Подписаться
Silvia Mella
Silvia Mella
Подтвержден адрес электронной почты в домене ru.nl
Название
Процитировано
Процитировано
Год
New techniques for trail bounds and application to differential trails in Keccak
S Mella, JJC Daemen, GV Assche
442017
On the homomorphic computation of symmetric cryptographic primitives
S Mella, R Susella
Cryptography and Coding: 14th IMA International Conference, IMACC 2013 …, 2013
232013
Method for performing an encryption of an AES type, and corresponding system and computer program product
R Susella, S Mella
US Patent 9,425,961, 2016
152016
Improved differential and linear trail bounds for ASCON
S El Hirch, S Mella, A Mehrdad, JJC Daemen
132022
Tighter trail bounds for Xoodoo
S Mella, J Daemen, G Van Assche
IACR Transactions on Symmetric Cryptology 2023 (4), 187-214, 2023
9*2023
Differential Trail Search in Cryptographic Primitives with Big-Circle Chi
A Mehrdad, S Mella, L Grassi, J Daemen
82023
The role of the fault model in DFA against AES
C Ferretti, S Mella, F Melzani
Proceedings of the Third Workshop on Hardware and Architectural Support for …, 2014
82014
Committing authenticated encryption based on SHAKE
J Daemen, S Mella, G Van Assche
Cryptology ePrint Archive, 2023
72023
Computing the Distribution of Differentials over the Non-linear Mapping
J Daemen, A Mehrdad, S Mella
International Conference on Security, Privacy, and Applied Cryptography …, 2021
72021
Profiled side channel attacks against the RSA cryptosystem using neural networks
A Barenghi, D Carrera, S Mella, A Pace, G Pelosi, R Susella
Journal of Information Security and Applications 66, 103122, 2022
42022
Strengthening sequential side-channel attacks through change detection
L Frittoli, M Bocchi, S Mella, D Carrera, B Rossi, P Fragneto, R Susella, ...
IACR Transactions on Cryptographic Hardware and Embedded Systems, 1-21, 2020
42020
New Results for Partial Key Exposure on RSA with Exponent Blinding
S Cimato, S Mella, R Susella
12th International Conference on Security and Cryptography, 136-147, 2015
42015
Partial key exposure attacks on RSA with exponent blinding
S Cimato, S Mella, R Susella
International Conference on E-Business and Telecommunications, 364-385, 2015
32015
Propagation properties of a non-linear mapping based on squaring in odd characteristic
J Daemen, D Kuijsters, S Mella, D Verbakel
Cryptography and Communications 16 (5), 997-1011, 2024
22024
Xoodyak Under SCA Siege
PA Eliasi, S Mella, L Weissbart, L Batina, S Picek
2024 27th International Symposium on Design & Diagnostics of Electronic …, 2024
22024
Xoodyak, a final update
J Daemen, S Hoffert, S Mella, M Peeters, G Van Assche, R Van Keer
Update of a submission to the Caesar competition, 2022
22022
Koala: A Low-Latency Pseudorandom Function
PA Eliasi, Y Belkheyar, J Daemen, S Ghosh, D Kuijsters, A Mehrdad, ...
Cryptology ePrint Archive, 2024
12024
Xoodyak, an update
J Daemen, S Hoffert, S Mella, M Peeters, G Van Assche, R Van Keer
Publication to NIST Lightweight Cryptography Standardization Process (round …, 2020
12020
J-DFA: a Novel Approach for Robust Differential Fault Analysis
L Magri, S Mella, P Fragneto, F Melzani, B Rossi
12015
ChiLow and ChiChi: New Constructions for Code Encryption
Y Belkheyar, P Derbez, S Ghosh, G Leander, S Mella, L Perrin, ...
Cryptology ePrint Archive, 2025
2025
В данный момент система не может выполнить эту операцию. Повторите попытку позднее.
Статьи 1–20