Massimiliano Sala

From MaRDI portal
(Redirected from Person:402559)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
An algebraic attack on stream ciphers with application to nonlinear filter generators and WG-PRNG
Advances in Mathematics of Communications
2024-09-16Paper
On cryptographic properties of cubic and splitting Boolean functions
Applicable Algebra in Engineering, Communication and Computing
2024-09-11Paper
On second-order derivatives of Boolean functions and cubic APN permutations in even dimension
Mediterranean Journal of Mathematics
2024-06-08Paper
Group structure of elliptic curves over \(\mathbb{Z}/N\mathbb{Z}\)
Journal of Mathematical Cryptology
2024-03-16Paper
Searchable encryption with randomized ciphertext and randomized keyword search
Journal of Mathematical Cryptology
2024-03-16Paper
Provably unforgeable threshold EdDSA with an offline participant and trustless setup
Mediterranean Journal of Mathematics
2023-09-08Paper
A coercion-resistant blockchain-based E-voting protocol with receipts
Advances in Mathematics of Communications
2023-07-07Paper
A survey on functional encryption
Advances in Mathematics of Communications
2023-06-30Paper
Elliptic loops
Journal of Pure and Applied Algebra
2023-06-26Paper
On the equivalence of two post-quantum cryptographic families
Annali di Matematica Pura ed Applicata. Serie Quarta
2023-03-07Paper
A survey on the group of points arising from elliptic curves with a Weierstrass model over a ring2023-02-01Paper
Rational points on cubic surfaces and AG codes from the norm-trace curve
Annali di Matematica Pura ed Applicata. Serie Quarta
2023-01-25Paper
scientific article; zbMATH DE number 7542487 (Why is no real title available?)2022-06-15Paper
A note on an infeasible linearization of some block ciphers
Journal of Discrete Mathematical Sciences and Cryptography
2022-02-16Paper
Threshold ECDSA with an offline recovery party
Mediterranean Journal of Mathematics
2021-11-30Paper
Threshold ECDSA with an offline recovery party
Mediterranean Journal of Mathematics
2021-11-30Paper
A formula on the weight distribution of linear codes with applications to AMDS codes
Finite Fields and their Applications
2021-11-23Paper
On the linear structures of balanced functions and quadratic APN functions
Cryptography and Communications
2021-07-13Paper
Intersections between the norm-trace curve and some low degree curves
Finite Fields and their Applications
2021-02-18Paper
Rational points on cubic surfaces and AG codes from the Norm-Trace curve
(available as arXiv preprint)
2021-02-10Paper
Zech tableaux as tools for sparse decoding2021-02-06Paper
On properties of translation groups in the affine general linear group with applications to cryptography
Journal of Algebra
2020-12-16Paper
HELP: a sparse error locator polynomial for BCH codes
Applicable Algebra in Engineering, Communication and Computing
2020-07-15Paper
A power APN function CCZ-equivalent to Kasami function in even dimension2020-04-13Paper
Weight distribution of Hermitian codes and matrices rank
Finite Fields and their Applications
2019-11-22Paper
A proof of security for a key-policy RS-ABE scheme
JP Journal of Algebra, Number Theory and Applications
2019-08-16Paper
Differential attacks: using alternative operations
Designs, Codes and Cryptography
2019-02-20Paper
Wave-shaped round functions and primitive groups
Advances in Mathematics of Communications
2019-02-15Paper
On hidden sums compatible with a given block cipher diffusion layer
Discrete Mathematics
2018-11-29Paper
A deterministic algorithm for the distance and weight distribution of binary nonlinear codes
International Journal of Information and Coding Theory
2018-11-05Paper
Hilbert quasi-polynomial for order domains and application to coding theory
Advances in Mathematics of Communications
2018-09-21Paper
On the Shape of the General Error Locator Polynomial for Cyclic Codes
IEEE Transactions on Information Theory
2018-09-19Paper
On the discrete logarithm problem for prime-field elliptic curves
Finite Fields and their Applications
2018-04-27Paper
Several proofs of security for a tokenization algorithm
Applicable Algebra in Engineering, Communication and Computing
2017-12-04Paper
A note on APN permutations in even dimension
Finite Fields and their Applications
2017-07-13Paper
Some Bounds on the Size of Codes
IEEE Transactions on Information Theory
2017-05-16Paper
On Optimal Nonlinear Systematic Codes
IEEE Transactions on Information Theory
2017-04-28Paper
The group generated by the round functions of a GOST-like cipher
Annali di Matematica Pura ed Applicata. Serie Quarta
2017-02-17Paper
