Franco Chiaraluce

Orcid: 0000-0001-6994-1448

Affiliations:
  • Università Politecnica delle Marche, Ancona, Italy


According to our database1, Franco Chiaraluce authored at least 155 papers between 1991 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Bounds on the Free Distance of Periodically Time-Varying SC-LDPC Codes.
IEEE Trans. Inf. Theory, April, 2024

Computational Hardness of the Permuted Kernel and Subcode Equivalence Problems.
IEEE Trans. Inf. Theory, 2024

BiometricIdentity dApp: Decentralized biometric authentication based on fuzzy commitment and blockchain.
SoftwareX, 2024

Decentralized Biometric Authentication based on Fuzzy Commitments and Blockchain.
CoRR, 2024

Telecommand Rejection Probability for CCSDS-compliant LDPC-Coded Transmissions with Tail Sequence.
CoRR, 2024

Design and Analysis of a Family of Complexity-Constrained LDPC Codes.
Proceedings of the IEEE International Symposium on Information Theory, 2024

2023
Optimizing quasi-cyclic spatially coupled LDPC codes by eliminating harmful objects.
EURASIP J. Wirel. Commun. Netw., December, 2023

Rate-compatible LDPC Codes based on Primitive Polynomials and Golomb Rulers.
CoRR, 2023

Rate-Adaptive LDPC Codes Obtained from Simplex Codes.
Proceedings of the IEEE International Conference on Communications, 2023

A Blockchain Consensus Protocol Based on Fuzzy Signatures.
Proceedings of the IEEE Global Communications Conference, 2023

A Machine Learning-based Method for Cyber Risk Assessment.
Proceedings of the 36th IEEE International Symposium on Computer-Based Medical Systems, 2023

2022
Effect of randomizers on the power spectrum excess of space telemetry signals.
Int. J. Satell. Commun. Netw., 2022

SPANSE: combining sparsity with density for efficient one-time code-based digital signatures.
CoRR, 2022

A data availability attack on a blockchain protocol based on LDPC codes.
CoRR, 2022

MAGIC: A Method for Assessing Cyber Incidents Occurrence.
IEEE Access, 2022

Analysis of a Blockchain Protocol Based on LDPC Codes.
Proceedings of the 4th Workshop on Distributed Ledger Technology co-located with the Italian Conference on Cybersecurity 2022 (ITASEC 2022), 2022

A Novel Attack to the Permuted Kernel Problem.
Proceedings of the IEEE International Symposium on Information Theory, 2022

Optimization of a Reed-Solomon code-based protocol against blockchain data availability attacks.
Proceedings of the 2022 IEEE International Conference on Communications Workshops, 2022

Implementation of Ethereum Accounts and Transactions on Embedded IoT Devices.
Proceedings of the IEEE International Conference on Omni-layer Intelligent Systems, 2022

2021
Girth Analysis and Design of Periodically Time-Varying SC-LDPC Codes.
IEEE Trans. Inf. Theory, 2021

Code-based signatures without trapdoors through restricted vectors.
IACR Cryptol. ePrint Arch., 2021

Performance bounds for QC-MDPC codes decoders.
IACR Cryptol. ePrint Arch., 2021

Next generation earth-to-space telecommand coding and synchronization: ground system design, optimization and software implementation.
EURASIP J. Wirel. Commun. Netw., 2021

Efficient Hardware Implementation of the LEDAcrypt Decoder.
IEEE Access, 2021

2020
Dataset related to Analysis of Decoding Failures of LDPC and MDPC Codes in Out-of-Place Bit Flipping Decoding.
Dataset, October, 2020

Analysis of the Error Correction Capability of LDPC and MDPC Codes Under Parallel Bit-Flipping Decoding and Application to Cryptography.
IEEE Trans. Commun., 2020

End-to-End Simulations of Coded Transmissions in Space Links Affected by Solar Scintillation.
IEEE Trans. Aerosp. Electron. Syst., 2020

Complexity of statistical attacks on QC-LDPC code-based cryptosystems.
IET Inf. Secur., 2020

A New Path to Code-based Signatures via Identification Schemes with Restricted Errors.
CoRR, 2020

