Personal information

Verified email domains

Activities

Employment (1)

Khalifa University: Abu Dhabi, Abu Dhabi, AE

2011-08-11 to present | Assistant Professor in Information Security (Electrical and Computer Engineering)
Employment
Source: Self-asserted source
Abdulhadi Shoufan

Education and qualifications (1)

Technische Universität Darmstadt: Darmstadt, Hess, DE

2007-03-30 to present | Dr.-Ing. (Computer Science)
Education
Source: Self-asserted source
Abdulhadi Shoufan

Funding (2)

Linguistic Feature Filter in Arabic

Grant
Lockheed Martin Corporation (MD, MD, US)
Source: Self-asserted source
Abdulhadi Shoufan

Post-Quantum Cryptography

Grant
Federal office of Information Security (Bonn, DE)
Source: Self-asserted source
Abdulhadi Shoufan

Works (40)

ABS controller: An introductory case study for motivating non-major students

IEEE Global Engineering Education Conference, EDUCON
2016 | Conference paper
EID:

2-s2.0-84994633296

Contributors: Shoufan, A.
Source: Self-asserted source
Abdulhadi Shoufan via Scopus - Elsevier

Epistemic fidelity and cognitive constructivism in DLD-VISU

IEEE Global Engineering Education Conference, EDUCON
2016 | Conference paper
EID:

2-s2.0-84994585621

Contributors: Shoufan, A.
Source: Self-asserted source
Abdulhadi Shoufan via Scopus - Elsevier

Live demonstration of DLD-VISU: An eLearning platform for digital logic design

Proceedings - IEEE International Symposium on Circuits and Systems
2016 | Conference paper
EID:

2-s2.0-84983391344

Contributors: Shoufan, A.
Source: Self-asserted source
Abdulhadi Shoufan via Scopus - Elsevier

Subscription-free Pay-TV over IPTV

Journal of Systems Architecture
2016 | Journal article
EID:

2-s2.0-84953278485

Contributors: Arul, T.; Shoufan, A.
Source: Self-asserted source
Abdulhadi Shoufan via Scopus - Elsevier

Toward Modeling the Intrinsic Complexity of Test Problems

IEEE Transactions on Education
2016 | Journal article
EID:

2-s2.0-84991038633

Contributors: Shoufan, A.
Source: Self-asserted source
Abdulhadi Shoufan via Scopus - Elsevier

A web-based visualization and animation platform for digital logic design

IEEE Transactions on Learning Technologies
2015 | Journal article
EID:

2-s2.0-84933050086

Contributors: Shoufan, A.; Lu, Z.; Huss, S.A.
Source: Self-asserted source
Abdulhadi Shoufan via Scopus - Elsevier

On the power consumption of cryptographic processors in civil microdrones

ICISSP 2015 - 1st International Conference on Information Systems Security and Privacy, Proceedings
2015 | Conference paper
EID:

2-s2.0-84938767186

Contributors: Shoufan, A.; Alnoon, H.; Baek, J.
Source: Self-asserted source
Abdulhadi Shoufan via Scopus - Elsevier

Secure communication in civil drones

Communications in Computer and Information Science
2015 | Book
EID:

2-s2.0-84955321535

Contributors: Shoufan, A.; Alnoon, H.; Baek, J.
Source: Self-asserted source
Abdulhadi Shoufan via Scopus - Elsevier

A fault attack on a hardware-based implementation of the secure hash algorithm SHA-512

2013 International Conference on Reconfigurable Computing and FPGAs, ReConFig 2013
2013 | Conference paper
EID:

2-s2.0-84894469267

Contributors: Shoufan, A.
Source: Self-asserted source
Abdulhadi Shoufan via Scopus - Elsevier

Forward-secure identity-based signature: New generic constructions and their applications

Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications
2013 | Journal article
EID:

2-s2.0-84886940827

Contributors: Al Ebri, N.; Baek, J.; Shoufan, A.; Vu, Q.H.
Source: Self-asserted source
Abdulhadi Shoufan via Scopus - Elsevier

Stateful public-key encryption schemes forward-secure against state exposure

Computer Journal
2013 | Journal article
EID:

2-s2.0-84875708636

Contributors: Baek, J.; Vu, Q.H.; Shoufan, A.; Jones, A.; Wong, D.S.
Source: Self-asserted source
Abdulhadi Shoufan via Scopus - Elsevier

A hardware security module for quadrotor communication

FPT 2012 - 2012 International Conference on Field-Programmable Technology
2012 | Conference paper
EID:

2-s2.0-84874038157

Contributors: Shoufan, A.
Source: Self-asserted source
Abdulhadi Shoufan via Scopus - Elsevier

Consumer opinions on short-interval charging for pay-TV over IPTV

Proceedings - 26th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012
2012 | Conference paper
EID:

