Follow
Najwa Aaraj
Najwa Aaraj
Technology Innovation Institute, Princeton University
Verified email at tii.ae
Title
Cited by
Cited by
Year
Optimizing performance of integrity monitoring
DLS Najwa Aaraj, Mihai Christodorescu, Dimitrios Pendarakis, Reiner Sailer
US Patent US8949797B2, 2015
99*2015
Survey on fully homomorphic encryption, theory, and applications
C Marcolla, V Sucasas, M Manzano, R Bassoli, FHP Fitzek, N Aaraj
Proceedings of the IEEE 110 (10), 1572-1609, 2022
872022
Analysis and design of a hardware/software trusted platform module for embedded systems
N Aaraj, A Raghunathan, NK Jha
ACM Transactions on Embedded Computing Systems (TECS) 8 (1), 1-31, 2009
722009
Energy and execution time analysis of a software-based trusted platform module
N Aaraj, A Raghunathan, S Ravi, NK Jha
2007 Design, Automation & Test in Europe Conference & Exhibition, 1-6, 2007
412007
SHARKS: Smart hacking approaches for risk scanning in Internet-of-Things and cyber-physical systems based on machine learning
T Saha, N Aaraj, N Ajjarapu, NK Jha
IEEE Transactions on Emerging Topics in Computing 10 (2), 870-885, 2021
362021
Dynamic binary instrumentation-based framework for malware defense
N Aaraj, A Raghunathan, NK Jha
Detection of Intrusions and Malware, and Vulnerability Assessment: 5th …, 2008
322008
Machine learning assisted security analysis of 5G-network-connected systems
T Saha, N Aaraj, NK Jha
IEEE Transactions on Emerging Topics in Computing 10 (4), 2006-2024, 2022
282022
Architectures for efficient face authentication in embedded systems
N Aaraj, S Ravi, S Raghunathan, NK Jha
Proceedings of the Design Automation & Test in Europe Conference 2, 6 pp., 2006
262006
Hardware architectures for post-quantum digital signature schemes
D Soni, K Basu, M Nabeel, N Aaraj, M Manzano, R Karri
Springer, 2021
252021
Hybrid architectures for efficient and secure face authentication in embedded systems
N Aaraj, S Ravi, A Raghunathan, NK Jha
IEEE transactions on very large scale integration (VLSI) systems 15 (3), 296-308, 2007
222007
Finding and evaluating parameters for BGV
J Mono, C Marcolla, G Land, T Güneysu, N Aaraj
International Conference on Cryptology in Africa, 370-394, 2023
162023
System and method for security in internet-of-things and cyber-physical systems based on machine learning
T Saha, N Aaraj, NK Jha
US Patent 11,973,771, 2024
142024
Falcon
D Soni, K Basu, M Nabeel, N Aaraj, M Manzano, R Karri, D Soni, K Basu, ...
Hardware Architectures for Post-Quantum Digital Signature Schemes, 31-41, 2021
132021
Modular inverse for integers using fast constant time GCD algorithm and its applications
S Deshpande, SM Del Pozo, V Mateu, M Manzano, N Aaraj, J Szefer
2021 31st International Conference on Field-Programmable Logic and …, 2021
112021
Secure reconfiguration of software-defined radio
C Li, NK Jha, A Raghunathan
ACM Transactions on Embedded Computing Systems (TECS) 11 (1), 1-22, 2012
102012
Transient current testing of dynamic CMOS circuits
N Aaraj, A Nazer, A Chehab, A Kayssi
19th IEEE International Symposium on Defect and Fault Tolerance in VLSI …, 2004
102004
A framework for defending embedded systems against software attacks
N Aaraj, A Raghunathan, NK Jha
ACM Transactions on Embedded Computing Systems (TECS) 10 (3), 1-23, 2011
62011
Detection of Intrusions and Malware, and Vulnerability Assessment
D Zamboni, D Zamboni
Springer, 2008
62008
Secure multi-party computation-based privacy-preserving authentication for smart cities
V Sucasas, A Aly, G Mantas, J Rodriguez, N Aaraj
IEEE Transactions on Cloud Computing, 2023
52023
CRYSTALS-dilithium
D Soni, K Basu, M Nabeel, N Aaraj, M Manzano, R Karri, D Soni, K Basu, ...
Hardware Architectures for Post-Quantum Digital Signature Schemes, 13-30, 2021
52021
The system can't perform the operation now. Try again later.
Articles 1–20