Zakaria Najm

858 total citations
16 papers, 161 citations indexed

About

Zakaria Najm is a scholar working on Hardware and Architecture, Artificial Intelligence and Computer Vision and Pattern Recognition. According to data from OpenAlex, Zakaria Najm has authored 16 papers receiving a total of 161 indexed citations (citations by other indexed papers that have themselves been cited), including 12 papers in Hardware and Architecture, 12 papers in Artificial Intelligence and 4 papers in Computer Vision and Pattern Recognition. Recurrent topics in Zakaria Najm's work include Cryptographic Implementations and Security (12 papers), Physical Unclonable Functions (PUFs) and Hardware Security (12 papers) and Chaos-based Image/Signal Encryption (4 papers). Zakaria Najm is often cited by papers focused on Cryptographic Implementations and Security (12 papers), Physical Unclonable Functions (PUFs) and Hardware Security (12 papers) and Chaos-based Image/Signal Encryption (4 papers). Zakaria Najm collaborates with scholars based in France, Singapore and Netherlands. Zakaria Najm's co-authors include Sylvain Guilley, Jean‐Luc Danger, Shivam Bhasin, Xuan Thuy Ngo, Thomas Peyrin, Yves Mathieu, Tarik Graba, Dirmanto Jap, Bruno Robisson and Jean-Baptiste Rigaud and has published in prestigious journals such as SHILAP Revista de lepidopterología, IEEE Transactions on Computers and Journal of Cryptology.

In The Last Decade

Zakaria Najm

16 papers receiving 152 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Zakaria Najm France 8 115 97 73 40 25 16 161
Abhishek Chakraborty India 9 169 1.5× 136 1.4× 120 1.6× 46 1.1× 40 1.6× 18 227
Mitsuru Shiozaki Japan 8 171 1.5× 124 1.3× 104 1.4× 43 1.1× 45 1.8× 33 231
Yukiyasu Tsunoo Japan 8 79 0.7× 138 1.4× 36 0.5× 74 1.9× 12 0.5× 32 172
André Schaller Germany 8 127 1.1× 47 0.5× 86 1.2× 10 0.3× 35 1.4× 17 147
Jean-Baptiste Rigaud France 11 250 2.2× 216 2.2× 117 1.6× 77 1.9× 26 1.0× 27 308
Mohammed Nabeel United States 8 136 1.2× 105 1.1× 125 1.7× 18 0.5× 42 1.7× 22 219
Nahid Farhady Ghalaty United States 10 186 1.6× 209 2.2× 69 0.9× 44 1.1× 14 0.6× 19 279
Christophe Clavier France 7 77 0.7× 132 1.4× 34 0.5× 63 1.6× 7 0.3× 11 164
Vikash Kumar India 7 37 0.3× 65 0.7× 43 0.6× 42 1.1× 11 0.4× 18 131
Masahiko Takenaka Japan 8 62 0.5× 52 0.5× 53 0.7× 21 0.5× 26 1.0× 24 130

Countries citing papers authored by Zakaria Najm

Since Specialization
Citations

This map shows the geographic impact of Zakaria Najm's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Zakaria Najm with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Zakaria Najm more than expected).

Fields of papers citing papers by Zakaria Najm

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Zakaria Najm. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Zakaria Najm. The network helps show where Zakaria Najm may publish in the future.

Co-authorship network of co-authors of Zakaria Najm

This figure shows the co-authorship network connecting the top 25 collaborators of Zakaria Najm. A scholar is included among the top collaborators of Zakaria Najm based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Zakaria Najm. Zakaria Najm is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

16 of 16 papers shown
1.
Najm, Zakaria, et al.. (2020). Fixslicing: A New GIFT Representation. SHILAP Revista de lepidopterología. 7 indexed citations
2.
Najm, Zakaria, et al.. (2020). Fixslicing: A New GIFT Representation. IACR Transactions on Cryptographic Hardware and Embedded Systems. 402–427. 10 indexed citations
3.
Hou, Xiaolu, et al.. (2019). SoK. 403–414. 1 indexed citations
4.
Ravi, Prasanna, et al.. (2019). Security is an architectural design constraint. Microprocessors and Microsystems. 68. 17–27. 4 indexed citations
5.
Najm, Zakaria, et al.. (2018). On Comparing Side-channel Properties of AES and ChaCha20 on Microcontrollers. DR-NTU (Nanyang Technological University). 552–555. 11 indexed citations
6.
Roy, Debapriya Basu, Shivam Bhasin, Jean‐Luc Danger, et al.. (2018). The Conflicted Usage of RLUTs for Security-Critical Applications on FPGA. SPIRE - Sciences Po Institutional REpository. 2(2). 162–178. 6 indexed citations
7.
Ravi, Prasanna, et al.. (2018). Feature Selection Methods for Non-Profiled Side-Channel Attacks on ECC. DR-NTU (Nanyang Technological University). 8419. 1–5. 9 indexed citations
8.
Bruneau, Nicolas, Sylvain Guilley, Zakaria Najm, & Yannick Teglia. (2017). Multivariate High-Order Attacks of Shuffled Tables Recomputation. Journal of Cryptology. 31(2). 351–393. 12 indexed citations
9.
Guilley, Sylvain, et al.. (2017). Using modular extension to provably protect Edwards curves against fault attacks. Journal of Cryptographic Engineering. 7(4). 321–330. 1 indexed citations
10.
Najm, Zakaria, et al.. (2016). Dismantling Real-World ECC with Horizontal and Vertical Template Attacks. SPIRE - Sciences Po Institutional REpository. 4 indexed citations
11.
Ngo, Xuan Thuy, Jean‐Luc Danger, Sylvain Guilley, et al.. (2016). Cryptographically Secure Shield for Security IPs Protection. IEEE Transactions on Computers. 1–1. 28 indexed citations
12.
Ngo, Xuan Thuy, Zakaria Najm, Shivam Bhasin, Sylvain Guilley, & Jean‐Luc Danger. (2016). Method taking into account process dispersion to detect hardware Trojan Horse by side-channel analysis. Journal of Cryptographic Engineering. 6(3). 239–247. 21 indexed citations
13.
Danger, Jean‐Luc, et al.. (2015). Hardware Trojan Detection by Delay and Electromagnetic Measurements. Design, Automation & Test in Europe Conference & Exhibition (DATE), 2015. 782–787. 31 indexed citations
14.
Carlet, Claude, et al.. (2015). Optimized linear complementary codes implementation for hardware trojan prevention. 1–4. 6 indexed citations
15.
Guilley, Sylvain, et al.. (2015). Formally proved security of assembly code against power analysis. Journal of Cryptographic Engineering. 6(3). 201–216. 8 indexed citations
16.
Guilley, Sylvain, et al.. (2015). Formally Proved Security of Assembly Code Against Power Analysis. 2 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026