Andrea Visconti

Orcid: 0000-0001-5689-8575

According to our database1, Andrea Visconti authored at least 43 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Progressive and efficient verification for digital signatures: extensions and experimental results.
J. Cryptogr. Eng., September, 2024

Differential cryptanalysis with SAT, SMT, MILP, and CP: a detailed comparison for bit-oriented primitives.
IACR Cryptol. ePrint Arch., 2024

A multistep strategy for polynomial system solving over finite fields and a new algebraic attack on the stream cipher Trivium.
Finite Fields Their Appl., 2024

Security Analysis of Cryptographic Algorithms: Hints from Machine Learning.
Proceedings of the Engineering Applications of Neural Networks, 2024

2022
Public Key Compression and Fast Polynomial Multiplication for NTRU using the Corrected Hybridized NTT-Karatsuba Method.
IACR Cryptol. ePrint Arch., 2022

An algebraic attack to the Bluetooth stream cipher E0.
Finite Fields Their Appl., 2022

An IoT Inventory Before Deployment: A Survey on IoT Protocols, Communication Technologies, Vulnerabilities, Attacks, and Future Research Directions.
Comput. Secur., 2022

2021
Effects of central tendency measures on term weighting in textual information retrieval.
Soft Comput., 2021

Internet of Things Design, Architectures and Protocols.
Internet Things, 2021

Why you cannot even hope to use Ore algebras in Cryptography.
Appl. Algebra Eng. Commun. Comput., 2021

A direct-digitization open-loop gyroscope frontend with +/-8000°/s full-scale range and noise floor of 0.0047°/s/√Hz.
Proceedings of the 2021 Symposium on VLSI Circuits, Kyoto, Japan, June 13-19, 2021, 2021

New Records of Pre-image Search of Reduced SHA-1 Using SAT Solvers.
Proceedings of the Seventh International Conference on Mathematics and Computing, 2021

2020
Exploiting an HMAC-SHA-1 Optimization to Speed up PBKDF2.
IEEE Trans. Dependable Secur. Comput., 2020

Polynomial multiplication over binary finite fields: new upper bounds.
J. Cryptogr. Eng., 2020

Why you cannot even hope to use Gröbner bases in cryptography: an eternal golden braid of failures.
Appl. Algebra Eng. Commun. Comput., 2020

Evolution of Bosch Inertial Measurement Units for Consumer Electronics.
Proceedings of the 2020 IEEE Sensors, Rotterdam, The Netherlands, October 25-28, 2020, 2020

2019
Measuring Performances of a White-Box Approach in the IoT Context.
Symmetry, 2019

Examining PBKDF2 security margin - Case study of LUKS.
J. Inf. Secur. Appl., 2019

Understanding Optimizations and Measuring Performances of PBKDF2.
IACR Cryptol. ePrint Arch., 2019

Discovering varying patterns of Normal and interleaved ADLs in smart homes.
Appl. Intell., 2019

White-Box Cryptography: A Time-Security Trade-Off for the SPNbox Family.
Proceedings of the 2nd International Conference on Wireless Intelligent and Distributed Environment for Communication, 2019

2018
The Dangers of Rooting: Data Leakage Detection in Android Applications.
Mob. Inf. Syst., 2018

Improved upper bounds for the expected circuit complexity of dense systems of linear equations over GF(2).
Inf. Process. Lett., 2018

Efficient Computation of Squarefree Separator Polynomials.
Proceedings of the Mathematical Software - ICMS 2018, 2018

2017
Exploiting a Bad User Practice to Retrieve Data Leakage on Android Password Managers.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2017

2016
On the weaknesses of PBKDF2.
IACR Cryptol. ePrint Arch., 2016

What users should know about Full Disk Encryption based on LUKS.
IACR Cryptol. ePrint Arch., 2016

2014
Differential Fault Attacks against AES Tampering with the Instruction Flow.
Proceedings of the SECRYPT 2014, 2014

2012
An Improved Public-key Tracing Scheme with Sublinear Ciphertext Size.
Proceedings of the SECRYPT 2012, 2012

2011
Artificial immune system based on interval type-2 fuzzy set paradigm.
Appl. Soft Comput., 2011

2010
Concave type-2 fuzzy sets: properties and operations.
Soft Comput., 2010

Secure electronic bills of lading: blind counts and digital signatures.
Electron. Commer. Res., 2010

2009
On the calculation of extended max and min operations between convex fuzzy sets of the real line.
Fuzzy Sets Syst., 2009

Detecting misbehaving nodes in MANET with an artificial immune system based on type-2 fuzzy sets.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009

2008
Intrusion Detection via Artificial Immune System: a Performance-based Approach.
Proceedings of the Biologically-Inspired Collaborative Computing, 2008

A Type-2 Fuzzy Set Recognition Algorithm for Artificial Immune Systems.
Proceedings of the Hybrid Artificial Intelligence Systems, Third International Workshop, 2008

Distributed-interval Type-2 Fuzzy Set based Recognition Algorithm for IDS.
Proceedings of the 2008 IEEE International Conference on Granular Computing, 2008

2007
EZK: A Zero Knowledge Tool for Generating, Handling, and Securing Electronic Bills of Lading.
Proceedings of the WEBIST 2007, 2007

Email Granulation Based On Augmented Interval Type-2 Fuzzy Set Methodologies.
Proceedings of the 2007 IEEE International Conference on Granular Computing, 2007

2005
Intrusion detection via artificial immune systems.
PhD thesis, 2005

Profiling Network Attacks Via AIS.
Proceedings of the Neural Nets, 16th Italian Workshop on Neural Nets, 2005

Testing of native artificial immune system for the protection of computer networks.
Proceedings of the AC 2005, 2005

2003
Detection and Analysis of Unexpected State Components in Biological Systems.
Proceedings of the Computational Methods in Systems Biology, First International Workshop, 2003


  Loading...