| Physical Attacks N El Mrabet, L Goubin, S Guilley, J Fournier, D Jauvart, M Moreau, ... Guide to Pairing-Based Cryptography - ISBN 9781498729505, 2016 | 152* | 2016 |
| What about vulnerability to a fault attack of the Miller’s algorithm during an identity based protocol? N El Mrabet International Conference on Information Security and Assurance, 122-134, 2009 | 53 | 2009 |
| A scalable and systolic architectures of montgomery modular multiplication for public key cryptosystems based on dsps A Mrabet, N El-Mrabet, R Lashermes, JB Rigaud, B Bouallegue, ... Journal of Hardware and Systems Security 1 (3), 219-236, 2017 | 31 | 2017 |
| A practical differential power analysis attack against the miller algorithm N El Mrabet, G Di Natale, ML Flottes 2009 Ph. D. Research in Microelectronics and Electronics, 308-311, 2009 | 30 | 2009 |
| Choosing and generating parameters for pairing implementation on BN curves FR Sylvain Duquesne, Nadia El Mrabet, Safia Haloui Applicable Algebra in Engineering, Communication and Computing 29 (2), 113-147, 2018 | 29 | 2018 |
| Efficient multiplication in finite field extensions of degree 5 N El Mrabet, A Guillevic, S Ionica International Conference on Cryptology in Africa, 188-205, 2011 | 29 | 2011 |
| A taxonomy of pairings, their security, their complexity R Barbulescu, N El Mrabet, L Ghammam | 28 | 2020 |
| Pairing in cryptography: an arithmetic point of view JC Bajard, N El Mrabet Advanced Signal Processing Algorithms, Architectures, and Implementations …, 2007 | 28 | 2007 |
| A variant of miller’s formula and algorithm J Boxall, N El Mrabet, F Laguillaumie, DP Le International Conference on Pairing-Based Cryptography, 417-434, 2010 | 27 | 2010 |
| Resistance of isogeny-based cryptographic implementations to a fault attack É Tasso, L De Feo, N El Mrabet, S Pontié International Workshop on Constructive Side-Channel Analysis and Secure …, 2021 | 25 | 2021 |
| A survey of fault attacks in pairing based cryptography N El Mrabet, JJA Fournier, L Goubin, R Lashermes Cryptography and Communications 7 (1), 185-205, 2015 | 25 | 2015 |
| Post-quantum cryptography: Challenges and opportunities for robust and secure hw design D Bellizia, N El Mrabet, AP Fournaris, S Pontié, F Regazzoni, ... 2021 IEEE International Symposium on Defect and fault tolerance in VLSI and …, 2021 | 24 | 2021 |
| Optimal Ate Pairing on Elliptic Curves with Embedding Degree and E Fouotsa, N El Mrabet, A Pecha Journal of groups, complexity, cryptology 12, 2020 | 24 | 2020 |
| Modeling a node capture attack in a secured Wireless Sensor Network M Smache, N El Mrabet, A Tria, JJ GIL-QUIJANO, E Riou, G Chaput IEEE World Forum on Internet of Things, 2016 | 22 | 2016 |
| SIKE channels: Zero-value side-channel attacks on SIKE L De Feo, N El Mrabet, A Genêt, N Kaluđerović, NL de Guertechin, ... IACR Transactions on Cryptographic Hardware and Embedded Systems 2022 (3 …, 2022 | 21 | 2022 |
| A study of pairing computation for elliptic curves with embedding degree 15 N El Mrabet, N Guillermin, S Ionica Cryptology ePrint Archive, 2009 | 21 | 2009 |
| Video injection attacks on remote digital identity verification solution using face recognition K Carta, C Barral, N El Mrabet, S Mouille in 13th International Multi-Conference on Complexity, Informatics and …, 2022 | 18 | 2022 |
| Practical validation of several fault attacks against the miller algorithm R Lashermes, M Paindavoine, N El Mrabet, JJA Fournier, L Goubin 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, 115-122, 2014 | 18 | 2014 |
| Fault attacks on pairing-based cryptography N El Mrabet, D Page, F Vercauteren Fault analysis in cryptography, 221-236, 2012 | 17 | 2012 |
| Randomization of arithmetic over polynomial modular number system LS Didier, FY Dosso, N El Mrabet, J Marrez, P Véron 2019 IEEE 26th Symposium on Computer Arithmetic (ARITH), 199-206, 2019 | 15 | 2019 |