default search action
Malik Imran
Person information
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Amer Aljaedi, Furqan Aziz Qureshi, Mohammad Mazyad Hazzazi, Malik Imran, Zaid Bassfar, Sajjad Shaukat Jamal:
FPGA Implementation of Elliptic-Curve Point Multiplication Over GF(2233) Using Booth Polynomial Multiplier for Area-Sensitive Applications. IEEE Access 12: 72847-72859 (2024) - [j16]Malik Imran, Safiullah Khan, Ayesha Khalid, Ciara Rafferty, Yasir Ali Shah, Samuel Pagliarini, Muhammad Rashid, Máire O'Neill:
Evaluating NTT/INTT Implementation Styles for Post-Quantum Cryptography. IEEE Embed. Syst. Lett. 16(4): 485-488 (2024) - [j15]Safiullah Khan, Kashif Inayat, Fahad Bin Muslim, Yasir Ali Shah, Muhammad Atif Ur Rehman, Ayesha Khalid, Malik Imran, Akmalbek Abdusalomov:
Securing the IoT ecosystem: ASIC-based hardware realization of Ascon lightweight cipher. Int. J. Inf. Sec. 23(6): 3653-3664 (2024) - [j14]Malik Imran, Aikata, Sujoy Sinha Roy, Samuel Pagliarini:
High-Speed Design of Post Quantum Cryptography With Optimized Hashing and Multiplication. IEEE Trans. Circuits Syst. II Express Briefs 71(2): 847-851 (2024) - [c8]Samuel Pagliarini, Aikata, Malik Imran, Sujoy Sinha Roy:
REPQC: Reverse Engineering and Backdooring Hardware Accelerators for Post-quantum Cryptography. AsiaCCS 2024 - [c7]Levent Aksoy, Debapriya Basu Roy, Malik Imran, Samuel Pagliarini:
Multiplierless Design of High-Speed Very Large Constant Multiplications. ASPDAC 2024: 957-962 - [i12]Samuel Pagliarini, Aikata, Malik Imran, Sujoy Sinha Roy:
REPQC: Reverse Engineering and Backdooring Hardware Accelerators for Post-quantum Cryptography. CoRR abs/2403.09352 (2024) - 2023
- [j13]Malik Imran, Felipe Almeida, Andrea Basso, Sujoy Sinha Roy, Samuel Pagliarini:
High-speed SABER key encapsulation mechanism in 65nm CMOS. J. Cryptogr. Eng. 13(4): 461-471 (2023) - [j12]Malik Imran, Zain Ul Abideen, Samuel Pagliarini:
A Versatile and Flexible Multiplier Generator for Large Integer Polynomials. J. Hardw. Syst. Secur. 7(2): 55-71 (2023) - [j11]Aikata, Ahmet Can Mert, Malik Imran, Samuel Pagliarini, Sujoy Sinha Roy:
KaLi: A Crystal for Post-Quantum Security Using Kyber and Dilithium. IEEE Trans. Circuits Syst. I Regul. Pap. 70(2): 747-758 (2023) - [i11]Levent Aksoy, Debapriya Basu Roy, Malik Imran, Samuel Pagliarini:
Multiplierless Design of High-Speed Very Large Constant Multiplications. CoRR abs/2309.05550 (2023) - [i10]Malik Imran, Aikata, Sujoy Sinha Roy, Samuel N. Pagliarini:
Towards High-speed ASIC Implementations of Post-Quantum Cryptography. IACR Cryptol. ePrint Arch. 2023: 716 (2023) - 2022
- [j10]Felipe Almeida, Malik Imran, Jaan Raik, Samuel Pagliarini:
Ransomware Attack as Hardware Trojan: A Feasibility and Demonstration Study. IEEE Access 10: 44827-44839 (2022) - [j9]Levent Aksoy, Debapriya Basu Roy, Malik Imran, Patrick Karl, Samuel Pagliarini:
Multiplierless Design of Very Large Constant Multiplications in Cryptography. IEEE Trans. Circuits Syst. II Express Briefs 69(11): 4503-4507 (2022) - [i9]Levent Aksoy, Debapriya Basu Roy, Malik Imran, Patrick Karl, Samuel Pagliarini:
Multiplierless Design of Very Large Constant Multiplications in Cryptography. CoRR abs/2205.10591 (2022) - [i8]Malik Imran, Felipe Almeida, Andrea Basso, Sujoy Sinha Roy, Samuel Pagliarini:
High-speed SABER Key Encapsulation Mechanism in 65nm CMOS. IACR Cryptol. ePrint Arch. 2022: 530 (2022) - [i7]Aikata, Ahmet Can Mert, Malik Imran, Samuel Pagliarini, Sujoy Sinha Roy:
KaLi: A Crystal for Post-Quantum Security. IACR Cryptol. ePrint Arch. 2022: 1086 (2022) - 2021
- [j8]Muhammad Rashid, Malik Imran, Muhammad Kashif, Asher Sajid:
