Publications
Journal Papers
Bahache, Anwar Noureddine, Noureddine Chikouche, and Sedat Akleylek. "Securing cloud-based healthcare applications with a quantum-resistant authentication and key agreement framework." Internet of Things (IF= 5.9). 4/2024. 26; pp. 101200.
Boubakeur Moussaoui, Noureddine Chikouche, Hacene Fouchal, An Efficient Privacy Scheme for C-ITS Stations. Computers and Electrical Engineering (IF= 4.152). 4/2023. 107; pp. 108613. DOI: https://doi.org/10.1016/j.compeleceng.2023.108613
Sellami Benaissi, Noureddine Chikouche, Rafik Hamza, A novel image encryption algorithm based on hybrid chaotic maps using a key image. Optik (IF= 2.84). 2/2023; 272; pp. 170316. DOI: https://doi.org/10.1016/j.ijleo.2022.170316.
Anwar Noureddine Bahache, Noureddine Chikouche, Fares Mezrag, Authentication Schemes for Healthcare Applications Using Wireless Medical Sensor Networks: A Survey. SN Computer Science (Scopus). 9/2022; 3(5); pp. 1-25. DOI: https://doi.org/10.1007/s42979-022-01300-z
Noureddine Chikouche, Foudil Cherif: EAP-SRES: An Enhanced Authentication Protocol for Secure Remote Education Systems Using NFC Technology. International Journal of Computing and Digital Systems (Scopus). 5/2020; 9(3); pp. 447-456. DOI: 10.12785/ijcds/090309.
Noureddine Chikouche, Pierre-Louis Cayrel, El Hadji Modou Mboup, Brice Odilon Boidje: A privacy-preserving code-based authentication protocol for Internet of Things. The Journal of Supercomputing (IF=2.157). 12/2019; 75(12); pp 8231–8261. DOI:10.1007/s11227-019-03003-4 .
Noureddine Chikouche, Foudil Cherif, Pierre-Louis Cayrel, Mohamed Benmohammed: RFID Authentication Protocols Based on Error-Correcting Codes: A Survey. Wireless Personal Communications (IF=0.951). 9/2017; 96(1); pp. 509-527. DOI:10.1007/s11277-017-4181-8.
Noureddine Chikouche, Foudil Cherif, Pierre-Louis Cayrel, Mohamed Benmohammed: A Secure Code-Based Authentication Scheme for RFID Systems. 08/2015; 7(9). DOI:10.5815/ijcnis.2015.09.01.
Noureddine Chikouche, Foudil Cherif, Pierre-Louis Cayrel, Mohamed Benmohammed: Improved RFID Authentication Protocol Based on Randomized McEliece Cryptosystem. International Journal of Network Security (Scopus). 07/2015; 17(4).
Noureddine Chikouche, Foudil Cherif, Mohamed Benmohammed: An Authentication Protocol Based on Combined RFID-Biometric System. International Journal of Advanced Computer Science and Applications 03/2012; 3(4). DOI:10.14569/IJACSA.2012.030411.
International Conferences/Workshops
Abderrahmane Marrok, Safaa Boukhelef, Noureddine Chikouche, “PQH-WireGuard: Post-quantum hybrid cryptography based WireGuard VPN protocol.” 17th International Conference on Information Technology and Applications (ICITA 2023), Springer, Italy, 2023.
Anwar Noureddine Bahache, Noureddine Chikouche, "A comparative analysis of RFID authentication protocols for healthcare applications," International Conference on Artificial Intelligence for Cyber Security Systems and Privacy (AI-CSP 2021), IEEE, El Oued, 2021.
Bouchra Roukia Louassef, Noureddine Chikouche: Privacy preservation in healthcare systems. International Conference on Artificial Intelligence for Cyber Security Systems and Privacy (AI-CSP 2021). IEEE, El Oued, 2021.
Amar Abdelmalek Ghehioueche, Noureddine Chikouche, Fares Mezrag: Performance Evaluation and Analysis of Encryption Schemes for Wireless Sensor Networks. International Conference on Digitization (ICD-2019) Landscaping Artificial Intelligence , IEEE, Skyline University College, Shareja, UAE, 11/2019.
Noureddine Chikouche, Privacy Analysis of a New Authentication Protocol for Internet of Things, International Workshop on Cryptography and its Applications (2’IWCA’19). Oran, 18-19 june 2019.
Noureddine Chikouche, Simulation of Attacks on Authentication Protocols for Near Field Communications. 2nd International Workshop on Cryptography and its Applications (2’IWCA’19), Oran, Algeria, 6/2019.
