Follow
Emanuele Bellini
Emanuele Bellini
Technology Innovation Institute
Verified email at tii.ae
Title
Cited by
Cited by
Year
Syndrome decoding estimator
A Esser, E Bellini
IACR International Conference on Public-Key Cryptography, 112-141, 2022
372022
Improved Veron identification and signature schemes in the rank metric
E Bellini, F Caullery, P Gaborit, M Manzano, V Mateu
2019 IEEE International Symposium on Information Theory (ISIT), 1872-1876, 2019
352019
An efficient and secure RSA-like cryptosystem exploiting Rédei rational functions over conics
E Bellini, N Murru
Finite fields and their applications 39, 179-194, 2016
352016
Code-based signature schemes from identification protocols in the rank metric
E Bellini, F Caullery, A Hasikos, M Manzano, V Mateu
Cryptology and Network Security: 17th International Conference, CANS 2018 …, 2018
222018
MR-DSS–smaller MinRank-based (ring-) signatures
E Bellini, A Esser, C Sanna, J Verbel
International Conference on Post-Quantum Cryptography, 144-169, 2022
202022
An estimator for the hardness of the MQ problem
E Bellini, RH Makarim, C Sanna, J Verbel
International Conference on Cryptology in Africa, 323-347, 2022
162022
Performance comparison between deep learning-based and conventional cryptographic distinguishers
E Bellini, M Rossi
Intelligent Computing: Proceedings of the 2021 Computing Conference, Volume …, 2021
162021
Quantum search for scaled hash function preimages
S Ramos-Calderer, E Bellini, JI Latorre, M Manzano, V Mateu
Quantum Information Processing 20 (5), 180, 2021
152021
MinRank in the head: short signatures from zero-knowledge proofs
G Adj, L Rivera-Zamarripa, J Verbel
International Conference on Cryptology in Africa, 3-27, 2023
122023
An ind-cca-secure code-based encryption scheme using rank metric
HA Shehhi, E Bellini, F Borba, F Caullery, M Manzano, V Mateu
Progress in Cryptology–AFRICACRYPT 2019: 11th International Conference on …, 2019
102019
An optimized quantum implementation of ISD on scalable quantum resources
A Esser, S Ramos-Calderer, E Bellini, JI Latorre, M Manzano
arXiv preprint arXiv:2112.06157, 2021
92021
Rotational analysis of ChaCha permutation
S Barbero, E Bellini, R Makarim
arXiv preprint arXiv:2008.13406, 2020
92020
Fully automated differential-linear attacks against ARX ciphers
E Bellini, D Gerault, J Grados, RH Makarim, T Peyrin
Cryptographers’ Track at the RSA Conference, 252-276, 2023
82023
Enhancing code based zero-knowledge proofs using rank metric
E Bellini, P Gaborit, A Hasikos, V Mateu
Cryptology and Network Security: 19th International Conference, CANS 2020 …, 2020
82020
DRANKULA: a McEliece-like rank metric based cryptosystem implementation
AS Al Abdouli, M Al Ali, E Bellini, F Caullery, A Hasikos, M Manzano, ...
Cryptology ePrint Archive, 2018
82018
Some bounds on the size of codes
E Bellini, E Guerrini, M Sala
IEEE Transactions on Information Theory 60 (3), 1475-1480, 2014
82014
: a Software Library for Cryptographic Hardness Estimation
A Esser, J Verbel, F Zweydinger, E Bellini
Cryptology ePrint Archive, 2023
72023
A cipher-agnostic neural training pipeline with automated finding of good input differences
E Bellini, D Gerault, A Hambitzer, M Rossi
Cryptology ePrint Archive, 2022
72022
Functional cryptanalysis: application to reduced-round Xoodoo
E Bellini, RH Makarim
Cryptology ePrint Archive, 2022
62022
A deterministic algorithm for the distance and weight distribution of binary nonlinear codes
E Bellini, M Sala
International Journal of Information and Coding Theory 5 (1), 18-35, 2018
62018
The system can't perform the operation now. Try again later.
Articles 1–20