default search action
BibTeX records: Guido Bertoni
@article{DBLP:journals/iacr/BertoniDHPAKV23, author = {Guido Bertoni and Joan Daemen and Seth Hoffert and Micha{\"{e}}l Peeters and Gilles Van Assche and Ronny Van Keer and Beno{\^{\i}}t Viguier}, title = {TurboSHAKE}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {342}, year = {2023}, url = {https://eprint.iacr.org/2023/342}, timestamp = {Fri, 31 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BertoniDHPAKV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cosade/2020, editor = {Guido Marco Bertoni and Francesco Regazzoni}, title = {Constructive Side-Channel Analysis and Secure Design - 11th International Workshop, {COSADE} 2020, Lugano, Switzerland, April 1-3, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12244}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-68773-1}, doi = {10.1007/978-3-030-68773-1}, isbn = {978-3-030-68772-4}, timestamp = {Fri, 05 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cosade/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/SchaumontLPB18, author = {Patrick Schaumont and Ruby B. Lee and Ronald Perez and Guido Bertoni}, title = {Special Section on Secure Computer Architectures}, journal = {{IEEE} Trans. Computers}, volume = {67}, number = {3}, pages = {305--306}, year = {2018}, url = {https://doi.org/10.1109/TC.2017.2788658}, doi = {10.1109/TC.2017.2788658}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tc/SchaumontLPB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/ZaccariaMB18, author = {Vittorio Zaccaria and Filippo Melzani and Guido Bertoni}, title = {Spectral Features of Higher-Order Side-Channel Countermeasures}, journal = {{IEEE} Trans. Computers}, volume = {67}, number = {4}, pages = {596--603}, year = {2018}, url = {https://doi.org/10.1109/TC.2017.2772231}, doi = {10.1109/TC.2017.2772231}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/ZaccariaMB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/todaes/DelledonneZSBM18, author = {Lorenzo Delledonne and Vittorio Zaccaria and Ruggero Susella and Guido Bertoni and Filippo Melzani}, title = {{CASCA:} {A} Design Automation Approach for Designing Hardware Countermeasures Against Side-Channel Attacks}, journal = {{ACM} Trans. Design Autom. Electr. Syst.}, volume = {23}, number = {6}, pages = {69:1--69:17}, year = {2018}, url = {https://doi.org/10.1145/3241047}, doi = {10.1145/3241047}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/todaes/DelledonneZSBM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/BertoniDPAKV18, author = {Guido Bertoni and Joan Daemen and Micha{\"{e}}l Peeters and Gilles Van Assche and Ronny Van Keer and Beno{\^{\i}}t Viguier}, editor = {Bart Preneel and Frederik Vercauteren}, title = {KangarooTwelve: Fast Hashing Based on Keccak-p}, booktitle = {Applied Cryptography and Network Security - 16th International Conference, {ACNS} 2018, Leuven, Belgium, July 2-4, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10892}, pages = {400--418}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93387-0\_21}, doi = {10.1007/978-3-319-93387-0\_21}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/BertoniDPAKV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/SamwelBBDS18, author = {Niels Samwel and Lejla Batina and Guido Bertoni and Joan Daemen and Ruggero Susella}, editor = {Nigel P. Smart}, title = {Breaking Ed25519 in WolfSSL}, booktitle = {Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers' Track at the {RSA} Conference 2018, San Francisco, CA, USA, April 16-20, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10808}, pages = {1--20}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76953-0\_1}, doi = {10.1007/978-3-319-76953-0\_1}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/SamwelBBDS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdtc/ZaccariaMMB18, author = {Vittorio Zaccaria and Maria Chiara Molteni and Filippo Melzani and Guido Bertoni}, title = {Darth's Saber: {A} Key Exfiltration Attack for Symmetric Ciphers Using Laser Light}, booktitle = {2018 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC} 2018, Amsterdam, The Netherlands, September 13, 2018}, pages = {23--26}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/FDTC.2018.00012}, doi = {10.1109/FDTC.2018.00012}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fdtc/ZaccariaMMB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Bertoni0M18, author = {Guido Marco Bertoni and Lorenzo Grassi and Filippo Melzani}, title = {Simulations of Optical Emissions for Attacking {AES} and Masked {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {291}, year = {2018}, url = {https://eprint.iacr.org/2018/291}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Bertoni0M18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BertoniDHPAK18, author = {Guido Bertoni and Joan Daemen and Seth Hoffert and Micha{\"{e}}l Peeters and Gilles Van Assche and Ronny Van Keer}, title = {The authenticated encryption schemes Kravatte-SANE and Kravatte-SANSE}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1012}, year = {2018}, url = {https://eprint.iacr.org/2018/1012}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BertoniDHPAK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhss/BertoniMM17, author = {Guido Bertoni and Marco Martinoli and Maria Chiara Molteni}, title = {A Methodology for the Characterisation of Leakages in Combinatorial Logic}, journal = {J. Hardw. Syst. Secur.