Zobrazeno 1 - 10
of 66
pro vyhledávání: '"Nadia El Mrabet"'
Autor:
Luca De Feo, Nadia El Mrabet, Aymeric Genêt, Novak Kaluđerovi´c, Natacha Linard de Guertechin, Simon Pontié, Élise Tasso
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2022, Iss 3 (2022)
We present new side-channel attacks on SIKE, the isogeny-based candidate in the NIST PQC competition. Previous works had shown that SIKE is vulnerable to differential power analysis, and pointed to coordinate randomization as an effective countermeas
Externí odkaz:
https://doaj.org/article/57869587d1704b04abc014e7e75027f7
Publikováno v:
Groups, Complexity, Cryptology, Vol Volume 12, Issue 1 (2020)
Much attention has been given to the efficient computation of pairings on elliptic curves with even embedding degree since the advent of pairing-based cryptography. The few existing works in the case of odd embedding degrees require some improvements
Externí odkaz:
https://doaj.org/article/efbf83dfa2eb43c4a25722236872fa2c
Autor:
Nadia El Mrabet, Marc Joye
This book is devoted to efficient pairing computations and implementations, useful tools for cryptographers working on topics like identity-based cryptography and the simplification of existing protocols like signature schemes.As well as exploring th
Autor:
Kévin Carta, André Huynh, Stéfane Mouille, Nadia El Mrabet, Claude Barral, Sébastien Brangoulo
Publikováno v:
Proceedings of the 14th International Multi-Conference on Complexity, Informatics and Cybernetics: IMCIC 2023.
Publikováno v:
Arithmetic of Finite Fields ISBN: 9783031229435
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::dba9ac35fc8a2abd8101f4df79c0bda5
https://doi.org/10.1007/978-3-031-22944-2_17
https://doi.org/10.1007/978-3-031-22944-2_17
Publikováno v:
2022 IEEE 29th Symposium on Computer Arithmetic (ARITH).
Publikováno v:
Cryptography and Communications. 13:475-477
Publikováno v:
Journal of Cryptographic Engineering
Journal of Cryptographic Engineering, Springer, 2020, 10 (4), pp.337-354. ⟨10.1007/s13389-020-00239-2⟩
Journal of Cryptographic Engineering, 2020, 10 (4), pp.337-354. ⟨10.1007/s13389-020-00239-2⟩
Journal of Cryptographic Engineering, Springer, 2020, 10 (4), pp.337-354. ⟨10.1007/s13389-020-00239-2⟩
Journal of Cryptographic Engineering, 2020, 10 (4), pp.337-354. ⟨10.1007/s13389-020-00239-2⟩
International audience; When implemented in software (or hardware), a cryptographic protocol can leak sensitive information during its execution. Side-channel attacks can use those leakages in order to reveal some information about the secret used by
Publikováno v:
Proceedings of the 13th International Multi-Conference on Complexity, Informatics and Cybernetics: IMCIC 2022.
Publikováno v:
Proceedings of the Seventh International Conference on Mathematics and Computing ISBN: 9789811668890
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::93fbead2969adfeed76adf319537cacb
https://doi.org/10.1007/978-981-16-6890-6_43
https://doi.org/10.1007/978-981-16-6890-6_43