Nidhal Selmane

412 total citations
6 papers, 151 citations indexed

About

Nidhal Selmane is a scholar working on Artificial Intelligence, Hardware and Architecture and Computer Vision and Pattern Recognition. According to data from OpenAlex, Nidhal Selmane has authored 6 papers receiving a total of 151 indexed citations (citations by other indexed papers that have themselves been cited), including 6 papers in Artificial Intelligence, 5 papers in Hardware and Architecture and 4 papers in Computer Vision and Pattern Recognition. Recurrent topics in Nidhal Selmane's work include Cryptographic Implementations and Security (6 papers), Physical Unclonable Functions (PUFs) and Hardware Security (5 papers) and Chaos-based Image/Signal Encryption (4 papers). Nidhal Selmane is often cited by papers focused on Cryptographic Implementations and Security (6 papers), Physical Unclonable Functions (PUFs) and Hardware Security (5 papers) and Chaos-based Image/Signal Encryption (4 papers). Nidhal Selmane collaborates with scholars based in France and United States. Nidhal Selmane's co-authors include Sylvain Guilley, Jean‐Luc Danger, Shivam Bhasin, Mohamed Hamdi and Laurent Sauvage and has published in prestigious journals such as IET Information Security.

In The Last Decade

Nidhal Selmane

6 papers receiving 147 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Nidhal Selmane France 5 132 128 44 31 25 6 151
Victor Lomné France 7 188 1.4× 152 1.2× 80 1.8× 60 1.9× 19 0.8× 14 200
Adrian Thillard France 2 129 1.0× 98 0.8× 55 1.3× 49 1.6× 13 0.5× 3 135
Julia Borghoff Denmark 2 118 0.9× 43 0.3× 78 1.8× 20 0.6× 16 0.6× 4 129
Kitae Jeong South Korea 8 108 0.8× 42 0.3× 79 1.8× 24 0.8× 12 0.5× 22 134
Vincent Grosso France 6 130 1.0× 92 0.7× 52 1.2× 25 0.8× 10 0.4× 18 135
Kerstin Lemke‐Rust Germany 5 70 0.5× 45 0.4× 44 1.0× 20 0.6× 14 0.6× 14 90
Mario Kirschbaum Austria 6 72 0.5× 56 0.4× 30 0.7× 10 0.3× 10 0.4× 8 76
Maxime Nassar France 5 111 0.8× 111 0.9× 56 1.3× 10 0.3× 10 0.4× 8 116
Karine Heydemann France 7 118 0.9× 100 0.8× 14 0.3× 62 2.0× 31 1.2× 22 155
Frédéric Valette France 3 57 0.4× 48 0.4× 19 0.4× 14 0.5× 11 0.4× 5 65

Countries citing papers authored by Nidhal Selmane

Since Specialization
Citations

This map shows the geographic impact of Nidhal Selmane's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Nidhal Selmane with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Nidhal Selmane more than expected).

Fields of papers citing papers by Nidhal Selmane

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Nidhal Selmane. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Nidhal Selmane. The network helps show where Nidhal Selmane may publish in the future.

Co-authorship network of co-authors of Nidhal Selmane

This figure shows the co-authorship network connecting the top 25 collaborators of Nidhal Selmane. A scholar is included among the top collaborators of Nidhal Selmane based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Nidhal Selmane. Nidhal Selmane is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

6 of 6 papers shown
1.
Guilley, Sylvain, et al.. (2011). Performance evaluation of protocols resilient to physical attacks. 5479. 51–56. 1 indexed citations
2.
Selmane, Nidhal, Shivam Bhasin, Sylvain Guilley, & Jean‐Luc Danger. (2011). Security evaluation of application-specific integrated circuits and field programmable gate arrays against setup time violation attacks. IET Information Security. 5(4). 181–190. 16 indexed citations
3.
Bhasin, Shivam, et al.. (2010). Countering early evaluation. 1–8. 18 indexed citations
4.
Bhasin, Shivam, Nidhal Selmane, Sylvain Guilley, & Jean‐Luc Danger. (2009). Security evaluation of different AES implementations against practical setup time violation attacks in FPGAs. 15–21. 13 indexed citations
5.
Hamdi, Mohamed, et al.. (2008). Fault Analysis Attack on an FPGA AES Implementation. 1–5. 15 indexed citations
6.
Selmane, Nidhal, Sylvain Guilley, & Jean‐Luc Danger. (2008). Practical Setup Time Violation Attacks on AES. 91–96. 88 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026