BibTeX records: Guido Bertoni

download as .bib file

@article{DBLP:journals/iacr/BertoniDHPAKV23,
  author       = {Guido Bertoni and
                  Joan Daemen and
                  Seth Hoffert and
                  Micha{\"{e}}l Peeters and
                  Gilles Van Assche and
                  Ronny Van Keer and
                  Beno{\^{\i}}t Viguier},
  title        = {TurboSHAKE},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {342},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/342},
  timestamp    = {Fri, 31 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BertoniDHPAKV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cosade/2020,
  editor       = {Guido Marco Bertoni and
                  Francesco Regazzoni},
  title        = {Constructive Side-Channel Analysis and Secure Design - 11th International
                  Workshop, {COSADE} 2020, Lugano, Switzerland, April 1-3, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12244},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-68773-1},
  doi          = {10.1007/978-3-030-68773-1},
  isbn         = {978-3-030-68772-4},
  timestamp    = {Fri, 05 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cosade/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/SchaumontLPB18,
  author       = {Patrick Schaumont and
                  Ruby B. Lee and
                  Ronald Perez and
                  Guido Bertoni},
  title        = {Special Section on Secure Computer Architectures},
  journal      = {{IEEE} Trans. Computers},
  volume       = {67},
  number       = {3},
  pages        = {305--306},
  year         = {2018},
  url          = {https://doi.org/10.1109/TC.2017.2788658},
  doi          = {10.1109/TC.2017.2788658},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tc/SchaumontLPB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/ZaccariaMB18,
  author       = {Vittorio Zaccaria and
                  Filippo Melzani and
                  Guido Bertoni},
  title        = {Spectral Features of Higher-Order Side-Channel Countermeasures},
  journal      = {{IEEE} Trans. Computers},
  volume       = {67},
  number       = {4},
  pages        = {596--603},
  year         = {2018},
  url          = {https://doi.org/10.1109/TC.2017.2772231},
  doi          = {10.1109/TC.2017.2772231},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/ZaccariaMB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/todaes/DelledonneZSBM18,
  author       = {Lorenzo Delledonne and
                  Vittorio Zaccaria and
                  Ruggero Susella and
                  Guido Bertoni and
                  Filippo Melzani},
  title        = {{CASCA:} {A} Design Automation Approach for Designing Hardware Countermeasures
                  Against Side-Channel Attacks},
  journal      = {{ACM} Trans. Design Autom. Electr. Syst.},
  volume       = {23},
  number       = {6},
  pages        = {69:1--69:17},
  year         = {2018},
  url          = {https://doi.org/10.1145/3241047},
  doi          = {10.1145/3241047},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/todaes/DelledonneZSBM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BertoniDPAKV18,
  author       = {Guido Bertoni and
                  Joan Daemen and
                  Micha{\"{e}}l Peeters and
                  Gilles Van Assche and
                  Ronny Van Keer and
                  Beno{\^{\i}}t Viguier},
  editor       = {Bart Preneel and
                  Frederik Vercauteren},
  title        = {KangarooTwelve: Fast Hashing Based on Keccak-p},
  booktitle    = {Applied Cryptography and Network Security - 16th International Conference,
                  {ACNS} 2018, Leuven, Belgium, July 2-4, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10892},
  pages        = {400--418},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93387-0\_21},
  doi          = {10.1007/978-3-319-93387-0\_21},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/BertoniDPAKV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/SamwelBBDS18,
  author       = {Niels Samwel and
                  Lejla Batina and
                  Guido Bertoni and
                  Joan Daemen and
                  Ruggero Susella},
  editor       = {Nigel P. Smart},
  title        = {Breaking Ed25519 in WolfSSL},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers' Track at
                  the {RSA} Conference 2018, San Francisco, CA, USA, April 16-20, 2018,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10808},
  pages        = {1--20},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76953-0\_1},
  doi          = {10.1007/978-3-319-76953-0\_1},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/SamwelBBDS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/ZaccariaMMB18,
  author       = {Vittorio Zaccaria and
                  Maria Chiara Molteni and
                  Filippo Melzani and
                  Guido Bertoni},
  title        = {Darth's Saber: {A} Key Exfiltration Attack for Symmetric Ciphers Using
                  Laser Light},
  booktitle    = {2018 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC}
                  2018, Amsterdam, The Netherlands, September 13, 2018},
  pages        = {23--26},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/FDTC.2018.00012},
  doi          = {10.1109/FDTC.2018.00012},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fdtc/ZaccariaMMB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Bertoni0M18,
  author       = {Guido Marco Bertoni and
                  Lorenzo Grassi and
                  Filippo Melzani},
  title        = {Simulations of Optical Emissions for Attacking {AES} and Masked {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {291},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/291},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Bertoni0M18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BertoniDHPAK18,
  author       = {Guido Bertoni and
                  Joan Daemen and
                  Seth Hoffert and
                  Micha{\"{e}}l Peeters and
                  Gilles Van Assche and
                  Ronny Van Keer},
  title        = {The authenticated encryption schemes Kravatte-SANE and Kravatte-SANSE},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1012},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1012},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BertoniDHPAK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jhss/BertoniMM17,
  author       = {Guido Bertoni and
                  Marco Martinoli and
                  Maria Chiara Molteni},
  title        = {A Methodology for the Characterisation of Leakages in Combinatorial
                  Logic},
  journal      = {J. Hardw. Syst. Secur.},
  volume       = {1},
  number       = {3},
  pages        = {269--281},
  year         = {2017},
  url          = {https://doi.org/10.1007/s41635-017-0015-0},
  doi          = {10.1007/S41635-017-0015-0},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jhss/BertoniMM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BertoniDHPAK17,
  author       = {Guido Bertoni and
                  Joan Daemen and
                  Seth Hoffert and
                  Micha{\"{e}}l Peeters and
                  Gilles Van Assche and
                  Ronny Van Keer},
  title        = {Farfalle: parallel permutation-based cryptography},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {4},
  pages        = {1--38},
  year         = {2017},
  url          = {https://tosc.iacr.org/index.php/ToSC/article/view/801},
  timestamp    = {Mon, 08 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/BertoniDHPAK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SamwelBBDS17,
  author       = {Niels Samwel and
                  Lejla Batina and
                  Guido Bertoni and
                  Joan Daemen and
                  Ruggero Susella},
  title        = {Breaking Ed25519 in WolfSSL},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {985},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/985},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SamwelBBDS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jetc/BarenghiBBPSS16,
  author       = {Alessandro Barenghi and
                  Guido Marco Bertoni and
                  Luca Breveglieri and
                  Gerardo Pelosi and
                  Stefano Sanfilippo and
                  Ruggero Susella},
  title        = {A Fault-Based Secret Key Retrieval Method for {ECDSA:} Analysis and
                  Countermeasure},
  journal      = {{ACM} J. Emerg. Technol. Comput. Syst.},
  volume       = {13},
  number       = {1},
  pages        = {8:1--8:26},
  year         = {2016},
  url          = {https://doi.org/10.1145/2767132},
  doi          = {10.1145/2767132},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jetc/BarenghiBBPSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BossiAB16,
  author       = {Simone Bossi and
                  Tea Anselmo and
                  Guido Bertoni},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {On {TLS} 1.3 - Early Performance Analysis in the IoT Field},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {117--125},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005688901170125},
  doi          = {10.5220/0005688901170125},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/BossiAB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/space/BertoniM16,
  author       = {Guido Bertoni and
                  Marco Martinoli},
  editor       = {Claude Carlet and
                  M. Anwar Hasan and
                  Vishal Saraswat},
  title        = {A Methodology for the Characterisation of Leakages in Combinatorial
                  Logic},
  booktitle    = {Security, Privacy, and Applied Cryptography Engineering - 6th International
                  Conference, {SPACE} 2016, Hyderabad, India, December 14-18, 2016,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10076},
  pages        = {363--382},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49445-6\_21},
  doi          = {10.1007/978-3-319-49445-6\_21},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/space/BertoniM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BertoniDPAK16,
  author       = {Guido Bertoni and
                  Joan Daemen and
                  Micha{\"{e}}l Peeters and
                  Gilles Van Assche and
                  Ronny Van Keer},
  title        = {KangarooTwelve: fast hashing based on Keccak-p},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {770},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/770},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BertoniDPAK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BertoniM16,
  author       = {Guido Bertoni and
                  Marco Martinoli},
  title        = {A Methodology for the Characterisation of Leakages in Combinatorial
                  Logic},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {841},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/841},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BertoniM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BertoniDPAK16a,
  author       = {Guido Bertoni and
                  Joan Daemen and
                  Micha{\"{e}}l Peeters and
                  Gilles Van Assche and
                  Ronny Van Keer},
  title        = {Farfalle: parallel permutation-based cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1188},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1188},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BertoniDPAK16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/space/BertoniGM15,
  author       = {Guido Marco Bertoni and
                  Lorenzo Grassi and
                  Filippo Melzani},
  editor       = {Rajat Subhra Chakraborty and
                  Peter Schwabe and
                  Jon A. Solworth},
  title        = {Simulations of Optical Emissions for Attacking {AES} and Masked {AES}},
  booktitle    = {Security, Privacy, and Applied Cryptography Engineering - 5th International
                  Conference, {SPACE} 2015, Jaipur, India, October 3-7, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9354},
  pages        = {172--189},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24126-5\_11},
  doi          = {10.1007/978-3-319-24126-5\_11},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/space/BertoniGM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BertoniDPA15,
  author       = {Guido Bertoni and
                  Joan Daemen and
                  Micha{\"{e}}l Peeters and
                  Gilles Van Assche},
  title        = {Keccak},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {389},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/389},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BertoniDPA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/BertoniDPA14,
  author       = {Guido Bertoni and
                  Joan Daemen and
                  Micha{\"{e}}l Peeters and
                  Gilles Van Assche},
  title        = {The Making of {KECCAK}},
  journal      = {Cryptologia},
