An improved approach for lsb-based image steganography using AES algorithm SL Chikouche, N Chikouche 2017 5th International Conference on Electrical Engineering-Boumerdes (ICEE …, 2017 | 51 | 2017 |
A privacy-preserving code-based authentication protocol for Internet of Things N Chikouche, PL Cayrel, EHM Mboup, BO Boidje The Journal of Supercomputing 75 (12), 8231-8261, 2019 | 35 | 2019 |
A novel image encryption algorithm based on hybrid chaotic maps using a key image S Benaissi, N Chikouche, R Hamza Optik 272, 170316, 2023 | 32 | 2023 |
Authentication schemes for healthcare applications using wireless medical sensor networks: A survey AN Bahache, N Chikouche, F Mezrag SN Computer Science 3 (5), 382, 2022 | 27 | 2022 |
Improved RFID authentication protocol based on randomized McEliece cryptosystem N Chikouche, F Cherif, PL Cayrel, M Benmohammed | 17 | 2015 |
An authentication protocol based on combined RFID-biometric system RFID-biometric system N Chikouche, F Cherif, M Benmohammed arXiv preprint arXiv:1207.5627, 2012 | 12 | 2012 |
RFID authentication protocols based on error-correcting codes: a survey N Chikouche, F Cherif, PL Cayrel, M Benmohammed Wireless Personal Communications 96, 509-527, 2017 | 8 | 2017 |
Privacy preservation in healthcare systems BR Louassef, N Chikouche 2021 International Conference on Artificial Intelligence for Cyber Security …, 2021 | 6 | 2021 |
Performance evaluation of post-quantum public-key cryptography in smart mobile devices N Chikouche, A Ghadbane Conference on e-Business, e-Services and e-Society, 67-80, 2018 | 6 | 2018 |
A secure code-based authentication scheme for RFID systems N Chikouche, F Cherif, PL Cayrel, M Benmohammed International Journal of Computer Network and Information Security 7 (9), 1-9, 2015 | 6 | 2015 |
Eap-sres: An enhanced authentication protocol for secure remote education systems using nfc technology N Chikouche, F Cherif International Journal of Computing and Digital Systems 9 (03), 2020 | 3 | 2020 |
Weaknesses in two RFID authentication protocols N Chikouche, F Cherif, PL Cayrel, M Benmohammed Codes, Cryptology, and Information Security: First International Conference …, 2015 | 3 | 2015 |
Implementation of Public-Key cryptographic systems on embedded devices (case: Computation speed) W Tayoub, S Lakehali, C Noureddine | 3 | 2013 |
Vulnerabilities of two recently RFID authentication protocols N Chikouche, F Cherif, M Benmohammed 2012 IEEE International Conference on Complex Systems (ICCS), 1-6, 2012 | 3 | 2012 |
Formal analysis of a novel RFID authentication protocol N Chikouche 2017 8th International Conference on Computing, Communication and Networking …, 2017 | 2 | 2017 |
Algebraic replay attacks on authentication in RFID protocols N Chikouche, F Cherif, M Benmohammed International Conference on Security of Information and Communication …, 2013 | 2 | 2013 |
An efficient privacy scheme for C-ITS stations B Moussaoui, N Chikouche, H Fouchal Computers and Electrical Engineering 107, 108613, 2023 | 1 | 2023 |
Performance Evaluation and Analysis of Encryption Schemes for Wireless Sensor Networks AA Ghehioueche, N Chikouche, F Mezrag 2019 International Conference on Digitization (ICD), 187-191, 2019 | 1 | 2019 |
Vérification automatique des protocoles d’authentification des systèmes RFID N Chikouche, M Benmohammed Proc. of STIC’09, 2009 | 1 | 2009 |
PQH-WireGuard: Post-quantum Hybrid Cryptography-Based WireGuard VPN Protocol A Marrok, S Boukhelef, N Chikouche International Conference on Information Technology and Applications, 283-292, 2022 | | 2022 |