Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SMaC: spatial map caching technique for mobile devices., and . SAC, page 1829-1830. ACM, (2010)Side-channel security of superscalar CPUs: evaluating the impact of micro-architectural features., and . DAC, page 120:1-120:6. ACM, (2018)Supporting Concurrency in Private Data Outsourcing., , , , and . ESORICS, volume 6879 of Lecture Notes in Computer Science, page 648-664. Springer, (2011)A Unified Approach to Canonical Form-based Boolean Matching., , , and . DAC, page 841-846. IEEE, (2007)Quantum Computing Research Lines in the Italian Center for Supercomputing., , and . SAMOS, volume 14385 of Lecture Notes in Computer Science, page 423-434. Springer, (2023)A Quantum Circuit to Speed-Up the Cryptanalysis of Code-Based Cryptosystems., , and . SecureComm (2), volume 399 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 458-474. Springer, (2021)Encasing block ciphers to foil key recovery attempts via side channel., , , and . ICCAD, page 96. ACM, (2016)Performance Bounds for QC-MDPC Codes Decoders., , , , and . CBCrypto, volume 13150 of Lecture Notes in Computer Science, page 95-122. Springer, (2021)Evaluating the Trade-offs in the Hardware Design of the LEDAcrypt Encryption Functions., , , , and . ICECS, page 739-742. IEEE, (2019)Low Voltage Fault Attacks to AES., , , , and . HOST, page 7-12. IEEE Computer Society, (2010)