Paolo Santini

Orcid: 0000-0003-0631-3668

According to our database1, Paolo Santini authored at least 55 papers between 2016 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Computational Hardness of the Permuted Kernel and Subcode Equivalence Problems.
IEEE Trans. Inf. Theory, 2024

2023
A New Formulation of the Linear Equivalence Problem and Shorter LESS Signatures.
IACR Cryptol. ePrint Arch., 2023

Not Just Regular Decoding: Asymptotics and Improvements of Regular Syndrome Decoding Attacks.
IACR Cryptol. ePrint Arch., 2023

On Linear Equivalence, Canonical Forms, and Digital Signatures.
IACR Cryptol. ePrint Arch., 2023

Zero-Knowledge Proofs from the Action Subgraph.
IACR Cryptol. ePrint Arch., 2023

Zero Knowledge Protocols and Signatures from the Restricted Syndrome Decoding Problem.
IACR Cryptol. ePrint Arch., 2023

On the computational hardness of the code equivalence problem in cryptography.
Adv. Math. Commun., 2023

Generic Decoding of Restricted Errors.
Proceedings of the IEEE International Symposium on Information Theory, 2023

A Blockchain Consensus Protocol Based on Fuzzy Signatures.
Proceedings of the IEEE Global Communications Conference, 2023

2022
Reproducible families of codes and cryptographic applications.
J. Math. Cryptol., 2022

Advanced signature functionalities from the code equivalence problem.
Int. J. Comput. Math. Comput. Syst. Theory, 2022

Designing a Practical Code-Based Signature Scheme from Zero-Knowledge Proofs with Trusted Setup.
Cryptogr., 2022

SPANSE: combining sparsity with density for efficient one-time code-based digital signatures.
CoRR, 2022

A data availability attack on a blockchain protocol based on LDPC codes.
CoRR, 2022

Analysis of a Blockchain Protocol Based on LDPC Codes.
Proceedings of the 4th Workshop on Distributed Ledger Technology co-located with the Italian Conference on Cybersecurity 2022 (ITASEC 2022), 2022

A Novel Attack to the Permuted Kernel Problem.
Proceedings of the IEEE International Symposium on Information Theory, 2022

Optimization of a Reed-Solomon code-based protocol against blockchain data availability attacks.
Proceedings of the 2022 IEEE International Conference on Communications Workshops, 2022

Implementation of Ethereum Accounts and Transactions on Embedded IoT Devices.
Proceedings of the IEEE International Conference on Omni-layer Intelligent Systems, 2022

2021
Cryptanalysis of a Code-Based Signature Scheme Based on the Schnorr-Lyubashevsky Framework.
IEEE Commun. Lett., 2021

A Note on Non-Interactive Key Exchange from Code Equivalence.
IACR Cryptol. ePrint Arch., 2021

LESS-FM: Fine-tuning Signatures from a Code-based Cryptographic Group Action.
IACR Cryptol. ePrint Arch., 2021

Cryptanalysis of a code-based signature scheme without trapdoors.
IACR Cryptol. ePrint Arch., 2021

Code-based signatures without trapdoors through restricted vectors.
IACR Cryptol. ePrint Arch., 2021

Performance bounds for QC-MDPC codes decoders.
IACR Cryptol. ePrint Arch., 2021

Cryptanalysis of a code-based full-time signature.
Des. Codes Cryptogr., 2021

Efficient Hardware Implementation of the LEDAcrypt Decoder.
IEEE Access, 2021

LESS-FM: Fine-Tuning Signatures from the Code Equivalence Problem.
Proceedings of the Post-Quantum Cryptography - 12th International Workshop, 2021

2020
Analysis of the Error Correction Capability of LDPC and MDPC Codes Under Parallel Bit-Flipping Decoding and Application to Cryptography.
IEEE Trans. Commun., 2020

Lightweight Key Encapsulation Using LDPC Codes on FPGAs.
IEEE Trans. Computers, 2020

Complexity of statistical attacks on QC-LDPC code-based cryptosystems.
IET Inf. Secur., 2020

LESS is More: Code-Based Signatures without Syndromes.
IACR Cryptol. ePrint Arch., 2020

Cryptanalysis of a Code-Based Signature Scheme Based on the Lyubashevsky Framework.
IACR Cryptol. ePrint Arch., 2020

Cryptanalysis of LEDAcrypt.
IACR Cryptol. ePrint Arch., 2020

A New Path to Code-based Signatures via Identification Schemes with Restricted Errors.
CoRR, 2020

On the Hardness of the Lee Syndrome Decoding Problem.
CoRR, 2020

Analysis of In-Place Randomized Bit-Flipping Decoders for the Design of LDPC and MDPC Code-Based Cryptosystems.
Proceedings of the E-Business and Telecommunications, 2020

A Failure Rate Model of Bit-flipping Decoders for QC-LDPC and QC-MDPC Code-based Cryptosystems.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

Low-Lee-Density Parity-Check Codes.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

2019
A Data-Driven Approach to Cyber Risk Assessment.
Secur. Commun. Networks, 2019

Security of generalised Reed-Solomon code-based cryptosystems.
IET Inf. Secur., 2019

A Code-specific Conservative Model for the Failure Rate of Bit-flipping Decoding of LDPC Codes with Cryptographic Applications.
IACR Cryptol. ePrint Arch., 2019

A Reaction Attack against Cryptosystems based on LRPC Codes.
IACR Cryptol. ePrint Arch., 2019

A theoretical analysis of the error correction capability of LDPC and MDPC codes under parallel bit-flipping decoding.
CoRR, 2019

A Finite Regime Analysis of Information Set Decoding Algorithms.
Algorithms, 2019

Cryptanalysis of a One-Time Code-Based Digital Signature Scheme.
Proceedings of the IEEE International Symposium on Information Theory, 2019

Hard-Decision Iterative Decoding of LDPC Codes with Bounded Error Rate.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Analysis of Reaction and Timing Attacks Against Cryptosystems Based on Sparse Parity-Check Codes.
Proceedings of the Code-Based Cryptography - 7th International Workshop, 2019

LEDAcrypt: QC-LDPC Code-Based Cryptosystems with Bounded Decryption Failure Rate.
Proceedings of the Code-Based Cryptography - 7th International Workshop, 2019

2018
Reproducible Codes and Cryptographic Applications.
IACR Cryptol. ePrint Arch., 2018

Designing Efficient Dyadic Operations for Cryptographic Applications.
IACR Cryptol. ePrint Arch., 2018

Design and Implementation of a Digital Signature Scheme Based on Low-density Generator Matrix Codes.
CoRR, 2018

LEDAkem: A Post-quantum Key Encapsulation Mechanism Based on QC-LDPC Codes.
Proceedings of the Post-Quantum Cryptography - 9th International Conference, 2018

Hindering Reaction Attacks by Using Monomial Codes in the McEliece Cryptosystem.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

Assessing and Countering Reaction Attacks Against Post-Quantum Public-Key Cryptosystems Based on QC-LDPC Codes.
Proceedings of the Cryptology and Network Security - 17th International Conference, 2018

2016
Soft McEliece: MDPC code-based McEliece cryptosystems with very compact keys through real-valued intentional errors.
Proceedings of the IEEE International Symposium on Information Theory, 2016


  Loading...