Mella, Silvia
122  results:
Search for persons X
?
2

PROACT - Physical Attack Resistance of Cryptographic Algori..:

, In: Applied Reconfigurable Computing. Architectures, Tools, and Applications; Lecture Notes in Computer Science,
Adhikary, Asmita ; Basurto, Abraham ; Batina, Lejla... - p. 255-266 , 2024
 
?
3

Xoodyak Under SCA Siege:

, In: 2024 27th International Symposium on Design & Diagnostics of Electronic Circuits & Systems (DDECS),
 
?
4

Differential and Linear properties of vectorial boolean fun..:

Mella, Silvia ; Mehrdad, Alireza ; Daemen, Joan
Cryptography and Communications.  15 (2023)  6 - p. 1087-1116 , 2023
 
?
5

Tighter Trail Bounds for Xoodoo:

Mella, Silvia ; Daemen, Joan ; Van Assche, Gilles
IACR Transactions on Symmetric Cryptology.  2023 (2023)  4 - p. 187-214 , 2023
 
?
8

Profiled side channel attacks against the RSA cryptosystem ..:

Barenghi, Alessandro ; Carrera, Diego ; Mella, Silvia...
Journal of Information Security and Applications.  66 (2022)  - p. 103122 , 2022
 
?
9

Computing the Distribution of Differentials over the Non-li..:

, In: Security, Privacy, and Applied Cryptography Engineering; Lecture Notes in Computer Science,
 
?
10

Profiled Attacks Against the Elliptic Curve Scalar Point Mu..:

, In: Network and System Security; Lecture Notes in Computer Science,
 
?
11

Strengthening Sequential Side-Channel Attacks Through Chang..:

Frittoli, Luca ; Bocchi, Matteo ; Mella, Silvia...
IACR Transactions on Cryptographic Hardware and Embedded Systems.  , 2020
 
?
13

The role of the fault model in DFA against AES:

, In: Proceedings of the Third Workshop on Hardware and Architectural Support for Security and Privacy,
 
?
14

Tighter Trail Bounds for Xoodoo:

Mella, Silvia ; Daemen, Joan ; Van Assche, Gilles
https://tosc.iacr.org/index.php/ToSC/article/view/11285/10817.  , 2023
 
1-15