Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Maurizio Muratore
Itziar Gonzalez-Dios
Claudia Calabrese
Maria Concetta Palumbo
Jinus Roshandel
Jhonathan Pinzon
Giovanni Venturelli
Chen Ma
Radu Timofte
Kuanrui Yin
Home
/
Author
/
FABRIZIO DE SANTIS
Author Info
Open Visualization
Name
Affiliation
Papers
FABRIZIO DE SANTIS
Technische Universität München, Munich, Germany
23
Collaborators
Citations
PageRank
38
84
10.44
Referers
Referees
References
242
354
217
Search Limit
100
354
Publications (23 rows)
Collaborators (38 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
High-Resolution EM Attacks Against Leakage-Resilient PRFs Explained - And An Improved Construction.
0
0.34
2018
The CAESAR-API in the real world — Towards a fair evaluation of hardware CAESAR candidates
1
0.48
2018
Post-Quantum Key Exchange on ARMv8-A - A New Hope for NEON made Simple.
2
0.40
2018
ChaCha20-Poly1305 authenticated encryption for high-speed embedded IoT applications.
0
0.34
2017
Side-channel leakage aware instruction scheduling.
2
0.38
2017
Fast FPGA Implementations of Diffie-Hellman on the Kummer Surface of a Genus-2 Curve.
0
0.34
2017
Low-Cost Setup for Localized Semi-invasive Optical Fault Injection Attacks - How Low Can We Go?
0
0.34
2017
Dissecting Leakage Resilient PRFs with Multivariate Localized EM Attacks - A Practical Security Evaluation on FPGA.
2
0.36
2017
Low-latency X25519 hardware implementation: breaking the 100 microseconds barrier.
1
0.37
2017
Towards Side-Channel Secure Firmware Updates - A Minimalist Anomaly Detection Approach.
0
0.34
2016
Squeezing Polynomial Masking in Tower Fields - A Higher-Order Masked AES S-Box.
0
0.34
2016
Hiding Higher-Order Univariate Leakages by Shuffling Polynomial Masking Schemes: A More Efficient, Shuffled, and Higher-Order Masked AES S-box
0
0.34
2016
X25519 Hardware Implementation for Low-Latency Applications
2
0.37
2016
Ciphertext-Only Fault Attacks on PRESENT.
5
0.44
2014
On Efficient Leakage-Resilient Pseudorandom Functions With Hard-To-Invert Leakages
0
0.34
2014
Towards fresh re-keying with leakage-resilient PRFs: cipher design principles and analysis.
8
0.47
2013
Clustering Algorithms for Non-profiled Single-Execution Attacks on Exponentiations.
17
0.69
2013
On the Relationship between Correlation Power Analysis and the Stochastic Approach: An ASIC Designer Perspective.
0
0.34
2013
Strengths and limitations of high-resolution electromagnetic field measurements for side-channel analysis
12
0.77
2012
Reliability bound and channel capacity of IBS-based fuzzy embedders
3
0.40
2012
On the Efficiency of Design Time Evaluation of the Resistance to Power Attacks
3
0.42
2011
Record Setting Software Implementation of DES Using CUDA
19
1.20
2010
Fast Disk Encryption through GPGPU Acceleration
7
0.63
2009
1