[go: up one dir, main page]

Follow
Ruggero Susella
Ruggero Susella
Verified email at st.com
Title
Cited by
Cited by
Year
Breaking ed25519 in wolfssl
N Samwel, L Batina, G Bertoni, J Daemen, R Susella
Cryptographers’ Track at the RSA Conference, 1-20, 2018
522018
On the homomorphic computation of symmetric cryptographic primitives
S Mella, R Susella
IMA International Conference on Cryptography and Coding, 28-44, 2013
272013
A novel fault attack against ECDSA
A Barenghi, G Bertoni, A Palomba, R Susella
2011 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2011
212011
A compact and exception-free ladder for all short Weierstrass elliptic curves
R Susella, S Montrasio
International Conference on Smart Card Research and Advanced Applications …, 2016
162016
Method for performing an encryption of an AES type, and corresponding system and computer program product
R Susella, S Mella
US Patent 9,425,961, 2016
152016
Secure and effective implementation of an IOTA light node using STM32
D Stucchi, R Susella, P Fragneto, B Rossi
Proceedings of the 2nd Workshop on Blockchain-enabled Networked Sensor, 28-29, 2019
142019
A fault-based secret key retrieval method for ECDSA: Analysis and countermeasure
A Barenghi, GM Bertoni, L Breveglieri, G Pelosi, S Sanfilippo, R Susella
ACM Journal on Emerging Technologies in Computing Systems (JETC) 13 (1), 1-26, 2016
142016
Method for encrypting a message through the computation of mathematical functions comprising modular multiplications
GM Bertoni, R Susella
US Patent 9,152,383, 2015
132015
A high efficiency hardware design for the post-quantum KEM HQC
F Antognazza, A Barenghi, G Pelosi, R Susella
2024 IEEE International Symposium on Hardware Oriented Security and Trust …, 2024
122024
A flexible ASIC-oriented design for a full NTRU accelerator
F Antognazza, A Barenghi, G Pelosi, R Susella
Proceedings of the 28th Asia and South Pacific Design Automation Conference …, 2023
112023
Profiled side channel attacks against the RSA cryptosystem using neural networks
A Barenghi, D Carrera, S Mella, A Pace, G Pelosi, R Susella
Journal of Information Security and Applications 66, 103122, 2022
102022
Method for generating a digital signature
GM Bertoni, R Susella, A Palomba
US Patent 8,817,977, 2014
102014
Mayo: Optimized implementation with revised parameters for armv7-m
A Gringiani, A Meneghetti, E Signorini, R Susella
Cryptology ePrint Archive, 2023
82023
An Efficient Unified Architecture for Polynomial Multiplications in Lattice-Based Cryptoschemes.
F Antognazza, A Barenghi, G Pelosi, R Susella
ICISSP, 81-88, 2023
72023
Strengthening sequential side-channel attacks through change detection
L Frittoli, M Bocchi, S Mella, D Carrera, B Rossi, P Fragneto, R Susella, ...
IACR Transactions on Cryptographic Hardware and Embedded Systems, 1-21, 2020
72020
Performance and efficiency exploration of hardware polynomial multipliers for post-quantum lattice-based cryptosystems
F Antognazza, A Barenghi, G Pelosi, R Susella
SN Computer Science 5 (2), 212, 2024
52024
CASCA: A design automation approach for designing hardware countermeasures against side-channel attacks
L Delledonne, V Zaccaria, R Susella, G Bertoni, F Melzani
ACM Transactions on Design Automation of Electronic Systems (TODAES) 23 (6 …, 2018
52018
New results for partial key exposure on RSA with exponent blinding
S Cimato, S Mella, R Susella
2015 12th International Joint Conference on e-Business and …, 2015
52015
Practical power analysis attacks to RSA on a large IP portfolio SoC
GM Bertoni, L Breveglieri, A Cominola, F Melzani, R Susella
2009 Sixth International Conference on Information Technology: New …, 2009
52009
Method for performing cryptographic operations in a processing device, corresponding processing device and computer program product
R Susella, F Melzani, GM Bertoni
US Patent 11,582,039, 2023
42023
The system can't perform the operation now. Try again later.
Articles 1–20