עקוב אחר
Silvia Mella
Silvia Mella
כתובת אימייל מאומתת בדומיין ru.nl
כותרת
צוטט על ידי
צוטט על ידי
שנה
New techniques for trail bounds and application to differential trails in Keccak
S Mella, JJC Daemen, GV Assche
392017
On the homomorphic computation of symmetric cryptographic primitives
S Mella, R Susella
Cryptography and Coding: 14th IMA International Conference, IMACC 2013 …, 2013
222013
Method for performing an encryption of an AES type, and corresponding system and computer program product
R Susella, S Mella
US Patent 9,425,961, 2016
132016
Improved differential and linear trail bounds for ASCON
S El Hirch, S Mella, A Mehrdad, J Daemen
IACR Transactions on Symmetric Cryptology, 145-178, 2022
102022
The role of the fault model in DFA against AES
C Ferretti, S Mella, F Melzani
Proceedings of the Third Workshop on Hardware and Architectural Support for …, 2014
82014
Tighter trail bounds for xoodoo
J Daemen, S Mella, G Van Assche
Cryptology ePrint Archive, 2022
72022
Computing the Distribution of Differentials over the Non-linear Mapping
J Daemen, A Mehrdad, S Mella
International Conference on Security, Privacy, and Applied Cryptography …, 2021
62021
Differential trail search in cryptographic primitives with big-circle chi: Application to subterranean
A Mehrdad, S Mella, L Grassi, J Daemen
42022
Strengthening sequential side-channel attacks through change detection
L Frittoli, M Bocchi, S Mella, D Carrera, B Rossi, P Fragneto, R Susella, ...
IACR Transactions on Cryptographic Hardware and Embedded Systems 2020 (3), 1-21, 2020
42020
Committing authenticated encryption based on SHAKE
J Daemen, S Mella, G Van Assche
Cryptology ePrint Archive, 2023
32023
Profiled side channel attacks against the RSA cryptosystem using neural networks
A Barenghi, D Carrera, S Mella, A Pace, G Pelosi, R Susella
Journal of Information Security and Applications 66, 103122, 2022
22022
New Results for Partial Key Exposure on RSA with Exponent Blinding
S Cimato, S Mella, R Susella
12th International Conference on Security and Cryptography, 136-147, 2015
22015
Xoodyak, an update
J Daemen, S Hoffert, S Mella, M Peeters, G Van Assche, R Van Keer
Publication to NIST Lightweight Cryptography Standardization Process (round …, 2020
12020
Partial key exposure attacks on RSA with exponent blinding
S Cimato, S Mella, R Susella
E-Business and Telecommunications: 12th International Joint Conference …, 2016
12016
J-DFA: a Novel Approach for Robust Differential Fault Analysis
L Magri, S Mella, P Fragneto, F Melzani, B Rossi
12015
Propagation properties of a non-linear mapping based on squaring in odd characteristic
J Daemen, D Kuijsters, S Mella, D Verbakel
Cryptography and Communications, 1-15, 2024
2024
Xoodyak Under SCA Siege
PA Eliasi, S Mella, L Weissbart, L Batina, S Picek
2024 27th International Symposium on Design & Diagnostics of Electronic …, 2024
2024
PROACT-Physical Attack Resistance of Cryptographic Algorithms and Circuits with Reduced Time to Market
A Adhikary, A Basurto, L Batina, I Buhan, J Daemen, S Mella, N Mentens, ...
International Symposium on Applied Reconfigurable Computing, 255-266, 2024
2024
Tighter Trail Bounds for Xoodoo
S Mella, J Daemen, G Van Assche
IACR Transactions on Symmetric Cryptology 2023 (4), 187-214, 2023
2023
Differential and Linear properties of vectorial boolean functions based on chi
S Mella, A Mehrdad, J Daemen
Cryptography and Communications 15 (6), 1087-1116, 2023
2023
המערכת אינה יכולה לבצע את הפעולה כעת. נסה שוב מאוחר יותר.
מאמרים 1–20