Francesco Regazzoni
Francesco Regazzoni
ALaRI - USI
Verified email at alari.ch
Title
Cited by
Cited by
Year
Midori: A Block Cipher for Low Energy
S Banik, A Bogdanov, T Isobe, K Shibutani, H Hiwatari, T Akishita, ...
International Conference on the Theory and Application of Cryptology and …, 2015
2652015
Midori: A Block Cipher for Low Energy
S Banik, A Bogdanov, T Isobe, K Shibutani, H Hiwatari, T Akishita, ...
International Conference on the Theory and Application of Cryptology and …, 2015
2652015
Stealthy dopant-level hardware trojans
GT Becker, F Regazzoni, C Paar, WP Burleson
International Conference on Cryptographic Hardware and Embedded Systems, 197-214, 2013
2442013
Fresh re-keying: Security against side-channel and fault attacks for low-cost devices
M Medwed, FX Standaert, J Großschädl, F Regazzoni
International Conference on Cryptology in Africa, 279-296, 2010
1312010
ALE: AES-based lightweight authenticated encryption
A Bogdanov, F Mendel, F Regazzoni, V Rijmen, E Tischhauser
International Workshop on Fast Software Encryption, 447-466, 2013
1132013
Compact implementation and performance evaluation of block ciphers in ATtiny devices
T Eisenbarth, Z Gong, T Güneysu, S Heyse, S Indesteege, S Kerckhof, ...
International Conference on Cryptology in Africa, 172-187, 2012
1072012
A first step towards automatic application of power analysis countermeasures
AG Bayrak, F Regazzoni, P Brisk, FX Standaert, P Ienne
2011 48th ACM/EDAC/IEEE Design Automation Conference (DAC), 230-235, 2011
922011
Architecture and applications of a high resolution gated SPAD image sensor
S Burri, Y Maruyama, X Michalet, F Regazzoni, C Bruschini, E Charbon
Optics express 22 (14), 17573-17589, 2014
902014
Compact FPGA implementations of the five SHA-3 finalists
S Kerckhof, F Durvaux, N Veyrat-Charvillon, F Regazzoni, ...
International Conference on Smart Card Research and Advanced Applications …, 2011
732011
Sleuth: Automated verification of software power analysis countermeasures
AG Bayrak, F Regazzoni, D Novo, P Ienne
International Workshop on Cryptographic Hardware and Embedded Systems, 293-310, 2013
672013
Countermeasures against fault attacks on software implemented AES: effectiveness and cost
A Barenghi, L Breveglieri, I Koren, G Pelosi, F Regazzoni
Proceedings of the 5th Workshop on Embedded Systems Security, 1-10, 2010
652010
A design flow and evaluation framework for DPA-resistant instruction set extensions
F Regazzoni, A Cevrero, FX Standaert, S Badel, T Kluter, P Brisk, ...
International Workshop on Cryptographic Hardware and Embedded Systems, 205-219, 2009
642009
A survey on hardware trojan detection techniques
S Bhasin, F Regazzoni
2015 IEEE International Symposium on Circuits and Systems (ISCAS), 2021-2024, 2015
632015
Breaking ECC2K-130.
DV Bailey, L Batina, DJ Bernstein, P Birkner, JW Bos, HC Chen, ...
IACR Cryptol. ePrint Arch. 2009, 541, 2009
622009
Exploring energy efficiency of lightweight block ciphers
S Banik, A Bogdanov, F Regazzoni
International Conference on Selected Areas in Cryptography, 178-194, 2015
562015
The curse of class imbalance and conflicting metrics with machine learning for side-channel evaluations
S Picek, A Heuser, A Jovic, S Bhasin, F Regazzoni
IACR Transactions on Cryptographic Hardware and Embedded Systems 2019 (1), 1-29, 2019
512019
FPGA implementations of the AES masked against power analysis attacks
F Regazzoni, Y Wang, FX Standaert
Proceedings of COSADE 2011, 56-66, 2011
512011
Compact implementation and performance evaluation of hash functions in attiny devices
J Balasch, B Ege, T Eisenbarth, B Gérard, Z Gong, T Güneysu, S Heyse, ...
International Conference on Smart Card Research and Advanced Applications …, 2012
482012
Speeding up AES by extending a 32 bit processor instruction set
GM Bertoni, L Breveglieri, F Roberto, F Regazzoni
IEEE 17th International Conference on Application-specific Systems …, 2006
462006
Stealthy dopant-level hardware trojans: extended version
GT Becker, F Regazzoni, C Paar, WP Burleson
Journal of Cryptographic Engineering 4 (1), 19-31, 2014
452014
The system can't perform the operation now. Try again later.
Articles 1–20