Silvia Mella

Orcid: 0000-0002-4664-3541

According to our database1, Silvia Mella authored at least 23 papers between 2013 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Propagation properties of a non-linear mapping based on squaring in odd characteristic.
Cryptogr. Commun., September, 2024

Koala: A Low-Latency Pseudorandom Function.
IACR Cryptol. ePrint Arch., 2024

Shaking up authenticated encryption.
IACR Cryptol. ePrint Arch., 2024

Xoodyak Under SCA Siege.
Proceedings of the 27th International Symposium on Design & Diagnostics of Electronic Circuits & Systems, 2024

PROACT - Physical Attack Resistance of Cryptographic Algorithms and Circuits with Reduced Time to Market.
Proceedings of the Applied Reconfigurable Computing. Architectures, Tools, and Applications, 2024

2023
Differential and Linear properties of vectorial boolean functions based on chi.
Cryptogr. Commun., December, 2023

Tighter Trail Bounds for Xoodoo.
IACR Trans. Symmetric Cryptol., 2023

Committing authenticated encryption based on SHAKE.
IACR Cryptol. ePrint Arch., 2023

2022
Differential Trail Search in Cryptographic Primitives with Big-Circle Chi: Application to Subterranean.
IACR Trans. Symmetric Cryptol., 2022

Improved Differential and Linear Trail Bounds for ASCON.
IACR Trans. Symmetric Cryptol., 2022

Profiled side channel attacks against the RSA cryptosystem using neural networks.
J. Inf. Secur. Appl., 2022

2021
Computing the Distribution of Differentials over the Non-linear Mapping χ.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2021

Profiled Attacks Against the Elliptic Curve Scalar Point Multiplication Using Neural Networks.
Proceedings of the Network and System Security - 15th International Conference, 2021

2020
Strengthening Sequential Side-Channel Attacks Through Change Detection.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

2018
Analysis of cryptographic algorithms against theoretical and implementation attacks.
PhD thesis, 2018

2017
New techniques for trail bounds and application to differential trails in Keccak.
IACR Trans. Symmetric Cryptol., 2017

2016
Key Recovery in Public Clouds: A Survey on Cross-VM Side Channel Attacks.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

2015
New Results for Partial Key Exposure on RSA with Exponent Blinding.
Proceedings of the SECRYPT 2015, 2015

Partial Key Exposure Attacks on RSA with Exponent Blinding.
Proceedings of the E-Business and Telecommunications - 12th International Joint Conference, 2015

J-DFA: A Novel Approach for Robust Differential Fault Analysis.
Proceedings of the 2015 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2015

2014
Differential Fault Attacks against AES Tampering with the Instruction Flow.
Proceedings of the SECRYPT 2014, 2014

The role of the fault model in DFA against AES.
Proceedings of the HASP 2014, 2014

2013
On the Homomorphic Computation of Symmetric Cryptographic Primitives.
Proceedings of the Cryptography and Coding - 14th IMA International Conference, 2013


  Loading...