Följ
Alessandro Budroni
Alessandro Budroni
Senior Cryptography Engineer, Technology Innovation Institute
Verifierad e-postadress på tii.ae - Startsida
Titel
Citeras av
Citeras av
År
Efficient hash maps to on BLS curves
A Budroni, F Pintore
Applicable Algebra in Engineering, Communication and Computing, 1-21, 2018
20*2018
Making the bkw algorithm practical for lwe
A Budroni, Q Guo, T Johansson, E Mårtensson, PS Wagner
Progress in Cryptology–INDOCRYPT 2020: 21st International Conference on …, 2020
132020
A hybrid approach for multimedia use verification
QT Phan, A Budroni, C Pasquini, F De Natale
CEUR WORKSHOP PROCEEDINGS, [1]-[3], 2016
112016
Improvements on Making BKW Practical for Solving LWE
A Budroni, Q Guo, T Johansson, E Mårtensson, PS Wagner
Cryptography 5 (4), 31, 2021
42021
The mersenne low hamming combination search problem can be reduced to an ILP problem
A Budroni, A Tenti
International Conference on Cryptology in Africa, 41-55, 2019
42019
Properties of Lattice Isomorphism as a Cryptographic Group Action
B Benčina, A Budroni, JJ Chi-Domínguez, M Kulkarni
Cryptology ePrint Archive, 2024
3*2024
Improved estimation of key enumeration with applications to solving LWE
A Budroni, E Mårtensson
2023 IEEE International Symposium on Information Theory (ISIT), 495-500, 2023
32023
PERK
N Aaraj, S Bettaieb, L Bidoux, A Budroni, V Dyseryn, A Esser, P Gaborit, ...
32023
New Public-Key Crypto-System EHT
A Budroni, I Semaev
arXiv preprint arXiv:2103.01147, 2021
32021
Enabling perk on resource-constrained devices
S Bettaieb, L Bidoux, A Budroni, M Palumbi, LP Perin
Cryptology ePrint Archive, 2024
12024
Attacks on integer-RLWE
A Budroni, B Chetioui, E Franch
Information and Communications Security: 22nd International Conference …, 2020
12020
Quasi-Optimal Permutation Ranking and Applications to PERK
S Bettaieb, A Budroni, M Palumbi, DL Gazzoni Filho
Cryptology ePrint Archive, 2024
2024
Don’t Use It Twice! Solving Relaxed Linear Code Equivalence Problems
A Budroni, JJ Chi-Domínguez, G D'Alconzo, AJ Di Scala, M Kulkarni
Cryptology ePrint Archive, 2024
2024
SoK: Methods for Sampling Random Permutations in Post-Quantum Cryptography
A Budroni, IA Canales-Martínez, LP Perin
Cryptology ePrint Archive, 2024
2024
Notes on Lattice-Based Cryptography
A Budroni
The University of Bergen, 2022
2022
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–15