Follow
Mohamed El-Hadedy
Mohamed El-Hadedy
Research Scientist at UIUC, Senior IEEE Member
Verified email at alumni.ntnu.no - Homepage
Title
Cited by
Cited by
Year
Cryptographic hash function Edon-R′
D Gligoroski, RS Ødegård, M Mihova, SJ Knapskog, A Drápal, V Klima, ...
2009 Proceedings of the 1st International Workshop on Security and …, 2009
622009
Cryptographic hash function blue midnight wish
D Gligoroski, V Klima, SJ Knapskog, M El-Hadedy, J Amundsen
2009 Proceedings of the 1st International Workshop on Security and …, 2009
562009
ASAP: Accelerated Short-Read Alignment on Programmable Hardware
SS Banerjee, M El-Hadedy, JB Lim, ZT Kalbarczyk, D Chen, SS Lumetta, ...
IEEE Transactions on Computers 68 (3), 331-346, 2018
492018
Analysis and modeling of collaborative execution strategies for heterogeneous CPU-FPGA architectures
S Huang, LW Chang, I El Hajj, S Garcia de Gonzalo, J Gómez-Luna, ...
Proceedings of the 2019 ACM/SPEC International Conference on Performance …, 2019
422019
High performance implementation of a public key block cipher-mqq, for fpga platforms
M El-Hadedy, D Gligoroski, SJ Knapskog
2008 International Conference on Reconfigurable Computing and FPGAs, 427-432, 2008
232008
π-cipher v2
D Gligoroski, H Mihajloska, S Samardjiska, H Jacobsen, M El-Hadedy, ...
Cryptographic competitions: CAESAR, 2014
222014
Triangle counting and truss decomposition using FPGA
S Huang, M El-Hadedy, C Hao, Q Li, VS Mailthody, K Date, J Xiong, ...
2018 IEEE high performance extreme computing conference (HPEC), 1-7, 2018
212018
On accelerating pair-HMM computations in programmable hardware
RKI Subho S. Banerjee, Mohamed El-Hadedy, Ching Y. Tan, Zbigniew T ...
2017 27th International Conference on Field Programmable Logic and …, 2017
202017
π-Cipher: Authenticated Encryption for Big Data
D Gligoroski, H Mihajloska, S Samardjiska, H Jacobsen, RE Jensen, ...
Secure IT Systems: 19th Nordic Conference, NordSec 2014, Tromsø, Norway …, 2014
202014
Generating efficient and high-quality pseudo-random behavior on Automata Processors
J Wadden, N Brunelle, K Wang, M El-Hadedy, G Robins, M Stan, ...
2016 IEEE 34th International Conference on Computer Design (ICCD), 622-629, 2016
192016
Reco-hcon: A high-throughput reconfigurable compact ascon processor for trusted iot
X Wei, M El-Hadedy, S Mosanu, Z Zhu, WM Hwu, X Guo
2022 IEEE 35th International System-on-Chip Conference (SOCC), 1-6, 2022
162022
Analysis and optimization of I/O cache coherency strategies for SoC-FPGA device
SW Min, S Huang, M El-Hadedy, J Xiong, D Chen, W Hwu
2019 29th International Conference on Field Programmable Logic and …, 2019
152019
Ensemble hyperspectral band selection for detecting nitrogen status in grape leaves
R Omidi, A Moghimi, A Pourreza, M El-Hadedy, AS Eddin
2020 19th IEEE International Conference on Machine Learning and Applications …, 2020
122020
GAGE and InGAGE v1. 03
D Gligoroski, H Mihajloska, D Otte, M El-Hadedy
NIST lightweight competition round 1, 114, 2019
112019
Blue Midnight Wish
D Gligoroski, V Klima, SJ Knapskog, M El-Hadedy, J Amundsen, ...
proceeding of The First SHA-3 Candidate Conference, 2009
112009
Agile-aes: Implementation of configurable aes primitive with agile design approach
X Guo, M El-Hadedy, S Mosanu, X Wei, K Skadron, MR Stan
Integration 85, 87-96, 2022
102022
Area efficient processing element architecture for compact hash functions systems on virtex5 fpga platform
M El-Hadedy, D Gligoroski, SJ Knapskog
2011 NASA/ESA Conference on Adaptive Hardware and Systems (AHS), 240-247, 2011
82011
π-cipher v1. Cryptographic competitions: CAESAR (2014)
D Gligoroski, H Mihajloska, S Samardjiska, H Jacobsen, M El-Hadedy, ...
URL http://competitions. cr. yp. to/round1/picipherv2. pdf, 0
8
Low area implementation of the hash function “blue midnight wish 256” for fpga platforms
M El-Hadedy, D Gligoroski, SJ Knapskog
2009 International Conference on Intelligent Networking and Collaborative …, 2009
72009
Cryptographic hash function BLUE MIDNIGHT WISH. Submission to NIST (Round 2)
D Gligoroski, V Klíma, SJ Knapskog, M El-Hadedy, J Amundsen, ...
Submission to NIST (Round 2), 2009
72009
The system can't perform the operation now. Try again later.
Articles 1–20