An Optimized Architecture for Binary Huff Curves With Improved Security. IEEE Access 9: 88498-88511 (2021) - [j7]Malik Imran, Faisal Bashir, Atif Raza Jafri, Muhammad Rashid, Muhammad Najam-ul-Islam:
A systematic review of scalable hardware architectures for pattern matching in network security. Comput. Electr. Eng. 92: 107169 (2021) - [c6]Malik Imran, Felipe Almeida, Jaan Raik, Andrea Basso, Sujoy Sinha Roy, Samuel Pagliarini:
Design Space Exploration of SABER in 65nm ASIC. ASHES@CCS 2021: 85-90 - [c5]Malik Imran, Zain Ul Abideen, Samuel Pagliarini:
An Open-source Library of Large Integer Polynomial Multipliers. DDECS 2021: 145-150 - [c4]Tiago D. Perez, Malik Imran, Pablo Vaz, Samuel Pagliarini:
Side-Channel Trojan Insertion - a Practical Foundry-Side Attack via ECO. ISCAS 2021: 1-5 - [i6]Malik Imran, Zain Ul Abideen, Samuel Pagliarini:
An Open-source Library of Large Integer Polynomial Multipliers. CoRR abs/2101.11404 (2021) - [i5]Tiago D. Perez, Malik Imran, Pablo Vaz, Samuel Pagliarini:
Side-Channel Trojan Insertion - a Practical Foundry-Side Attack via ECO. CoRR abs/2102.00724 (2021) - [i4]Malik Imran, Felipe Almeida, Jaan Raik, Andrea Basso, Sujoy Sinha Roy, Samuel Pagliarini:
Design Space Exploration of SABER in 65nm ASIC. CoRR abs/2109.07824 (2021) - [i3]Malik Imran, Felipe Almeida, Jaan Raik, Andrea Basso, Sujoy Sinha Roy, Samuel Pagliarini:
Design Space Exploration of SABER in 65nm ASIC. IACR Cryptol. ePrint Arch. 2021: 1202 (2021) - 2020
- [j6]Muhammad Rashid, Malik Imran, Atif Raza Jafri, Zahid Mehmood:
A 4-Stage Pipelined Architecture for Point Multiplication of Binary Huff Curves. J. Circuits Syst. Comput. 29(11): 2050179:1-2050179:28 (2020) - [c3]Muhammad Rashid, Malik Imran, Atif Raza Jafri:
Exploration of Hardware Architectures for String Matching Algorithms in Network Intrusion Detection Systems. IAIT 2020: 3:1-3:7 - [c2]Malik Imran, Samuel Pagliarini, Muhammad Rashid:
An Area Aware Accelerator for Elliptic Curve Point Multiplication. ICECS 2020: 1-4 - [i2]Malik Imran, Zain Ul Abideen, Samuel Pagliarini:
A Systematic Study of Lattice-based NIST PQC Algorithms: from Reference Implementations to Hardware Accelerators. CoRR abs/2009.07091 (2020) - [i1]Malik Imran, Samuel Pagliarini, Muhammad Rashid:
An Area Aware Accelerator for Elliptic Curve Point Multiplication. IACR Cryptol. ePrint Arch. 2020: 1148 (2020)
2010 – 2019
- 2019
- [j5]Malik Imran, Muhammad Rashid, Atif Raza Jafri, Muhammad Kashif:
Throughput/area optimised pipelined architecture for elliptic curve crypto processor. IET Comput. Digit. Tech. 13(5): 361-368 (2019) - [j4]Muhammad Rashid, Malik Imran, Atif Raza Jafri, Turki F. Al-Somani:
Flexible Architectures for Cryptographic Algorithms - A Systematic Literature Review. J. Circuits Syst. Comput. 28(3): 1930003:1-1930003:35 (2019) - [j3]Muhammad Rashid, Malik Imran, Atif Raza Jafri, Turki F. Al-Somani:
Erratum: Flexible Architectures for Cryptographic Algorithms - A Systematic Literature Review. J. Circuits Syst. Comput. 28(13): 1992002:1 (2019) - 2018
- [j2]Malik Imran, Muhammad Rashid, Atif Raza Jafri, Muhammad Najam-ul-Islam:
ACryp-Proc: Flexible Asymmetric Crypto Processor for Point Multiplication. IEEE Access 6: 22778-22793 (2018) - 2017
- [j1]Atif Raza Jafri, Muhammad Najam-ul-Islam, Malik Imran, Muhammad Rashid:
Towards an Optimized Architecture for Unified Binary Huff Curves. J. Circuits Syst. Comput. 26(11): 1750178:1-1750178:14 (2017) - 2016
- [c1]Muhammad Rashid, Malik Imran, Atif Raza Jafri:
Comparative analysis of flexible cryptographic implementations. ReCoSoC 2016: 1-6
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 20:37 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint