Skip to main content

Showing 1–3 of 3 results for author: Ziadia, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2301.01889  [pdf, other

    cs.CR

    FPGA Implementation of SIMON-128 Cryptographic Algorithm Using Artix-7

    Authors: Ridha Ghayoula, Jaouhar Fattahi, Amor Smida, Issam El Gmati, Emil Pricop, Marwa Ziadia

    Abstract: FPGA is a hardware architecture based on a matrix of programmable and configurable logic circuits thanks to which a large number of functionalities inside the device can be modified using a hardware description language. These functionalities must often be secured especially when the context is sensitive (military, banking, medical, legal, etc.). In this paper, we put forward an efficient implemen… ▽ More

    Submitted 4 January, 2023; originally announced January 2023.

    Comments: ECAI 2022

  2. Witness-Functions versus Interpretation-Functions for Secrecy in Cryptographic Protocols: What to Choose?

    Authors: Jaouhar Fattahi, Mohamed Mejri, Marwa Ziadia, Takwa Omrani, Emil Pricop

    Abstract: Proving that a cryptographic protocol is correct for secrecy is a hard task. One of the strongest strategies to reach this goal is to show that it is increasing, which means that the security level of every single atomic message exchanged in the protocol, safely evaluated, never deceases. Recently, two families of functions have been proposed to measure the security level of atomic messages. The f… ▽ More

    Submitted 27 July, 2017; originally announced July 2017.

    Comments: Accepted at the IEEE SMC (6 two column pages) on 2017-07-10

  3. Cryptographic Protocol for Multipart Missions Involving Two Independent and Distributed Decision Levels in a Military Context

    Authors: Jaouhar Fattahi, Mohamed Mejri, Marwa Ziadia, Ouejdene Samoud, Elies Ghayoula, Emil Pricop

    Abstract: In several critical military missions, more than one decision level are involved. These decision levels are often independent and distributed, and sensitive pieces of information making up the military mission must be kept hidden from one level to another even if all of the decision levels cooperate to accomplish the same task. Usually, a mission is negotiated through insecure networks such as the… ▽ More

    Submitted 27 July, 2017; v1 submitted 24 July, 2017; originally announced July 2017.

    Comments: Accepted at the IEEE SMC'2017 on 2017-07-10 (6 double column pages)