Andrea Visconti
Orcid: 0000-0001-5689-8575
According to our database1,
Andrea Visconti
authored at least 43 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Progressive and efficient verification for digital signatures: extensions and experimental results.
J. Cryptogr. Eng., September, 2024
Differential cryptanalysis with SAT, SMT, MILP, and CP: a detailed comparison for bit-oriented primitives.
IACR Cryptol. ePrint Arch., 2024
A multistep strategy for polynomial system solving over finite fields and a new algebraic attack on the stream cipher Trivium.
Finite Fields Their Appl., 2024
Proceedings of the Engineering Applications of Neural Networks, 2024
2022
Public Key Compression and Fast Polynomial Multiplication for NTRU using the Corrected Hybridized NTT-Karatsuba Method.
IACR Cryptol. ePrint Arch., 2022
Finite Fields Their Appl., 2022
An IoT Inventory Before Deployment: A Survey on IoT Protocols, Communication Technologies, Vulnerabilities, Attacks, and Future Research Directions.
Comput. Secur., 2022
2021
Effects of central tendency measures on term weighting in textual information retrieval.
Soft Comput., 2021
Appl. Algebra Eng. Commun. Comput., 2021
A direct-digitization open-loop gyroscope frontend with +/-8000°/s full-scale range and noise floor of 0.0047°/s/√Hz.
Proceedings of the 2021 Symposium on VLSI Circuits, Kyoto, Japan, June 13-19, 2021, 2021
Proceedings of the Seventh International Conference on Mathematics and Computing, 2021
2020
IEEE Trans. Dependable Secur. Comput., 2020
J. Cryptogr. Eng., 2020
Why you cannot even hope to use Gröbner bases in cryptography: an eternal golden braid of failures.
Appl. Algebra Eng. Commun. Comput., 2020
Proceedings of the 2020 IEEE Sensors, Rotterdam, The Netherlands, October 25-28, 2020, 2020
2019
IACR Cryptol. ePrint Arch., 2019
Appl. Intell., 2019
Proceedings of the 2nd International Conference on Wireless Intelligent and Distributed Environment for Communication, 2019
2018
Mob. Inf. Syst., 2018
Improved upper bounds for the expected circuit complexity of dense systems of linear equations over GF(2).
Inf. Process. Lett., 2018
Proceedings of the Mathematical Software - ICMS 2018, 2018
2017
Exploiting a Bad User Practice to Retrieve Data Leakage on Android Password Managers.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2017
2016
IACR Cryptol. ePrint Arch., 2016
2014
Proceedings of the SECRYPT 2014, 2014
2012
An Improved Public-key Tracing Scheme with Sublinear Ciphertext Size.
Proceedings of the SECRYPT 2012, 2012
2011
Appl. Soft Comput., 2011
2010
Electron. Commer. Res., 2010
2009
On the calculation of extended max and min operations between convex fuzzy sets of the real line.
Fuzzy Sets Syst., 2009
Detecting misbehaving nodes in MANET with an artificial immune system based on type-2 fuzzy sets.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009
2008
Proceedings of the Biologically-Inspired Collaborative Computing, 2008
Proceedings of the Hybrid Artificial Intelligence Systems, Third International Workshop, 2008
Proceedings of the 2008 IEEE International Conference on Granular Computing, 2008
2007
EZK: A Zero Knowledge Tool for Generating, Handling, and Securing Electronic Bills of Lading.
Proceedings of the WEBIST 2007, 2007
Proceedings of the 2007 IEEE International Conference on Granular Computing, 2007
2005
Proceedings of the Neural Nets, 16th Italian Workshop on Neural Nets, 2005
Testing of native artificial immune system for the protection of computer networks.
Proceedings of the AC 2005, 2005
2003
Proceedings of the Computational Methods in Systems Biology, First International Workshop, 2003