Noureddine Chikouche, Abderahmen Ghadbane: Performance Evaluation of Post-Quantum Public-Key Cryptography in Smart Mobile Devices. Challenges and Opportunities in the Digital Era - I3E 2018, LNCS, Volume 11195, pp 67-80, 10/2018; Springer, ISBN: 978-3-030-02130-6.
Sofyane Ladgham-Chikouche, Noureddine Chikouche: An Improved Approach for LSB-Based Image Steganography using AES Algorithm. 5th International Conference on Electrical Engineering (ICEE-B), IEEE, University of Boumerdes, Algeria, 10/2017.
Noureddine Chikouche: Formal Analysis of a Novel RFID Authentication Protocol. 8th International Conference on Computing, Communication and Networking Technologies (8th ICCCNT 2017), IEEE, India; 7/2017.
Amar Abdelmalek Ghehioueche, Noureddine Chikouche, Fares Mezrag: Simulation of Encryption Schemes for Wireless Sensor Networks. International Conference on Embedded Systems in Telecommunications and Instrumentation (ICESTI’16), Annaba, Algeria; 10/2016.
Noureddine Chikouche, Foudil Cherif, Pierre-Louis Cayrel, Mohamed Benmohammed: Weaknesses in Two RFID Authentication Protocols. Codes, Cryptology, and Information Security, LNCS, Volume 9084, pp 162-172 , 05/2015; Springer, ISBN: 978-3-319-18680-1.
Noureddine Chikouche, Foudil Cherif, Pierre-Louis Cayrel, Benmohamed Mohamed: A Survey on RFID Authentication Protocols Based on Error-Correcting Codes. International Conference on Coding and Cryptography, ICCC 2015, USTHB, Algeria; 11/2015.
Walid Tayoub, Lakehali Somia, Noureddine Chikouche: Implementation Of Public-Key Cryptographic Systems On Embedded Devices (Case: Computation Speed). The First International Symposium on Informatics and its Applications (ISIA'2014), Univrsity of M'sila; 02/2014.
Noureddine Chikouche, Foudil Cherif, Mohamed Benmohammed: Algebraic Replay Attacks on Authentication in RFID Protocols. Advances in Security of Information and Communication Networks, CCIS, Volume 381, pp 153-163, 09/2013; Springer, ISBN: 978-3-642-40596-9, .
Noureddine Chikouche, Foudil Cherif, Mohamed Benmohammed: Vulnerabilities of two recently RFID authentication protocols. International Conference on Computer Science - ICCS 2012, Morocco, IEEE; 11/2012.
Noureddine Chikouche, Cherif Foudil, Mohamed Benmohammed: Conception et Vérification d'un Protocole d'Authentification de Système Combiné RFID-Biométrique. Third International Conference on Computer Science and its Applications (CIIA'11), Saida, Algeria; 12/2011.
National Conferences/Workshops
Anwar Noureddine Bahache, Noureddine Chikouche, Fares Mezrag: An analysis of user authentication schemes for WBAN in healthcare applications. 4th Conference on Informatics and Applied Mathematics (IAM’21), Guelma, 12/2021.
Anwar Noureddine Bahache, Noureddine Chikouche: A Survey of RFID authentication schemes for healthcare applications. Workshop on Internet of Things Security (IoTSec 2021), M'sila, 11/2021.
Noureddine Chikouche: Code-Based Cryptosystems: A Comparative Study. Workshops on Pure and Applied Mathematics (WPAM'2018), University of M'sila, 12/2018.
Sofyane Ladgham-Chikouche, Noureddine Chikouche: Implementation of Steganography Algorithms Based on Least Significant Bit Technique. 2éme édition du Workshop sur les mathématiques et leurs applications en traitement d’images et vision artificielle (MI' 2017), University of M'sila, 4/2017.
Noureddine Chikouche, Foudil Cherif, Mohamed Benmohammed: Détection des attaques de type homme du milieu passif et l’attaque par rejeu algébrique. JNIAK’2012, Journées Nationales sur l’Informatique et ses Applications, 04/2012.
Noureddine Chikouche, Mohamed Benmohammed: Vérification de la sécurité des protocoles d’authentification RFID exigeant l’opérateur XOR. Journées d’Etudes Doctorales (JED 2010), University of Annaba, 6/2010.
Noureddine Chikouche, Mohamed Benmohammed: Vérification automatique des protocoles d'authentification des systèmes RFID. Doctoriales STIC'09 , M'sila, Algeria; 12/2009.