Ange Martinelli

Orcid: 0009-0001-6004-3884

According to our database1, Ange Martinelli authored at least 15 papers between 2010 and 2026.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book  In proceedings  Article  PhD thesis  Dataset  Other 

Links

On csauthors.net:

Bibliography

2026
ML-DSA masking sweetened with SUCRE: Shuffle-and-Unmask Countermeasure for REjection sampling.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2026

2025
Nostalgia Cipher: Can Filtered LFSRs Be Secure Again? An Application to Hybrid Homomorphic Encryption with Sub-50 ms Latency.
IACR Cryptol. ePrint Arch., 2025

SUMAC: an Efficient Administrated-CGKA Using Multicast Key Agreement.
IACR Cryptol. ePrint Arch., 2025

The Art of Bonsai: How Well-Shaped Trees Improve the Communication Cost of MLS.
Proceedings of the 10th IEEE European Symposium on Security and Privacy, 2025

Breaking HuFu with 0 Leakage - A Side-Channel Analysis.
Proceedings of the Constructive Approaches for Security Analysis and Design of Embedded Systems, 2025

Spilling-Cascade: An Optimal PKE Combiner for KEM Hybridization.
Proceedings of the Applied Cryptography and Network Security, 2025

2024
Quarantined-TreeKEM: A Continuous Group Key Agreement for MLS, Secure in Presence of Inactive Users.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
Quarantined-TreeKEM: a Continuous Group Key Agreement for MLS, Secure in Presence of Inactive Users.
IACR Cryptol. ePrint Arch., 2023

Leaking-cascades: an optimized construction for KEM hybridization.
IACR Cryptol. ePrint Arch., 2023

2022
The Hidden Parallelepiped Is Back Again: Power Analysis Attacks on Falcon.
IACR Cryptol. ePrint Arch., 2022

2019
Unifying Leakage Models on a Rényi Day.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

2018
Grafting Trees: A Fault Attack Against the SPHINCS Framework.
Proceedings of the Post-Quantum Cryptography - 9th International Conference, 2018

2013
Impact of Sboxes Size upon Side Channel Resistance and Block Cipher Design.
Proceedings of the Progress in Cryptology, 2013

2011
Protecting AES with Shamir's Secret Sharing Scheme.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011

2010
Affine Masking against Higher-Order Side Channel Analysis.
Proceedings of the Selected Areas in Cryptography - 17th International Workshop, 2010


  Loading...