  volume       = {38},
  number       = {1},
  pages        = {26--60},
  year         = {2014},
  url          = {https://doi.org/10.1080/01611194.2013.856818},
  doi          = {10.1080/01611194.2013.856818},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/BertoniDPA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BertoniDPA14,
  author       = {Guido Bertoni and
                  Joan Daemen and
                  Micha{\"{e}}l Peeters and
                  Gilles Van Assche},
  title        = {Sufficient conditions for sound tree and sequential hashing modes},
  journal      = {Int. J. Inf. Sec.},
  volume       = {13},
  number       = {4},
  pages        = {335--353},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10207-013-0220-y},
  doi          = {10.1007/S10207-013-0220-Y},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/BertoniDPA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BertoniC14,
  author       = {Guido Bertoni and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Introduction to the {CHES} 2013 special issue},
  journal      = {J. Cryptogr. Eng.},
  volume       = {4},
  number       = {1},
  pages        = {1},
  year         = {2014},
  url          = {https://doi.org/10.1007/s13389-014-0076-8},
  doi          = {10.1007/S13389-014-0076-8},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jce/BertoniC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BertoniDPA14,
  author       = {Guido Bertoni and
                  Joan Daemen and
                  Micha{\"{e}}l Peeters and
                  Gilles Van Assche},
  editor       = {Ioana Boureanu and
                  Philippe Owesarski and
                  Serge Vaudenay},
  title        = {Sakura: {A} Flexible Coding for Tree Hashing},
  booktitle    = {Applied Cryptography and Network Security - 12th International Conference,
                  {ACNS} 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8479},
  pages        = {217--234},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-07536-5\_14},
  doi          = {10.1007/978-3-319-07536-5\_14},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/BertoniDPA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/BarenghiBBP13,
  author       = {Alessandro Barenghi and
                  Guido Marco Bertoni and
                  Luca Breveglieri and
                  Gerardo Pelosi},
  title        = {A fault induction technique based on voltage underfeeding with application
                  to attacks against {AES} and {RSA}},
  journal      = {J. Syst. Softw.},
  volume       = {86},
  number       = {7},
  pages        = {1864--1878},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jss.2013.02.021},
  doi          = {10.1016/J.JSS.2013.02.021},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jss/BarenghiBBP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BertoniDPA13,
  author       = {Guido Bertoni and
                  Joan Daemen and
                  Micha{\"{e}}l Peeters and
                  Gilles Van Assche},
  editor       = {Thomas Johansson and
                  Phong Q. Nguyen},
  title        = {Keccak},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Athens, Greece, May 26-30, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7881},
  pages        = {313--314},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38348-9\_19},
  doi          = {10.1007/978-3-642-38348-9\_19},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BertoniDPA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ches/2013,
  editor       = {Guido Bertoni and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International
                  Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8086},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40349-1},
  doi          = {10.1007/978-3-642-40349-1},
  isbn         = {978-3-642-40348-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BertoniDDLPA13,
  author       = {Guido Bertoni and
                  Joan Daemen and
                  Nicolas Debande and
                  Thanh{-}Ha Le and
                  Micha{\"{e}}l Peeters and
                  Gilles Van Assche},
  title        = {Power Analysis of Hardware Implementations Protected with Secret Sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {67},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/067},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BertoniDDLPA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BertoniDPA13,
  author       = {Guido Bertoni and
                  Joan Daemen and
                  Micha{\"{e}}l Peeters and
                  Gilles Van Assche},
  title        = {Sakura: a flexible coding for tree hashing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {231},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/231},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BertoniDPA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/micro/BertoniDDLPA12,
  author       = {Guido Bertoni and
                  Joan Daemen and
                  Nicolas Debande and
                  Thanh{-}Ha Le and
                  Micha{\"{e}}l Peeters and
                  Gilles Van Assche},
  title        = {Power analysis of hardware implementations protected with secret sharing},
  booktitle    = {45th Annual {IEEE/ACM} International Symposium on Microarchitecture,
                  {MICRO} 2012, Workshops Proceedings, Vancouver, BC, Canada, December
                  1-5, 2012},
  pages        = {9--16},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/MICROW.2012.12},
  doi          = {10.1109/MICROW.2012.12},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/micro/BertoniDDLPA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/BarenghiBBPP12,
  author       = {Alessandro Barenghi and
                  Guido Marco Bertoni and
                  Luca Breveglieri and
                  Mauro Pellicioli and
                  Gerardo Pelosi},
  editor       = {Marc Joye and
                  Michael Tunstall},
  title        = {Injection Technologies for Fault Attacks on Microprocessors},
  booktitle    = {Fault Analysis in Cryptography},
  series       = {Information Security and Cryptography},
  pages        = {275--293},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29656-7\_16},
  doi          = {10.1007/978-3-642-29656-7\_16},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/isc/BarenghiBBPP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fdtc/2012,
  editor       = {Guido Bertoni and
                  Benedikt Gierlichs},
  title        = {2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, Leuven,
                  Belgium, September 9, 2012},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6305022/proceeding},
  isbn         = {978-1-4673-2900-2},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fdtc/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsd/BarenghiBSM11,
  author       = {Alessandro Barenghi and
                  Guido Bertoni and
                  Fabrizio De Santis and
                  Filippo Melzani},
  title        = {On the Efficiency of Design Time Evaluation of the Resistance to Power
                  Attacks},
  booktitle    = {14th Euromicro Conference on Digital System Design, Architectures,
                  Methods and Tools, {DSD} 2011, August 31 - September 2, 2011, Oulu,
                  Finland},
  pages        = {777--785},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/DSD.2011.103},
  doi          = {10.1109/DSD.2011.103},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsd/BarenghiBSM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/BarenghiBPS11,
  author       = {Alessandro Barenghi and
                  Guido Bertoni and
                  Andrea Palomba and
                  Ruggero Susella},
  title        = {A novel fault attack against {ECDSA}},
  booktitle    = {{HOST} 2011, Proceedings of the 2011 {IEEE} International Symposium
                  on Hardware-Oriented Security and Trust (HOST), 5-6 June 2011, San
                  Diego, California, {USA}},
  pages        = {161--166},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/HST.2011.5955015},
  doi          = {10.1109/HST.2011.5955015},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/BarenghiBPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/BertoniDPA11,
  author       = {Guido Bertoni and
                  Joan Daemen and
                  Micha{\"{e}}l Peeters and
                  Gilles Van Assche},
  editor       = {Ali Miri and
                  Serge Vaudenay},
  title        = {Duplexing the Sponge: Single-Pass Authenticated Encryption and Other
                  Applications},
  booktitle    = {Selected Areas in Cryptography - 18th International Workshop, {SAC}
                  2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7118},
  pages        = {320--337},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-28496-0\_19},
  doi          = {10.1007/978-3-642-28496-0\_19},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/BertoniDPA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/BarenghiBBPP11,
  author       = {Alessandro Barenghi and
                  Guido Marco Bertoni and
                  Luca Breveglieri and
                  Gerardo Pelosi and
                  Andrea Palomba},
  editor       = {Mehmet A. Orgun and
                  Atilla El{\c{c}}i and
                  Oleg B. Makarevich and
                  Sorin A. Huss and
                  Josef Pieprzyk and
                  Lyudmila K. Babenko and
                  Alexander G. Chefranov and
                  Rajan Shankaran},
  title        = {Fault attack to the elliptic curve digital signature algorithm with
                  multiple bit faults},
  booktitle    = {Proceedings of the 4th International Conference on Security of Information
                  and Networks, {SIN} 2011, Sydney, NSW, Australia, November 14-19,
                  2011},
  pages        = {63--72},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2070425.2070438},
  doi          = {10.1145/2070425.2070438},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/BarenghiBBPP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BertoniDPA11,
  author       = {Guido Bertoni and
                  Joan Daemen and
                  Micha{\"{e}}l Peeters and
                  Gilles Van Assche},
  title        = {Duplexing the sponge: single-pass authenticated encryption and other
                  applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {499},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/499},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BertoniDPA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/BarenghiBBPP10,
  author       = {Alessandro Barenghi and
                  Guido Marco Bertoni and
                  Luca Breveglieri and
                  Mauro Pellicioli and
                  Gerardo Pelosi},
  title        = {Fault attack on {AES} with single-bit induced faults},
  booktitle    = {Sixth International Conference on Information Assurance and Security,
                  {IAS} 2010, Atlanta, GA, USA, August 23-25, 2010},
  pages        = {167--172},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ISIAS.2010.5604061},
  doi          = {10.1109/ISIAS.2010.5604061},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/BarenghiBBPP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BertoniDPA10,
  author       = {Guido Bertoni and
                  Joan Daemen and
                  Micha{\"{e}}l Peeters and
                  Gilles Van Assche},
  editor       = {Stefan Mangard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Sponge-Based Pseudo-Random Number Generators},
  booktitle    = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International
                  Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6225},
  pages        = {33--47},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15031-9\_3},
  doi          = {10.1007/978-3-642-15031-9\_3},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/BertoniDPA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/BarenghiBBPP10,
  author       = {Alessandro Barenghi and
                  Guido Bertoni and
                  Luca Breveglieri and
                  Mauro Pellicioli and
                  Gerardo Pelosi},
  editor       = {Jim Plusquellic and
                  Ken Mai},
  title        = {Low Voltage Fault Attacks to {AES}},
  booktitle    = {{HOST} 2010, Proceedings of the 2010 {IEEE} International Symposium
                  on Hardware-Oriented Security and Trust (HOST), 13-14 June 2010, Anaheim
                  Convention Center, California, {USA}},
  pages        = {7--12},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/HST.2010.5513121},
  doi          = {10.1109/HST.2010.5513121},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/BarenghiBBPP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/10/BertoniM10,
  author       = {Guido Marco Bertoni and
                  Filippo Melzani},
  editor       = {Ingrid M. R. Verbauwhede},
  title        = {Secret Key Crypto Implementations},
