default search action
Luca Breveglieri
- > Home > Persons > Luca Breveglieri
Publications
- 2016
- [j19]Alessandro Barenghi, Guido Marco Bertoni, Luca Breveglieri, Gerardo Pelosi, Stefano Sanfilippo, Ruggero Susella:
A Fault-Based Secret Key Retrieval Method for ECDSA: Analysis and Countermeasure. ACM J. Emerg. Technol. Comput. Syst. 13(1): 8:1-8:26 (2016) - 2013
- [j18]Alessandro Barenghi, Guido Marco Bertoni, Luca Breveglieri, Gerardo Pelosi:
A fault induction technique based on voltage underfeeding with application to attacks against AES and RSA. J. Syst. Softw. 86(7): 1864-1878 (2013) - 2012
- [p1]Alessandro Barenghi, Guido Marco Bertoni, Luca Breveglieri, Mauro Pellicioli, Gerardo Pelosi:
Injection Technologies for Fault Attacks on Microprocessors. Fault Analysis in Cryptography 2012: 275-293 - 2011
- [c53]Alessandro Barenghi, Guido Marco Bertoni, Luca Breveglieri, Gerardo Pelosi, Andrea Palomba:
Fault attack to the elliptic curve digital signature algorithm with multiple bit faults. SIN 2011: 63-72 - 2010
- [c52]Alessandro Barenghi, Guido Marco Bertoni, Luca Breveglieri, Mauro Pellicioli, Gerardo Pelosi:
Fault attack on AES with single-bit induced faults. IAS 2010: 167-172 - [c50]Alessandro Barenghi, Guido Bertoni, Luca Breveglieri, Mauro Pellicioli, Gerardo Pelosi:
Low Voltage Fault Attacks to AES. HOST 2010: 7-12 - [i2]Alessandro Barenghi, Guido Bertoni, Luca Breveglieri, Mauro Pellicioli, Gerardo Pelosi:
Low Voltage Fault Attacks to AES and RSA on General Purpose Processors. IACR Cryptol. ePrint Arch. 2010: 130 (2010) - 2009
- [c49]Guido Marco Bertoni, Luca Breveglieri, Alessandro Cominola, Filippo Melzani, Ruggero Susella:
Practical Power Analysis Attacks to RSA on a Large IP Portfolio SoC. ITNG 2009: 455-460 - 2008
- [j14]Guido Marco Bertoni, Luca Breveglieri, Pasqualina Fragneto, Gerardo Pelosi:
Parallel Hardware Architectures for the Cryptographic Tate Pairing. Int. J. Netw. Secur. 7(1): 31-37 (2008) - [j13]Guido Bertoni, Luca Breveglieri, Liqun Chen, Pasqualina Fragneto, Keith A. Harrison, Gerardo Pelosi:
A pairing SW implementation for Smart-Cards. J. Syst. Softw. 81(7): 1240-1247 (2008) - [c46]Alessandro Barenghi, Guido Bertoni, Luca Breveglieri, Gerardo Pelosi:
A FPGA Coprocessor for the Cryptographic Tate Pairing over Fp. ITNG 2008: 112-119 - [c45]Guido Marco Bertoni, Luca Breveglieri, Roberto Farina, Francesco Regazzoni:
A 640 Mbit/S 32-Bit Pipelined Implementation of the AES Algorithm. SECRYPT 2008: 453-459 - 2006
- [c41]Guido Bertoni, Luca Breveglieri, Roberto Farina, Francesco Regazzoni:
Speeding Up AES By Extending a 32 bit Processor Instruction Set. ASAP 2006: 275-282 - [c40]Guido Bertoni, Luca Breveglieri, Pasqualina Fragneto, Gerardo Pelosi, Luigi Sportiello:
Software implementation of Tate pairing over GF(2m). DATE Designers' Forum 2006: 7-11 - [c37]Thomas J. Wollinger, Guido Bertoni, Luca Breveglieri, Christof Paar:
Performance of HECC Coprocessors Using Inversion-Free Formulae. ICCSA (3) 2006: 1004-1012 - [c35]Guido Bertoni, Luca Breveglieri, Pasqualina Fragneto, Gerardo Pelosi:
