Suivre
Nadia El Mrabet
Nadia El Mrabet
Adresse e-mail validée de emse.fr - Page d'accueil
Titre
Citée par
Citée par
Année
Physical Attacks
N El Mrabet, L Goubin, S Guilley, J Fournier, D Jauvart, M Moreau, ...
Guide to Pairing-Based Cryptography - ISBN 9781498729505, 2016
137*2016
What about vulnerability to a fault attack of the Miller’s algorithm during an identity based protocol?
N El Mrabet
Advances in Information Security and Assurance: Third International …, 2009
512009
A practical differential power analysis attack against the miller algorithm
N El Mrabet, G Di Natale, ML Flottes
2009 Ph. D. Research in Microelectronics and Electronics, 308-311, 2009
312009
Pairing in cryptography: an arithmetic point of view
JC Bajard, N El Mrabet
Advanced Signal Processing Algorithms, Architectures, and Implementations …, 2007
292007
A scalable and systolic architectures of montgomery modular multiplication for public key cryptosystems based on dsps
A Mrabet, N El-Mrabet, R Lashermes, JB Rigaud, B Bouallegue, ...
Journal of Hardware and Systems Security 1, 219-236, 2017
272017
Choosing and generating parameters for pairing implementation on BN curves
FR Sylvain Duquesne, Nadia El Mrabet, Safia Haloui
Applicable Algebra in Engineering, Communication and Computing 29 (2), 113-147, 2018
262018
A variant of miller’s formula and algorithm
J Boxall, N El Mrabet, F Laguillaumie, DP Le
Pairing-Based Cryptography-Pairing 2010: 4th International Conference …, 2010
262010
A survey of fault attacks in pairing based cryptography
N El Mrabet, JJA Fournier, L Goubin, R Lashermes
Cryptography and Communications 7, 185-205, 2015
252015
A taxonomy of pairings, their security, their complexity
R Barbulescu, N El Mrabet, L Ghammam
232020
Efficient multiplication in finite field extensions of degree 5
N El Mrabet, A Guillevic, S Ionica
Progress in Cryptology–AFRICACRYPT 2011: 4th International Conference on …, 2011
232011
A study of pairing computation for elliptic curves with embedding degree 15
N El Mrabet, N Guillermin, S Ionica
Cryptology ePrint Archive, 2009
232009
Resistance of isogeny-based cryptographic implementations to a fault attack
É Tasso, L De Feo, N El Mrabet, S Pontié
Constructive Side-Channel Analysis and Secure Design: 12th International …, 2021
212021
Optimal Ate Pairing on Elliptic Curves with Embedding Degree and
E Fouotsa, N El Mrabet, A Pecha
Journal of groups, complexity, cryptology 12, 2020
19*2020
Modeling a node capture attack in a secured Wireless Sensor Network
M Smache, N El Mrabet, A Tria, JJ GIL-QUIJANO, E Riou, G Chaput
IEEE World Forum on Internet of Things, 2016
182016
Practical validation of several fault attacks against the miller algorithm
R Lashermes, M Paindavoine, N El Mrabet, JJA Fournier, L Goubin
2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, 115-122, 2014
182014
Fault attacks on pairing-based cryptography
N El Mrabet, D Page, F Vercauteren
Fault analysis in cryptography, 221-236, 2012
162012
Post-quantum cryptography: Challenges and opportunities for robust and secure HW design
D Bellizia, N El Mrabet, AP Fournaris, S Pontié, F Regazzoni, ...
2021 IEEE International Symposium on Defect and fault tolerance in VLSI and …, 2021
142021
High-performance elliptic curve cryptography by using the CIOS method for modular multiplication
A Mrabet, N El-Mrabet, R Lashermes, JB Rigaud, B Bouallegue, ...
Risks and Security of Internet and Systems: 11th International Conference …, 2017
142017
Efficient multiplication over extension fields
N El Mrabet, N Gama
International Workshop on the Arithmetic of Finite Fields, 136-151, 2012
142012
SIKE channels: Zero-value side-channel attacks on SIKE
L De Feo, N El Mrabet, A Genêt, N Kaluđerović, NL de Guertechin, ...
IACR Transactions on Cryptographic Hardware and Embedded Systems 2022, 264–289, 2022
132022
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20