Nadia El Mrabet
Orcid: 0000-0003-3840-584X
According to our database1,
Nadia El Mrabet
authored at least 58 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
ACM Trans. Reconfigurable Technol. Syst., March, 2024
Des. Codes Cryptogr., March, 2024
IACR Cryptol. ePrint Arch., 2024
Truncated multiplication and batch software SIMD AVX512 implementation for faster Montgomery multiplications and modular exponentiation.
IACR Commun. Cryptol., 2024
2023
IACR Cryptol. ePrint Arch., 2023
2022
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022
Math. Comput. Sci., 2022
Proceedings of the Arithmetic of Finite Fields - 9th International Workshop, 2022
Proceedings of the 29th IEEE Symposium on Computer Arithmetic, 2022
2021
Two hardware implementations for modular multiplication in the AMNS: Sequential and semi-parallel.
J. Inf. Secur. Appl., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the Seventh International Conference on Mathematics and Computing, 2021
Post-Quantum Cryptography: Challenges and Opportunities for Robust and Secure HW Design.
Proceedings of the 36th IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, 2021
Proceedings of the Smart Card Research and Advanced Applications, 2021
2020
J. Cryptogr. Eng., 2020
J. Cryptogr. Eng., 2020
Multiplication over Extension Fields for Pairing-based Cryptography: an Hardware Point of View.
IACR Cryptol. ePrint Arch., 2020
Proceedings of the Code-Based Cryptography - 8th International Workshop, 2020
2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the 2019 International Conference on Cyberworlds, 2019
Proceedings of the Risks and Security of Internet and Systems, 2019
Hardware Optimization on FPGA for the Modular Multiplication in the AMNS Representation.
Proceedings of the Risks and Security of Internet and Systems, 2019
Proceedings of the 26th IEEE Symposium on Computer Arithmetic, 2019
2018
Appl. Algebra Eng. Commun. Comput., 2018
2017
A Scalable and Systolic Architectures of Montgomery Modular Multiplication for Public Key Cryptosystems Based on DSPs.
J. Hardw. Syst. Secur., 2017
Resistance of the Point Randomisation Countermeasure for Pairings Against Side-Channel Attack.
Proceedings of the E-Business and Telecommunications - 14th International Joint Conference, 2017
Proceedings of the Codes, Cryptology and Information Security, 2017
2016
A Systolic Hardware Architectures of Montgomery Modular Multiplication for Public Key Cryptosystems.
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the 3rd IEEE World Forum on Internet of Things, 2016
High-Performance Elliptic Curve Cryptography by Using the CIOS Method for Modular Multiplication.
Proceedings of the Risks and Security of Internet and Systems, 2016
2015
IACR Cryptol. ePrint Arch., 2015
Choosing and generating parameters for low level pairing implementation on BN curves.
IACR Cryptol. ePrint Arch., 2015
Failure of the Point Blinding Countermeasure Against Fault Attack in Pairing-Based Cryptography.
Proceedings of the Codes, Cryptology, and Information Security, 2015
2014
J. Math. Cryptol., 2014
Proceedings of the Global Summit on Computer & Information Technology, 2014
Proceedings of the 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2014
2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
2012
Proceedings of the Fault Analysis in Cryptography, 2012
Proceedings of the Arithmetic of Finite Fields - 4th International Workshop, 2012
2011
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011
Proceedings of the Progress in Cryptology - AFRICACRYPT 2011, 2011
2010
Proceedings of the Information Security and Assurance - 4th International Conference, 2010
Proceedings of the Pairing-Based Cryptography - Pairing 2010, 2010
2009
Arithmétique des couplages, performance et résistance aux attaques par canaux cachés. (Arithmetic of Pairings, Efficiency and Weakness of Pairing Based Cryptography with respect to Side Channel Attacks).
PhD thesis, 2009
IACR Cryptol. ePrint Arch., 2009
What about Vulnerability to a Fault Attack of the Miller's Algorithm During an Identity Based Protocol?.
Proceedings of the Advances in Information Security and Assurance, 2009
Finite Field Multiplication Combining AMNS and DFT Approach for Pairing Cryptography.
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009