Emanuele Bellini

From MaRDI portal
(Redirected from Person:268488)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Farasha: a provable permutation-based parallelizable PRF2024-10-16Paper
ACE-HoT: \underline{A}ccelerating an extreme amount of symmetric \underline{C}ipher \underline{E}valuations for (\underline{H}igh-\underline{o}rder) avalanche \underline{T}ests2024-10-16Paper
CLAASP: a cryptographic library for the automated analysis of symmetric primitives2024-10-16Paper
Differential cryptanalysis with SAT, SMT, MILP, and CP: a detailed comparison for bit-oriented primitives2024-06-05Paper
Fully automated differential-linear attacks against ARX ciphers
Topics in Cryptology – CT-RSA 2023
2023-10-04Paper
NNBits: bit profiling with a deep learning ensemble based distinguisher
Topics in Cryptology – CT-RSA 2023
2023-10-04Paper
Rotational analysis of ChaCha permutation
Advances in Mathematics of Communications
2023-09-12Paper
Monte Carlo tree search for automatic differential characteristics search: application to SPECK
Lecture Notes in Computer Science
2023-08-14Paper
Parallel isogeny path finding with limited memory
Lecture Notes in Computer Science
2023-08-14Paper
scientific article; zbMATH DE number 7722346 (Why is no real title available?)2023-08-03Paper
Hybrid decoding -- classical-quantum trade-offs for information set decoding
Post-Quantum Cryptography
2023-07-07Paper
MR-DSS -- smaller MinRank-based (ring-)signatures
Post-Quantum Cryptography
2023-07-07Paper
Code-Based Signature Schemes from Identification Protocols in the Rank Metric
Cryptology and Network Security
2023-06-28Paper
An estimator for the hardness of the MQ problem
Progress in Cryptology - AFRICACRYPT 2022
2023-06-02Paper
Enhancing Code Based Zero-Knowledge Proofs Using Rank Metric2023-03-22Paper
Quantum search for scaled hash function preimages
Quantum Information Processing
2023-03-15Paper
New records of pre-image search of reduced SHA-1 using SAT solvers2022-10-07Paper
Syndrome Decoding Estimator
Public-Key Cryptography – PKC 2022
2022-07-08Paper
An extension of Cook’s elasti cipher
Journal of Discrete Mathematical Sciences and Cryptography
2022-04-19Paper
On the decoding of 1-Fibonacci error correcting codes
Discrete Mathematics, Algorithms and Applications
2022-02-01Paper
Practical complexities of probabilistic algorithms for solving Boolean polynomial systems
Discrete Applied Mathematics
2022-01-13Paper
Group law on affine conics and applications to cryptography
Applied Mathematics and Computation
2021-11-11Paper
A multi-factor RSA-like scheme with fast decryption based on Rédei rational functions over the Pell hyperbola
(available as arXiv preprint)
2020-09-21Paper
An IND-CCA-secure code-based encryption scheme using rank metric2020-05-06Paper
Point-groups over singular cubics2020-01-08Paper
A deterministic algorithm for the distance and weight distribution of binary nonlinear codes
International Journal of Information and Coding Theory
2018-11-05Paper
Some Bounds on the Size of Codes
IEEE Transactions on Information Theory
2017-05-16Paper
An algorithmic approach using multivariate polynomials for the nonlinearity of Boolean functions2016-10-19Paper
An efficient and secure RSA-like cryptosystem exploiting Rédei rational functions over conics
Finite Fields and their Applications
2016-04-15Paper
On the Griesmer bound for nonlinear codes2015-01-18Paper


Research outcomes over time


This page was built for person: Emanuele Bellini