default search action
Najwa Aaraj
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j8]Victor Sucasas, Abdelrahaman Aly, Georgios Mantas, Jonathan Rodriguez, Najwa Aaraj:
Secure Multi-Party Computation-Based Privacy-Preserving Authentication for Smart Cities. IEEE Trans. Cloud Comput. 11(4): 3555-3572 (2023) - [c13]Johannes Mono, Chiara Marcolla, Georg Land, Tim Güneysu, Najwa Aaraj:
Finding and Evaluating Parameters for BGV. AFRICACRYPT 2023: 370-394 - [c12]Anna Hambitzer, David Gérault, Yun Ju Huang, Najwa Aaraj, Emanuele Bellini:
NNBits: Bit Profiling with a Deep Learning Ensemble Based Distinguisher. CT-RSA 2023: 493-523 - [i10]Tanujay Saha, Tamjid Al Rahat, Najwa Aaraj, Yuan Tian, Niraj K. Jha:
ML-FEED: Machine Learning Framework for Efficient Exploit Detection (Extended version). CoRR abs/2301.04314 (2023) - [i9]Ashraf Haddad, Najwa Aaraj, Preslav Nakov, Septimiu Fabian Mare:
Automated Mapping of CVE Vulnerability Records to MITRE CWE Weaknesses. CoRR abs/2304.11130 (2023) - [i8]Anna Hambitzer, David Gérault, Yun Ju Huang, Najwa Aaraj, Emanuele Bellini:
NNBits: Bit Profiling with a Deep Learning Ensemble Based Distinguisher. IACR Cryptol. ePrint Arch. 2023: 819 (2023) - [i7]Najwa Aaraj, Abdelrahaman Aly, Tim Güneysu, Chiara Marcolla, Johannes Mono, Rogerio Paludo, Iván Santos-González, Mireia Scholz, Eduardo Soria-Vazquez, Victor Sucasas, Ajith Suresh:
FANNG-MPC: Framework for Artificial Neural Networks and Generic MPC. IACR Cryptol. ePrint Arch. 2023: 1918 (2023) - 2022
- [j7]Chiara Marcolla, Victor Sucasas, Marc Manzano, Riccardo Bassoli, Frank H. P. Fitzek, Najwa Aaraj:
Survey on Fully Homomorphic Encryption, Theory, and Applications. Proc. IEEE 110(10): 1572-1609 (2022) - [j6]Tanujay Saha, Najwa Aaraj, Neel Ajjarapu, Niraj K. Jha:
SHARKS: Smart Hacking Approaches for RisK Scanning in Internet-of-Things and Cyber-Physical Systems Based on Machine Learning. IEEE Trans. Emerg. Top. Comput. 10(2): 870-885 (2022) - [j5]Tanujay Saha, Najwa Aaraj, Niraj K. Jha:
Machine Learning Assisted Security Analysis of 5G-Network-Connected Systems. IEEE Trans. Emerg. Top. Comput. 10(4): 2006-2024 (2022) - [c11]Maria Papaioannou, Georgios Mantas, Aliyah Essop, Victor Sucasas, Najwa Aaraj, Jonathan Rodriguez:
Risk Estimation for a Secure & Usable User Authentication Mechanism for Mobile Passenger ID Devices. CAMAD 2022: 173-178 - [c10]Nitin Satpute, Anna Hambitzer, Saeed Aljaberi, Najwa Aaraj:
GPU4SNN: GPU-Based Acceleration for Spiking Neural Network Simulations. PPAM (1) 2022: 399-413 - [c9]Najwa Aaraj, Emanuele Bellini, Ravindra Jejurikar, Marc Manzano, Raghvendra Rohit, Eugenio Salazar:
Farasha: A Provable Permutation-Based Parallelizable PRF. SAC 2022: 437-458 - [c8]Tanujay Saha, Tamjid Al Rahat, Najwa Aaraj, Yuan Tian, Niraj K. Jha:
ML-FEED: Machine Learning Framework for Efficient Exploit Detection. TPS-ISA 2022: 140-149 - [i6]Johannes Mono, Chiara Marcolla, Georg Land, Tim Güneysu, Najwa Aaraj:
Finding and Evaluating Parameters for BGV. IACR Cryptol. ePrint Arch. 2022: 706 (2022) - [i5]Najwa Aaraj, Emanuele Bellini, Ravindra Jejurikar, Marc Manzano, Raghvendra Rohit, Eugenio Salazar:
Farasha: A Provable Permutation-based Parallelizable PRF. IACR Cryptol. ePrint Arch. 2022: 1150 (2022) - [i4]Chiara Marcolla, Victor Sucasas, Marc Manzano, Riccardo Bassoli, Frank H. P. Fitzek, Najwa Aaraj:
Survey on Fully Homomorphic Encryption, Theory, and Applications. IACR Cryptol. ePrint Arch. 2022: 1602 (2022) - 2021
- [c7]Sanjay Deshpande, Santos Merino Del Pozo, Víctor Mateu, Marc Manzano, Najwa Aaraj, Jakub Szefer:
Modular Inverse for Integers using Fast Constant Time GCD Algorithm and its Applications. FPL 2021: 122-129 - [c6]Najwa Aaraj, Chiara Marcolla, Xiaojie Zhu:
Exipnos: An Efficient Verifiable Dynamic Symmetric Searchable Encryption Scheme with Forward and Backward Privacy. INDOCRYPT 2021: 487-509 - [i3]Tanujay Saha, Najwa Aaraj, Neel Ajjarapu, Niraj K. Jha:
SHARKS: Smart Hacking Approaches for RisK Scanning in Internet-of-Things and Cyber-Physical Systems based on Machine Learning. CoRR abs/2101.02780 (2021) - [i2]Tanujay Saha, Najwa Aaraj, Niraj K. Jha:
Machine Learning Assisted Security Analysis of 5G-Network-Connected Systems. CoRR abs/2108.03514 (2021)
2010 – 2019
- 2017
- [i1]Najwa Aaraj, Florian Caullery, Marc Manzano:
MILP-aided Cryptanalysis of Round Reduced ChaCha. IACR Cryptol. ePrint Arch. 2017: 1163 (2017) - 2012
- [j4]Divya Arora, Najwa Aaraj, Anand Raghunathan, Niraj K. Jha:
INVISIOS: A Lightweight, Minimally Intrusive Secure Execution Environment. ACM Trans. Embed. Comput. Syst. 11(3): 60:1-60:20 (2012) - 2011
- [j3]Najwa Aaraj, Anand Raghunathan, Niraj K. Jha:
A framework for defending embedded systems against software attacks. ACM Trans. Embed. Comput. Syst. 10(3): 33:1-33:23 (2011)
2000 – 2009
- 2008
- [j2]Najwa Aaraj, Anand Raghunathan, Niraj K. Jha:
Analysis and design of a hardware/software trusted platform module for embedded systems. ACM Trans. Embed. Comput. Syst. 8(1): 8:1-8:31 (2008) - [c5]Najwa Aaraj, Anand Raghunathan, Niraj K. Jha:
Dynamic Binary Instrumentation-Based Framework for Malware Defense. DIMVA 2008: 64-87 - 2007
- [j1]Najwa Aaraj, Srivaths Ravi, Anand Raghunathan, Niraj K. Jha:
Hybrid Architectures for Efficient and Secure Face Authentication in Embedded Systems. IEEE Trans. Very Large Scale Integr. Syst. 15(3): 296-308 (2007) - [c4]Najwa Aaraj, Anand Raghunathan, Srivaths Ravi, Niraj K. Jha:
Energy and execution time analysis of a software-based trusted platform module. DATE 2007: 1128-1133 - 2006
- [c3]Najwa Aaraj, Srivaths Ravi, Anand Raghunathan, Niraj K. Jha:
Architectures for efficient face authentication in embedded systems. DATE Designers' Forum 2006: 1-6 - 2005
- [c2]Sleiman Itani, Najwa Aaraj, Darine Abdelahad, Ayman I. Kayssi:
Neighbor stranger discrimination: a new defense mechanism against Internet DDOS attacks. AICCSA 2005: 95 - 2004
- [c1]Najwa Aaraj, Anis Nazer, Ali Chehab, Ayman I. Kayssi:
Transient Current Testing of Dynamic CMOS Circuits. DFT 2004: 264-271
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-09 00:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint