Roberto Maria Avanzi

According to our database1, Roberto Maria Avanzi authored at least 48 papers between 2002 and 2017.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2017
The QARMA Block Cipher Family. Almost MDS Matrices Over Rings With Zero Divisors, Nearly Symmetric Even-Mansour Constructions With Non-Involutory Central Rounds, and Search Heuristics for Low-Latency S-Boxes.
IACR Trans. Symmetric Cryptol., 2017

2016
A Salad of Block Ciphers.
IACR Cryptology ePrint Archive, 2016

The QARMA Block Cipher Family - Almost MDS Matrices Over Rings With Zero Divisors, Nearly Symmetric Even-Mansour Constructions With Non-Involutory Central Rounds, and Search Heuristics for Low-Latency S-Boxes.
IACR Cryptology ePrint Archive, 2016

2013
Faster 128-EEA3 and 128-EIA3 Software.
IACR Cryptology ePrint Archive, 2013

Faster 128-EEA3 and 128-EIA3 Software.
Proceedings of the Information Security, 16th International Conference, 2013

2012
Erratum to: Side-channel attacks on the McEliece and Niederreiter public-key cryptosystems.
J. Cryptographic Engineering, 2012

2011
Hyperelliptic Curves Performance.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Hyperelliptic Curves.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Hyperelliptic Curve Security.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Side-channel attacks on the McEliece and Niederreiter public-key cryptosystems.
J. Cryptographic Engineering, 2011

On the distribution of the coefficients of normal forms for Frobenius expansions.
Des. Codes Cryptogr., 2011

Redundant τ-adic expansions I: non-adjacent digit sets and their applications to scalar multiplication.
Des. Codes Cryptogr., 2011

Faster and Lower Memory Scalar Multiplication on Supersingular Curves in Characteristic Three.
Proceedings of the Public Key Cryptography - PKC 2011, 2011

2010
Side-Channel Attacks on the McEliece and Niederreiter Public-Key Cryptosystems.
IACR Cryptology ePrint Archive, 2010

Arithmetic of Supersingular Koblitz Curves in Characteristic Three.
IACR Cryptology ePrint Archive, 2010

A filtering method for the hyperelliptic curve index calculus and its analysis.
Adv. in Math. of Comm., 2010

Efficient reduction of large divisors on hyperelliptic curves.
Adv. in Math. of Comm., 2010

Optimization of the arithmetic of the ideal class group for genus 4 hyperelliptic curves over projective coordinates.
Adv. in Math. of Comm., 2010

Combined Implementation Attack Resistant Exponentiation.
Proceedings of the Progress in Cryptology, 2010

2008
Rethinking low genus hyperelliptic Jacobian arithmetic over binary fields: interplay of field arithmetic and explicit formulæ.
J. Mathematical Cryptology, 2008

Redundant tau-adic Expansions I: Non-Adjacent Digit Sets and their Applications to Scalar Multiplication.
IACR Cryptology ePrint Archive, 2008

2007
Another Look at Square Roots and Traces (and Quadratic Equations) in Fields of Even Characteristic.
IACR Cryptology ePrint Archive, 2007

Effects of Optimizations for Software Implementations of Small Binary Field Arithmetic.
Proceedings of the Arithmetic of Finite Fields, First International Workshop, 2007

Another Look at Square Roots (and Other Less Common Operations) in Fields of Even Characteristic.
Proceedings of the Selected Areas in Cryptography, 14th International Workshop, 2007

2006
Scalar Multiplication on Koblitz Curves using Double Bases.
IACR Cryptology ePrint Archive, 2006

Scalar Multiplication on Koblitz Curves Using the Frobenius Endomorphism and Its Combination with Point Halving: Extensions and Mathematical Analysis.
Algorithmica, 2006

Scalar Multiplication on Koblitz Curves Using Double Bases.
Proceedings of the Progressin Cryptology, 2006

On Redundant tau -Adic Expansions and Non-adjacent Digit Sets.
Proceedings of the Selected Areas in Cryptography, 13th International Workshop, 2006

Delaying and Merging Operations in Scalar Multiplication: Applications to Curve-Based Cryptosystems.
Proceedings of the Selected Areas in Cryptography, 13th International Workshop, 2006

Extending Scalar Multiplication Using Double Bases.
Proceedings of the Advances in Cryptology, 2006

2005
Index Calculus for Hyperelliptic Curves.
Proceedings of the Handbook of Elliptic and Hyperelliptic Curve Cryptography., 2005

Index Calculus.
Proceedings of the Handbook of Elliptic and Hyperelliptic Curve Cryptography., 2005

Introduction to Public-Key Cryptography.
Proceedings of the Handbook of Elliptic and Hyperelliptic Curve Cryptography., 2005

Compositeness and Primality Testing Factoring.
Proceedings of the Handbook of Elliptic and Hyperelliptic Curve Cryptography., 2005

Generic Algorithms for Computing Discrete Logarithms.
Proceedings of the Handbook of Elliptic and Hyperelliptic Curve Cryptography., 2005

The Complexity of Certain Multi-Exponentiation Techniques in Cryptography.
J. Cryptology, 2005

Minimality of the Hamming Weight of the \tau-NAF for Koblitz Curves and Improved Combination with Point Halving.
IACR Cryptology ePrint Archive, 2005

Side Channel Attacks on Implementations of Curve-Based Cryptographic Primitives.
IACR Cryptology ePrint Archive, 2005

Minimality of the Hamming Weight of the T-NAF for Koblitz Curves and Improved Combination with Point Halving.
Proceedings of the Selected Areas in Cryptography, 12th International Workshop, 2005

Energy-Efficient Software Implementation of Long Integer Modular Arithmetic.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29, 2005

2004
On using expansions to the base of -2.
Int. J. Comput. Math., 2004

A Note on the Signed Sliding Window Integer Recoding and a Left-to-Right Analogue.
Proceedings of the Selected Areas in Cryptography, 11th International Workshop, 2004

Faster Scalar Multiplication on Koblitz Curves Combining Point Halving with the Frobenius Endomorphism.
Proceedings of the Public Key Cryptography, 2004

Aspects of Hyperelliptic Curves over Large Prime Fields in Software Implementations.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2004

2003
Aspects of Hyperelliptic Curves over Large Prime Fields in Software Implementations.
IACR Cryptology ePrint Archive, 2003

Generic Efficient Arithmetic Algorithms for PAFFs (Processor Adequate Finite Fields) and Related Algebraic Structures (Extended Abstract).
Proceedings of the Selected Areas in Cryptography, 10th Annual International Workshop, 2003

Countermeasures against Differential Power Analysis for Hyperelliptic Curve Cryptosystems.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2003

2002
On multi-exponentiation in cryptography.
IACR Cryptology ePrint Archive, 2002


  Loading...