Ange Martinelli

Orcid: 0009-0001-6004-3884

According to our database1, Ange Martinelli authored at least 13 papers between 2010 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
SUMAC: an Efficient Administrated-CGKA Using Multicast Key Agreement.
IACR Cryptol. ePrint Arch., 2025

The Art of Bonsai: How Well-Shaped Trees Improve the Communication Cost of MLS.
Proceedings of the 10th IEEE European Symposium on Security and Privacy, 2025

Breaking HuFu with 0 Leakage - A Side-Channel Analysis.
Proceedings of the Constructive Approaches for Security Analysis and Design of Embedded Systems, 2025

Spilling-Cascade: An Optimal PKE Combiner for KEM Hybridization.
Proceedings of the Applied Cryptography and Network Security, 2025

2024
Quarantined-TreeKEM: A Continuous Group Key Agreement for MLS, Secure in Presence of Inactive Users.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
Quarantined-TreeKEM: a Continuous Group Key Agreement for MLS, Secure in Presence of Inactive Users.
IACR Cryptol. ePrint Arch., 2023

Leaking-cascades: an optimized construction for KEM hybridization.
IACR Cryptol. ePrint Arch., 2023

2022
The Hidden Parallelepiped Is Back Again: Power Analysis Attacks on Falcon.
IACR Cryptol. ePrint Arch., 2022

2019
Unifying Leakage Models on a Rényi Day.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

2018
Grafting Trees: A Fault Attack Against the SPHINCS Framework.
Proceedings of the Post-Quantum Cryptography - 9th International Conference, 2018

2013
Impact of Sboxes Size upon Side Channel Resistance and Block Cipher Design.
Proceedings of the Progress in Cryptology, 2013

2011
Protecting AES with Shamir's Secret Sharing Scheme.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011

2010
Affine Masking against Higher-Order Side Channel Analysis.
Proceedings of the Selected Areas in Cryptography - 17th International Workshop, 2010


  Loading...