Koala
EL MRABET Nadia


My publications
  • Keywords :
  • Cryptology, cryptanalyse, cryptography
  • Elliptic curves, pairing
  • Finite Fields
  • Arithmetic
  • Security
  • Side Channels Attacks



Book and chapters

    • N. El Mrabet, Dan Page and Frederick Vercauteren Fault Attacks on Pairing Based Cryptography: A State of the Art, in Fault Analysis in Cryptography, Eds M. Joye and M. Tunstall, Springer 2012.

    • N. El Mrabet and M. Joye Editors Guide to Pairing-Based Cryptography, 2016 CRC Press, Taylor & Francis Group.

    • J-L. Beuchat, L. J. Dominguez Perez, S. Duquesne, N. El Mrabet, L. Fuentes- Castaneda, and F. Rodriguez-Henriquez Arithmetic of Finite Fields Chap. in Guide to Pairing-Based Cryptography, 2016, Eds N. El Mrabet and M. Joye, CRC Press 2016.

    • J-L. Beuchat, N. El Mrabet, L. Fuentes-Castaneda, and F. Rodriguez-Henriquez Mathematical Background Chap. in Guide to Pairing-Based Cryptography, 2016, Eds N. El Mrabet and M. Joye, CRC Press 2016.

    • S. Duquesne, N. El Mrabet, S. Haloui, D. Robert and F. Rondepierre Choosing parameters, Chap. in Guide to Pairing-Based Cryptography, 2016, Eds N. El Mrabet and M. Joye, CRC Press 2016.

    • Nadia El Mrabet, Louis Goubin, Sylvain Guilley, Jacques Fournier, Damien Jauvart, Martin Moreau, Pablo Rauzy, and Franck Rondepierre Physical Attacks Chap. in Guide to Pairing-Based Cryptography, 2016, Eds N. El Mrabet and M. Joye, CRC Press 2016.

    • Yves Aubry, Pierre Barthélémy, Nadia El Mrabet: Special issue from mathematics to embedded devices. Cryptogr. Commun. 13(4): 475-477 (2021)


Revue-Journal

    • K. Carta, C. Barral, N. El Mrabet and S. Mouille, On the Pitfalls of Videoconferences for Challenge-Based Face Liveness Detection, to appear in JSCI 2022.


    • A. Chaouch, L-S. Didier, F. Y. Dosso, N. El Mrabet, B. Bouallegue, B. Ouni, Two hardware implementations for modular multiplication in the AMNS: Sequential and semi-parallel, Journal of Information Security and Applications, Volume 58, May 2021, 102770, https://doi.org/10.1016/j.jisa.2021.102770

    • E. Fouotsa, N. El Mrabet, and A. Pecha. Optimal ate pairing on elliptic curves with embedding degree 9, 15 and 27. journal of Groups, Complexity, Cryptology, Volume 12(issue 1), Apr 2020.

    • Maamar Ouladj, N. EL MRABET, Sylvain Guilley, Philippe Guillot and Gilles Millérioux, On the power of template attacks in highly multivariate context, JCEN (2020), doi = 10.1007/s13389-020-00239-2. PDF available here: https://rdcu.be/b6yT7

    • Damien Jauvart, N. El Mrabet, Jacques Fournier, Louis Goubin, Improving Side Channel attacks in Pairing Based cryptography, JCEN (2019). doi = 10.1007/s13389-018-00201-3

    • Emmanuel Fouotsa, Aminatou Pecha, N. El Mrabet, Beta Weil pairing revisited, Afrika Mathematica (2019). doi = https://doi.org/10.1007/s13370-019-00653-8

    • Phong Le Duc, Nadia El Mrabet, Safia Haloui, Tan Chik How, On the near prime-order MNT curves Applicable Algebra in Engineering, Communication and Computing, 2019, https://link.springer.com/epdf/10.1007/s00200-018-0363-1?author_access_token=bHzi8DBAfM1OZcKkFQYGYve4RwlQNchNByi7wbcMAY6qwyIH-WtGoSo4AjyigFruZb6EjBUw2rC9MAmaKbWWjEeLqx_kkc9TRTMFk8rTeY6QnmwEBNVMxeqATb8NYC83GDkiJRt4CJfK7884EI8ceA%3D%3D

    • S. Duquesne, N. El Mrabet, S. Haloui and F. Rondepierre Choosing and generating parameters for pairing implementation on BN curves, Applicable Algebra in Engineering, Communication and Computing, pp. 1-35, doi = 10.1007/s00200-017-0334-y, AAECC2017.

    • A. Mrabet, N. El Mrabet, R. Lashermes, J-B. Rigaud, B. Bouallegue, S. Mesnager and M. Machhout. A scalable and systolic architectures of montgomery modular multiplication for public key cryptosystems based on dsps., extended version to appear in Journal of Hardware and Systems Security (accepted in August 2017).

    • N. El Mrabet, Jacques Fournier, Louis Goubin and Ronan Lasherme A survey of Fault attacks in Pairing Based Cryptography , in Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences, Springer 2015, PDF.

