Name
Affiliation
Papers
FABRIZIO DE SANTIS
Technische Universität München, Munich, Germany
23
Collaborators
Citations 
PageRank 
38
84
10.44
Referers 
Referees 
References 
242
354
217
Search Limit
100354
Title
Citations
PageRank
Year
High-Resolution EM Attacks Against Leakage-Resilient PRFs Explained - And An Improved Construction.00.342018
The CAESAR-API in the real world — Towards a fair evaluation of hardware CAESAR candidates10.482018
Post-Quantum Key Exchange on ARMv8-A - A New Hope for NEON made Simple.20.402018
ChaCha20-Poly1305 authenticated encryption for high-speed embedded IoT applications.00.342017
Side-channel leakage aware instruction scheduling.20.382017
Fast FPGA Implementations of Diffie-Hellman on the Kummer Surface of a Genus-2 Curve.00.342017
Low-Cost Setup for Localized Semi-invasive Optical Fault Injection Attacks - How Low Can We Go?00.342017
Dissecting Leakage Resilient PRFs with Multivariate Localized EM Attacks - A Practical Security Evaluation on FPGA.20.362017
Low-latency X25519 hardware implementation: breaking the 100 microseconds barrier.10.372017
Towards Side-Channel Secure Firmware Updates - A Minimalist Anomaly Detection Approach.00.342016
Squeezing Polynomial Masking in Tower Fields - A Higher-Order Masked AES S-Box.00.342016
Hiding Higher-Order Univariate Leakages by Shuffling Polynomial Masking Schemes: A More Efficient, Shuffled, and Higher-Order Masked AES S-box00.342016
X25519 Hardware Implementation for Low-Latency Applications20.372016
Ciphertext-Only Fault Attacks on PRESENT.50.442014
On Efficient Leakage-Resilient Pseudorandom Functions With Hard-To-Invert Leakages00.342014
Towards fresh re-keying with leakage-resilient PRFs: cipher design principles and analysis.80.472013
Clustering Algorithms for Non-profiled Single-Execution Attacks on Exponentiations.170.692013
On the Relationship between Correlation Power Analysis and the Stochastic Approach: An ASIC Designer Perspective.00.342013
Strengths and limitations of high-resolution electromagnetic field measurements for side-channel analysis120.772012
Reliability bound and channel capacity of IBS-based fuzzy embedders30.402012
On the Efficiency of Design Time Evaluation of the Resistance to Power Attacks30.422011
Record Setting Software Implementation of DES Using CUDA191.202010
Fast Disk Encryption through GPGPU Acceleration70.632009