New techniques for trail bounds and application to differential trails in Keccak S Mella, JJC Daemen, GV Assche | 41 | 2017 |
On the homomorphic computation of symmetric cryptographic primitives S Mella, R Susella Cryptography and Coding: 14th IMA International Conference, IMACC 2013 …, 2013 | 22 | 2013 |
Method for performing an encryption of an AES type, and corresponding system and computer program product R Susella, S Mella US Patent 9,425,961, 2016 | 13 | 2016 |
Improved differential and linear trail bounds for ASCON S El Hirch, S Mella, A Mehrdad, J Daemen IACR Transactions on Symmetric Cryptology, 145-178, 2022 | 12 | 2022 |
The role of the fault model in DFA against AES C Ferretti, S Mella, F Melzani Proceedings of the Third Workshop on Hardware and Architectural Support for …, 2014 | 8 | 2014 |
Tighter trail bounds for Xoodoo J Daemen, S Mella, G Van Assche Cryptology ePrint Archive, 2022 | 7 | 2022 |
Computing the Distribution of Differentials over the Non-linear Mapping J Daemen, A Mehrdad, S Mella International Conference on Security, Privacy, and Applied Cryptography …, 2021 | 7 | 2021 |
Committing authenticated encryption based on SHAKE J Daemen, S Mella, G Van Assche Cryptology ePrint Archive, 2023 | 6 | 2023 |
Differential trail search in cryptographic primitives with big-circle chi: Application to subterranean A Mehrdad, S Mella, L Grassi, J Daemen | 6 | 2022 |
Strengthening sequential side-channel attacks through change detection L Frittoli, M Bocchi, S Mella, D Carrera, B Rossi, P Fragneto, R Susella, ... IACR Transactions on Cryptographic Hardware and Embedded Systems 2020 (3), 1-21, 2020 | 4 | 2020 |
New Results for Partial Key Exposure on RSA with Exponent Blinding S Cimato, S Mella, R Susella 12th International Conference on Security and Cryptography, 136-147, 2015 | 3 | 2015 |
Profiled side channel attacks against the RSA cryptosystem using neural networks A Barenghi, D Carrera, S Mella, A Pace, G Pelosi, R Susella Journal of Information Security and Applications 66, 103122, 2022 | 2 | 2022 |
Partial key exposure attacks on RSA with exponent blinding S Cimato, S Mella, R Susella E-Business and Telecommunications: 12th International Joint Conference …, 2016 | 2 | 2016 |
Propagation properties of a non-linear mapping based on squaring in odd characteristic J Daemen, D Kuijsters, S Mella, D Verbakel Cryptography and Communications, 1-15, 2024 | 1 | 2024 |
Xoodyak Under SCA Siege PA Eliasi, S Mella, L Weissbart, L Batina, S Picek 2024 27th International Symposium on Design & Diagnostics of Electronic …, 2024 | 1 | 2024 |
Xoodyak, an update J Daemen, S Hoffert, S Mella, M Peeters, G Van Assche, R Van Keer Publication to NIST Lightweight Cryptography Standardization Process (round …, 2020 | 1 | 2020 |
J-DFA: a Novel Approach for Robust Differential Fault Analysis L Magri, S Mella, P Fragneto, F Melzani, B Rossi | 1 | 2015 |
PROACT-Physical Attack Resistance of Cryptographic Algorithms and Circuits with Reduced Time to Market A Adhikary, A Basurto, L Batina, I Buhan, J Daemen, S Mella, N Mentens, ... International Symposium on Applied Reconfigurable Computing, 255-266, 2024 | | 2024 |
Koala: A Low-Latency Pseudorandom Function PA Eliasi, Y Belkheyar, J Daemen, S Ghosh, D Kuijsters, A Mehrdad, ... Cryptology ePrint Archive, 2024 | | 2024 |
Tighter Trail Bounds for Xoodoo S Mella, J Daemen, G Van Assche IACR Transactions on Symmetric Cryptology 2023 (4), 187-214, 2023 | | 2023 |