    • Sylvain Duquesne, N. El Mrabet and Emmanuel Fouotsa Efficient Pairings Computation on Jacobi Quartic Elliptic Curves , in Journal of Mathematical Cryptology, de Gruyter 2014, PDF.

    • N. El Mrabet and L. Poinsot Harmonic Analysis and a Bentness-Like Notion in Certain Finite Abelian Groups Over Some Finite Fields in Malaysian Journal of Mathematical Sciences, Special Issue : The 4th International Cryptology and Information Security Conference 2014, vol. 9, pp. 1-20 Juin 2015 (ISSN 1823-8343).


Articles

    • K. Carta, C. Barral, N. El Mrabet and S. Mouille, Video injection attacks on remote digital identity verification solution using face recognition, accepted in the 13th International Multi-Conference on Complexity, Informatics and Cybernetics (IMCIC 2022), to be held in Orlando, USA, on March 8-11, 2022.


    • Arthur Lavice, Nadia El Mrabet, Alexandre Berzati, Jean-Baptiste Rigaud and Julien Proy, Hardware Implementations of Pairings at Updated Security Levels in LNCS post-proceddings of CARDIS 2021.


    • Élise Tasso, Luca De Feo, Nadia El Mrabet, Simon Pontié: Resistance of Isogeny-Based Cryptographic Implementations to a Fault Attack. COSADE 2021: 255-276


    • Davide Bellizia, Nadia El Mrabet, Apostolos P. Fournaris, Simon Pontié, Francesco Regazzoni, François-Xavier Standaert, Élise Tasso, Emanuele Valea: Post-Quantum Cryptography: Challenges and Opportunities for Robust and Secure HW Design. DFT 2021: 1-6


    • K. Carta, C. Barral, N. El Mrabet and S. Mouille, On the Pitfalls of Videoconferences for Challenge-Based Face Liveness Detection, In N. Callaos, N. Lace, B. Sánchez, M. Savoie (Eds.), Proceedings of the 25th World Multi-Conference on Systemics, Cybernetics and Informatics: WMSCI 2021, Vol. I, pp. 1-6. International Institute of Informatics and Cybernetics, July 2021.


    • Arthur Lavice, Nadia El Mrabet, Alexandre Berzati and Jean-Baptiste Rigaud,Hardware Implementation of Multiplication over Quartic Extension Fields in 7th International Conference on Mathematics and Computing (ICMC 2021).


    • L. Mortajine, O. Benchaalal, P. Cayrel, N. E. Mrabet, and J. Lablanche. Optimized and secure imple- mentation of ROLLO-I. In M. Baldi, E. Persichetti, and P. Santini, editors, Code-Based Cryptography - 8th International Workshop, CBCrypto 2020, Zagreb, Croatia, May 9-10, 2020, Revised Selected Papers, volume 12087 of Lecture Notes in Computer Science, pages 117--137. Springer, 2020.

    • L. Didier, F. Dosso, N. El Mrabet, J. Marrez, and P. Véron. Randomization of arithmetic over polynomial modular number system. In ARITH, pages 199--206. IEEE, 2019.

    • A. Bel Korchi and N. El Mrabet. A practical use case of homomorphic encryption. In CiberWorld, pages 328--335. IEEE, 2019.

    • A. Bel Korchi and N. El Mrabet. Delegation of computation using fv cryptosystem. In Crisis 2019. LNCS, 2019.

    • A. Chaouch, Y. F. Dosso, L.-S. Didier, N. El Mrabet, B. Ouni, and B. Bouallegue. Hardware implementation of the modular multiplication in the amns representation. In Crisis 2019. LNCS, 2019.

    • Philippe Guillot, Gilles Millérioux, Brandon Dravie and Nadia El Mrabet : Spectral Approach for Correlation Power Analysis, proceedings LNCS de C2SI 2017 : pp. 238-253, LNCS 2017.

    • A. Mrabet, N. El Mrabet B. Bouallegue, S. Mesnager and M. Machhout. An efficient and scalable modular inversion and division for public key cryptosystems, proceedings IEEE of the International Conference on Engineering and Management Information Systems ICEMIS 2017.

    • Damien Jauvart and Jacques J. A. Fournier and Louis Goubin and Nadia {El Mrabet}. First Practical Side-channel Attack to Defeat Point Randomization in Secure Implementations of Pairing-based Cryptography, (ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017

    • M. Smache, N. El Mrabet, A. Tria, JJ. GIL-QUIJANO, E. Riou, G. Chaput Modeling a node capture attack in a secured Wireless Sensor Network, proceedings IEEE of the 3rd World Forum on Internet of Things, 2016.

    • A. Mrabet, N. El Mrabet, R. Lashermes, J-B. Rigaud, B. Bouallegue, S. Mesnager and M. Machhout : A scalable and systolic architectures of montgomery modular multiplication for public key cryptosystems based on dsps., proceedings LNCS de The Sixth International Conference on Security, Privacy and Applied Cryptographic Engineering (SPACE 2016), pp. 138-156, LNCS 2016.

