37 results on '"Sala, Massimiliano"'
Search Results
2. Elliptic loops.
3. Searchable encryption with randomized ciphertext and randomized keyword search.
4. On cryptographic properties of cubic and splitting Boolean functions.
5. Nonlinearity of Boolean Functions: An Algorithmic Approach Based on Multivariate Polynomials.
6. THE POLITICS OF SPECTACLE: ITALIAN MUSIC AND FASCIST PROPAGANDA.
7. A commutative algebra approach to linear codes
8. GRÖBNER BASIS TECHNIQUES TO COMPUTE WEIGHT DISTRIBUTIONS OF SHORTENED CYCLIC CODES.
9. General Error Locator Polynomials for Binary Cyclic Codes With t ⩽ 2 and n < 63.
10. A New Bound for the Minimum Distance of a Cyclic Code From Its Defining Set.
11. Correcting errors and erasures via the syndrome variety
12. On the Gro¨bner bases of some symmetric systems and their application to coding theory
13. Intersections between the norm-trace curve and some low degree curves.
14. A Small Subgroup Attack on Bitcoin Address Generation.
15. A New ECDLP-Based PoW Model †.
16. Weight distribution of Hermitian codes and matrices rank.
17. A Linear Programming Estimate of the Weight Distribution of BCH (255, k).
18. On properties of translation groups in the affine general linear group with applications to cryptography.
19. HELP: a sparse error locator polynomial for BCH codes.
20. On hidden sums compatible with a given block cipher diffusion layer.
21. On the discrete logarithm problem for prime-field elliptic curves.
22. A note on an infeasible linearization of some block ciphers.
23. Several proofs of security for a tokenization algorithm.
24. On the Shape of the General Error Locator Polynomial for Cyclic Codes.
25. On Optimal Nonlinear Systematic Codes.
26. On the small-weight codewords of some Hermitian codes.
27. On the Hermitian curve and its intersections with some conics.
28. Some Bounds on the Size of Codes.
29. A formula on the weight distribution of linear codes with applications to AMDS codes.
30. Improved decoding of affine-variety codes
31. COMPUTING THE DISTANCE DISTRIBUTION OF SYSTEMATIC NONLINEAR CODES.
32. Generation of high quality random numbers via an all-silicon-based approach.
33. On weak differential uniformity of vectorial Boolean functions as a cryptographic criterion.
34. Some security bounds for the key sizes of DGHV scheme.
35. On weakly APN functions and 4-bit S-Boxes
36. On the provable security of BEAR and LION schemes.
37. Metal free in situ formation of phthalimide N-oxyl radicals by light-induced homolysis of N-alkoxyphthalimides
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.