2-s2.0-84860724432

Contributors: Arul, T.; Shoufan, A.
Source: Self-asserted source
Abdulhadi Shoufan via Scopus - Elsevier

Efficient generic construction of forward-secure identity-based signature

Proceedings - 2012 7th International Conference on Availability, Reliability and Security, ARES 2012
2012 | Conference paper
EID:

2-s2.0-84869427887

Contributors: Al Ebri, N.; Baek, J.; Shoufan, A.; Vu, Q.H.
Source: Self-asserted source
Abdulhadi Shoufan via Scopus - Elsevier

Power trace alignment for cryptosystems featuring random frequency countermeasures

2012 2nd International Conference on Digital Information Processing and Communications, ICDIPC 2012
2012 | Conference paper
EID:

2-s2.0-84866701648

Contributors: Tian, Q.; Shoufan, A.; Stoettinger, M.; Huss, S.A.
Source: Self-asserted source
Abdulhadi Shoufan via Scopus - Elsevier

A benchmarking environment for performance evaluation of tree-based rekeying algorithms

Journal of Systems and Software
2011 | Journal article
EID:

2-s2.0-79956207533

Contributors: Shoufan, A.; Arul, T.
Source: Self-asserted source
Abdulhadi Shoufan via Scopus - Elsevier

A novel architecture for a secure update of cryptographic engines on trusted platform module

2011 International Conference on Field-Programmable Technology, FPT 2011
2011 | Conference paper
EID:

2-s2.0-84857201083

Contributors: Malipatlolla, S.; Feller, T.; Shoufan, A.; Arul, T.; Huss, S.A.
Source: Self-asserted source
Abdulhadi Shoufan via Scopus - Elsevier

A novel cryptoprocessor architecture for chained Merkle signature scheme

Microprocessors and Microsystems
2011 | Journal article
EID:

2-s2.0-79551470670

Contributors: Shoufan, A.; Huber, N.; Gregor Molter, H.
Source: Self-asserted source
Abdulhadi Shoufan via Scopus - Elsevier

A simple power analysis attack on a McEliece cryptoprocessor

Journal of Cryptographic Engineering
2011 | Journal article
EID:

2-s2.0-84866648434

Contributors: Molter, H.G.; Stöttinger, M.; Shoufan, A.; Strenzke, F.
Source: Self-asserted source
Abdulhadi Shoufan via Scopus - Elsevier

A compact course on VHDL-AMS

ISCAS 2010 - 2010 IEEE International Symposium on Circuits and Systems: Nano-Bio Circuit Fabrics and Systems
2010 | Conference paper
EID:

2-s2.0-77955997574

Contributors: Shoufan, A.
Source: Self-asserted source
Abdulhadi Shoufan via Scopus - Elsevier

A demonstrator for beamforming in C2X communication

IEEE Vehicular Technology Conference
2010 | Conference paper
EID:

2-s2.0-77954931152

Contributors: Stübing, H.; Shoufan, A.; Huss, S.A.
Source: Self-asserted source
Abdulhadi Shoufan via Scopus - Elsevier

A fast hash tree generator for Merkle signature scheme

ISCAS 2010 - 2010 IEEE International Symposium on Circuits and Systems: Nano-Bio Circuit Fabrics and Systems
2010 | Conference paper
EID:

2-s2.0-77955988896

Contributors: Shoufan, A.; Huber, N.
Source: Self-asserted source
Abdulhadi Shoufan via Scopus - Elsevier

A Novel Cryptoprocessor Architecture for the McEliece Public-Key Cryptosystem

IEEE Transactions on Computers
2010 | Journal article
EID:

2-s2.0-85008529836

Contributors: Shoufan, A.; Wink, T.; Molter, H.G.; Huss, S.A.; Kohnert, E.
Source: Self-asserted source
Abdulhadi Shoufan via Scopus - Elsevier

A platform for visualizing digital circuit synthesis with VHDL

ITiCSE'10 - Proceedings of the 2010 ACM SIGCSE Annual Conference on Innovation and Technology in Computer Science Education
2010 | Conference paper
EID:

2-s2.0-77955157508

Contributors: Shoufan, A.; Lu, Z.; Rößling, G.
Source: Self-asserted source
Abdulhadi Shoufan via Scopus - Elsevier

A timing attack against Patterson algorithm in the McEliece PKC

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2010 | Book
EID:

2-s2.0-77954596095

Contributors: Shoufan, A.; Strenzke, F.; Molter, H.G.; Stöttinger, M.
Source: Self-asserted source
Abdulhadi Shoufan via Scopus - Elsevier

An FPGA accelerator for hash tree generation in the Merkle Signature Scheme

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2010 | Book
EID:

2-s2.0-77951275502

Contributors: Shoufan, A.
Source: Self-asserted source
Abdulhadi Shoufan via Scopus - Elsevier

Enhancing security and privacy in C2X communication by radiation pattern control

IEEE Vehicular Technology Conference
2010 | Conference paper
EID:

2-s2.0-77954938158

Contributors: Stübing, H.; Shoufan, A.; Huss, S.A.
Source: Self-asserted source
Abdulhadi Shoufan via Scopus - Elsevier

Multicast rekeying: Performance evaluation

Lecture Notes in Electrical Engineering
2010 | Book
EID:

2-s2.0-79955121383

Contributors: Shoufan, A.; Arul, T.
Source: Self-asserted source
Abdulhadi Shoufan via Scopus - Elsevier

Reconfigurable computing education in computer science

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2010 | Book
EID:

2-s2.0-77951264496

Contributors: Shoufan, A.; Huss, S.A.
Source: Self-asserted source
Abdulhadi Shoufan via Scopus - Elsevier

A compact error model for reliable system design

Proceedings of the 2009 International Conference on High Performance Computing and Simulation, HPCS 2009
2009 | Conference paper
EID:

2-s2.0-70449485549

Contributors: Israr, A.; Shoufan, A.; Huss, S.A.
Source: Self-asserted source
Abdulhadi Shoufan via Scopus - Elsevier

A novel processor architecture for McEliece cryptosystem and FPGA platforms

Proceedings of the International Conference on Application-Specific Systems, Architectures and Processors
2009 | Conference paper
EID:

2-s2.0-71049123271

Contributors: Shoufan, A.; Winky, T.; Molterz, G.; Hussz, S.; Strentzkex, F.
Source: Self-asserted source
Abdulhadi Shoufan via Scopus - Elsevier

An efficient reliability evalu ation approach for system-level design of embedded systems

Proceedings of the 10th International Symposium on Quality Electronic Design, ISQED 2009
2009 | Conference paper
EID:

2-s2.0-67649644200

Contributors: Israr, A.; Shoufan, A.; Huss, S.A.
Source: Self-asserted source
Abdulhadi Shoufan via Scopus - Elsevier

High-performance rekeying processor architecture for group key management

IEEE Transactions on Computers
2009 | Journal article
EID:

2-s2.0-70349464346

Contributors: Shoufan, A.; Huss, S.A.
Source: Self-asserted source
Abdulhadi Shoufan via Scopus - Elsevier

Understanding physical models in VHDL-AMS

2009 Forum on Specification and Design Languages, FDL 2009
2009 | Conference paper
EID:

2-s2.0-77951524626

Contributors: Shoufan, A.; Huss, S.
Source: Self-asserted source
Abdulhadi Shoufan via Scopus - Elsevier

A novel rekeying message authentication procedure based on Winternitz OTS and reconfigurable hardware architectures

Proceedings - 2008 International Conference on Reconfigurable Computing and FPGAs, ReConFig 2008
2008 | Conference paper
EID:

2-s2.0-62349136105

Contributors: Shoufan, A.; Huss, S.A.; Kelm, O.; Schipp, S.
Source: Self-asserted source
Abdulhadi Shoufan via Scopus - Elsevier

Side channels in the McEliece PKC

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2008 | Book
EID:

2-s2.0-56749169082

Contributors: Strenzke, F.; Tews, E.; Molter, H.G.; Overbeck, R.; Shoufan, A.
Source: Self-asserted source
Abdulhadi Shoufan via Scopus - Elsevier

Compact AES-based architecture for symmetric encryption, hash function, and random number generation

Proceedings - 2007 International Conference on Field Programmable Logic and Applications, FPL
2007 | Conference paper
EID:

2-s2.0-48149092090

Contributors: Laue, R.; Kelm, O.; Schipp, S.; Shoufan, A.; Huss, S.A.
Source: Self-asserted source
Abdulhadi Shoufan via Scopus - Elsevier

High-flexibility rekeying processor for key management in secure multicast

Proceedings - 21st International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINAW'07
2007 | Conference paper
EID:

2-s2.0-35248853500

Contributors: Shoufan, A.; Laue, R.; Huss, S.A.
Source: Self-asserted source
Abdulhadi Shoufan via Scopus - Elsevier

Reliable performance evaluation of rekeying algorithms in secure multicast

2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WOWMOM
2007 | Conference paper
EID:

2-s2.0-47749086238

Contributors: Shoufan, A.; Laue, R.; Huss, S.A.
Source: Self-asserted source
Abdulhadi Shoufan via Scopus - Elsevier

A novel batch rekeying processor architecture for secure multicast key management

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2005 | Book
EID:

2-s2.0-33646832871

Contributors: Shoufan, A.; Huss, S.A.; Cutleriwala, M.
Source: Self-asserted source
Abdulhadi Shoufan via Scopus - Elsevier

Peer review (1 review for 1 publication/grant)

Review activity for Computers & security. (1)