Volgen
Silvia Mella
Silvia Mella
Geverifieerd e-mailadres voor ru.nl
Titel
Geciteerd door
Geciteerd door
Jaar
New techniques for trail bounds and application to differential trails in Keccak
S Mella, JJC Daemen, GV Assche
262017
On the homomorphic computation of symmetric cryptographic primitives
S Mella, R Susella
IMA International Conference on Cryptography and Coding, 28-44, 2013
162013
The role of the fault model in DFA against AES
C Ferretti, S Mella, F Melzani
Proceedings of the Third Workshop on Hardware and Architectural Support forá…, 2014
72014
Tighter trail bounds for Xoodoo
J Daemen, S Mella, G Van Assche
Cryptology ePrint Archive, 2022
22022
Computing the Distribution of Differentials over the Non-linear Mapping
J Daemen, A Mehrdad, S Mella
International Conference on Security, Privacy, and Applied Cryptographyá…, 2021
22021
Strengthening sequential side-channel attacks through change detection
L Frittoli, M Bocchi, S Mella, D Carrera, B Rossi, P Fragneto, R Susella, ...
IACR Transactions on Cryptographic Hardware and Embedded Systems 2020 3, 1-21, 2020
22020
Profiled side channel attacks against the RSA cryptosystem using neural networks
A Barenghi, D Carrera, S Mella, A Pace, G Pelosi, R Susella
Journal of Information Security and Applications 66, 103122, 2022
12022
Xoodyak, an update
J Daemen, S Hoffert, S Mella, M Peeters, G Van Assche, R Van Keer
Publication to NIST Lightweight Cryptography Standardization Process (roundá…, 2020
12020
Method for performing an encryption of an AES type, and corresponding system and computer program product
R Susella, S Mella
US Patent 9,425,961, 2016
12016
Partial key exposure attacks on RSA with exponent blinding
S Cimato, S Mella, R Susella
International Conference on E-Business and Telecommunications, 364-385, 2015
12015
New Results for Partial Key Exposure on RSA with Exponent Blinding
S Cimato, S Mella, R Susella
12th International Conference on Security and Cryptography, 136-147, 2015
12015
J-DFA: a Novel Approach for Robust Differential Fault Analysis
L Magri, S Mella, P Fragneto, F Melzani, B Rossi
12015
Xoodyak, a final update
J Daemen, S Hoffert, S Mella, M Peeters, G Van Assche, R Van Keer
2022
Differential Trail Search in Cryptographic Primitives with Big-Circle Chi:: Application to Subterranean
A Mehrdad, S Mella, L Grassi, J Daemen
IACR Transactions on Symmetric Cryptology, 253-288, 2022
2022
Improved Differential and Linear Trail Bounds for ASCON
S El Hirch, S Mella, A Mehrdad, J Daemen
Cryptology ePrint Archive, 2022
2022
Profiled Attacks Against the Elliptic Curve Scalar Point Multiplication Using Neural Networks
A Barenghi, D Carrera, S Mella, A Pace, G Pelosi, R Susella
International Conference on Network and System Security, 238-257, 2021
2021
Analysis of cryptographic algorithms against theoretical and implementation attacks
S Mella
UniversitÓ degli Studi di Milano, 2018
2018
The intrathecal synthesis of BAFF inversely correlates with local IgG synthesis in multiple sclerosis at clinical onset
M Puthenparampil, M Silvia, L Federle, E Toffanin, S Ruggero, F Rinaldi, ...
MULTIPLE SCLEROSIS JOURNAL 22, 492-493, 2016
2016
Key Recovery in Public Clouds: A Survey on Cross-VM Side Channel Attacks
S Cimato, E Damiani, S Mella, CN Yang
International Conference on Cloud Computing and Security, 456-467, 2016
2016
Differential Fault Attacks against AES tampering with the Instruction Flow
S Mella, F Melzani, A Visconti
11th International Conference on Security and Cryptography, 2014
2014
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20