    • A. Mrabet, N. El Mrabet, R. Lashermes, J-B. Rigaud, B. Bouallegue, S. Mesnager and M. Machhout : High-performance elliptic curve cryptography by using the cios method for modular multiplication, proceedings LNCS of CRISIS 2016 : 11th International Conference on Risks and Security of Internet and Systems, pp. 185-198, LNCS 2016.

    • D. Jauvart, J. J. A. Fournier, N. El Mrabet and L. Goubin : Improving Side Channel Attacks Against Pairing-Based Cryptography. proceedings LNCS of CRiSIS 2016 : pp. 199-213, LNCS 2016.

    • N. El Mrabet and E. Fouotsa Failure of the Point Blinding counter-measure Against Fault Attack in Pairing-Based Cryptography, proceedings LNCS of C2SI 2015, Codes, Cryptology, and Information Security 2015, LNCS vol. 9084, pp. 259-273, Springer 2015.

    • L. Duc-Phong, N. El Mrabet and T. Chik How On Near Prime-Order Elliptic Curves with Small Embedding Degrees, Conference on Algebraic Informatics CAI 2015, LNCS vol. 9270, pp. 140-151, Springer 2015.

    • R. Lashermes, M. Paindavoine, N. El Mrabet, J. Fournier and L. Goubin Practical Validation of Several Fault Attacks against the Miller Algorithm, FDTC 2014, Fault Diagnosis and Tolerance in Cryptography, proceedings IEEE computer Society, pp. 115-122, 2014.

    • N. El Mrabet and L. Poinsot Harmonic Analysis and a Bentness-like Notion in Certain Finite Abelian Groups Over Some Finite Fields, Cryptology2014, extended version published in the Malaysian Journal of Mathematical Sciences, Special Issue : The 4th International Cryptology and Information Security Conference 2014, vol. 9, pp. 1-20 Juin 2015 (ISSN 1823-8343).

    • A. Mrabet, B. Bouallegue, M. Mohsen, N. El Mrabet, S. Mesnager and R. Tourki Implementation of Faster Miller over BN curves in Jacobian Coordinates, IEEE proceddings of GSCIT 2014.

    • N. EL MRABET Side Channel Attacks against Pairing over Theta Functions , presented to CAI 2013, 5th International Conference on Algebraic Informatics.

    • N. EL MRABET and Nicolas Gama Efficient Multiplication over Extension Fields, accepted to WAIFI 2012, 4th International Workshop on Arithmetic of Finite Fields.

    • N. EL MRABET, Aurore Guillevic and Sorina Ionica Efficient Multiplication in Finite Field Extensions of Degree 5, AfricaCrypt 2011, The 4th International Conference on Cryptology.

    • D. J. Weng, Y. Dou, C. Ma and N. El Mrabet Fault Attacks against the Miller Algorithm in Hessian Coordinates. proceedings LNCS of Inscrypt 2011 LNCS vol. 7537, pp. 102--112, Springer 2011.

    • D. N. El Mrabet Fault attacks against the Miller algorithm in Edwards Coordinates?. proceedings LNCS of ISA 2010 Springer CCIS vol. 76, pp 72--85, Springer 2010.

    • John Boxall, N. EL MRABET, Fabien Laguillaumie and Phong Le Duc A Variant of Miller's Formula and Algorithm, accepted to Pairing 2010, The 4th International Conference on Pairing Based Cryptography.

    • N. EL MRABET and C. NEGRE Finite field multiplication combining AMNS and DFT approach for pairing cryptography,accepted and presented to ACISP 2009, The 14th Australian Conference on Information Security and Privacy, 1-3 July 2009, in Brisbane, Australia. PDF - Bibtex.

    • N. EL MRABET, M-L. FLOTTES and Giogio DI NATALE A practical Differential Power Analysis Attack against the Miller Algorithm, accepted and presented at Prime 2009, The 5th International Conference on Ph.D. Research in Microelectronics & Electronics. PDF - Bibtex.

    • N. EL MRABET What about vulnerability to a fault attack  of the Miller algorithm  during an Identity Based Protocol? , accepted and presented at ISA 2009, The 3rd International Conference on Information Security and Assurance, 25-27 June 2009, in Korea University, Seoul, South Korea. PDF - Bibtex.

    • J.-C. Bajard and N. EL MRABET, Pairing in Cryptography: an Arithmetic Point of View presented at the Advanced Signal Processing Algorithms, Architectures, and Implementations XVI, part of SPIE, August 2007, San Diego, CA, USA.


Miscalleneous

    • Scientific work for the general public:
      • I am an author in a scientifique journal for general public: Plume. I wrote some articles about Cryptography (in french) :
        • Cryptography from Nebuchadnezzar to today
        • Which protocols behind your blue card?
      • I authered one chapter of the book "Pourquoi les Mathématiques", Ellipse.
    • Lecture
      • During a winter, spring or summer school at ENSIAS, Leucherbard, European Patent Office
      • For "Le Pole SCS", GT-Arith, Gt C2,
      • Conferences and seminars to present my research

Last update: January 2022