  booktitle    = {Secure Integrated Circuits and Systems},
  series       = {Integrated Circuits and Systems},
  pages        = {45--62},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-0-387-71829-3\_3},
  doi          = {10.1007/978-0-387-71829-3\_3},
  timestamp    = {Wed, 26 Jun 2019 18:00:01 +0200},
  biburl       = {https://dblp.org/rec/books/sp/10/BertoniM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarenghiBBPP10,
  author       = {Alessandro Barenghi and
                  Guido Bertoni and
                  Luca Breveglieri and
                  Mauro Pellicioli and
                  Gerardo Pelosi},
  title        = {Low Voltage Fault Attacks to {AES} and {RSA} on General Purpose Processors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {130},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/130},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarenghiBBPP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/BarenghiBPP09,
  author       = {Alessandro Barenghi and
                  Guido Bertoni and
                  Emanuele Parrinello and
                  Gerardo Pelosi},
  editor       = {Luca Breveglieri and
                  Israel Koren and
                  David Naccache and
                  Elisabeth Oswald and
                  Jean{-}Pierre Seifert},
  title        = {Low Voltage Fault Attacks on the {RSA} Cryptosystem},
  booktitle    = {Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography,
                  {FDTC} 2009, Lausanne, Switzerland, 6 September 2009},
  pages        = {23--31},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/FDTC.2009.30},
  doi          = {10.1109/FDTC.2009.30},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fdtc/BarenghiBPP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itng/BertoniBCMS09,
  author       = {Guido Marco Bertoni and
                  Luca Breveglieri and
                  Alessandro Cominola and
                  Filippo Melzani and
                  Ruggero Susella},
  editor       = {Shahram Latifi},
  title        = {Practical Power Analysis Attacks to {RSA} on a Large {IP} Portfolio
                  SoC},
  booktitle    = {Sixth International Conference on Information Technology: New Generations,
                  {ITNG} 2009, Las Vegas, Nevada, USA, 27-29 April 2009},
  pages        = {455--460},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ITNG.2009.189},
  doi          = {10.1109/ITNG.2009.189},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itng/BertoniBCMS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/BertoniDPA09,
  author       = {Guido Bertoni and
                  Joan Daemen and
                  Micha{\"{e}}l Peeters and
                  Gilles Van Assche},
  editor       = {Helena Handschuh and
                  Stefan Lucks and
                  Bart Preneel and
                  Phillip Rogaway},
  title        = {Sufficient conditions for sound tree hashing modes},
  booktitle    = {Symmetric Cryptography, 11.01. - 16.01.2009},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {09031},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany},
  year         = {2009},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2009/1946/},
  timestamp    = {Thu, 10 Jun 2021 13:02:06 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/BertoniDPA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/BertoniDPA09a,
  author       = {Guido Bertoni and
                  Joan Daemen and
                  Micha{\"{e}}l Peeters and
                  Gilles Van Assche},
  editor       = {Helena Handschuh and
                  Stefan Lucks and
                  Bart Preneel and
                  Phillip Rogaway},
  title        = {The Road from Panama to Keccak via RadioGat{\'{u}}n},
  booktitle    = {Symmetric Cryptography, 11.01. - 16.01.2009},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {09031},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany},
  year         = {2009},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2009/1958/},
  timestamp    = {Thu, 23 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/BertoniDPA09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BertoniDPA09,
  author       = {Guido Bertoni and
                  Joan Daemen and
                  Micha{\"{e}}l Peeters and
                  Gilles Van Assche},
  title        = {Sufficient conditions for sound tree and sequential hashing modes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {210},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/210},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BertoniDPA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/BertoniBFP08,
  author       = {Guido Marco Bertoni and
                  Luca Breveglieri and
                  Pasqualina Fragneto and
                  Gerardo Pelosi},
  title        = {Parallel Hardware Architectures for the Cryptographic Tate Pairing},
  journal      = {Int. J. Netw. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {31--37},
  year         = {2008},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v7-n1/ijns-2008-v7-n1-p31-37.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/BertoniBFP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/BertoniBCFHP08,
  author       = {Guido Bertoni and
                  Luca Breveglieri and
                  Liqun Chen and
                  Pasqualina Fragneto and
                  Keith A. Harrison and
                  Gerardo Pelosi},
  title        = {A pairing {SW} implementation for Smart-Cards},
  journal      = {J. Syst. Softw.},
  volume       = {81},
  number       = {7},
  pages        = {1240--1247},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.jss.2007.09.022},
  doi          = {10.1016/J.JSS.2007.09.022},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jss/BertoniBCFHP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/GuilleySHPBC08,
  author       = {Sylvain Guilley and
                  Laurent Sauvage and
                  Philippe Hoogvorst and
                  Renaud Pacalet and
                  Guido Marco Bertoni and
                  Sumanta Chaudhuri},
  title        = {Security Evaluation of {WDDL} and SecLib Countermeasures against Power
                  Attacks},
  journal      = {{IEEE} Trans. Computers},
  volume       = {57},
  number       = {11},
  pages        = {1482--1497},
  year         = {2008},
  url          = {https://doi.org/10.1109/TC.2008.109},
  doi          = {10.1109/TC.2008.109},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/GuilleySHPBC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BertoniDPA08,