Parallel Hardware Architectures for the Cryptographic Tate Pairing. ITNG 2006: 186-191 - [c34]Guido Bertoni, Luca Breveglieri, Matteo Venturi:
ECC Hardware Coprocessors for 8-bit Systems and Power Consumption Considerations. ITNG 2006: 573-574 - [c33]Guido Bertoni, Luca Breveglieri, Matteo Venturi:
Power Aware Design of an Elliptic Curve Coprocessor for 8 bit Platforms. PerCom Workshops 2006: 337-341 - 2005
- [c29]Guido Bertoni, Vittorio Zaccaria, Luca Breveglieri, Matteo Monchiero, Gianluca Palermo:
AES Power Attack Based on Induced Cache Miss and Countermeasure. ITCC (1) 2005: 586-591 - [c28]Fabio Sozzani, Guido Bertoni, Stefano Turcato, Luca Breveglieri:
A Parallelized Design for an Elliptic Curve Cryptosystem Coprocessor. ITCC (1) 2005: 626-630 - 2004
- [c25]Guido Bertoni, Luca Breveglieri, Israel Koren, Paolo Maistri:
An Efficient Hardware-Based Fault Diagnosis Scheme for AES: Performances and Cost. DFT 2004: 130-138 - [c23]Guido Bertoni, Luca Breveglieri, Thomas J. Wollinger, Christof Paar:
Finding Optimum Parallel Coprocessor Design for Genus 2 Hyperelliptic Curve Cryptosystems. ITCC (2) 2004: 538- - [i1]Guido Bertoni, Luca Breveglieri, Thomas J. Wollinger, Christof Paar:
Finding Optimum Parallel Coprocessor Design for Genus 2 Hyperelliptic Curve Cryptosystems. IACR Cryptol. ePrint Arch. 2004: 29 (2004) - 2003
- [j9]Guido Bertoni, Luca Breveglieri, Israel Koren, Paolo Maistri, Vincenzo Piuri:
Error Analysis and Detection Procedures for a Hardware Implementation of the Advanced Encryption Standard. IEEE Trans. Computers 52(4): 492-505 (2003) - [c21]Guido Bertoni, Luca Breveglieri, Israel Koren, Paolo Maistri, Vincenzo Piuri:
Concurrent Fault Detection in a Hardware Implementation of the RC5 Encryption Algorithm. ASAP 2003: 423-432 - [c20]Guido Bertoni, Luca Breveglieri, Israel Koren, Paolo Maistri, Vincenzo Piuri:
Detecting and Locating Faults in VLSI Implementations of the Advanced Encryption Standard. DFT 2003: 105- - [c19]Guido Bertoni, A. Bircan, Luca Breveglieri, Pasqualina Fragneto, Marco Macchetti, Vittorio Zaccaria:
About the performances of the Advanced Encryption Standard in embedded systems with cache memory. ISCAS (5) 2003: 145-148 - 2002
- [c18]Guido Bertoni, Luca Breveglieri, Israel Koren, Paolo Maistri, Vincenzo Piuri:
On the Propagation of Faults and Their Detection in a Hardware Implementation of the Advanced Encryption Standard. ASAP 2002: 303- - [c17]Guido Bertoni, Luca Breveglieri, Pasqualina Fragneto, Marco Macchetti, Stefano Marchesin:
Efficient Software Implementation of AES on 32-Bit Platforms. CHES 2002: 159-171 - [c16]Guido Bertoni, Luca Breveglieri, Israel Koren, Paolo Maistri, Vincenzo Piuri:
A Parity Code Based Fault Detection for an Implementation of the Advanced Encryption Standard. DFT 2002: 51-59 - 2001
- [c15]Guido Bertoni, Luca Breveglieri, Pasqualina Fragneto:
Efficient finite field digital-serial multiplier architecture for cryptography applications. DATE 2001: 812
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint