Noura Benhadjyoussef
University of Monastir
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Noura Benhadjyoussef.
international multi-conference on systems, signals and devices | 2011
Noura Benhadjyoussef; Mohsen Machhout; Rached Tourki
Correlation power analysis is the well-known attack against cryptographic modules. An attacker exploits the correlation between the power consumed by a device and the data being processed. In the present paper, we present the experimental procedure of correlation power analysis using three different devices: FPGA, ASIC and a microcontroller. Results show that the power model used to calculate hypothetical power is related to the algorithm and not to the platform and its validity depends statistically on the implementation.
international conference on design and technology of integrated systems in nanoscale era | 2012
Noura Benhadjyoussef; Mohsen Machhout; Wajih El Hadj Youssef; Rached Tourki
Recently, much research has been conducted for security of data transactions on embedded platforms. Advanced Encryption Standard (AES) is considered as one of a candidate algorithm for data encryption/decryption. One important application of this standard is cryptography on smart cards. In this paper we describe a 32-bits architecture developed for Rijndael algorithm to accelerate execution on 32-bits platforms with reduced memory. Using the FPGA device xc5vfx70t-2ff1136-6, a very low-cost implementation of 375 occupied Slices is obtained under 303.364 MHz frequency.
Journal of Circuits, Systems, and Computers | 2015
Noura Benhadjyoussef; Wajih Elhadjyoussef; Mohsen Machhout; Rached Tourki; Kholdoun Torki
Embedded processor is often expected to achieve a higher security with good performance and economical use of resource. However, the choice regarding the best solution for how cryptographic algorithms are incorporated in processor core is one of the most challenging assignments a designer has to face. This paper presents an inexpensive instruction set extensions (ISE) of efficient cryptographic algorithms on 32-bit processors assuring various types of instruction (public/private key cryptography, random number generator (RNG) and secure hash function (SHF)). These extensions provide hardware instructions that implement a full algorithm in a single instruction. Our enhanced LEON2 SPARC V8 core with cryptographic ISE is implemented using Xilinx XC5VFX70t FPGA device and an ASIC CMOS 40-nm technology. The total area of the resulting chip is about 1.93 mm2 and the estimated power consumption of the chip is 16.3 mW at 10 MHz. Hardware cost and power consumption evaluation are provided for different clock frequencies and the achieved results show that our circuit is able to be arranged in many security constrained devices.
international conference on control engineering information technology | 2016
Khaoula Mannay; Noura Benhadjyoussef; Mohsen Machhout; Jesús Ureña
In the age of automation the ability to navigate persons and devices in indoor/outdoor environments has become important for many applications.
International Review on Modelling and Simulations | 2013
Noura Benhadjyoussef; Wajih Elhadjyoussef; Mohsen Machhout; Rached Tourki
The performance evaluation of cryptographic algorithms has guided to serious studies of its implementations. The efficiency of these algorithms is improved by applying good design rules adapted to devices and to its resources constraints. In this paper, we present a careful study of three possible designs of the Advanced Encryption Standard (AES) targeting 32-bit embedded system; we examined AES implementations which use arithmetic properties of the AES S-box and structures based on hardware look-up tables. We have analyzed and compared different characteristics like clock frequency, occupancy area, and power consumption of these implementations. The resulting designs are implemented using Xilinx XC5VFX70t FPGA device and an ASIC CMOS 40 nm technology. Our results show that AES implementation based on hardware look-up table shows the lowest power consumption and highest frequency. The AES implementations which use arithmetic properties of the S-box are characterized by the smallest silicon area.
International Journal of Computer Network and Information Security | 2012
Hassen Mestiri; Noura Benhadjyoussef; Mohsen Machhout; Rached Tourki
international conference on communications | 2012
Noura Benhadjyoussef; Hassen Mestiri; Mohsen Machhout; Rached Tourki
International Journal of Computer Network and Information Security | 2013
Hassen Mestiri; Noura Benhadjyoussef; Mohsen Machhout; Rached Tourki
international conference on control decision and information technologies | 2013
Hassen Mestiri; Noura Benhadjyoussef; Mohsen Machhout; Rached Tourki
International Review on Computers and Software | 2013
Hassen Mestiri; Noura Benhadjyoussef; Mohsen Machhout; Rached Tourki