Follow
guido bertoni
guido bertoni
Security Pattern
No verified email
Title
Cited by
Cited by
Year
On the indifferentiability of the sponge construction
G Bertoni, J Daemen, M Peeters, G Van Assche
Advances in Cryptology–EUROCRYPT 2008, 181-197, 2008
5882008
Sponge functions
G Bertoni, J Daemen, M Peeters, G Van Assche
ECRYPT hash workshop 2007, 2007
5552007
Duplexing the sponge: single-pass authenticated encryption and other applications
G Bertoni, J Daemen, M Peeters, G Van Assche
Selected Areas in Cryptography, 320-337, 2012
4892012
Error analysis and detection procedures for a hardware implementation of the advanced encryption standard
G Bertoni, L Breveglieri, I Koren, P Maistri, V Piuri
Computers, IEEE Transactions on 52 (4), 492-505, 2003
4422003
Keccak
G Bertoni, J Daemen, M Peeters, G Van Assche
Advances in Cryptology–EUROCRYPT 2013, 313-314, 2013
4112013
Keccak sponge function family main document
G Bertoni, J Daemen, M Peeters, G Van Assche
Submission to NIST (Round 2) 3, 30, 2009
4012009
The keccak reference
G Bertoni, M Peeters, G Van Assche
263*2011
The keccak sha-3 submission
G Bertoni, J Daemen, M Peeters, G Van Assche
Submission to NIST (Round 3) 7 (8), 20, 2011
2632011
Efficient software implementation of AES on 32-bit platforms
G Bertoni, L Breveglieri, P Fragneto, M Macchetti, S Marchesin
Cryptographic Hardware and Embedded Systems-CHES 2002, 159-171, 2003
2232003
Cryptographic sponge functions
G Bertoni, J Daemen, M Peeters, G Van Assche
Submission to NIST (Round 3), 2011
1752011
Permutation-based encryption, authentication and authenticated encryption
J Daemen, G Bertoni, M Peeters, G Van Assche
DIAC-Directions in Authenticated Ciphers, Sweden, 2012
161*2012
AES power attack based on induced cache miss and countermeasure
G Bertoni, V Zaccaria, L Breveglieri, M Monchiero, G Palermo
Information Technology: Coding and Computing, 2005. ITCC 2005. International …, 2005
1602005
Sponge-based pseudo-random number generators
G Bertoni, J Daemen, M Peeters, G Van Assche
Cryptographic Hardware and Embedded Systems, CHES 2010, 33-47, 2010
1522010
Keccak specifications
G Bertoni, J Daemen, M Peeters, G Van Assche
Submission to NIST (Round 2), 2009
1422009
Keccak specifications
G Bertoni, J Daemen, M Peeters, G Van Assche
Submission to NIST 42, 2008
1422008
Low voltage fault attacks on the RSA cryptosystem
A Barenghi, G Bertoni, E Parrinello, G Pelosi
Fault Diagnosis and Tolerance in Cryptography (FDTC), 2009 Workshop on, 23-31, 2009
1312009
Low Voltage Fault Attacks on the RSA Cryptosystem
G PELOSI, A BARENGHI, G BERTONI, E PARRINIELLO
International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2009
131*2009
On the security of the keyed sponge construction
G Bertoni, J Daemen, M Peeters, GV Assche
SKEW, 2011
1092011
Efficient GF (p m) arithmetic architectures for cryptographic applications
G Bertoni, J Guajardo, S Kumar, G Orlando, C Paar, T Wollinger
Topics in Cryptology—CT-RSA 2003, 158-175, 2003
1092003
Power-efficient ASIC synthesis of cryptographic sboxes
G Bertoni, M Macchetti, L Negri, P Fragneto
Proceedings of the 14th ACM Great Lakes symposium on VLSI, 277-281, 2004
962004
The system can't perform the operation now. Try again later.
Articles 1–20