  author       = {Guido Bertoni and
                  Joan Daemen and
                  Micha{\"{e}}l Peeters and
                  Gilles Van Assche},
  editor       = {Nigel P. Smart},
  title        = {On the Indifferentiability of the Sponge Construction},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2008, 27th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Istanbul, Turkey, April 13-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4965},
  pages        = {181--197},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78967-3\_11},
  doi          = {10.1007/978-3-540-78967-3\_11},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BertoniDPA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itng/BarenghiBBP08,
  author       = {Alessandro Barenghi and
                  Guido Bertoni and
                  Luca Breveglieri and
                  Gerardo Pelosi},
  editor       = {Shahram Latifi},
  title        = {A {FPGA} Coprocessor for the Cryptographic Tate Pairing over Fp},
  booktitle    = {Fifth International Conference on Information Technology: New Generations
                  {(ITNG} 2008), 7-8 April 2008, Las Vegas, Nevada, {USA}},
  pages        = {112--119},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ITNG.2008.260},
  doi          = {10.1109/ITNG.2008.260},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itng/BarenghiBBP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BertoniBFR08,
  author       = {Guido Marco Bertoni and
                  Luca Breveglieri and
                  Roberto Farina and
                  Francesco Regazzoni},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {A 640 Mbit/S 32-Bit Pipelined Implementation of the {AES} Algorithm},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {453--459},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Tue, 31 Mar 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BertoniBFR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asap/BertoniBRR06,
  author       = {Guido Bertoni and
                  Luca Breveglieri and
                  Roberto Farina and
                  Francesco Regazzoni},
  title        = {Speeding Up {AES} By Extending a 32 bit Processor Instruction Set},
  booktitle    = {2006 {IEEE} International Conference on Application-Specific Systems,
                  Architecture and Processors {(ASAP} 2006), 11-13 September 2006, Steamboat
                  Springs, Colorado, {USA}},
  pages        = {275--282},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ASAP.2006.62},
  doi          = {10.1109/ASAP.2006.62},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asap/BertoniBRR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/BertoniBFPS06,
  author       = {Guido Bertoni and
                  Luca Breveglieri and
                  Pasqualina Fragneto and
                  Gerardo Pelosi and
                  Luigi Sportiello},
  editor       = {Georges G. E. Gielen},
  title        = {Software implementation of Tate pairing over GF(2\({}^{\mbox{m}}\))},
  booktitle    = {Proceedings of the Conference on Design, Automation and Test in Europe:
                  Designers' Forum, {DATE} 2006, Munich, Germany, March 6-10, 2006},
  pages        = {7--11},
  publisher    = {European Design and Automation Association, Leuven, Belgium},
  year         = {2006},
  url          = {https://doi.org/10.1109/DATE.2006.244156},
  doi          = {10.1109/DATE.2006.244156},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/date/BertoniBFPS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/WollingerBBP06,
  author       = {Thomas J. Wollinger and
                  Guido Bertoni and
                  Luca Breveglieri and
                  Christof Paar},
  editor       = {Marina L. Gavrilova and
                  Osvaldo Gervasi and
                  Vipin Kumar and
                  Chih Jeng Kenneth Tan and
                  David Taniar and
                  Antonio Lagan{\`{a}} and
                  Youngsong Mun and
                  Hyunseung Choo},
  title        = {Performance of {HECC} Coprocessors Using Inversion-Free Formulae},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2006, International
                  Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3982},
  pages        = {1004--1012},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11751595\_105},
  doi          = {10.1007/11751595\_105},
  timestamp    = {Thu, 28 Apr 2022 16:17:38 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsa/WollingerBBP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itng/BertoniBFP06,
  author       = {Guido Bertoni and
                  Luca Breveglieri and
                  Pasqualina Fragneto and
                  Gerardo Pelosi},
  title        = {Parallel Hardware Architectures for the Cryptographic Tate Pairing},
  booktitle    = {Third International Conference on Information Technology: New Generations
                  {(ITNG} 2006), 10-12 April 2006, Las Vegas, Nevada, {USA}},
  pages        = {186--191},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ITNG.2006.107},
  doi          = {10.1109/ITNG.2006.107},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itng/BertoniBFP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itng/BertoniBV06,
  author       = {Guido Bertoni and
                  Luca Breveglieri and
                  Matteo Venturi},
  title        = {{ECC} Hardware Coprocessors for 8-bit Systems and Power Consumption
                  Considerations},
  booktitle    = {Third International Conference on Information Technology: New Generations
                  {(ITNG} 2006), 10-12 April 2006, Las Vegas, Nevada, {USA}},
  pages        = {573--574},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ITNG.2006.55},
  doi          = {10.1109/ITNG.2006.55},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itng/BertoniBV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/BertoniBV06,
  author       = {Guido Bertoni and
                  Luca Breveglieri and
                  Matteo Venturi},
  title        = {Power Aware Design of an Elliptic Curve Coprocessor for 8 bit Platforms},
  booktitle    = {4th {IEEE} Conference on Pervasive Computing and Communications Workshops
                  (PerCom 2006 Workshops), 13-17 March 2006, Pisa, Italy},
  pages        = {337--341},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/PERCOMW.2006.110},
  doi          = {10.1109/PERCOMW.2006.110},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/BertoniBV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BertoniDPA06,
