Crocetti, Luca
84  results:
Search for persons X
?
2

Cycle-Accurate Verification of the Cryptographic Co-Process..:

, In: Lecture Notes in Electrical Engineering; Applications in Electronics Pervading Industry, Environment and Society,
 
?
5

A PUF-Based Secure Boot for RISC-V Architectures:

, In: Lecture Notes in Electrical Engineering; Applications in Electronics Pervading Industry, Environment and Society,
 
?
6

Secure Data Authentication in Space Communications by High-..:

, In: Lecture Notes in Electrical Engineering; Applications in Electronics Pervading Industry, Environment and Society,
 
?
7

Highly-Efficient Galois Counter Mode Symmetric Encryption C..:

, In: Lecture Notes in Electrical Engineering; Applications in Electronics Pervading Industry, Environment and Society,
 
?
8

On the Usage of Isomorphic Fields in Hardware AES Modules f..:

, In: Lecture Notes in Electrical Engineering; Applications in Electronics Pervading Industry, Environment and Society,
Crocetti, Luca ; Saponara, Sergio - p. 55-61 , 2024
 
?
9

On the Necessity, Security Requirements and Performance Req..:

, In: 2023 IEEE 2nd Industrial Electronics Society Annual On-Line Conference (ONCON),
 
?
10

A Novel and Robust Security Approach for Authentication, In..:

, In: 2023 IEEE 3rd International Conference on Industrial Electronics for Sustainable Energy Systems (IESES),
 
?
11

Can the SHA-3 Algorithm be used for the Construction of Eff..:

, In: 2023 IEEE 2nd Industrial Electronics Society Annual On-Line Conference (ONCON),
Crocetti, Luca - p. 1-6 , 2023
 
?
12

Implementation of a Hash-based Secure Core for Integrity an..:

, In: 2023 IEEE 2nd Industrial Electronics Society Annual On-Line Conference (ONCON),
 
?
15

Implementation Strategies for Highly-accurate and Efficient..:

, In: 2023 IEEE 2nd Industrial Electronics Society Annual On-Line Conference (ONCON),
 
1-15