VLSI) systems 15 (3), 296-308, 2007
222007
Finding and evaluating parameters for BGV
J Mono, C Marcolla, G Land, T Güneysu, N Aaraj
International Conference on Cryptology in Africa, 370-394, 2023
172023
System and method for security in internet-of-things and cyber-physical systems based on machine learning
T Saha, N Aaraj, NK Jha
US Patent 11,973,771, 2024
162024
Falcon
D Soni, K Basu, M Nabeel, N Aaraj, M Manzano, R Karri, D Soni, K Basu, ...
Hardware Architectures for Post-Quantum Digital Signature Schemes, 31-41, 2021
152021
Modular inverse for integers using fast constant time GCD algorithm and its applications
S Deshpande, SM Del Pozo, V Mateu, M Manzano, N Aaraj, J Szefer
2021 31st International Conference on Field-Programmable Logic and …, 2021
122021
Secure reconfiguration of software-defined radio
C Li, NK Jha, A Raghunathan
ACM Transactions on Embedded Computing Systems (TECS) 11 (1), 1-22, 2012
102012
Transient current testing of dynamic CMOS circuits
N Aaraj, A Nazer, A Chehab, A Kayssi
19th IEEE International Symposium on Defect and Fault Tolerance in VLSI …, 2004
102004
Secure multi-party computation-based privacy-preserving authentication for smart cities
V Sucasas, A Aly, G Mantas, J Rodriguez, N Aaraj
IEEE Transactions on Cloud Computing, 2023
92023
PERK
N Aaraj, S Bettaieb, L Bidoux, A Budroni, V Dyseryn, A Esser, P Gaborit, ...
92023
CRYSTALS-dilithium
D Soni, K Basu, M Nabeel, N Aaraj, M Manzano, R Karri, D Soni, K Basu, ...
Hardware Architectures for Post-Quantum Digital Signature Schemes, 13-30, 2021
92021
A framework for defending embedded systems against software attacks
N Aaraj, A Raghunathan, NK Jha
ACM Transactions on Embedded Computing Systems (TECS) 10 (3), 1-23, 2011
62011
The system can't perform the operation now. Try again later.
Articles 1–20