Ruggero Susella

According to our database1, Ruggero Susella authored at least 17 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Performance and Efficiency Exploration of Hardware Polynomial Multipliers for Post-Quantum Lattice-Based Cryptosystems.
SN Comput. Sci., 2024

2023
MAYO: Optimized Implementation with Revised Parameters for ARMv7-M.
IACR Cryptol. ePrint Arch., 2023

An Efficient Unified Architecture for Polynomial Multiplications in Lattice-Based Cryptoschemes.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

A Flexible ASIC-Oriented Design for a Full NTRU Accelerator.
Proceedings of the 28th Asia and South Pacific Design Automation Conference, 2023

2022
Profiled side channel attacks against the RSA cryptosystem using neural networks.
J. Inf. Secur. Appl., 2022

2021
Profiled Attacks Against the Elliptic Curve Scalar Point Multiplication Using Neural Networks.
Proceedings of the Network and System Security - 15th International Conference, 2021

2020
Strengthening Sequential Side-Channel Attacks Through Change Detection.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

2019
Secure and Effective Implementation of an IOTA Light Node using STM32.
Proceedings of the 2nd Workshop on Blockchain-enabled Networked Sensor Systems, 2019

2018
CASCA: A Design Automation Approach for Designing Hardware Countermeasures Against Side-Channel Attacks.
ACM Trans. Design Autom. Electr. Syst., 2018

2017
Breaking Ed25519 in WolfSSL.
IACR Cryptol. ePrint Arch., 2017

2016
A Fault-Based Secret Key Retrieval Method for ECDSA: Analysis and Countermeasure.
ACM J. Emerg. Technol. Comput. Syst., 2016

A Compact and Exception-Free Ladder for All Short Weierstrass Elliptic Curves.
Proceedings of the Smart Card Research and Advanced Applications, 2016

2015
New Results for Partial Key Exposure on RSA with Exponent Blinding.
Proceedings of the SECRYPT 2015, 2015

Partial Key Exposure Attacks on RSA with Exponent Blinding.
Proceedings of the E-Business and Telecommunications - 12th International Joint Conference, 2015

2013
On the Homomorphic Computation of Symmetric Cryptographic Primitives.
Proceedings of the Cryptography and Coding - 14th IMA International Conference, 2013

2011
A novel fault attack against ECDSA.
Proceedings of the HOST 2011, 2011

2009
Practical Power Analysis Attacks to RSA on a Large IP Portfolio SoC.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009


  Loading...