Symbolic analysis of higher-order side channel countermeasures E Bisi, F Melzani, V Zaccaria IEEE Transactions on Computers 66 (6), 1099-1105, 2016 | 14 | 2016 |
Method for performing a sensitive data encryption with masking, and corresponding encryption apparatus and computer program product F Melzani US Patent 10,050,776, 2018 | 11 | 2018 |
Enhancing fault sensitivity analysis through templates F Melzani, A Palomba 2013 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2013 | 11 | 2013 |
Method for performing an encryption with look-up tables, and corresponding encryption apparatus and computer program product F Melzani US Patent 9,898,623, 2018 | 10 | 2018 |
Spectral features of higher-order side-channel countermeasures V Zaccaria, F Melzani, G Bertoni IEEE Transactions on Computers 67 (4), 596-603, 2017 | 8 | 2017 |
The role of the fault model in DFA against AES C Ferretti, S Mella, F Melzani Proceedings of the Third Workshop on Hardware and Architectural Support for …, 2014 | 8 | 2014 |
On the efficiency of design time evaluation of the resistance to power attacks A Barenghi, G Bertoni, F De Santis, F Melzani 2011 14th Euromicro Conference on Digital System Design, 777-785, 2011 | 6 | 2011 |
CASCA: A design automation approach for designing hardware countermeasures against side-channel attacks L Delledonne, V Zaccaria, R Susella, G Bertoni, F Melzani ACM Transactions on Design Automation of Electronic Systems (TODAES) 23 (6 …, 2018 | 4 | 2018 |
Simulations of optical emissions for attacking AES and masked AES GM Bertoni, L Grassi, F Melzani Security, Privacy, and Applied Cryptography Engineering: 5th International …, 2015 | 3 | 2015 |
Practical power analysis attacks to RSA on a large IP portfolio SoC GM Bertoni, L Breveglieri, A Cominola, F Melzani, R Susella 2009 Sixth International Conference on Information Technology: New …, 2009 | 3 | 2009 |
Darth's Saber: A Key Exfiltration Attack for Symmetric Ciphers Using Laser Light V Zaccaria, MC Molteni, F Melzani, G Bertoni 2018 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 23-26, 2018 | 1 | 2018 |
Encryption device of a substitution-box type, and corresponding encryption method and computer program product F Melzani US Patent 9,875,377, 2018 | 1 | 2018 |
J-DFA: A novel approach for robust differential fault analysis L Magri, S Mella, P Fragneto, F Melzani, B Rossi 2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 35-44, 2015 | 1 | 2015 |
Design time engineering of side channel resistant cipher implementations A Barenghi, L Breveglieri, F De Santis, F Melzani, A Palomba, G Pelosi Theory and Practice of Cryptography Solutions for Secure Information Systems …, 2013 | 1 | 2013 |
Method for performing cryptographic operations in a processing device, corresponding processing device and computer program product R Susella, F Melzani, GM Bertoni US Patent 11,582,039, 2023 | | 2023 |
Differential fault attacks against AES tampering with the instruction flow S Mella, F Melzani, A Visconti 2014 11th International Conference on Security and Cryptography (SECRYPT), 1-6, 2014 | | 2014 |
On the Efficiency of Design Time Evaluation of the Resistance to Power Attacks G Bertoni, A Barenghi, FD Santis, F Melzani | | 2011 |
Secret Key Crypto Implementations GM Bertoni, F Melzani Secure Integrated Circuits and Systems, 45-62, 2010 | | 2010 |
Session details: Hardware implementations for data security V Fischer, FR St Etienne, F Melzani | | |
J-DFA L Magri, S Mella, P Fragneto, B Rossi, F Melzani | | |