default search action
Belgacem Bouallegue
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Amira G. Mohamed, Somia A. Abd El-Mottaleb, Mehtab Singh, Hassan Yousif Ahmed, Medien Zeghid, Wazie M. Abdulkawi, Belgacem Bouallegue, Osman Ahmed Abdalla:
Chaos Fractal Digital Image Encryption Transmission in Underwater Optical Wireless Communication System. IEEE Access 12: 117541-117559 (2024) - [j16]Chen Zhichu, Mohsin Ali Koondhar, Ghulam Sarwar Kaloi, Muhammad Zain Yousaf, Aamir Ali, Zuhair Muhammed Alaas, Belgacem Bouallegue, Abdelmoty M. Ahmed, Yasser Ahmed Elshrief:
Offshore wind farms interfacing using HVAC-HVDC schemes: A review. Comput. Electr. Eng. 120: 109797 (2024) - [c18]Hashim Elshafie, Norsheila Binti Fisal, Ahmed Elmokhtar, Paul Rodrigues, Quadri Noorulhasan Naveed, Belgacem Bouallegue:
Positional Analysis of Spectrum Sharing Between IEEE 80.16 and TV Band. ATSIP 2024: 245-248 - 2023
- [j15]Mahmoud Khattab, Akram M. Zeki, Ali Amer Alwan, Belgacem Bouallegue, Safaa S. Matter, Abdelmoty M. Ahmed:
A Hybrid Regularization-Based Multi-Frame Super-Resolution Using Bayesian Framework. Comput. Syst. Sci. Eng. 44(1): 35-54 (2023) - [j14]Mouna Bedoui, Belgacem Bouallegue, Abdelmoty M. Ahmed, Belgacem Hamdi, Mohsen Machhout, Mahmoud, Mahmoud Khattab:
A Secure Hardware Implementation for Elliptic Curve Digital Signature Algorithm. Comput. Syst. Sci. Eng. 44(3): 2177-2193 (2023) - [j13]Ahmad M. J. AL Moustafa, Mohd Shafry Mohd Rahim, Belgacem Bouallegue, Mahmoud Khattab, Amr Mohmed Soliman, Gamal Tharwat, Abdelmoty M. Ahmed:
Integrated Mediapipe with a CNN Model for Arabic Sign Language Recognition. J. Electr. Comput. Eng. 2023: 8870750:1-8870750:15 (2023) - [j12]Mouna Bedoui, Belgacem Bouallegue, Hassen Mestiri, Belgacem Hamdi, Mohsen Machhout:
An improvement of both security and reliability for elliptic curve scalar multiplication Montgomery algorithm. Multim. Tools Appl. 82(8): 11973-11992 (2023) - 2022
- [j11]Mouna Bedoui, Hassen Mestiri, Belgacem Bouallegue, Belgacem Hamdi, Mohsen Machhout:
An improvement of both security and reliability for AES implementations. J. King Saud Univ. Comput. Inf. Sci. 34(10 Part B): 9844-9851 (2022) - 2021
- [j10]Asma Chaouch, Laurent-Stéphane Didier, Fangan-Yssouf Dosso, Nadia El Mrabet, Belgacem Bouallegue, Bouraoui Ouni:
Two hardware implementations for modular multiplication in the AMNS: Sequential and semi-parallel. J. Inf. Secur. Appl. 58: 102770 (2021) - [j9]Gamal Tharwat, Abdelmoty M. Ahmed, Belgacem Bouallegue:
Arabic Sign Language Recognition System for Alphabets Using Machine Learning Techniques. J. Electr. Comput. Eng. 2021: 2995851:1-2995851:17 (2021) - [j8]Mahmoud Khattab, Akram M. Zeki, Ali Amer Alwan, Belgacem Bouallegue, Safaa S. Matter, Abdelmoty M. Ahmed:
Regularized Multiframe Super-Resolution Image Reconstruction Using Linear and Nonlinear Filters. J. Electr. Comput. Eng. 2021: 8309910:1-8309910:16 (2021)
2010 – 2019
- 2019