  author       = {Guido Bertoni and
                  Joan Daemen and
                  Micha{\"{e}}l Peeters and
                  Gilles Van Assche},
  title        = {RadioGat{\'{u}}n, a belt-and-mill hash function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {369},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/369},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BertoniDPA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itcc/BertoniZBMP05,
  author       = {Guido Bertoni and
                  Vittorio Zaccaria and
                  Luca Breveglieri and
                  Matteo Monchiero and
                  Gianluca Palermo},
  title        = {{AES} Power Attack Based on Induced Cache Miss and Countermeasure},
  booktitle    = {International Symposium on Information Technology: Coding and Computing
                  {(ITCC} 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, {USA}},
  pages        = {586--591},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ITCC.2005.62},
  doi          = {10.1109/ITCC.2005.62},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itcc/BertoniZBMP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itcc/SozzaniBTB05,
  author       = {Fabio Sozzani and
                  Guido Bertoni and
                  Stefano Turcato and
                  Luca Breveglieri},
  title        = {A Parallelized Design for an Elliptic Curve Cryptosystem Coprocessor},
  booktitle    = {International Symposium on Information Technology: Coding and Computing
                  {(ITCC} 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, {USA}},
  pages        = {626--630},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ITCC.2005.25},
  doi          = {10.1109/ITCC.2005.25},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itcc/SozzaniBTB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/it/Bertoni04,
  author       = {Guido Bertoni},
  title        = {Efficient and reliable algorithms and architectures for innovative
                  complex cryptographic systems},
  school       = {Polytechnic University of Milan, Italy},
  year         = {2004},
  url          = {https://opac.bncf.firenze.sbn.it/bncf-prod/resource?uri=BNI0007112},
  timestamp    = {Wed, 29 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/it/Bertoni04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dft/BertoniBKM04,
  author       = {Guido Bertoni and
                  Luca Breveglieri and
                  Israel Koren and
                  Paolo Maistri},
  title        = {An Efficient Hardware-Based Fault Diagnosis Scheme for {AES:} Performances
                  and Cost},
  booktitle    = {19th {IEEE} International Symposium on Defect and Fault-Tolerance
                  in {VLSI} Systems {(DFT} 2004), 10-13 October 2004, Cannes, France,
                  Proceedings},
  pages        = {130--138},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.ieeecomputersociety.org/10.1109/DFT.2004.8},
  doi          = {10.1109/DFT.2004.8},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dft/BertoniBKM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/glvlsi/BertoniMNF04,
  author       = {Guido Bertoni and
                  Marco Macchetti and
                  Luca Negri and
                  Pasqualina Fragneto},
  editor       = {David Garrett and
                  John C. Lach and
                  Charles A. Zukowski},
  title        = {Power-efficient {ASIC} synthesis of cryptographic sboxes},
  booktitle    = {Proceedings of the 14th {ACM} Great Lakes Symposium on {VLSI} 2004,
                  Boston, MA, USA, April 26-28, 2004},
  pages        = {277--281},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/988952.989019},
  doi          = {10.1145/988952.989019},
  timestamp    = {Fri, 20 Aug 2021 16:30:37 +0200},
  biburl       = {https://dblp.org/rec/conf/glvlsi/BertoniMNF04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itcc/BertoniBWP04,
  author       = {Guido Bertoni and
                  Luca Breveglieri and
                  Thomas J. Wollinger and
                  Christof Paar},
  title        = {Finding Optimum Parallel Coprocessor Design for Genus 2 Hyperelliptic
                  Curve Cryptosystems},
  booktitle    = {International Conference on Information Technology: Coding and Computing
                  (ITCC'04), Volume 2, April 5-7, 2004, Las Vegas, Nevada, {USA}},
  pages        = {538},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/ITCC.2004.1286710},
  doi          = {10.1109/ITCC.2004.1286710},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itcc/BertoniBWP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BertoniBWP04,
  author       = {Guido Bertoni and
                  Luca Breveglieri and
                  Thomas J. Wollinger and
                  Christof Paar},
  title        = {Finding Optimum Parallel Coprocessor Design for Genus 2 Hyperelliptic
                  Curve Cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {29},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/029},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BertoniBWP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/BertoniBKMP03,
  author       = {Guido Bertoni and
                  Luca Breveglieri and
                  Israel Koren and
                  Paolo Maistri and
                  Vincenzo Piuri},
  title        = {Error Analysis and Detection Procedures for a Hardware Implementation
                  of the Advanced Encryption Standard},
  journal      = {{IEEE} Trans. Computers},
  volume       = {52},
  number       = {4},
  pages        = {492--505},
  year         = {2003},
  url          = {https://doi.org/10.1109/TC.2003.1190590},
  doi          = {10.1109/TC.2003.1190590},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tc/BertoniBKMP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asap/BertoniBKMP03,
  author       = {Guido Bertoni and
                  Luca Breveglieri and
                  Israel Koren and
                  Paolo Maistri and
                  Vincenzo Piuri},
  title        = {Concurrent Fault Detection in a Hardware Implementation of the {RC5}
                  Encryption Algorithm},
  booktitle    = {14th {IEEE} International Conference on Application-Specific Systems,
                  Architectures, and Processors {(ASAP} 2003), 24-26 June 2003, The
                  Hague, The Netherlands},
  pages        = {423--432},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/ASAP.2003.1212865},
  doi          = {10.1109/ASAP.2003.1212865},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asap/BertoniBKMP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/BertoniGKOPW03,
  author       = {Guido Bertoni and
                  Jorge Guajardo and
                  Sandeep S. Kumar and
                  Gerardo Orlando and
                  Christof Paar and
                  Thomas J. Wollinger},
  editor       = {Marc Joye},
  title        = {Efficient GF(p\({}^{\mbox{m}}\)) Arithmetic Architectures for Cryptographic
                  Applications},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2003, The Cryptographers' Track at
                  the {RSA} Conference 2003, San Francisco, CA, USA, April 13-17, 2003,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2612},
  pages        = {158--175},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36563-X\_11},
  doi          = {10.1007/3-540-36563-X\_11},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/BertoniGKOPW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dft/BertoniBKMP03,
  author       = {Guido Bertoni and
                  Luca Breveglieri and
                  Israel Koren and
                  Paolo Maistri and
                  Vincenzo Piuri},
  title        = {Detecting and Locating Faults in {VLSI} Implementations of the Advanced
                  Encryption Standard},
  booktitle    = {18th {IEEE} International Symposium on Defect and Fault-Tolerance
                  in {VLSI} Systems {(DFT} 2003), 3-5 November 2003, Boston, MA, USA,
                  Proceedings},
  pages        = {105},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/DFTVS.2003.1250101},
  doi          = {10.1109/DFTVS.2003.1250101},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dft/BertoniBKMP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/BertoniGO03,
  author       = {Guido Bertoni and
                  Jorge Guajardo and
                  Gerardo Orlando},
  editor       = {Thomas Johansson and
                  Subhamoy Maitra},
  title        = {Systolic and Scalable Architectures for Digit-Serial Multiplication
                  in Fields GF(p\({}^{\mbox{m}}\))},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2003, 4th International Conference
                  on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2904},
  pages        = {349--362},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24582-7\_26},
  doi          = {10.1007/978-3-540-24582-7\_26},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/indocrypt/BertoniGO03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/BertoniBABFMZ03,
  author       = {Guido Bertoni and
                  A. Bircan and
                  Luca Breveglieri and
                  Pasqualina Fragneto and
                  Marco Macchetti and
                  Vittorio Zaccaria},
  title        = {About the performances of the Advanced Encryption Standard in embedded
                  systems with cache memory},
  booktitle    = {Proceedings of the 2003 International Symposium on Circuits and Systems,
                  {ISCAS} 2003, Bangkok, Thailand, May 25-28, 2003},
  pages        = {145--148},
  publisher    = {{IEEE}},
  year         = {2003},
  url          = {https://doi.org/10.1109/ISCAS.2003.1206212},
  doi          = {10.1109/ISCAS.2003.1206212},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/iscas/BertoniBABFMZ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asap/BertoniBKMP02,
  author       = {Guido Bertoni and
                  Luca Breveglieri and
                  Israel Koren and
                  Paolo Maistri and
                  Vincenzo Piuri},
  title        = {On the Propagation of Faults and Their Detection in a Hardware Implementation
                  of the Advanced Encryption Standard},
  booktitle    = {13th {IEEE} International Conference on Application-Specific Systems,
                  Architectures, and Processors {(ASAP} 2002), 17-19 July 2002, San
                  Jose, CA, {USA}},
  pages        = {303},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/ASAP.2002.1030729},
  doi          = {10.1109/ASAP.2002.1030729},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asap/BertoniBKMP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BertoniBFMM02,
  author       = {Guido Bertoni and
                  Luca Breveglieri and
                  Pasqualina Fragneto and
                  Marco Macchetti and
                  Stefano Marchesin},
  editor       = {Burton S. Kaliski Jr. and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Efficient Software Implementation of {AES} on 32-Bit Platforms},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International
                  Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2523},
  pages        = {159--171},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36400-5\_13},
  doi          = {10.1007/3-540-36400-5\_13},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/BertoniBFMM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dft/BertoniBKMP02,
  author       = {Guido Bertoni and
                  Luca Breveglieri and
                  Israel Koren and
                  Paolo Maistri and
                  Vincenzo Piuri},
  title        = {A Parity Code Based Fault Detection for an Implementation of the Advanced
                  Encryption Standard},
  booktitle    = {17th {IEEE} International Symposium on Defect and Fault-Tolerance
                  in {VLSI} Systems {(DFT} 2002), 6-8 November 2002, Vancouver, BC,
                  Canada, Proceedings},
  pages        = {51--59},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/DFTVS.2002.1173501},
  doi          = {10.1109/DFTVS.2002.1173501},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dft/BertoniBKMP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/BertoniBF01,
  author       = {Guido Bertoni and
                  Luca Breveglieri and
                  Pasqualina Fragneto},
  editor       = {Wolfgang Nebel and
                  Ahmed Jerraya},
  title        = {Efficient finite field digital-serial multiplier architecture for
                  cryptography applications},
  booktitle    = {Proceedings of the Conference on Design, Automation and Test in Europe,
                  {DATE} 2001, Munich, Germany, March 12-16, 2001},
  pages        = {812},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/DATE.2001.915150},
  doi          = {10.1109/DATE.2001.915150},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/date/BertoniBF01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics