Guitouni Zied

Guitouni Zied
  • Doctor of Electronics
  • Professor (Assistant) at University of Monastir

About

22
Publications
1,926
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
30
Citations
Introduction
Information security, wireless network security, Design Digital Electronics and VHDL Programming Circuit
Current institution
University of Monastir
Current position
  • Professor (Assistant)

Publications

Publications (22)
Article
Full-text available
This paper presents a new method for generating encryption keys for Internet of Things (IoT) devices. This method combines chaos theory with neural networks to create secure and efficient keys. We use the Lorenz chaotic system to generate complex patterns and a Convolutional Neural Network (CNN) to learn and predict these patterns. This approach is...
Article
Full-text available
This paper introduces an innovative hardware implementation of the Secure Hash Algorithm (SHA-3) using three-dimensional cellular automata (3D-CA) for secure blockchain-based IoT systems. Our approach optimizes the SHA-3 algorithm by leveraging the parallel processing capabilities of 3D-CA, addressing the computational challenges in resource-constr...
Article
Full-text available
The secure distribution of keys is essential to ensuring the privacy and integrity of data in Internet of Things (IoT) systems. Quantum Key Distribution (QKD) protocols, such as BB84, use principles from quantum mechanics to establish secure communication channels. However, errors that occur during the transmission of qubits can compromise the reli...
Article
Full-text available
Secure Hash Algorithms (SHA) are widely used in the Internet of Things (IoT) systems for message authentication and integrity verification. However, the performance of different SHA algorithms can vary significantly in terms of Quality of Service (QoS) metrics such as area utilization, processing speed, energy efficiency, and security. In this pape...
Article
Full-text available
The Internet of Things (IoT) has experienced rapid growth, resulting in a proliferation of interconnected devices in domains such as smart homes, cities, and healthcare applications. Ensuring secure communication within IoT networks is crucial for protecting privacy and data. The BB84 protocol, a quantum key distribution (QKD) protocol, shows promi...
Article
Full-text available
In the realm of Internet of Things (IoT) systems, the generation of cryptographic keys is crucial for ensuring secure data transmission and device authentication. However, traditional methods of generating random keys encounter challenges about security, efficiency, and scalability, particularly when applied to resource-constrained IoT devices. To...
Article
Full-text available
This paper presents a novel encryption method for the secure transmission of medical images in the Internet of Medical Things (IoMT) systems. The method combines Feedforward Neural Network (FFNN) architectures for a random key generation with a substitution function using the Sbox of the AES algorithm to ensure high-level security. The FFNNs are tr...
Article
Full-text available
The Internet of Medical Things (IoMT) driven health is the most advantageous aspect of technology in the global healthcare industry. Securing medical images in IoMT systems is a great challenge to protecting medical privacy. Many cryptographic schemes that provide the confidentiality and integrity of these images over IoMT devices are proposed. The...
Article
Full-text available
Cellular Automata (CAs) have been applied successfully to several physical systems, processes and scientific problems that involve local interactions, such as image processing, data encryption and byte error correcting codes. In this paper, we analyze the cellular automata, and we propose a reconfigurable cryptosystem based on 2-D Von Neumann cellu...
Article
Full-text available
Security protocols and encryption algorithms are essentially based on algorithms and on Random Number Generators (RNG). In this paper, we described a single key cryptographic system based on Programmable Cellular Automata Generator (PCAG) and Stream Generators. We proposed reconfigurable architecture of PCAG. The hardware implementations of PCAG an...
Preprint
Full-text available
The Elliptic Curve Cryptography covers all relevant asymmetric cryptographic primitives like digital signatures and key agreement algorithms. The function used for this purpose is the point multiplication KP. Where K is an integer and P is a point on an elliptic curve. In the present work, we will develop an optimized Elliptic Curve Point Multiplic...

Network

Cited By