- [c17]Asma Chaouch, Fangan-Yssouf Dosso, Laurent-Stéphane Didier, Nadia El Mrabet, Bouraoui Ouni, Belgacem Bouallegue:
Hardware Optimization on FPGA for the Modular Multiplication in the AMNS Representation. CRiSIS 2019: 113-127 - 2017
- [j7]Amine Mrabet, Nadia El Mrabet, Ronan Lashermes, Jean-Baptiste Rigaud, Belgacem Bouallegue, Sihem Mesnager, Mohsen Machhout:
A Scalable and Systolic Architectures of Montgomery Modular Multiplication for Public Key Cryptosystems Based on DSPs. J. Hardw. Syst. Secur. 1(3): 219-236 (2017) - [c16]Abdessalem Abidi, Christophe Guyeux, Belgacem Bouallegue, Mohsen Machhout:
Conditions to Have a Well-Disordered Dynamics in the CBC Mode of Operation. AICCSA 2017: 226-231 - [i6]Abdessalem Abidi, Christophe Guyeux, Jacques Demerjian, Belagacem Bouallegue, Mohsen Machhout:
Lyapunov Exponent Evaluation of the CBC Mode of Operation. CoRR abs/1706.08099 (2017) - [i5]Abdessalem Abidi, Samar Tawbi, Christophe Guyeux, Belgacem Bouallegue, Mohsen Machhout:
Summary of Topological Study of Chaotic CBC Mode of Operation. CoRR abs/1708.03243 (2017) - 2016
- [j6]Manel Dridi, Mohamed Ali Hajjaji, Belgacem Bouallegue, Abdellatif Mtibaa:
Cryptography of medical images based on a combination between chaotic and neural network. IET Image Process. 10(11): 830-839 (2016) - [j5]Abdessalem Abidi, Qianxue Wang, Belgacem Bouallegue, Mohsen Machhout, Christophe Guyeux:
Proving Chaotic Behavior of CBC Mode of Operation. Int. J. Bifurc. Chaos 26(7): 1650113:1-1650113:10 (2016) - [j4]Fatma Kahri, Hassen Mestiri, Belgacem Bouallegue, Mohsen Machhout:
High Speed FPGA Implementation of Cryptographic KECCAK Hash Function Crypto-Processor. J. Circuits Syst. Comput. 25(4): 1650026:1-1650026:15 (2016) - [j3]Hassen Mestiri, Fatma Kahri, Belgacem Bouallegue, Mohsen Machhout:
A high-speed AES design resistant to fault injection attacks. Microprocess. Microsystems 41: 47-55 (2016) - [c15]Asma Chaouch, Belgacem Bouallegue, Bouraoui Ouni:
Software application for simulation-based AES, RSA and elliptic-curve algorithms. ATSIP 2016: 77-82 - [c14]Abdessalem Abidi, Qianxue Wang, Belgacem Bouallegue, Mohsen Machhout, Christophe Guyeux:
Quantitative evaluation of chaotic CBC mode of operation. ATSIP 2016: 88-92 - [c13]Amine Mrabet, Nadia El Mrabet, Ronan Lashermes, Jean-Baptiste Rigaud, Belgacem Bouallegue, Sihem Mesnager, Mohsen Machhout:
High-Performance Elliptic Curve Cryptography by Using the CIOS Method for Modular Multiplication. CRiSIS 2016: 185-198 - [c12]Abdessalem Abidi, Samar Tawbi, Christophe Guyeux, Belgacem Bouallegue, Mohsen Machhout:
Summary of Topological Study of Chaotic CBC Mode of Operation. CSE/EUC/DCABES 2016: 436-443 - [c11]Mouna Bedoui, Hassen Mestiri, Belgacem Bouallegue, Mohsen Machhout:
A reliable fault detection scheme for the AES hardware implementation. ISIVC 2016: 47-52 - [c10]Hassen Mestiri, Fatma Kahri, Mouna Bedoui, Belgacem Bouallegue, Mohsen Machhout:
High throughput pipelined hardware implementation of the KECCAK hash function. ISIVC 2016: 282-286 - [c9]Amine Mrabet, Nadia El Mrabet, Ronan Lashermes, Jean-Baptiste Rigaud, Belgacem Bouallegue, Sihem Mesnager, Mohsen Machhout:
A Scalable and Systolic Architectures of Montgomery Modular Multiplication for Public Key Cryptosystems Based on DSPs. SPACE 2016: 138-156 - [i4]Abdessalem Abidi, Qianxue Wang, Belgacem Bouallegue, Mohsen Machhout, Christophe Guyeux:
Quantitative Evaluation of Chaotic CBC Mode of Operation. CoRR abs/1601.08139 (2016) - [i3]Abdessalem Abidi, Christophe Guyeux, Bechara al Bouna, Belgacem Bouallegue, Mohsen Machhout:
The dynamics of the CBC Mode of Operation. CoRR abs/1605.02950 (2016) - [i2]Abdessalem Abidi, Qianxue Wang, Belgacem Bouallegue, Mohsen Machhout, Christophe Guyeux:
Proving chaotic behaviour of CBC mode of operation. CoRR abs/1608.05838 (2016) - [i1]Amine Mrabet, Nadia El Mrabet, Ronan Lashermes, Jean-Baptiste Rigaud, Belgacem Bouallegue, Sihem Mesnager, Mohsen Machhout:
A Systolic Hardware Architectures of Montgomery Modular Multiplication for Public Key Cryptosystems. IACR Cryptol. ePrint Arch. 2016: 487 (2016) - 2015
- [c8]Fatma Kahri, Hassen Mestiri, Belgacem Bouallegue, Mohsen Machhout:
Efficient FPGA hardware implementation of secure hash function SHA-256/Blake-256. SSD 2015: 1-5 - 2014
- [c7]Abdessalem Abidi, Belgacem Bouallegue, Fatma Kahri:
Implementation of elliptic curve digital signature algorithm (ECDSA). GSCIT 2014: 1-6 - [c6]Sondes Ajili, Mohamed Ali Hajjaji, Belgacem Bouallegue, Abdellatif Mtibaa:
Joint Watermarking\Encryption image for safe transmission: Application on medical imaging. GSCIT 2014: 1-6 - [c5]Manel Dridi, Belgacem Bouallegue, Abdellatif Mtibaa:
Crypto-compression of medical image based on DCT and chaotic system. GSCIT 2014: 1-6 - [c4]Amine Mrabet, Belgacem Bouallegue, Nadia El Mrabet, Mohsen Machhout, Sihem Mesnager:
Implementation of faster miller over Barreto-Naehrig curves in Jacobian cordinates. GSCIT 2014: 1-6 - 2013
- [c3]Fatma Kahri, Belgacem Bouallegue, Mohsen Machhout, Rached Tourki:
An FPGA implementation of the SHA-3: The BLAKE hash function. SSD 2013: 1-5 - 2010
- [j2]Zeghid Medien, Mohsen Machhout, Belgacem Bouallegue, Lazhar Khriji, Adel Baganne, Rached Tourki:
Design and Hardware Implementation of QoSS - AES Processor for Multimedia applications. Trans. Data Priv. 3(1): 43-64 (2010)
2000 – 2009
- 2007
- [c2]Zeghid Medien, Belgacem Bouallegue, Adel Baganne, Mohsen Machhout, Rached Tourki:
A Reconfigurable Implementation of the New Secure Hash Algorithm. ARES 2007: 281-285 - 2004
- [j1]Hattab Guesmi, Ridha Djemal, Belgacem Bouallegue, Jean-Philippe Diguet, Rached Tourki:
High performance architecture of integrated protocols for encoded video application. Comput. Stand. Interfaces 26(4): 301-315 (2004) - 2001
- [c1]Ridha Djemal, Belgacem Bouallegue, Jean-Philippe Diguet, Rached Tourki:
A Flow Control Approach for Encoded Video Applications Over ATM Network. ISCC 2001: 364-369
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint