Susella, Ruggero
16  results:
Search for persons X
?
1

A High Efficiency Hardware Design for the Post-Quantum KEM ..:

, In: 2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST),
 
?
3

A Versatile and Unified HQC Hardware Accelerator:

, In: Lecture Notes in Computer Science; Applied Cryptography and Network Security Workshops,
 
?
4

A Flexible ASIC-Oriented Design for a Full NTRU Accelerator:

, In: Proceedings of the 28th Asia and South Pacific Design Automation Conference,
 
?
5

Profiled side channel attacks against the RSA cryptosystem ..:

Barenghi, Alessandro ; Carrera, Diego ; Mella, Silvia...
Journal of Information Security and Applications.  66 (2022)  - p. 103122 , 2022
 
?
6

Profiled Attacks Against the Elliptic Curve Scalar Point Mu..:

, In: Network and System Security; Lecture Notes in Computer Science,
 
?
7

Strengthening Sequential Side-Channel Attacks Through Chang..:

Frittoli, Luca ; Bocchi, Matteo ; Mella, Silvia...
IACR Transactions on Cryptographic Hardware and Embedded Systems.  , 2020
 
?
8

Secure and Effective Implementation of an IOTA Light Node u..:

, In: Proceedings of the 2nd Workshop on Blockchain-enabled Networked Sensor,
 
?
9

CASCA : A Design Automation Approach for Designing Hardw..:

Delledonne, Lorenzo ; Zaccaria, Vittorio ; Susella, Ruggero..
ACM Transactions on Design Automation of Electronic Systems (TODAES).  23 (2018)  6 - p. 1-17 , 2018
 
?
10

CASCA: A Design Automation Approach for Designing Hardware ..:

Delledonne, Lorenzo ; Zaccaria, Vittorio ; Susella, Ruggero..
ACM Transactions on Design Automation of Electronic Systems.  23 (2018)  6 - p. 1-17 , 2018
 
?
11

A Fault-Based Secret Key Retrieval Method for ECDSA : An..:

Barenghi, Alessandro ; Bertoni, Guido M. ; Breveglieri, Luca...
ACM Journal on Emerging Technologies in Computing Systems (JETC).  13 (2016)  1 - p. 1-26 , 2016
 
?
12

A Fault-Based Secret Key Retrieval Method for ECDSA: Analys..:

Barenghi, Alessandro ; Bertoni, Guido M. ; Breveglieri, Luca...
ACM Journal on Emerging Technologies in Computing Systems.  13 (2016)  1 - p. 1-26 , 2016
 
?
14

Strengthening Sequential Side-Channel Attacks Through Chang..:

Frittoli, Luca ; Bocchi, Matteo ; Mella, Silvia...
https://tches.iacr.org/index.php/TCHES/article/view/8581/8148.  , 2020
 
1-15