Security Analysis of a Blockchain-based Protocol for the Certification of Academic Credentials.
Proceedings of the 3rd Distributed Ledger Technology Workshop Co-located with ITASEC 2020, 2020

Analysis of In-Place Randomized Bit-Flipping Decoders for the Design of LDPC and MDPC Code-Based Cryptosystems.
Proceedings of the E-Business and Telecommunications, 2020

A Failure Rate Model of Bit-flipping Decoders for QC-LDPC and QC-MDPC Code-based Cryptosystems.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

Low-Lee-Density Parity-Check Codes.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

2019
Analysis of the Block Error Probability of Concatenated Polar Code Ensembles.
IEEE Trans. Commun., 2019

A Data-Driven Approach to Cyber Risk Assessment.
Secur. Commun. Networks, 2019

Physical layer security over fading wiretap channels through classic coded transmissions with finite block length and discrete modulation.
Phys. Commun., 2019

Coded transmissions for space links affected by solar scintillation: Baseband analysis.
Int. J. Satell. Commun. Netw., 2019

Security of generalised Reed-Solomon code-based cryptosystems.
IET Inf. Secur., 2019

A Code-specific Conservative Model for the Failure Rate of Bit-flipping Decoding of LDPC Codes with Cryptographic Applications.
IACR Cryptol. ePrint Arch., 2019

A theoretical analysis of the error correction capability of LDPC and MDPC codes under parallel bit-flipping decoding.
CoRR, 2019

Efficient Search and Elimination of Harmful Objects in Optimized QC SC-LDPC Codes.
CoRR, 2019

A Finite Regime Analysis of Information Set Decoding Algorithms.
Algorithms, 2019

Code-based physical layer secret key generation in passive optical networks.
Ad Hoc Networks, 2019

Cryptanalysis of a One-Time Code-Based Digital Signature Scheme.
Proceedings of the IEEE International Symposium on Information Theory, 2019

Girth Properties of Time-Varying SC-LDPC Convolutional Codes.
Proceedings of the IEEE International Symposium on Information Theory, 2019

Hard-Decision Iterative Decoding of LDPC Codes with Bounded Error Rate.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Efficient Search and Elimination of Harmful Objects for the Optimization of QC-SC-LDPC Codes.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Analysis of Reaction and Timing Attacks Against Cryptosystems Based on Sparse Parity-Check Codes.
Proceedings of the Code-Based Cryptography - 7th International Workshop, 2019

LEDAcrypt: QC-LDPC Code-Based Cryptosystems with Bounded Decryption Failure Rate.
Proceedings of the Code-Based Cryptography - 7th International Workshop, 2019

2018
Design and Analysis of Time-Invariant SC-LDPC Convolutional Codes With Small Constraint Length.
IEEE Trans. Commun., 2018

Efficient Search of Compact QC-LDPC and SC-LDPC Convolutional Codes With Large Girth.
IEEE Commun. Lett., 2018

Interleaver Design for Short Concatenated Codes.
IEEE Commun. Lett., 2018

Design and Implementation of a Digital Signature Scheme Based on Low-density Generator Matrix Codes.
CoRR, 2018

LEDAkem: A Post-quantum Key Encapsulation Mechanism Based on QC-LDPC Codes.
Proceedings of the Post-Quantum Cryptography - 9th International Conference, 2018

Compact QC-LDPC Block and SC-LDPC Convolutional Codes for Low-Latency Communications.
Proceedings of the 29th IEEE Annual International Symposium on Personal, 2018

Hindering Reaction Attacks by Using Monomial Codes in the McEliece Cryptosystem.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

Assessing and Countering Reaction Attacks Against Post-Quantum Public-Key Cryptosystems Based on QC-LDPC Codes.
Proceedings of the Cryptology and Network Security - 17th International Conference, 2018

2017
A trusted cryptocurrency scheme for secure and verifiable digital transactions.
First Monday, 2017

Semantic Security with Practical Transmission Schemes over Fading Wiretap Channels.
Entropy, 2017

Design and Analysis of Time-Invariant SC-LDPC codes with Small Constraint Length.
CoRR, 2017