}, volume = {1}, number = {3}, pages = {269--281}, year = {2017}, url = {https://doi.org/10.1007/s41635-017-0015-0}, doi = {10.1007/S41635-017-0015-0}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jhss/BertoniMM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BertoniDHPAK17, author = {Guido Bertoni and Joan Daemen and Seth Hoffert and Micha{\"{e}}l Peeters and Gilles Van Assche and Ronny Van Keer}, title = {Farfalle: parallel permutation-based cryptography}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {4}, pages = {1--38}, year = {2017}, url = {https://tosc.iacr.org/index.php/ToSC/article/view/801}, timestamp = {Mon, 08 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/BertoniDHPAK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SamwelBBDS17, author = {Niels Samwel and Lejla Batina and Guido Bertoni and Joan Daemen and Ruggero Susella}, title = {Breaking Ed25519 in WolfSSL}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {985}, year = {2017}, url = {http://eprint.iacr.org/2017/985}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SamwelBBDS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jetc/BarenghiBBPSS16, author = {Alessandro Barenghi and Guido Marco Bertoni and Luca Breveglieri and Gerardo Pelosi and Stefano Sanfilippo and Ruggero Susella}, title = {A Fault-Based Secret Key Retrieval Method for {ECDSA:} Analysis and Countermeasure}, journal = {{ACM} J. Emerg. Technol. Comput. Syst.}, volume = {13}, number = {1}, pages = {8:1--8:26}, year = {2016}, url = {https://doi.org/10.1145/2767132}, doi = {10.1145/2767132}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jetc/BarenghiBBPSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BossiAB16, author = {Simone Bossi and Tea Anselmo and Guido Bertoni}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {On {TLS} 1.3 - Early Performance Analysis in the IoT Field}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {117--125}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005688901170125}, doi = {10.5220/0005688901170125}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/BossiAB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/space/BertoniM16, author = {Guido Bertoni and Marco Martinoli}, editor = {Claude Carlet and M. Anwar Hasan and Vishal Saraswat}, title = {A Methodology for the Characterisation of Leakages in Combinatorial Logic}, booktitle = {Security, Privacy, and Applied Cryptography Engineering - 6th International Conference, {SPACE} 2016, Hyderabad, India, December 14-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10076}, pages = {363--382}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49445-6\_21}, doi = {10.1007/978-3-319-49445-6\_21}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/space/BertoniM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BertoniDPAK16, author = {Guido Bertoni and Joan Daemen and Micha{\"{e}}l Peeters and Gilles Van Assche and Ronny Van Keer}, title = {KangarooTwelve: fast hashing based on Keccak-p}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {770}, year = {2016}, url = {http://eprint.iacr.org/2016/770}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BertoniDPAK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BertoniM16, author = {Guido Bertoni and Marco Martinoli}, title = {A Methodology for the Characterisation of Leakages in Combinatorial Logic}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {841}, year = {2016}, url = {http://eprint.iacr.org/2016/841}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BertoniM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BertoniDPAK16a, author = {Guido Bertoni and Joan Daemen and Micha{\"{e}}l Peeters and Gilles Van Assche and Ronny Van Keer}, title = {Farfalle: parallel permutation-based cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1188}, year = {2016}, url = {http://eprint.iacr.org/2016/1188}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BertoniDPAK16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/space/BertoniGM15, author = {Guido Marco Bertoni and Lorenzo Grassi and Filippo Melzani}, editor = {Rajat Subhra Chakraborty and Peter Schwabe and Jon A. Solworth}, title = {Simulations of Optical Emissions for Attacking {AES} and Masked {AES}}, booktitle = {Security, Privacy, and Applied Cryptography Engineering - 5th International Conference, {SPACE} 2015, Jaipur, India, October 3-7, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9354}, pages = {172--189}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24126-5\_11}, doi = {10.1007/978-3-319-24126-5\_11}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/space/BertoniGM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BertoniDPA15, author = {Guido Bertoni and Joan Daemen and Micha{\"{e}}l Peeters and Gilles Van Assche}, title = {Keccak}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {389}, year = {2015}, url = {http://eprint.iacr.org/2015/389}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BertoniDPA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/BertoniDPA14, author = {Guido Bertoni and Joan Daemen and Micha{\"{e}}l Peeters and Gilles Van Assche}, title = {The Making of {KECCAK}}, journal = {Cryptologia}, volume = {38}, number = {1}, pages = {26--60}, year = {2014}, url = {https://doi.org/10.1080/01611194.2013.856818}, doi = {10.1080/01611194.2013.856818}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/BertoniDPA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BertoniDPA14, author = {Guido Bertoni and Joan Daemen and Micha{\"{e}}l Peeters and Gilles Van Assche}, title = {Sufficient conditions for sound tree and sequential hashing modes}, journal = {Int. J. Inf. Sec.}, volume = {13}, number = {4}, pages = {335--353}, year = {2014}, url = {https://doi.org/10.1007/s10207-013-0220-y}, doi = {10.1007/S10207-013-0220-Y}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/BertoniDPA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BertoniC14, author = {Guido Bertoni and Jean{-}S{\'{e}}bastien Coron}, title = {Introduction to the {CHES} 2013 special issue}, journal = {J. Cryptogr. Eng.}, volume = {4}, number = {1}, pages = {1}, year = {2014}, url = {https://doi.org/10.1007/s13389-014-0076-8}, doi = {10.1007/S13389-014-0076-8}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/BertoniC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/BertoniDPA14, author = {Guido Bertoni and Joan Daemen and Micha{\"{e}}l Peeters and Gilles Van Assche}, editor = {Ioana Boureanu and Philippe Owesarski and Serge Vaudenay}, title = {Sakura: {A} Flexible Coding for Tree Hashing}, booktitle = {Applied Cryptography and Network Security - 12th International Conference, {ACNS} 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8479}, pages = {217--234}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-07536-5\_14}, doi = {10.1007/978-3-319-07536-5\_14}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/BertoniDPA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/BarenghiBBP13, author = {Alessandro Barenghi and Guido Marco Bertoni and Luca Breveglieri and Gerardo Pelosi}, title = {A fault induction technique based on voltage underfeeding with application to attacks against {AES} and {RSA}}, journal = {J. Syst. Softw.}, volume = {86}, number = {7}, pages = {1864--1878}, year = {2013}, url = {https://doi.org/10.1016/j.jss.2013.02.021}, doi = {10.1016/J.JSS.2013.02.021}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/BarenghiBBP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BertoniDPA13, author = {Guido Bertoni and Joan Daemen and Micha{\"{e}}l Peeters and Gilles Van Assche}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {Keccak}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {313--314}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_19}, doi = {10.1007/978-3-642-38348-9\_19}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/BertoniDPA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ches/2013, editor = {Guido Bertoni and Jean{-}S{\'{e}}bastien Coron}, title = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8086}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40349-1}, doi = {10.1007/978-3-642-40349-1}, isbn = {978-3-642-40348-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BertoniDDLPA13, author = {Guido Bertoni and Joan Daemen and Nicolas Debande and Thanh{-}Ha Le and Micha{\"{e}}l Peeters and Gilles Van Assche}, title = {Power Analysis of Hardware Implementations Protected with Secret Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {67}, year = {2013}, url = {http://eprint.iacr.org/2013/067}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BertoniDDLPA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BertoniDPA13, author = {Guido Bertoni and Joan Daemen and Micha{\"{e}}l Peeters and Gilles Van Assche}, title = {Sakura: a flexible coding for tree hashing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {231}, year = {2013}, url = {http://eprint.iacr.org/2013/231}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BertoniDPA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/micro/BertoniDDLPA12, author = {Guido Bertoni and Joan Daemen and Nicolas Debande and Thanh{-}Ha Le and Micha{\"{e}}l Peeters and Gilles Van Assche}, title = {Power analysis of hardware implementations protected with secret sharing}, booktitle = {45th Annual {IEEE/ACM} International Symposium on Microarchitecture, {MICRO} 2012, Workshops Proceedings, Vancouver, BC, Canada, December 1-5, 2012}, pages = {9--16}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/MICROW.2012.12}, doi = {10.1109/MICROW.2012.12}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/micro/BertoniDDLPA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/BarenghiBBPP12, author = {Alessandro Barenghi and Guido Marco Bertoni and Luca Breveglieri and Mauro Pellicioli and Gerardo Pelosi}, editor = {Marc Joye and Michael Tunstall}, title = {Injection Technologies for Fault Attacks on Microprocessors}, booktitle = {Fault Analysis in Cryptography}, series = {Information Security and Cryptography}, pages = {275--293}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29656-7\_16}, doi = {10.1007/978-3-642-29656-7\_16}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/isc/BarenghiBBPP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fdtc/2012, editor = {Guido Bertoni and Benedikt Gierlichs}, title = {2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, Leuven, Belgium, September 9, 2012}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://ieeexplore.ieee.org/xpl/conhome/6305022/proceeding}, isbn = {978-1-4673-2900-2}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fdtc/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsd/BarenghiBSM11, author = {Alessandro Barenghi and Guido Bertoni and Fabrizio De Santis and Filippo Melzani}, title = {On the Efficiency of Design Time Evaluation of the Resistance to Power Attacks}, booktitle = {14th Euromicro Conference on Digital System Design, Architectures, Methods and Tools, {DSD} 2011, August 31 - September 2, 2011, Oulu, Finland}, pages = {777--785}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/DSD.2011.103}, doi = {10.1109/DSD.2011.103}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsd/BarenghiBSM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/BarenghiBPS11, author = {Alessandro Barenghi and Guido Bertoni and Andrea Palomba and Ruggero Susella}, title = {A novel fault attack against {ECDSA}}, booktitle = {{HOST} 2011, Proceedings of the 2011 {IEEE} International Symposium on Hardware-Oriented Security and Trust (HOST), 5-6 June 2011, San Diego, California, {USA}}, pages = {161--166}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/HST.2011.5955015}, doi = {10.1109/HST.2011.5955015}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/BarenghiBPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/BertoniDPA11, author = {Guido Bertoni and Joan Daemen and Micha{\"{e}}l Peeters and Gilles Van Assche}, editor = {Ali Miri and Serge Vaudenay}, title = {Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications}, booktitle = {Selected Areas in Cryptography - 18th International Workshop, {SAC} 2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7118}, pages = {320--337}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-28496-0\_19}, doi = {10.1007/978-3-642-28496-0\_19}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/BertoniDPA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/BarenghiBBPP11, author = {Alessandro Barenghi and Guido Marco Bertoni and Luca Breveglieri and Gerardo Pelosi and Andrea Palomba}, editor = {Mehmet A. Orgun and Atilla El{\c{c}}i and Oleg B. Makarevich and Sorin A. Huss and Josef Pieprzyk and Lyudmila K. Babenko and Alexander G. Chefranov and Rajan Shankaran}, title = {Fault attack to the elliptic curve digital signature algorithm with multiple bit faults}, booktitle = {Proceedings of the 4th International Conference on Security of Information and Networks, {SIN} 2011, Sydney, NSW, Australia, November 14-19, 2011}, pages = {63--72}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2070425.2070438}, doi = {10.1145/2070425.2070438}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/BarenghiBBPP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BertoniDPA11, author = {Guido Bertoni and Joan Daemen and Micha{\"{e}}l Peeters and Gilles Van Assche}, title = {Duplexing the sponge: single-pass authenticated encryption and other applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {499}, year = {2011}, url = {http://eprint.iacr.org/2011/499}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BertoniDPA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/BarenghiBBPP10, author = {Alessandro Barenghi and Guido Marco Bertoni and Luca Breveglieri and Mauro Pellicioli and Gerardo Pelosi}, title = {Fault attack on {AES} with single-bit induced faults}, booktitle = {Sixth International Conference on Information Assurance and Security, {IAS} 2010, Atlanta, GA, USA, August 23-25, 2010}, pages = {167--172}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ISIAS.2010.5604061}, doi = {10.1109/ISIAS.2010.5604061}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/BarenghiBBPP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BertoniDPA10, author = {Guido Bertoni and Joan Daemen and Micha{\"{e}}l Peeters and Gilles Van Assche}, editor = {Stefan Mangard and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Sponge-Based Pseudo-Random Number Generators}, booktitle = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6225}, pages = {33--47}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15031-9\_3}, doi = {10.1007/978-3-642-15031-9\_3}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/BertoniDPA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/BarenghiBBPP10, author = {Alessandro Barenghi and Guido Bertoni and Luca Breveglieri and Mauro Pellicioli and Gerardo Pelosi}, editor = {Jim Plusquellic and Ken Mai}, title = {Low Voltage Fault Attacks to {AES}}, booktitle = {{HOST} 2010, Proceedings of the 2010 {IEEE} International Symposium on Hardware-Oriented Security and Trust (HOST), 13-14 June 2010, Anaheim Convention Center, California, {USA}}, pages = {7--12}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/HST.2010.5513121}, doi = {10.1109/HST.2010.5513121}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/BarenghiBBPP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/10/BertoniM10, author = {Guido Marco Bertoni and Filippo Melzani}, editor = {Ingrid M. R. Verbauwhede}, title = {Secret Key Crypto