Emanuele Bellini
Orcid: 0000-0002-2349-0247Affiliations:
- DarkMatter LLC, Abu Dhabi, UAE
- Telsy Elettronica e Telecomunicazioni S.p.A., Turin, Italy (2014 - 2017)
- University of Trento, Italy (PhD 2014)
According to our database1,
Emanuele Bellini
authored at least 61 papers
between 2012 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on scopus.com
-
on orcid.org
On csauthors.net:
Bibliography
2025
Systematic Timing Leakage Analysis of NIST PQDSS Candidates: Tooling and Lessons Learned.
CoRR, September, 2025
Proceedings of the Progress in Cryptology - LATINCRYPT 2025, 2025
The Window Heuristic: Automating Differential Trail Search in ARX Ciphers with Partial Linearization Trade-offs.
Proceedings of the Topics in Cryptology - CT-RSA 2025, 2025
On the Structural Properties of Toffoli Gate Composition in ARADI: Implications for Algebraic Distinguishers.
Proceedings of the Applied Cryptography and Network Security, 2025
2024
Int. J. Appl. Cryptogr., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Proceedings of the Progress in Cryptology - INDOCRYPT 2024, 2024
SoK: CryptographicEstimators - a Software Library for Cryptographic Hardness Estimation.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
IACR Trans. Symmetric Cryptol., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Selected Areas in Cryptography - SAC 2023, 2023
ACE-HoT: Accelerating an Extreme Amount of Symmetric Cipher Evaluations for (High-order) Avalanche Tests.
Proceedings of the Progress in Cryptology - LATINCRYPT 2023, 2023
Proceedings of the Topics in Cryptology - CT-RSA 2023, 2023
Proceedings of the Topics in Cryptology - CT-RSA 2023, 2023
Differential Cryptanalysis with SAT, SMT, MILP, and CP: A Detailed Comparison for Bit-Oriented Primitives.
Proceedings of the Cryptology and Network Security - 22nd International Conference, 2023
2022
Nonlinearity of Boolean Functions: An Algorithmic Approach Based on Multivariate Polynomials.
Symmetry, 2022
IACR Cryptol. ePrint Arch., 2022
A Cipher-Agnostic Neural Training Pipeline with Automated Finding of Good Input Differences.
IACR Cryptol. ePrint Arch., 2022
Statistical Tests for Symmetric Primitives - An Application to NIST Lightweight Finalists.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2022
Proceedings of the Selected Areas in Cryptography - 29th International Conference, 2022
Proceedings of the Post-Quantum Cryptography - 13th International Workshop, 2022
Proceedings of the Post-Quantum Cryptography - 13th International Workshop, 2022
Proceedings of the Public-Key Cryptography - PKC 2022, 2022
Monte Carlo Tree Search for Automatic Differential Characteristics Search: Application to SPECK.
Proceedings of the Progress in Cryptology - INDOCRYPT 2022, 2022
Proceedings of the Progress in Cryptology - INDOCRYPT 2022, 2022
Proceedings of the Progress in Cryptology, 2022
2021
IACR Cryptol. ePrint Arch., 2021
Practical complexities of probabilistic algorithms for solving Boolean polynomial systems.
IACR Cryptol. ePrint Arch., 2021
Discret. Math. Algorithms Appl., 2021
Appl. Math. Comput., 2021
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2021
Performance Comparison Between Deep Learning-Based and Conventional Cryptographic Distinguishers.
Proceedings of the Intelligent Computing, 2021
Proceedings of the Seventh International Conference on Mathematics and Computing, 2021
2020
Proceedings of the Cryptology and Network Security - 19th International Conference, 2020
2019
IACR Cryptol. ePrint Arch., 2019
A Multi-factor RSA-like Scheme with Fast Decryption Based on Rédei Rational Functions over the Pell Hyperbola.
Proceedings of the Numerical Computations: Theory and Algorithms, 2019
Proceedings of the IEEE International Symposium on Information Theory, 2019
Proceedings of the 37th IEEE International Conference on Computer Design, 2019
Rank-metric Encryption on Arm-Cortex M0: Porting code-based cryptography to lightweight devices.
Proceedings of the 6th on ASIA Public-Key Cryptography Workshop, 2019
Proceedings of the Progress in Cryptology - AFRICACRYPT 2019, 2019
2018
A deterministic algorithm for the distance and weight distribution of binary nonlinear codes.
Int. J. Inf. Coding Theory, 2018
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018
You Shall Not Pass! (Once Again): An IoT Application of Post-quantum Stateful Signature Schemes.
Proceedings of the 5th ACM on ASIA Public-Key Cryptography Workshop, 2018
Proceedings of the Cryptology and Network Security - 17th International Conference, 2018
2017
A multifactor RSA-like scheme with fast decryption based on Rédei rational functions over the Pell hyperbola.
CoRR, 2017
2016
An efficient and secure RSA-like cryptosystem exploiting Rédei rational functions over conics.
Finite Fields Their Appl., 2016
An algorithmic approach using multivariate polynomials for the nonlinearity of Boolean functions.
CoRR, 2016
2015
2014
2013
2012