Physical Attacks N El Mrabet, L Goubin, S Guilley, J Fournier, D Jauvart, M Moreau, ...
Guide to Pairing-Based Cryptography - ISBN 9781498729505, 2016
137 * 2016 What about vulnerability to a fault attack of the Miller’s algorithm during an identity based protocol? N El Mrabet
Advances in Information Security and Assurance: Third International …, 2009
51 2009 A practical differential power analysis attack against the miller algorithm N El Mrabet, G Di Natale, ML Flottes
2009 Ph. D. Research in Microelectronics and Electronics, 308-311, 2009
31 2009 Pairing in cryptography: an arithmetic point of view JC Bajard, N El Mrabet
Advanced Signal Processing Algorithms, Architectures, and Implementations …, 2007
29 2007 A scalable and systolic architectures of montgomery modular multiplication for public key cryptosystems based on dsps A Mrabet, N El-Mrabet, R Lashermes, JB Rigaud, B Bouallegue, ...
Journal of Hardware and Systems Security 1, 219-236, 2017
27 2017 Choosing and generating parameters for pairing implementation on BN curves FR Sylvain Duquesne, Nadia El Mrabet, Safia Haloui
Applicable Algebra in Engineering, Communication and Computing 29 (2), 113-147, 2018
26 2018 A variant of miller’s formula and algorithm J Boxall, N El Mrabet, F Laguillaumie, DP Le
Pairing-Based Cryptography-Pairing 2010: 4th International Conference …, 2010
26 2010 A survey of fault attacks in pairing based cryptography N El Mrabet, JJA Fournier, L Goubin, R Lashermes
Cryptography and Communications 7, 185-205, 2015
25 2015 A taxonomy of pairings, their security, their complexity R Barbulescu, N El Mrabet, L Ghammam
23 2020 Efficient multiplication in finite field extensions of degree 5 N El Mrabet, A Guillevic, S Ionica
Progress in Cryptology–AFRICACRYPT 2011: 4th International Conference on …, 2011
23 2011 A study of pairing computation for elliptic curves with embedding degree 15 N El Mrabet, N Guillermin, S Ionica
Cryptology ePrint Archive, 2009
23 2009 Resistance of isogeny-based cryptographic implementations to a fault attack É Tasso, L De Feo, N El Mrabet, S Pontié
Constructive Side-Channel Analysis and Secure Design: 12th International …, 2021
21 2021 Optimal Ate Pairing on Elliptic Curves with Embedding Degree and E Fouotsa, N El Mrabet, A Pecha
Journal of groups, complexity, cryptology 12, 2020
19 * 2020 Modeling a node capture attack in a secured Wireless Sensor Network M Smache, N El Mrabet, A Tria, JJ GIL-QUIJANO, E Riou, G Chaput
IEEE World Forum on Internet of Things, 2016
18 2016 Practical validation of several fault attacks against the miller algorithm R Lashermes, M Paindavoine, N El Mrabet, JJA Fournier, L Goubin
2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, 115-122, 2014
18 2014 Fault attacks on pairing-based cryptography N El Mrabet, D Page, F Vercauteren
Fault analysis in cryptography, 221-236, 2012
16 2012 Post-quantum cryptography: Challenges and opportunities for robust and secure HW design D Bellizia, N El Mrabet, AP Fournaris, S Pontié, F Regazzoni, ...
2021 IEEE International Symposium on Defect and fault tolerance in VLSI and …, 2021
14 2021 High-performance elliptic curve cryptography by using the CIOS method for modular multiplication A Mrabet, N El-Mrabet, R Lashermes, JB Rigaud, B Bouallegue, ...
Risks and Security of Internet and Systems: 11th International Conference …, 2017
14 2017 Efficient multiplication over extension fields N El Mrabet, N Gama
International Workshop on the Arithmetic of Finite Fields, 136-151, 2012
14 2012 SIKE channels: Zero-value side-channel attacks on SIKE L De Feo, N El Mrabet, A Genêt, N Kaluđerović, NL de Guertechin, ...
IACR Transactions on Cryptographic Hardware and Embedded Systems 2022, 264–289, 2022
13 2022