Nadia El Mrabet
Nadia El Mrabet
Adresse e-mail validée de - Page d'accueil
Citée par
Citée par
Physical Attacks
N El Mrabet, L Goubin, S Guilley, J Fournier, D Jauvart, M Moreau, ...
Guide to Pairing-Based Cryptography - ISBN 9781498729505, 2016
What about vulnerability to a fault attack of the Miller’s algorithm during an identity based protocol?
N El Mrabet
Advances in Information Security and Assurance: Third International …, 2009
A practical differential power analysis attack against the miller algorithm
N El Mrabet, G Di Natale, ML Flottes
2009 Ph. D. Research in Microelectronics and Electronics, 308-311, 2009
Pairing in cryptography: an arithmetic point of view
JC Bajard, N El Mrabet
Advanced Signal Processing Algorithms, Architectures, and Implementations …, 2007
Choosing and generating parameters for pairing implementation on BN curves
FR Sylvain Duquesne, Nadia El Mrabet, Safia Haloui
Applicable Algebra in Engineering, Communication and Computing 29 (2), 113-147, 2018
A variant of miller’s formula and algorithm
J Boxall, N El Mrabet, F Laguillaumie, DP Le
Pairing-Based Cryptography-Pairing 2010: 4th International Conference …, 2010
A scalable and systolic architectures of Montgomery modular multiplication for public key cryptosystems based on DSPs
A Mrabet, N El-Mrabet, R Lashermes, JB Rigaud, B Bouallegue, ...
Journal of Hardware and Systems Security 1, 219-236, 2017
A study of pairing computation for elliptic curves with embedding degree 15
N El Mrabet, N Guillermin, S Ionica
Cryptology ePrint Archive, 2009
A taxonomy of pairings, their security, their complexity
R Barbulescu, N El Mrabet, L Ghammam
A survey of fault attacks in pairing based cryptography
N El Mrabet, JJA Fournier, L Goubin, R Lashermes
Cryptography and Communications 7, 185-205, 2015
Efficient multiplication in finite field extensions of degree 5
N El Mrabet, A Guillevic, S Ionica
Progress in Cryptology–AFRICACRYPT 2011: 4th International Conference on …, 2011
Optimal Ate Pairing on Elliptic Curves with Embedding Degree and
E Fouotsa, N El Mrabet, A Pecha
Journal of groups, complexity, cryptology 12, 2020
Practical validation of several fault attacks against the miller algorithm
R Lashermes, M Paindavoine, N El Mrabet, JJA Fournier, L Goubin
2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, 115-122, 2014
Modeling a node capture attack in a secured Wireless Sensor Network
M Smache, N El Mrabet, A Tria, JJ GIL-QUIJANO, E Riou, G Chaput
IEEE World Forum on Internet of Things, 2016
Fault attacks on pairing-based cryptography
N El Mrabet, D Page, F Vercauteren
Fault analysis in cryptography, 221-236, 2012
Efficient multiplication over extension fields
N El Mrabet, N Gama
International Workshop on the Arithmetic of Finite Fields, 136-151, 2012
Resistance of isogeny-based cryptographic implementations to a fault attack
É Tasso, L De Feo, N El Mrabet, S Pontié
Constructive Side-Channel Analysis and Secure Design: 12th International …, 2021
High-performance elliptic curve cryptography by using the CIOS method for modular multiplication
A Mrabet, N El-Mrabet, R Lashermes, JB Rigaud, B Bouallegue, ...
Risks and Security of Internet and Systems: 11th International Conference …, 2017
Improving Side-Channel Attacks against Pairing-Based Cryptography
D Jauvart, J Fournier, N El Mrabet, L Goubin
CRISIS 2016 : The 11th International Conference on Risks and Security of …, 2016
Finite field multiplication combining AMNS and DFT approach for pairing cryptography
N El Mrabet, C Negre
Australasian Conference on Information Security and Privacy, 422-436, 2009
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20