A Probabilistic Small Model Theorem to Assess Confidentiality of Dispersed Cloud Storage.
Proceedings of the Quantitative Evaluation of Systems - 14th International Conference, 2017

Certificate Validation Through Public Ledgers and Blockchains.
Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), 2017

On the error probability of short concatenated polar and cyclic codes with interleaving.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

Security in heterogeneous distributed storage systems: A practically achievable information-theoretic approach.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

On the security of transmissions over fading wiretap channels in realistic conditions.
Proceedings of the IEEE International Conference on Communications, 2017

On Non-Linear Codes Correcting Errors of Limited Size.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

2016
Enhanced Public Key Security for the McEliece Cryptosystem.
J. Cryptol., 2016

On the use of ordered statistics decoders for low-density parity-check codes in space telecommand links.
EURASIP J. Wirel. Commun. Netw., 2016

Soft McEliece: MDPC code-based McEliece cryptosystems with very compact keys through real-valued intentional errors.
Proceedings of the IEEE International Symposium on Information Theory, 2016

On the error detection capability of combined LDPC and CRC codes for space telecommand transmissions.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

Achieving semantic security without keys through coding and all-or-nothing transforms over wireless channels.
Proceedings of the 2016 IEEE Global Conference on Signal and Information Processing, 2016

Time-invariant spatially coupled low-density parity-check codes with small constraint length.
Proceedings of the 2016 IEEE International Black Sea Conference on Communications and Networking, 2016

2015
Non-Invasive UWB Sensing of Astronauts' Breathing Activity.
Sensors, 2015

Analysis and performance evaluation of new coding options for space telecommand links - part II: jamming channels.
Int. J. Satell. Commun. Netw., 2015

Analysis and performance evaluation of new coding options for space telecommand links - Part I: AWGN channels.
Int. J. Satell. Commun. Netw., 2015

Security gap analysis of some LDPC coded transmission schemes over the flat and fast fading Gaussian wire-tap channels.
EURASIP J. Wirel. Commun. Netw., 2015

Performance assessment and design of finite length LDPC codes for the Gaussian wiretap channel.
Proceedings of the IEEE International Conference on Communication, 2015

LDPC coded modulation schemes with largely unequal error protection.
Proceedings of the IEEE International Black Sea Conference on Communications and Networking, 2015

2014
Secrecy Transmission on Parallel Channels: Theoretical Limits and Performance of Practical Codes.
IEEE Trans. Inf. Forensics Secur., 2014

A Hybrid Decoding Scheme for Short Non-Binary LDPC Codes.
IEEE Commun. Lett., 2014

Array Convolutional Low-Density Parity-Check Codes.
IEEE Commun. Lett., 2014

Error correcting codes in telecommand and telemetry for European Space Agency missions: An overview and new perspectives.
Proceedings of the 22nd International Conference on Software, 2014

Sparse generator matrices for some families of Quasi-Cyclic Low-Density Parity-Check codes.
Proceedings of the 22nd International Conference on Software, 2014

LDPC coded transmissions over the Gaussian broadcast channel with confidential messages.
Proceedings of the 21st International Conference on Telecommunications, 2014

Practical LDPC coded modulation schemes for the fading broadcast channel with confidential messages.
Proceedings of the IEEE International Conference on Communications, 2014

AONT-LT: A data protection scheme for Cloud and cooperative storage systems.
Proceedings of the International Conference on High Performance Computing & Simulation, 2014

2013
A Physical Layer Secured Key Distribution Technique for IEEE 802.11g Wireless Networks.
IEEE Wirel. Commun. Lett., 2013

Security and complexity of the McEliece cryptosystem based on quasi-cyclic low-density parity-check codes.
IET Inf. Secur., 2013

Secrecy Transmission on Block Fading Channels: Theoretical Limits and Performance of Practical Codes
CoRR, 2013

Low-power Secret-key Agreement over OFDM
CoRR, 2013

Advanced Channel Coding for Space Mission Telecommand Links.
Proceedings of the 78th IEEE Vehicular Technology Conference, 2013

Security gap performance of some LDPC code constructions.
Proceedings of the 36th International Conference on Telecommunications and Signal Processing, 2013

Using LDGM Codes and Sparse Syndromes to Achieve Digital Signatures.
Proceedings of the Post-Quantum Cryptography - 5th International Workshop, 2013

Advanced Coding Schemes against Jamming in Telecommand Links.
Proceedings of the 32th IEEE Military Communications Conference, 2013

A tight estimation of the security gap over the fast fading wiretap channel.
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013

A practical viewpoint on the performance of LDPC codes over the fast Rayleigh fading wire-tap channel.
Proceedings of the 2013 IEEE Symposium on Computers and Communications, 2013

Improving the efficiency of the LDPC code-based McEliece cryptosystem through irregular codes.
Proceedings of the 2013 IEEE Symposium on Computers and Communications, 2013

Security gap assessment for the fast fading wiretap channel.
Proceedings of the 20st International Conference on Telecommunications, 2013

Optimization of the parity-check matrix density in QC-LDPC code-based McEliece cryptosystems.
Proceedings of the IEEE International Conference on Communications, 2013

2012
A Class of Punctured Simplex Codes Which Are Proper for Error Detection.
IEEE Trans. Inf. Theory, 2012

Coding With Scrambling, Concatenation, and HARQ for the AWGN Wire-Tap Channel: A Security Gap Analysis.
IEEE Trans. Inf. Forensics Secur., 2012

Interleaved Product LDPC Codes.
IEEE Trans. Commun., 2012

Progressive Differences Convolutional Low-Density Parity-Check Codes.
IEEE Commun. Lett., 2012

A comparison between APSK and QAM in wireless tactical scenarios for land mobile systems.
EURASIP J. Wirel. Commun. Netw., 2012

On the generator matrix of array LDPC codes.
Proceedings of the 20th International Conference on Software, 2012

2011
Performance of Gossip Algorithms in Wireless Sensor Networks.
Proceedings of the Solutions on Embedded Systems, 2011

On a Family of Circulant Matrices for Quasi-Cyclic Low-Density Generator Matrix Codes.
IEEE Trans. Inf. Theory, 2011

Analysis of the Correlation Coefficient Between Component Noise Squared Norms for OFDM Systems.
IEEE Signal Process. Lett., 2011

Performance Evaluation of Some Distributed Averaging Algorithms for Sensor Networks.
Int. J. Distributed Sens. Networks, 2011

Security and complexity of the McEliece cryptosystem based on QC-LDPC codes
CoRR, 2011

Increasing Physical Layer Security through Scrambled Codes and ARQ
CoRR, 2011

Signal modeling and processing for physiological sensing through UWB radars.
Proceedings of the 19th International Conference on Software, 2011

Performance of APSK modulation in wireless tactical scenarios for land mobile systems.
Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011

On fuzzy syndrome hashing with LDPC coding.
Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies, 2011

2010
On the Autocorrelation Properties of Truncated Maximum-Length Sequences and Their Effect on the Power Spectrum.
IEEE Trans. Signal Process., 2010

Simple Statistical Analysis of the Impact of Some Nonidealities in Downstream VDSL with Linear Precoding.
EURASIP J. Adv. Signal Process., 2010

Non-systematic codes for physical layer security.
Proceedings of the 2010 IEEE Information Theory Workshop, 2010

2009
Finite-Precision Analysis of Demappers and Decoders for LDPC-Coded M-QAM Systems.
IEEE Trans. Broadcast., 2009

LDPC codes based on serially concatenated multiple parity-check codes.
IEEE Commun. Lett., 2009

Fault tolerance in sensor networks: Performance comparison of some gossip algorithms.
Proceedings of the Seventh Workshop on Intelligent solutions in Embedded Systems, 2009

New LDPC Codes Based on Serial Concatenation.
Proceedings of the Fifth Advanced International Conference on Telecommunications, 2009

2008
Chaos-Based Radars for Automotive Applications: Theoretical Issues and Numerical Simulation.
IEEE Trans. Veh. Technol., 2008

Exact and Approximate Expressions for the Probability of Undetected Errors of Varshamov-Tenengol'ts Codes.
IEEE Trans. Inf. Theory, 2008

A Simple Scheme for Belief Propagation Decoding of BCH and RS Codes in Multimedia Transmissions.
Int. J. Digit. Multim. Broadcast., 2008

