Nadia El Mrabet

From MaRDI portal
Person:490337

Available identifiers

zbMath Open el-mrabet.nadiaMaRDI QIDQ490337

List of research outcomes





PublicationDate of PublicationType
Optimal ate pairing on elliptic curves with embedding degree 9, 15 and 272024-07-03Paper
Exploiting ROLLO's constant-time implementations with a single-trace analysis2024-04-03Paper
New versions of Miller-loop secured against side-channel attacks2023-08-10Paper
Hardware implementation of multiplication over quartic extension fields2022-10-07Paper
Faster beta Weil pairing on BLS pairing friendly curves with odd embedding degree2022-08-10Paper
Resistance of isogeny-based cryptographic implementations to a fault attack2022-06-17Paper
Optimized and secure implementation of ROLLO-I2021-01-26Paper
Optimal Ate Pairing on Elliptic Curves with Embedding Degree $9,15$ and $27$2020-02-27Paper
Beta Weil pairing revisited2019-07-19Paper
On the near prime-order MNT curves2019-05-16Paper
A scalable and systolic architectures of Montgomery modular multiplication for public key cryptosystems based on DSPS2018-10-26Paper
Choosing and generating parameters for pairing implementation on BN curves2018-04-18Paper
Spectral Approach for Correlation Power Analysis2017-06-01Paper
A survey of fault attacks in pairing based cryptography2015-11-18Paper
On Near Prime-Order Elliptic Curves with Small Embedding Degrees2015-09-22Paper
Failure of the Point Blinding Countermeasure Against Fault Attack in Pairing-Based Cryptography2015-09-21Paper
Efficient computation of pairings on Jacobi quartic elliptic curves2015-01-22Paper
Side Channel Attacks against Pairing over Theta Functions2013-09-20Paper
Fault Attacks on Pairing-Based Cryptography2013-07-09Paper
Pairings from a tensor product point of view2013-04-21Paper
Efficient Multiplication over Extension Fields2012-11-01Paper
Efficient Multiplication in Finite Field Extensions of Degree 52011-06-29Paper
A Variant of Miller’s Formula and Algorithm2010-11-26Paper
What about Vulnerability to a Fault Attack of the Miller’s Algorithm During an Identity Based Protocol?2009-06-25Paper
Finite Field Multiplication Combining AMNS and DFT Approach for Pairing Cryptography2009-06-25Paper

Research outcomes over time

This page was built for person: Nadia El Mrabet