On weak differential uniformity of vectorial Boolean functions as a cryptographic criterion
Applicable Algebra in Engineering, Communication and Computing
2017-01-13Paper
An algorithmic approach using multivariate polynomials for the nonlinearity of Boolean functions2016-10-19Paper
A discrete logarithm-based approach to compute low-weight multiples of binary polynomials
Finite Fields and their Applications
2016-02-09Paper
On differential uniformity of maps that may hide an algebraic trapdoor
Algebraic Informatics
2015-09-22Paper
Key-policy multi-authority attribute-based encryption
Algebraic Informatics
2015-09-22Paper
Attacking BEAR and LION schemes in a realistic scenario
Algebraic Informatics
2015-09-22Paper
On the small-weight codewords of some Hermitian codes
Journal of Symbolic Computation
2015-08-24Paper
Some security bounds for the key sizes of DGHV scheme
Applicable Algebra in Engineering, Communication and Computing
2015-02-05Paper
On the Griesmer bound for nonlinear codes2015-01-18Paper
The role of Boolean functions in hiding sums as trapdoors for some block ciphers2014-11-27Paper
On the Hermitian curve and its intersections with some conics
Finite Fields and their Applications
2014-08-28Paper
On the Hermitian curve and its intersections with some conics
Finite Fields and their Applications
2014-08-28Paper
A weight-distribution bound for entropy extractors using linear binary codes2014-05-12Paper
On the group generated by the round functions of translation based ciphers over arbitrary finite fields
Finite Fields and their Applications
2014-02-05Paper
Generalized AG codes as evaluation codes
Algebraic Informatics
2013-09-20Paper
A new bound for cyclic codes beating the Roos bound
Algebraic Informatics
2013-09-20Paper
Postulation of general quintuple fat point schemes in \(\mathbb P^3\)
Journal of Algebra
2013-02-21Paper
On the evaluation of multivariate polynomials over finite fields
Journal of Symbolic Computation
2013-01-10Paper
Improved decoding of affine-variety codes
Journal of Pure and Applied Algebra
2012-10-19Paper
On the provable security of BEAR and LION schemes
Applicable Algebra in Engineering, Communication and Computing
2012-06-20Paper
On weakly APN functions and 4-bit S-boxes
Finite Fields and their Applications
2012-05-07Paper
Computing the distance distribution of systematic nonlinear codes
Journal of Algebra and its Applications
2010-05-21Paper
On some block ciphers and imprimitive groups
Applicable Algebra in Engineering, Communication and Computing
2010-01-18Paper
Gröbner Bases, Coding, and Cryptography: a Guide to the State-of-Art
Gröbner Bases, Coding, and Cryptography
2009-12-16Paper
An application of the O'Nan-Scott theorem to the group generated by the round functions of an AES-like cipher
Designs, Codes and Cryptography
2009-10-14Paper
A commutative algebra approach to linear codes
Journal of Algebra
2009-06-17Paper
Error resilient data transport in sensor network applications: A generic perspective
International Journal of Circuit Theory and Applications
2009-03-24Paper
A New Bound for the Minimum Distance of a Cyclic Code From Its Defining Set
IEEE Transactions on Information Theory
2008-12-21Paper
General Error Locator Polynomials for Binary Cyclic Codes With <formula formulatype="inline"><tex>$t \le 2$</tex></formula> and <formula formulatype="inline"> <tex>$n < 63$</tex></formula>
IEEE Transactions on Information Theory
2008-12-21Paper
Permutation equivalent maximal irreducible Goppa codes2008-06-10Paper
GRÖBNER BASIS TECHNIQUES TO COMPUTE WEIGHT DISTRIBUTIONS OF SHORTENED CYCLIC CODES
Journal of Algebra and its Applications
2007-08-10Paper
scientific article; zbMATH DE number 5150119 (Why is no real title available?)
(available as arXiv preprint)
2007-05-08Paper
On the Gröbner basis of a family of quasi-cyclic LDPC codes
Bulletin of the Iranian Mathematical Society
2007-04-10Paper
Correcting errors and erasures via the syndrome variety
Journal of Pure and Applied Algebra
2005-06-23Paper
On the Gröbner bases of some symmetric systems and their application to coding theory.
Journal of Symbolic Computation
2004-03-14Paper
Upper bounds on the dual distance of BCH\((255, k)\)
Designs, Codes and Cryptography
2003-11-10Paper
scientific article; zbMATH DE number 1846863 (Why is no real title available?)2002-12-17Paper
Gröbner bases and distance of cyclic codes
Applicable Algebra in Engineering, Communication and Computing
2002-07-29Paper
A linear programming estimate of the weight distribution of BCH\((255,k)\)
IEEE Transactions on Information Theory
2001-03-19Paper


Research outcomes over time


This page was built for person: Massimiliano Sala