default search action
Andrea Visconti
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Roberto La Scala, Federico Pintore, Sharwan K. Tiwari, Andrea Visconti:
A multistep strategy for polynomial system solving over finite fields and a new algebraic attack on the stream cipher Trivium. Finite Fields Their Appl. 98: 102452 (2024) - [j18]Cecilia Boschini, Dario Fiore, Elena Pagnin, Luca Torresetti, Andrea Visconti:
Progressive and efficient verification for digital signatures: extensions and experimental results. J. Cryptogr. Eng. 14(3): 551-575 (2024) - [c23]Mattia Paravisi, Andrea Visconti, Dario Malchiodi:
Security Analysis of Cryptographic Algorithms: Hints from Machine Learning. EANN 2024: 569-580 - [i12]Emanuele Bellini, Alessandro De Piccoli, Mattia Formenti, David Gérault, Paul Huynh, Simone Pelizzola, Sergio Polese, Andrea Visconti:
Differential cryptanalysis with SAT, SMT, MILP, and CP: a detailed comparison for bit-oriented primitives. IACR Cryptol. ePrint Arch. 2024: 105 (2024) - 2023
- [c22]Emanuele Bellini, Alessandro De Piccoli, Mattia Formenti, David Gérault, Paul Huynh, Simone Pelizzola, Sergio Polese, Andrea Visconti:
Differential Cryptanalysis with SAT, SMT, MILP, and CP: A Detailed Comparison for Bit-Oriented Primitives. CANS 2023: 268-292 - [i11]Roberto La Scala, Federico Pintore, Sharwan K. Tiwari, Andrea Visconti:
A multistep strategy for polynomial system solving over finite fields and a new algebraic attack on the stream cipher Trivium. CoRR abs/2304.07820 (2023) - [i10]Roberto La Scala, Federico Pintore, Sharwan K. Tiwari, Andrea Visconti:
A multistep strategy for polynomial system solving over finite fields and a new algebraic attack on the stream cipher Trivium. IACR Cryptol. ePrint Arch. 2023: 542 (2023) - 2022
- [j17]Ankur O. Bang, Udai Pratap Rao, Andrea Visconti, Alessandro Brighente, Mauro Conti:
An IoT Inventory Before Deployment: A Survey on IoT Protocols, Communication Technologies, Vulnerabilities, Attacks, and Future Research Directions. Comput. Secur. 123: 102914 (2022) - [j16]Roberto La Scala, Sergio Polese, Sharwan K. Tiwari, Andrea Visconti:
An algebraic attack to the Bluetooth stream cipher E0. Finite Fields Their Appl. 84: 102102 (2022) - [c21]Rohon Kundu, Alessandro De Piccoli, Andrea Visconti:
Public Key Compression and Fast Polynomial Multiplication for NTRU using the Corrected Hybridized NTT-Karatsuba Method. ICISSP 2022: 145-153 - [i9]Roberto La Scala, Sergio Polese, Sharwan K. Tiwari, Andrea Visconti:
An algebraic attack to the Bluetooth stream cipher E0. CoRR abs/2201.01262 (2022) - [i8]Roberto La Scala, Sergio Polese, Sharwan K. Tiwari, Andrea Visconti:
An algebraic attack to the Bluetooth stream cipher E0. IACR Cryptol. ePrint Arch. 2022: 16 (2022) - [i7]Rohon Kundu, Alessandro De Piccoli, Andrea Visconti:
Public Key Compression and Fast Polynomial Multiplication for NTRU using the Corrected Hybridized NTT-Karatsuba Method. IACR Cryptol. ePrint Arch. 2022: 108 (2022) - 2021
- [j15]Michela Ceria, Teo Mora, Andrea Visconti:
Why you cannot even hope to use Ore algebras in Cryptography. Appl. Algebra Eng. Commun. Comput. 32(3): 229-244 (2021) - [j14]Isaac Woungang, Sanjay K. Dhurandher, Andrea Visconti:
Internet of Things Design, Architectures and Protocols. Internet Things 14: 100267 (2021) - [j13]Farzad Ghahramani, Hooman Tahayori, Andrea Visconti:
Effects of central tendency measures on term weighting in textual information retrieval. Soft Comput. 25(11): 7341-7378 (2021) - [c20]Emanuele Bellini, Alessandro De Piccoli, Rusydi H. Makarim, Sergio Polese, Lorenzo Riva, Andrea Visconti:
New Records of Pre-image Search of Reduced SHA-1 Using SAT Solvers. ICMC 2021: 141-151 - [c19]Chinwuba D. Ezekwe, Saikrishna Ganta, Xinyu Xing, Anton Grad, Thomas Mayer, Andrea Visconti, Francesco Diazzi, Man-Chia Chen, Danielle Morton, Luca Valli, Robert Wolf, Ashkan Eghtesadi, Tobias Wolfer, Michael Pietzko, Alexander Grathwohl, Thomas Northemann, Richard Schoenleber, Ruslan Khalilyulin, Ishita Mukhopadhyay, Alexandru Negut, Artjom Kosov, Andreas Christian Serafin, Jan Hayek, Lin Sun:
A direct-digitization open-loop gyroscope frontend with +/-8000°/s full-scale range and noise floor of 0.0047°/s/√Hz. VLSI Circuits 2021: 1-2 - 2020
- [j12]Boo Barkee, Michela Ceria, Theo Moriarty, Andrea Visconti:
Why you cannot even hope to use Gröbner bases in cryptography: an eternal golden braid of failures. Appl. Algebra Eng. Commun. Comput. 31(3-4): 235-252 (2020) - [j11]Alessandro De Piccoli, Andrea Visconti, Ottavio Giulio Rizzo:
Polynomial multiplication over binary finite fields: new upper bounds. J. Cryptogr. Eng. 10(3): 197-210 (2020) - [j10]Andrea Visconti, Federico Gorla:
Exploiting an HMAC-SHA-1 Optimization to Speed up PBKDF2. IEEE Trans. Dependable Secur. Comput. 17(4): 775-781 (2020) - [c18]Johannes Classen, Florian Kult, Dusan Radovic, Thomas Zebrowski, Amin Jemili, Andrea Visconti, Chinwuba D. Ezekwe, Alexander Buhmann, Manuel Dietrich, Axel Grosse, Robert Maul, Carsten Geckeler, Rudy Eid:
Evolution of Bosch Inertial Measurement Units for Consumer Electronics. IEEE SENSORS 2020: 1-4
2010 – 2019
- 2019
- [j9]Mahsa Raeiszadeh, Hooman Tahayori, Andrea Visconti:
Discovering varying patterns of Normal and interleaved ADLs in smart homes. Appl. Intell. 49(12): 4175-4188 (2019) - [j8]Andrea Visconti, Ondrej Mosnácek, Milan Broz, Vashek Matyás:
Examining PBKDF2 security margin - Case study of LUKS. J. Inf. Secur. Appl. 46: 296-306 (2019) - [j7]Daniele Giacomo Vittorio Albricci, Michela Ceria, Federico Cioschi, Nicolò Fornari, Arvin Shakiba, Andrea Visconti:
Measuring Performances of a White-Box Approach in the IoT Context. Symmetry 11(8): 1000 (2019) - [c17]Andrea Francesco Iuorio, Andrea Visconti:
Understanding Optimizations and Measuring Performances of PBKDF2. WIDECOM 2019: 101-114 - [c16]Federico Cioschi, Nicolò Fornari, Andrea Visconti:
White-Box Cryptography: A Time-Security Trade-Off for the SPNbox Family. WIDECOM 2019: 153-166 - [i6]Andrea Francesco Iuorio, Andrea Visconti:
Understanding Optimizations and Measuring Performances of PBKDF2. IACR Cryptol. ePrint Arch. 2019: 161 (2019) - 2018
- [j6]Andrea Visconti, Chiara Valentina Schiavo, René Peralta:
Improved upper bounds for the expected circuit complexity of dense systems of linear equations over GF(2). Inf. Process. Lett. 137: 1-5 (2018) - [j5]Luca Casati, Andrea Visconti:
The Dangers of Rooting: Data Leakage Detection in Android Applications. Mob. Inf. Syst. 2018: 6020461:1-6020461:9 (2018) - [c15]Michela Ceria, Teo Mora, Andrea Visconti:
Efficient Computation of Squarefree Separator Polynomials. ICMS 2018: 98-104 - [i5]Alessandro De Piccoli, Andrea Visconti, Ottavio Giulio Rizzo:
Polynomial multiplication over binary finite fields: new upper bounds. IACR Cryptol. ePrint Arch. 2018: 91 (2018) - [i4]Andrea Visconti, Federico Gorla:
Exploiting an HMAC-SHA-1 optimization to speed up PBKDF2. IACR Cryptol. ePrint Arch. 2018: 97 (2018) - 2017
- [c14]Luca Casati, Andrea Visconti:
Exploiting a Bad User Practice to Retrieve Data Leakage on Android Password Managers. IMIS 2017: 952-958 - [i3]Andrea Visconti, Chiara Valentina Schiavo, René Peralta:
Improved upper bounds for the expected circuit complexity of dense systems of linear equations over GF(2). IACR Cryptol. ePrint Arch. 2017: 194 (2017) - 2016
- [i2]Andrea Visconti, Simone Bossi, Hany Ragab, Alexandro Calò:
On the weaknesses of PBKDF2. IACR Cryptol. ePrint Arch. 2016: 273 (2016) - [i1]Simone Bossi, Andrea Visconti:
What users should know about Full Disk Encryption based on LUKS. IACR Cryptol. ePrint Arch. 2016: 274 (2016) - 2015
- [c13]Andrea Visconti, Simone Bossi, Hany Ragab, Alexandro Calò:
On the Weaknesses of PBKDF2. CANS 2015: 119-126 - [c12]Simone Bossi, Andrea Visconti:
What Users Should Know About Full Disk Encryption Based on LUKS. CANS 2015: 225-237 - 2014
- [c11]Silvia Mella, Filippo Melzani, Andrea Visconti:
Differential Fault Attacks against AES Tampering with the Instruction Flow. SECRYPT 2014: 439-444 - 2012
- [c10]Chiara Valentina Schiavo, Andrea Visconti:
An Improved Public-key Tracing Scheme with Sublinear Ciphertext Size. SECRYPT 2012: 302-307 - 2011
- [j4]Andrea Visconti, Hooman Tahayori:
Artificial immune system based on interval type-2 fuzzy set paradigm. Appl. Soft Comput. 11(6): 4055-4063 (2011) - 2010
- [j3]Anastasia Pagnoni, Andrea Visconti:
Secure electronic bills of lading: blind counts and digital signatures. Electron. Commer. Res. 10(3-4): 363-388 (2010) - [j2]Hooman Tahayori, Andrea Tettamanzi, Giovanni Degli Antoni, Andrea Visconti, Masoomeh Moharrer:
Concave type-2 fuzzy sets: properties and operations. Soft Comput. 14(7): 749-756 (2010)
2000 – 2009
- 2009
- [j1]Hooman Tahayori, Andrea Tettamanzi, Giovanni Degli Antoni, Andrea Visconti:
On the calculation of extended max and min operations between convex fuzzy sets of the real line. Fuzzy Sets Syst. 160(21): 3103-3114 (2009) - [c9]Andrea Visconti, Hooman Tahayori:
Detecting misbehaving nodes in MANET with an artificial immune system based on type-2 fuzzy sets. ICITST 2009: 1-2 - 2008
- [c8]Hooman Tahayori, Andrea Visconti:
Distributed-interval Type-2 Fuzzy Set based Recognition Algorithm for IDS. GrC 2008: 572-575 - [c7]Andrea Visconti, Hooman Tahayori:
A Type-2 Fuzzy Set Recognition Algorithm for Artificial Immune Systems. HAIS 2008: 491-498 - [c6]Andrea Visconti, Nicoló Fusi, Hooman Tahayori:
Intrusion Detection via Artificial Immune System: a Performance-based Approach. BICC 2008: 125-135 - 2007
- [c5]Hooman Tahayori, Andrea Visconti, Giovanni Degli Antoni:
Email Granulation Based On Augmented Interval Type-2 Fuzzy Set Methodologies. GrC 2007: 139-144 - [c4]Andrea Visconti:
EZK: A Zero Knowledge Tool for Generating, Handling, and Securing Electronic Bills of Lading. WEBIST (3) 2007: 238-241 - 2005
- [b1]Andrea Visconti:
Intrusion detection via artificial immune systems. University of Milan, Italy, 2005 - [c3]Andrea Visconti:
Testing of native artificial immune system for the protection of computer networks. IADIS AC 2005: 283-288 - [c2]Anastasia Pagnoni, Andrea Visconti:
Profiling Network Attacks Via AIS. WIRN/NAIS 2005: 272-277 - 2003
- [c1]Anastasia Pagnoni, Andrea Visconti:
Detection and Analysis of Unexpected State Components in Biological Systems. CMSB 2003: 172
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint