Alessio Meneghetti

Orcid: 0000-0002-5159-7252

According to our database1, Alessio Meneghetti authored at least 38 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A class of locally recoverable codes over finite chain rings.
CoRR, 2024

Multidimensional Byzantine agreement in a synchronous setting.
Appl. Algebra Eng. Commun. Comput., 2024

2023
History-Free Sequential Aggregate Signatures from Generic Trapdoor Functions.
IACR Cryptol. ePrint Arch., 2023

MAYO: Optimized Implementation with Revised Parameters for ARMv7-M.
IACR Cryptol. ePrint Arch., 2023

Cutting the GRASS: Threshold GRoup Action Signature Schemes.
IACR Cryptol. ePrint Arch., 2023

2022
A Post-Quantum Digital Signature Scheme from QC-LDPC Codes.
IACR Cryptol. ePrint Arch., 2022

Extensible Decentralized Secret Sharing and Application to Schnorr Signatures.
IACR Cryptol. ePrint Arch., 2022

A formula on the weight distribution of linear codes with applications to AMDS codes.
Finite Fields Their Appl., 2022

Adaptable Cryptographic Primitives in Blockchains via Smart Contracts.
Cryptogr., 2022

The weight distribution of codes over finite chain rings.
CoRR, 2022

Cob: A Consensus Layer Enabling Sustainable Sharding-Based Consensus Protocols.
Proceedings of the 4th Workshop on Distributed Ledger Technology co-located with the Italian Conference on Cybersecurity 2022 (ITASEC 2022), 2022

A Provably-Unforgeable Threshold Schnorr Signature With an Offline Recovery Party.
Proceedings of the 4th Workshop on Distributed Ledger Technology co-located with the Italian Conference on Cybersecurity 2022 (ITASEC 2022), 2022

2021
Security issues of CFS-like digital signature algorithms.
CoRR, 2021

On explicit reductions between two purely algebraic problems: MQ and MLD.
CoRR, 2021

Cob: a Multidimensional Byzantine Agreement Protocol for Asynchronous Incomplete Networks.
CoRR, 2021

A survey on NIST PQ signatures.
CoRR, 2021

2020
Threshold Multi-Signature with an Offline Recovery Party.
IACR Cryptol. ePrint Arch., 2020

A Provably-Unforgeable Threshold EdDSA with an Offline Recovery Party.
CoRR, 2020

Threshold ECDSA with an Offline Recovery Party.
CoRR, 2020

Characterisation of the parameters of maximum weight spectrum codes according to their spread.
CoRR, 2020

A Note on an ECDLP-based PoW Model.
Proceedings of the 3rd Distributed Ledger Technology Workshop Co-located with ITASEC 2020, 2020

2019
A SPAD-based random number generator pixel based on the arrival time of photons.
Integr., 2019

A new ECDLP-based PoW model.
CoRR, 2019

A survey on efficient parallelization of blockchain-based smart contracts.
CoRR, 2019

Type-preserving matrices and security of block ciphers.
Adv. Math. Commun., 2019

Two-tier blockchain timestamped notarization with incremental security.
Proceedings of the Second Distributed Ledger Technology Workshop, 2019

A Compact TDC-based Quantum Random Number Generator.
Proceedings of the 26th IEEE International Conference on Electronics, Circuits and Systems, 2019

2018
Binary linear code weight distribution estimation by random bit stream compression.
CoRR, 2018

On linear codes and distinct weights.
CoRR, 2018

2017
Optimal Codes and Entropy Extractors.
PhD thesis, 2017

Code generator matrices as RNG conditioners.
Finite Fields Their Appl., 2017

A SPAD-Based Random Number Generator Pixel Based on the Arrival Time of Photons.
Proceedings of the New Generation of CAS, 2017

2016
On Optimal Nonlinear Systematic Codes.
IEEE Trans. Inf. Theory, 2016

16.3 A 16×16 pixels SPAD-based 128-Mb/s quantum random number generator with -74dB light rejection ratio and -6.7ppm/°C bias sensitivity on temperature.
Proceedings of the 2016 IEEE International Solid-State Circuits Conference, 2016

2015
Code generator matrices as entropy extractors.
CoRR, 2015

On the Griesmer bound for nonlinear codes.
CoRR, 2015

2014
A weight-distribution bound for entropy extractors using linear binary codes.
CoRR, 2014

2013
Improved image copyright protection scheme exploiting visual cryptography in wavelet domain.
Proceedings of the Image Processing: Algorithms and Systems XI, 2013


  Loading...