Follow
Filippo Melzani
Filippo Melzani
Security Pattern
Verified email at securitypattern.com - Homepage
Title
Cited by
Cited by
Year
Symbolic analysis of higher-order side channel countermeasures
E Bisi, F Melzani, V Zaccaria
IEEE Transactions on Computers 66 (6), 1099-1105, 2016
142016
Method for performing a sensitive data encryption with masking, and corresponding encryption apparatus and computer program product
F Melzani
US Patent 10,050,776, 2018
112018
Enhancing fault sensitivity analysis through templates
F Melzani, A Palomba
2013 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2013
112013
Method for performing an encryption with look-up tables, and corresponding encryption apparatus and computer program product
F Melzani
US Patent 9,898,623, 2018
102018
Spectral features of higher-order side-channel countermeasures
V Zaccaria, F Melzani, G Bertoni
IEEE Transactions on Computers 67 (4), 596-603, 2017
82017
The role of the fault model in DFA against AES
C Ferretti, S Mella, F Melzani
Proceedings of the Third Workshop on Hardware and Architectural Support for …, 2014
82014
On the efficiency of design time evaluation of the resistance to power attacks
A Barenghi, G Bertoni, F De Santis, F Melzani
2011 14th Euromicro Conference on Digital System Design, 777-785, 2011
62011
CASCA: A design automation approach for designing hardware countermeasures against side-channel attacks
L Delledonne, V Zaccaria, R Susella, G Bertoni, F Melzani
ACM Transactions on Design Automation of Electronic Systems (TODAES) 23 (6 …, 2018
42018
Simulations of optical emissions for attacking AES and masked AES
GM Bertoni, L Grassi, F Melzani
Security, Privacy, and Applied Cryptography Engineering: 5th International …, 2015
32015
Practical power analysis attacks to RSA on a large IP portfolio SoC
GM Bertoni, L Breveglieri, A Cominola, F Melzani, R Susella
2009 Sixth International Conference on Information Technology: New …, 2009
32009
Darth's Saber: A Key Exfiltration Attack for Symmetric Ciphers Using Laser Light
V Zaccaria, MC Molteni, F Melzani, G Bertoni
2018 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 23-26, 2018
12018
Encryption device of a substitution-box type, and corresponding encryption method and computer program product
F Melzani
US Patent 9,875,377, 2018
12018
J-DFA: A novel approach for robust differential fault analysis
L Magri, S Mella, P Fragneto, F Melzani, B Rossi
2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 35-44, 2015
12015
Design time engineering of side channel resistant cipher implementations
A Barenghi, L Breveglieri, F De Santis, F Melzani, A Palomba, G Pelosi
Theory and Practice of Cryptography Solutions for Secure Information Systems …, 2013
12013
Method for performing cryptographic operations in a processing device, corresponding processing device and computer program product
R Susella, F Melzani, GM Bertoni
US Patent 11,582,039, 2023
2023
Differential fault attacks against AES tampering with the instruction flow
S Mella, F Melzani, A Visconti
2014 11th International Conference on Security and Cryptography (SECRYPT), 1-6, 2014
2014
On the Efficiency of Design Time Evaluation of the Resistance to Power Attacks
G Bertoni, A Barenghi, FD Santis, F Melzani
2011
Secret Key Crypto Implementations
GM Bertoni, F Melzani
Secure Integrated Circuits and Systems, 45-62, 2010
2010
Session details: Hardware implementations for data security
V Fischer, FR St Etienne, F Melzani
J-DFA
L Magri, S Mella, P Fragneto, B Rossi, F Melzani
The system can't perform the operation now. Try again later.
Articles 1–20