default search action
Marco Macchetti
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c19]Marco Macchetti, Hervé Pelletier, Cédric Groux:
A New Fast and Side-Channel Resistant AES Hardware Architecture. CSR 2023: 572-579 - [i3]Marco Macchetti:
A Novel Related Nonce Attack for ECDSA. IACR Cryptol. ePrint Arch. 2023: 305 (2023) - 2022
- [c18]Hedi Fendri, Marco Macchetti, Jérôme Perrine, Mirjana Stojilovic:
A Deep-Learning Approach to Side-Channel Based CPU Disassembly at Design Time. DATE 2022: 670-675
2010 – 2019
- 2016
- [c17]Sebastien Bellon, Claudio Favi, Miroslaw Malek, Marco Macchetti, Francesco Regazzoni:
Evaluating the Impact of Environmental Factors on Physically Unclonable Functions (Abstract Only). FPGA 2016: 279 - [c16]Sebastien Bellon, Claudio Favi, Miroslaw Malek, Marco Macchetti, Francesco Regazzoni:
Evaluating physically unclonable functions on a large set of FPGAs. SAMOS 2016: 188-195 - 2013
- [c15]Marco Macchetti:
Cryptanalysis of AES and Camellia with Related S-boxes. AFRICACRYPT 2013: 208-221
2000 – 2009
- 2009
- [j1]Francesco Regazzoni, Thomas Eisenbarth, Axel Poschmann, Johann Großschädl, Frank K. Gürkaynak, Marco Macchetti, Zeynep Toprak Deniz, Laura Pozzi, Christof Paar, Yusuf Leblebici, Paolo Ienne:
Evaluating Resistance of MCML Technology to Power Analysis Attacks Using a Simulation-Based Methodology. Trans. Comput. Sci. 4: 230-243 (2009) - [c14]Pascal Junod, Marco Macchetti:
Revisiting the IDEA Philosophy. FSE 2009: 277-295 - 2007
- [c13]Luigi Dadda, Alberto Ferrante, Marco Macchetti:
A Memory Unit for Priority Management in IPSec Accelerators. ICC 2007: 1533-1538 - [c12]Francesco Regazzoni, Stéphane Badel, Thomas Eisenbarth, Johann Großschädl, Axel Poschmann, Zeynep Toprak Deniz, Marco Macchetti, Laura Pozzi, Christof Paar, Yusuf Leblebici, Paolo Ienne:
A Simulation-Based Methodology for Evaluating the DPA-Resistance of Cryptographic Functional Units with Application to CMOS and MCML Technologies. ICSAMOS 2007: 209-214 - [c11]Matteo Giaconia, Marco Macchetti, Francesco Regazzoni, Kai Schramm:
Area and Power Efficient Synthesis of DPA-Resistant Cryptographic S-Boxes. VLSI Design 2007: 731-737 - 2006
- [b1]Marco Macchetti:
Cryptographic protection of information. Polytechnic University of Milan, Italy, 2006 - [c10]Marco Macchetti, Wenyu Chen:
ASIC hardware implementation of the IDEA NXT encryption algorithm. ISCAS 2006 - 2005
- [c9]Marco Macchetti, Luigi Dadda:
Quasi-Pipelined Hash Circuits. IEEE Symposium on Computer Arithmetic 2005: 222-229 - [c8]Marco Macchetti, Mario Caironi, Luca Breveglieri, Alessandra Cherubini:
A Complete Formulation of Generalized Affine Equivalence. ICTCS 2005: 338-347 - [i2]Marco Macchetti:
Characteristics of Key-Dependent S-Boxes: the Case of Twofish. IACR Cryptol. ePrint Arch. 2005: 115 (2005) - 2004
- [c7]Luca Breveglieri, Alessandra Cherubini, Marco Macchetti:
On the Generalized Linear Equivalence of Functions Over Finite Fields. ASIACRYPT 2004: 79-91 - [c6]Luigi Dadda, Marco Macchetti, Jeff Owen:
The Design of a High Speed ASIC Unit for the Hash Function SHA-256 (384, 512). DATE 2004: 70-75 - [c5]Guido Bertoni, Marco Macchetti, Luca Negri, Pasqualina Fragneto:
Power-efficient ASIC synthesis of cryptographic sboxes. ACM Great Lakes Symposium on VLSI 2004: 277-281 - [c4]Luigi Dadda, Marco Macchetti, Jeff Owen:
An ASIC design for a high speed implementation of the hash function SHA-256 (384, 512). ACM Great Lakes Symposium on VLSI 2004: 421-425 - [c3]Kubilay Atasu, Luca Breveglieri, Marco Macchetti:
Efficient AES implementations for ARM based platforms. SAC 2004: 841-845 - [i1]Marco Macchetti:
Addendum to "On the Generalized Linear Equivalence of Functions over Finite Fields". IACR Cryptol. ePrint Arch. 2004: 347 (2004) - 2003
- [c2]Guido Bertoni, A. Bircan, Luca Breveglieri, Pasqualina Fragneto, Marco Macchetti, Vittorio Zaccaria:
About the performances of the Advanced Encryption Standard in embedded systems with cache memory. ISCAS (5) 2003: 145-148 - 2002
- [c1]Guido Bertoni, Luca Breveglieri, Pasqualina Fragneto, Marco Macchetti, Stefano Marchesin:
Efficient Software Implementation of AES on 32-Bit Platforms. CHES 2002: 159-171
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:09 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint