Guido Bertoni

From MaRDI portal
Person:1656056



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Breaking Ed25519 in WolfSSL2020-01-21Paper
A methodology for the characterisation of leakages in combinatorial logic2018-10-26Paper
\textsc{KangarooTwelve}: fast hashing based on \({\mathrm {KECCAK}\mathrm{-}p}{}\)2018-08-10Paper
Spectral Features of Higher-Order Side-Channel Countermeasures
IEEE Transactions on Computers
2018-06-27Paper
Security Evaluation of WDDL and SecLib Countermeasures against Power Attacks
IEEE Transactions on Computers
2017-08-08Paper
Sakura: a flexible coding for tree hashing
Applied Cryptography and Network Security
2014-07-07Paper
Keccak
Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings
2013-05-31Paper
Duplexing the sponge: Single-pass authenticated encryption and other applications
Selected Areas in Cryptography
2012-06-08Paper
Sponge-based pseudo-random number generators
Cryptographic Hardware and Embedded Systems, CHES 2010
2010-08-17Paper
Performance of HECC Coprocessors Using Inversion-Free Formulae
Computational Science and Its Applications - ICCSA 2006
2009-02-10Paper
On the Indifferentiability of the Sponge Construction
Advances in Cryptology – EUROCRYPT 2008
2008-04-15Paper
Progress in Cryptology - INDOCRYPT 2003
Lecture Notes in Computer Science
2007-11-29Paper
scientific article; zbMATH DE number 1979282 (Why is no real title available?)2003-09-11Paper
scientific article; zbMATH DE number 1962149 (Why is no real title available?)2003-08-10Paper


Research outcomes over time


This page was built for person: Guido Bertoni