Implementations}, booktitle = {Secure Integrated Circuits and Systems}, series = {Integrated Circuits and Systems}, pages = {45--62}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-0-387-71829-3\_3}, doi = {10.1007/978-0-387-71829-3\_3}, timestamp = {Wed, 26 Jun 2019 18:00:01 +0200}, biburl = {https://dblp.org/rec/books/sp/10/BertoniM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarenghiBBPP10, author = {Alessandro Barenghi and Guido Bertoni and Luca Breveglieri and Mauro Pellicioli and Gerardo Pelosi}, title = {Low Voltage Fault Attacks to {AES} and {RSA} on General Purpose Processors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {130}, year = {2010}, url = {http://eprint.iacr.org/2010/130}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarenghiBBPP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdtc/BarenghiBPP09, author = {Alessandro Barenghi and Guido Bertoni and Emanuele Parrinello and Gerardo Pelosi}, editor = {Luca Breveglieri and Israel Koren and David Naccache and Elisabeth Oswald and Jean{-}Pierre Seifert}, title = {Low Voltage Fault Attacks on the {RSA} Cryptosystem}, booktitle = {Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC} 2009, Lausanne, Switzerland, 6 September 2009}, pages = {23--31}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/FDTC.2009.30}, doi = {10.1109/FDTC.2009.30}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fdtc/BarenghiBPP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itng/BertoniBCMS09, author = {Guido Marco Bertoni and Luca Breveglieri and Alessandro Cominola and Filippo Melzani and Ruggero Susella}, editor = {Shahram Latifi}, title = {Practical Power Analysis Attacks to {RSA} on a Large {IP} Portfolio SoC}, booktitle = {Sixth International Conference on Information Technology: New Generations, {ITNG} 2009, Las Vegas, Nevada, USA, 27-29 April 2009}, pages = {455--460}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ITNG.2009.189}, doi = {10.1109/ITNG.2009.189}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itng/BertoniBCMS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/BertoniDPA09, author = {Guido Bertoni and Joan Daemen and Micha{\"{e}}l Peeters and Gilles Van Assche}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, title = {Sufficient conditions for sound tree hashing modes}, booktitle = {Symmetric Cryptography, 11.01. - 16.01.2009}, series = {Dagstuhl Seminar Proceedings}, volume = {09031}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany}, year = {2009}, url = {http://drops.dagstuhl.de/opus/volltexte/2009/1946/}, timestamp = {Thu, 10 Jun 2021 13:02:06 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/BertoniDPA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/BertoniDPA09a, author = {Guido Bertoni and Joan Daemen and Micha{\"{e}}l Peeters and Gilles Van Assche}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, title = {The Road from Panama to Keccak via RadioGat{\'{u}}n}, booktitle = {Symmetric Cryptography, 11.01. - 16.01.2009}, series = {Dagstuhl Seminar Proceedings}, volume = {09031}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany}, year = {2009}, url = {http://drops.dagstuhl.de/opus/volltexte/2009/1958/}, timestamp = {Thu, 23 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/BertoniDPA09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BertoniDPA09, author = {Guido Bertoni and Joan Daemen and Micha{\"{e}}l Peeters and Gilles Van Assche}, title = {Sufficient conditions for sound tree and sequential hashing modes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {210}, year = {2009}, url = {http://eprint.iacr.org/2009/210}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BertoniDPA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/BertoniBFP08, author = {Guido Marco Bertoni and Luca Breveglieri and Pasqualina Fragneto and Gerardo Pelosi}, title = {Parallel Hardware Architectures for the Cryptographic Tate Pairing}, journal = {Int. J. Netw. Secur.}, volume = {7}, number = {1}, pages = {31--37}, year = {2008}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v7-n1/ijns-2008-v7-n1-p31-37.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/BertoniBFP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/BertoniBCFHP08, author = {Guido Bertoni and Luca Breveglieri and Liqun Chen and Pasqualina Fragneto and Keith A. Harrison and Gerardo Pelosi}, title = {A pairing {SW} implementation for Smart-Cards}, journal = {J. Syst. Softw.}, volume = {81}, number = {7}, pages = {1240--1247}, year = {2008}, url = {https://doi.org/10.1016/j.jss.2007.09.022}, doi = {10.1016/J.JSS.2007.09.022}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jss/BertoniBCFHP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/GuilleySHPBC08, author = {Sylvain Guilley and Laurent Sauvage and Philippe Hoogvorst and Renaud Pacalet and Guido Marco Bertoni and Sumanta Chaudhuri}, title = {Security Evaluation of {WDDL} and SecLib Countermeasures against Power Attacks}, journal = {{IEEE} Trans. Computers}, volume = {57}, number = {11}, pages = {1482--1497}, year = {2008}, url = {https://doi.org/10.1109/TC.2008.109}, doi = {10.1109/TC.2008.109}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/GuilleySHPBC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BertoniDPA08, author = {Guido Bertoni and Joan Daemen and Micha{\"{e}}l Peeters and Gilles Van Assche}, editor = {Nigel P. Smart}, title = {On the Indifferentiability of the Sponge Construction}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4965}, pages = {181--197}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78967-3\_11}, doi = {10.1007/978-3-540-78967-3\_11}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/BertoniDPA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itng/BarenghiBBP08, author = {Alessandro Barenghi and Guido Bertoni and Luca Breveglieri and Gerardo Pelosi}, editor = {Shahram Latifi}, title = {A {FPGA} Coprocessor for the Cryptographic Tate Pairing over Fp}, booktitle = {Fifth International Conference on Information Technology: New Generations {(ITNG} 2008), 7-8 April 2008, Las Vegas, Nevada, {USA}}, pages = {112--119}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ITNG.2008.260}, doi = {10.1109/ITNG.2008.260}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itng/BarenghiBBP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BertoniBFR08, author = {Guido Marco Bertoni and Luca Breveglieri and Roberto Farina and Francesco Regazzoni}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {A 640 Mbit/S 32-Bit Pipelined Implementation of the {AES} Algorithm}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {453--459}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Tue, 31 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BertoniBFR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asap/BertoniBRR06, author = {Guido Bertoni and Luca Breveglieri and Roberto Farina and Francesco Regazzoni}, title = {Speeding Up {AES} By Extending a 32 bit Processor Instruction Set}, booktitle = {2006 {IEEE} International Conference on Application-Specific Systems, Architecture and Processors {(ASAP} 2006), 11-13 September 2006, Steamboat Springs, Colorado, {USA}}, pages = {275--282}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ASAP.2006.62}, doi = {10.1109/ASAP.2006.62}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asap/BertoniBRR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/BertoniBFPS06, author = {Guido Bertoni and Luca Breveglieri and Pasqualina Fragneto and Gerardo Pelosi and Luigi Sportiello}, editor = {Georges G. E. Gielen}, title = {Software implementation of Tate pairing over GF(2\({}^{\mbox{m}}\))}, booktitle = {Proceedings of the Conference on Design, Automation and Test in Europe: Designers' Forum, {DATE} 2006, Munich, Germany, March 6-10, 2006}, pages = {7--11}, publisher = {European Design and Automation Association, Leuven, Belgium}, year = {2006}, url = {https://doi.org/10.1109/DATE.2006.244156}, doi = {10.1109/DATE.2006.244156}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/date/BertoniBFPS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/WollingerBBP06, author = {Thomas J. Wollinger and Guido Bertoni and Luca Breveglieri and Christof Paar}, editor = {Marina L. Gavrilova and Osvaldo Gervasi and Vipin Kumar and Chih Jeng Kenneth Tan and David Taniar and Antonio Lagan{\`{a}} and Youngsong Mun and Hyunseung Choo}, title = {Performance of {HECC} Coprocessors Using Inversion-Free Formulae}, booktitle = {Computational Science and Its Applications - {ICCSA} 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {3982}, pages = {1004--1012}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11751595\_105}, doi = {10.1007/11751595\_105}, timestamp = {Thu, 28 Apr 2022 16:17:38 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/WollingerBBP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itng/BertoniBFP06, author = {Guido Bertoni and Luca Breveglieri and Pasqualina Fragneto and Gerardo Pelosi}, title = {Parallel Hardware Architectures for the Cryptographic Tate Pairing}, booktitle = {Third International Conference on Information Technology: New Generations {(ITNG} 2006), 10-12 April 2006, Las Vegas, Nevada, {USA}}, pages = {186--191}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ITNG.2006.107}, doi = {10.1109/ITNG.2006.107}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itng/BertoniBFP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itng/BertoniBV06, author = {Guido Bertoni and Luca Breveglieri and Matteo Venturi}, title = {{ECC} Hardware Coprocessors for 8-bit Systems and Power Consumption Considerations}, booktitle = {Third International Conference on Information Technology: New Generations {(ITNG} 2006), 10-12 April 2006, Las Vegas, Nevada, {USA}}, pages = {573--574}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ITNG.2006.55}, doi = {10.1109/ITNG.2006.55}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itng/BertoniBV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/BertoniBV06, author = {Guido Bertoni and Luca Breveglieri and Matteo Venturi}, title = {Power Aware Design of an Elliptic Curve Coprocessor for 8 bit Platforms}, booktitle = {4th {IEEE} Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 13-17 March 2006, Pisa, Italy}, pages = {337--341}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/PERCOMW.2006.110}, doi = {10.1109/PERCOMW.2006.110}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/percom/BertoniBV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BertoniDPA06, author = {Guido Bertoni and Joan Daemen and Micha{\"{e}}l Peeters and Gilles Van Assche}, title = {RadioGat{\'{u}}n, a belt-and-mill hash function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {369}, year = {2006}, url = {http://eprint.iacr.org/2006/369}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BertoniDPA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itcc/BertoniZBMP05, author = {Guido Bertoni and Vittorio Zaccaria and Luca Breveglieri and Matteo Monchiero and Gianluca Palermo}, title = {{AES} Power Attack Based on Induced Cache Miss and Countermeasure}, booktitle = {International Symposium on Information Technology: Coding and Computing {(ITCC} 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, {USA}}, pages = {586--591}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ITCC.2005.62}, doi = {10.1109/ITCC.2005.62}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itcc/BertoniZBMP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itcc/SozzaniBTB05, author = {Fabio Sozzani and Guido Bertoni and Stefano Turcato and Luca Breveglieri}, title = {A Parallelized Design for an Elliptic Curve Cryptosystem Coprocessor}, booktitle = {International Symposium on Information Technology: Coding and Computing {(ITCC} 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, {USA}}, pages = {626--630}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ITCC.2005.25}, doi = {10.1109/ITCC.2005.25}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itcc/SozzaniBTB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/it/Bertoni04, author = {Guido Bertoni}, title = {Efficient and reliable algorithms and architectures for innovative complex cryptographic systems}, school = {Polytechnic University of Milan, Italy}, year = {2004}, url = {https://opac.bncf.firenze.sbn.it/bncf-prod/resource?uri=BNI0007112}, timestamp = {Wed, 29 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/it/Bertoni04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dft/BertoniBKM04, author = {Guido Bertoni and Luca Breveglieri and Israel Koren and Paolo Maistri}, title = {An Efficient Hardware-Based Fault Diagnosis Scheme for {AES:} Performances and Cost}, booktitle = {19th {IEEE} International Symposium on Defect and Fault-Tolerance in {VLSI} Systems {(DFT} 2004), 10-13 October 2004, Cannes, France, Proceedings}, pages = {130--138}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.ieeecomputersociety.org/10.1109/DFT.2004.8}, doi = {10.1109/DFT.2004.8}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dft/BertoniBKM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/glvlsi/BertoniMNF04, author = {Guido Bertoni and Marco Macchetti and Luca Negri and Pasqualina Fragneto}, editor = {David Garrett and John C. Lach and Charles A. Zukowski}, title = {Power-efficient {ASIC} synthesis of cryptographic sboxes}, booktitle = {Proceedings of the 14th {ACM} Great Lakes Symposium on {VLSI} 2004, Boston, MA, USA, April 26-28, 2004}, pages = {277--281}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/988952.989019}, doi = {10.1145/988952.989019}, timestamp = {Fri, 20 Aug 2021 16:30:37 +0200}, biburl = {https://dblp.org/rec/conf/glvlsi/BertoniMNF04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itcc/BertoniBWP04, author = {Guido Bertoni and Luca Breveglieri and Thomas J. Wollinger and Christof Paar}, title = {Finding Optimum Parallel Coprocessor Design for Genus 2 Hyperelliptic Curve Cryptosystems}, booktitle = {International Conference on Information Technology: Coding and Computing (ITCC'04), Volume 2, April 5-7, 2004, Las Vegas, Nevada, {USA}}, pages = {538}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/ITCC.2004.1286710}, doi = {10.1109/ITCC.2004.1286710}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itcc/BertoniBWP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BertoniBWP04, author = {Guido Bertoni and Luca Breveglieri and Thomas J. Wollinger and Christof Paar}, title = {Finding Optimum Parallel Coprocessor Design for Genus 2 Hyperelliptic Curve Cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {29}, year = {2004}, url = {http://eprint.iacr.org/2004/029}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BertoniBWP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/BertoniBKMP03, author = {Guido Bertoni and Luca Breveglieri and Israel Koren and Paolo Maistri and Vincenzo Piuri}, title = {Error Analysis and Detection Procedures for a Hardware Implementation of the Advanced Encryption Standard}, journal = {{IEEE} Trans. Computers}, volume = {52}, number = {4}, pages = {492--505}, year = {2003}, url = {https://doi.org/10.1109/TC.2003.1190590}, doi = {10.1109/TC.2003.1190590}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tc/BertoniBKMP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asap/BertoniBKMP03, author = {Guido Bertoni and Luca Breveglieri and Israel Koren and Paolo Maistri and Vincenzo Piuri}, title = {Concurrent Fault Detection in a Hardware Implementation of the {RC5} Encryption Algorithm}, booktitle = {14th {IEEE} International Conference on Application-Specific Systems, Architectures, and Processors {(ASAP} 2003), 24-26 June 2003, The Hague, The Netherlands}, pages = {423--432}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/ASAP.2003.1212865}, doi = {10.1109/ASAP.2003.1212865}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asap/BertoniBKMP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/BertoniGKOPW03, author = {Guido Bertoni and Jorge Guajardo and Sandeep S. Kumar and Gerardo Orlando and Christof Paar and Thomas J. Wollinger}, editor = {Marc Joye}, title = {Efficient GF(p\({}^{\mbox{m}}\)) Arithmetic Architectures for Cryptographic Applications}, booktitle = {Topics in Cryptology - {CT-RSA} 2003, The Cryptographers' Track at the {RSA} Conference 2003, San Francisco, CA, USA, April 13-17, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2612}, pages = {158--175}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36563-X\_11}, doi = {10.1007/3-540-36563-X\_11}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/BertoniGKOPW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dft/BertoniBKMP03, author = {Guido Bertoni and Luca Breveglieri and Israel Koren and Paolo Maistri and Vincenzo Piuri}, title = {Detecting and Locating Faults in {VLSI} Implementations of the Advanced Encryption Standard}, booktitle = {18th {IEEE} International Symposium on Defect and Fault-Tolerance in {VLSI} Systems {(DFT} 2003), 3-5 November 2003, Boston, MA, USA, Proceedings}, pages = {105}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/DFTVS.2003.1250101}, doi = {10.1109/DFTVS.2003.1250101}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dft/BertoniBKMP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/BertoniGO03, author = {Guido Bertoni and Jorge Guajardo and Gerardo Orlando}, editor = {Thomas Johansson and Subhamoy Maitra}, title = {Systolic and Scalable Architectures for Digit-Serial Multiplication in Fields GF(p\({}^{\mbox{m}}\))}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2003, 4th International Conference on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2904}, pages = {349--362}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24582-7\_26}, doi = {10.1007/978-3-540-24582-7\_26}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/indocrypt/BertoniGO03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/BertoniBABFMZ03, author = {Guido Bertoni and A. Bircan and Luca Breveglieri and Pasqualina Fragneto and Marco Macchetti and Vittorio Zaccaria}, title = {About the performances of the Advanced Encryption Standard in embedded systems with cache memory}, booktitle = {Proceedings of the 2003 International Symposium on Circuits and Systems, {ISCAS} 2003, Bangkok, Thailand, May 25-28, 2003}, pages = {145--148}, publisher = {{IEEE}}, year = {2003}, url = {https://doi.org/10.1109/ISCAS.2003.1206212}, doi = {10.1109/ISCAS.2003.1206212}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/iscas/BertoniBABFMZ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asap/BertoniBKMP02, author = {Guido Bertoni and Luca Breveglieri and Israel Koren and Paolo Maistri and Vincenzo Piuri}, title = {On the Propagation of Faults and Their Detection in a Hardware Implementation of the Advanced Encryption Standard}, booktitle = {13th {IEEE} International Conference on Application-Specific Systems, Architectures, and Processors {(ASAP} 2002), 17-19 July 2002, San Jose, CA, {USA}}, pages = {303}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/ASAP.2002.1030729}, doi = {10.1109/ASAP.2002.1030729}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asap/BertoniBKMP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BertoniBFMM02, author = {Guido Bertoni and Luca Breveglieri and Pasqualina Fragneto and Marco Macchetti and Stefano Marchesin}, editor = {Burton S. Kaliski Jr. and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Efficient Software Implementation of {AES} on 32-Bit Platforms}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2523}, pages = {159--171}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36400-5\_13}, doi = {10.1007/3-540-36400-5\_13}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/BertoniBFMM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dft/BertoniBKMP02, author = {Guido Bertoni and Luca Breveglieri and Israel Koren and Paolo Maistri and Vincenzo Piuri}, title = {A Parity Code Based Fault Detection for an Implementation of the Advanced Encryption Standard}, booktitle = {17th {IEEE} International Symposium on Defect and Fault-Tolerance in {VLSI} Systems {(DFT} 2002), 6-8 November 2002, Vancouver, BC, Canada, Proceedings}, pages = {51--59}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/DFTVS.2002.1173501}, doi = {10.1109/DFTVS.2002.1173501}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dft/BertoniBKMP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/BertoniBF01, author = {Guido Bertoni and Luca Breveglieri and Pasqualina Fragneto}, editor = {Wolfgang Nebel and Ahmed Jerraya}, title = {Efficient finite field digital-serial multiplier architecture for cryptography applications}, booktitle = {Proceedings of the Conference on Design, Automation and Test in Europe, {DATE} 2001, Munich, Germany, March 12-16, 2001}, pages = {812}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/DATE.2001.915150}, doi = {10.1109/DATE.2001.915150}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/date/BertoniBF01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.