Thématiques de recherche

Journal papers

N. Méloni and M. Anwar Hasan. Efficient Double Bases for Scalar Multiplication. IEEE Transactions on Computers, Volume 64, Issue 8, p2204-2212, 2015.

N. Méloni, A. Namin, C. Négre and M. Anwar Hasan. Block Recombination Approach for Subquadratic Space Complexity Binary Field Multiplication based on Toeplitz Matrix-Vector Product. IEEE Transactions on Computers, Volume 61, Issue 2, p151-163, 2012.

N. Méloni, C. Négre and M. Anwar Hasan. High performance GHASH and impacts of a class of unconventional bases. Journal of Cryptographic Engineering, Volume 1, Number 3, p201-218, 2011.

A. Byrne, F. Crowe, W. P. Marnane, N. Méloni, A. Tisserand, and E. M. Popovici. SPA Resistant Elliptic Curve Cryptosystem Using Addition Chains. International Journal of High Performance Systems Architecture, 1(2):133-142, October 2007.

A. Byrne, N. Méloni, A. Tisserand, E. M. Popovici, and W. P. Marnane. Comparison of Simple Power Analysis Attack Resistant Algorithms for an Elliptic Curve Cryptosystem. Journal of Computers, 2(8):1-10, 2007.

Conference proceedings

N. Méloni and M. Anwar Hasan. Random Digit Representation of Integers. (accepted in ARITH 23 - 2016).

J. Proy, N. Veyrat-Charvillon, A. Tisserand, N. Méloni. Full Hardware Implementation of Short Addition Chains Recoding for ECC Scalar Multiplication Compas: Conférence d’informatique en Parallélisme, Architecture et Système, 2015.

F. Herbaut, P.-Y. Liardet, N. Méloni, P. Véron and Y. Teglia. Random Euclidean Addition Chain Generation and Its Application to Point MUltiplication. Progress in Cryptology - Indocrypt, LNCS 6498, p238-261, 2010.

N. Méloni, C. Négre and M. Anwar. Hasan High Performance GHASH Function for Long Messages. Applied Cryptography and Network Security, LNCS 6123, p154-167, 2010.

N. Méloni and M. Anwar Hasan. Elliptic Curve Point Scalar Multiplication Combining Yao's Algorithm and Double Bases. Workshop on Cryptographic Hardware and Embedded Systems - CHES LNCS 5747, p304-316, 2009.

N. Méloni. New Point Addition Formulae for ECC Applications.. International Workshop on the Arithmetic of Finite Fields, Madrid, Spain, LNCS 4547, p189-201, June 2007. paper.

A. Byrne, N. Meloni, F. Crowe, W. P. Marnane, A. Tisserand and E. M. Popovici. SPA resistant Elliptic Curve Cryptosystem using Addition Chains. 4th International Conference on Information Technology (ITNG), Las Vegas, Nevada, USA, p995-1000, April 2007.

J.-C. Bajard, S. Duquesne, M. Ercegovac and N. Méloni. Residue systems efficiency for modular products summation: Application to Elliptic Curves Cryptography. Advanced Signal Processing Algorithms, Architectures, and Implementations XVI, part of the SPIE Optics & Photonics 2006 Symposium, San Diego, California, USA.

J.-C. Bajard, N. Meloni and T. Plantard. Study of modular inversion in RNS. Advanced Signal Processing Algorithms, Architectures, and Implementations XV, part of the SPIE Optics & Photonics 2005 Symposium.

J.-C. Bajard, N. Méloni and T. Plantard. Efficient RNS Bases for Cryptography. IMACS'2005 World Congress. Paris, France, July 11-15, 2005.

Rapports de recherche

N. Méloni and M. Anwar Hasan. Random Digit Representation of Integers. 2015.

Thèse de Doctorat

N. Méloni. Arithmétique pour la Cryptographie basée sur les Courbes Elliptiques. Novembre 2007.