A General Model for Performance Evaluation in DS-CDMA Systems with Variable Spreading Factors.
IEICE Trans. Commun., 2008

A New Analysis of the McEliece Cryptosystem Based on QC-LDPC Codes.
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008

2007
Channel Coding for Future Space Missions: New Requirements and Trends.
Proc. IEEE, 2007

Exact and Approximate Expressions for the Probability of Undetected Error of Varshamov-Tenengol'ts Codes
CoRR, 2007

LDPC Codes in the McEliece Cryptosystem
CoRR, 2007

Cryptanalysis of a new instance of McEliece cryptosystem based on QC-LDPC Codes.
Proceedings of the IEEE International Symposium on Information Theory, 2007

The Probability of Undetected Error for Varshamov-Tenengol'ts Codes.
Proceedings of IEEE International Conference on Communications, 2007

Quasi-Cyclic Low-Density Parity-Check Codes in the McEliece Cryptosystem.
Proceedings of IEEE International Conference on Communications, 2007

2006
Design and comparison of turbo codes under frame-length and code-rate constraints.
Int. J. Satell. Commun. Netw., 2006

Non-Binary Low Density Parity Check Codes for Satellite Communications.
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006

Spread spectrum radars for automotive applications.
Proceedings of the Fifth IASTED International Conference on Communication Systems and Networks, 2006

An improved error concealment strategy driven by scene motion properties for H.264/AVC decoders.
Proceedings of the 14th European Signal Processing Conference, 2006

2005
JavaNetPhone: A java client for IP telephony applications in an MGCP framework.
Proceedings of the 13th European Signal Processing Conference, 2005

Masking video information by partial encryption of H.264/AVC coding parameters.
Proceedings of the 13th European Signal Processing Conference, 2005

Performance Evaluation in H.264/AVC Video Coding: The Role of the Parameters Affecting Motion Estimation.
Proceedings of the Internet and Multimedia Systems and Applications, 2005

2004
Extended Hamming Product Codes Analytical Performance Evaluation for Low Error Rate Applications.
IEEE Trans. Wirel. Commun., 2004

Proposal and performance evaluation of a packet over VDSL protocol for increasing throughput in the transmission of IP packets.
Int. J. Commun. Syst., 2004

2003
Modified twofish algorithm for increasing security and efficiency in the encryption of video signals.
Proceedings of the 2003 International Conference on Image Processing, 2003

2002
A new chaotic algorithm for video encryption.
IEEE Trans. Consumer Electron., 2002

Symbol synchronization properties of CCSDS turbo codes.
Int. J. Satell. Commun. Netw., 2002

Performance of DCSK in Multipath Environments: A Comparison with Systems Using Gold Sequences.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002

2001
Design techniques of two-layer architectures for WDM optical networks.
Int. J. Commun. Syst., 2001

On error floor and free distance of turbo codes.
Proceedings of the IEEE International Conference on Communications, 2001

2000
Reduction of Walsh-transformed electrocardiograms by double logarithmic coding.
IEEE Trans. Biomed. Eng., 2000

On the New CCSDS Standard for Space Telemetry: Turbo Codes and Symbol Synchronization.
Proceedings of the 2000 IEEE International Conference on Communications: Global Convergence Through Communications, 2000

1998
Multicast routing in BMSNs through greedy, weighted greedy, and Dijkstra algorithms: a comparative analysis.
Proceedings of the Broadband European Networks and Multimedia Services 1998, 1998

1996
PPM transmission over a photon counting channel: Comparison among various transmission formats.
Eur. Trans. Telecommun., 1996

1994
<i>Letter</i>: Analysis of concatenated reed-solomon encoding schemes with full and partial interleaving for short data messages.
Eur. Trans. Telecommun., 1994

1993
Enhancements of DQDB protocol with ECBWB mechanism for fair access and multi-priority traffic management.
Comput. Commun., 1993

1992
Performance analysis of trellis coded biorthogonal sequences in a variable rate system.
Eur. Trans. Telecommun., 1992

1991
Single-mode optical fibers with geometrical birefringence: Analysis of the propagation by means of finite element method.
Eur. Trans. Telecommun., 1991


  Loading...