default search action
Fabrizio De Santis
Person information
- affiliation: Technical University Munich, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j5]Shivam Bhasin, Fabrizio De Santis, Francesco Regazzoni:
Special Issue on Post-Quantum Cryptography for Embedded Systems. ACM Trans. Embed. Comput. Syst. 23(2): 26:1-26:3 (2024) - [c28]Fabian Schmid, Shibam Mukherjee, Stjepan Picek, Marc Stöttinger, Fabrizio De Santis, Christian Rechberger:
Towards Private Deep Learning-Based Side-Channel Analysis Using Homomorphic Encryption - Opportunities and Limitations. COSADE 2024: 133-154 - [c27]Utku Budak, Fabrizio De Santis, Georg Sigl:
A Lightweight Firmware Resilience Engine for IoT Devices Leveraging Minimal Processor Features. CSR 2024: 486-491 - [i11]Hermann Seuschek, Johann Heyszl, Fabrizio De Santis:
A Cautionary Note: Side-Channel Leakage Implications of Deterministic Signature Schemes. IACR Cryptol. ePrint Arch. 2024: 427 (2024) - [i10]Sven Bauer, Fabrizio De Santis, Kristjane Koleci, Anita Aghaie:
A Fault-Resistant NTT by Polynomial Evaluation and Interpolation. IACR Cryptol. ePrint Arch. 2024: 788 (2024) - 2023
- [c26]Malek Safieh, Andreas Furch, Fabrizio De Santis:
An Efficient Barrett Reduction Algorithm for Gaussian Integer Moduli. ARITH 2023: 76-83 - [c25]Sven Bauer, Fabrizio De Santis:
A Differential Fault Attack Against Deterministic Falcon Signatures. CARDIS 2023: 43-61 - [c24]Sven Bauer, Fabrizio De Santis:
Forging Dilithium and Falcon Signatures by Single Fault Injection. FDTC 2023: 81-88 - [i9]Sven Bauer, Fabrizio De Santis:
A Differential Fault Attack against Deterministic Falcon Signatures. IACR Cryptol. ePrint Arch. 2023: 422 (2023) - [i8]Fabian Schmid, Shibam Mukherjee, Stjepan Picek, Marc Stöttinger, Fabrizio De Santis, Christian Rechberger:
Towards Private Deep Learning-based Side-Channel Analysis using Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2023: 1252 (2023) - 2022
- [c23]Malek Safieh, Fabrizio De Santis:
Efficient Reduction Algorithms for Special Gaussian Integer Moduli. ARITH 2022: 111-119 - 2021
- [e1]Shivam Bhasin, Fabrizio De Santis:
Constructive Side-Channel Analysis and Secure Design - 12th International Workshop, COSADE 2021, Lugano, Switzerland, October 25-27, 2021, Proceedings. Lecture Notes in Computer Science 12910, Springer 2021, ISBN 978-3-030-89914-1 [contents] - 2020
- [i7]Florian Unterstein, Tolga Sel, Thomas Zeschg, Nisha Jacob, Michael Tempelmeier, Michael Pehl, Fabrizio De Santis:
Secure Update of FPGA-based Secure Elements using Partial Reconfiguration. IACR Cryptol. ePrint Arch. 2020: 833 (2020)
2010 – 2019
- 2018
- [b1]Fabrizio De Santis:
Algorithmic and Protocol Level Countermeasures to Protect Cryptographic Devices. Technical University Munich, Germany, 2018 - [j4]Silvan Streit, Fabrizio De Santis:
Post-Quantum Key Exchange on ARMv8-A: A New Hope for NEON Made Simple. IEEE Trans. Computers 67(11): 1651-1662 (2018) - [j3]Philipp Koppermann, Fabrizio De Santis, Johann Heyszl, Georg Sigl:
Fast FPGA Implementations of Diffie-Hellman on the Kummer Surface of a Genus-2 Curve. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(1): 1-17 (2018) - [c22]Florian Unterstein, Johann Heyszl, Fabrizio De Santis, Robert Specht, Georg Sigl:
High-Resolution EM Attacks Against Leakage-Resilient PRFs Explained - And an Improved Construction. CT-RSA 2018: 413-434 - [c21]Michael Tempelmeier, Fabrizio De Santis, Georg Sigl, Jens-Peter Kaps:
The CAESAR-API in the real world - Towards a fair evaluation of hardware CAESAR candidates. HOST 2018: 73-80 - [i6]Florian Unterstein, Johann Heyszl, Fabrizio De Santis, Robert Specht, Georg Sigl:
High-Resolution EM Attacks Against Leakage-Resilient PRFs Explained - And An Improved Construction. IACR Cryptol. ePrint Arch. 2018: 55 (2018) - 2017
- [j2]Philipp Koppermann, Fabrizio De Santis, Johann Heyszl, Georg Sigl:
Low-latency X25519 hardware implementation: breaking the 100 microseconds barrier. Microprocess. Microsystems 52: 491-497 (2017) - [c20]Florian Unterstein, Johann Heyszl, Fabrizio De Santis, Robert Specht:
Dissecting Leakage Resilient PRFs with Multivariate Localized EM Attacks - A Practical Security Evaluation on FPGA. COSADE 2017: 34-49 - [c19]Oscar M. Guillen, Michael Gruber, Fabrizio De Santis:
Low-Cost Setup for Localized Semi-invasive Optical Fault Injection Attacks - How Low Can We Go? COSADE 2017: 207-222 - [c18]Fabrizio De Santis, Andreas Schauer, Georg Sigl:
ChaCha20-Poly1305 authenticated encryption for high-speed embedded IoT applications. DATE 2017: 692-697 - [c17]Hermann Seuschek, Fabrizio De Santis, Oscar M. Guillen:
Side-channel leakage aware instruction scheduling. CS2@HiPEAC 2017: 7-12 - [c16]Philipp Koppermann, Fabrizio De Santis, Johann Heyszl, Georg Sigl:
Automatic generation of high-performance modular multipliers for arbitrary mersenne primes on FPGAs. HOST 2017: 35-40 - [i5]Florian Unterstein, Johann Heyszl, Fabrizio De Santis, Robert Specht:
Dissecting Leakage Resilient PRFs with Multivariate Localized EM Attacks - A Practical Security Evaluation on FPGA. IACR Cryptol. ePrint Arch. 2017: 272 (2017) - [i4]Silvan Streit, Fabrizio De Santis:
Post-Quantum Key Exchange on ARMv8-A - A New Hope for NEON made Simple. IACR Cryptol. ePrint Arch. 2017: 388 (2017) - [i3]Philipp Koppermann, Fabrizio De Santis, Johann Heyszl, Georg Sigl:
Fast FPGA Implementations of Diffie-Hellman on the Kummer Surface of a Genus-2 Curve. IACR Cryptol. ePrint Arch. 2017: 814 (2017) - 2016
- [c15]Fabrizio De Santis, Tobias Bauer, Georg Sigl:
Squeezing Polynomial Masking in Tower Fields - A Higher-Order Masked AES S-Box. CARDIS 2016: 192-208 - [c14]Fabrizio De Santis, Tobias Bauer, Georg Sigl:
Hiding Higher-Order Univariate Leakages by Shuffling Polynomial Masking Schemes: A More Efficient, Shuffled, and Higher-Order Masked AES S-box. TIS@CCS 2016: 17-26 - [c13]Philipp Koppermann, Fabrizio De Santis, Johann Heyszl, Georg Sigl:
X25519 Hardware Implementation for Low-Latency Applications. DSD 2016: 99-106 - [c12]Oscar M. Guillen, Fabrizio De Santis, Ralf Brederlow, Georg Sigl:
Towards Side-Channel Secure Firmware Updates - A Minimalist Anomaly Detection Approach. FPS 2016: 345-360 - [c11]Hermann Seuschek, Johann Heyszl, Fabrizio De Santis:
A Cautionary Note: Side-Channel Leakage Implications of Deterministic Signature Schemes. CS2@HiPEAC 2016: 7-12 - [c10]Michael Tempelmeier, Fabrizio De Santis, Jens-Peter Kaps, Georg Sigl:
An area-optimized serial implementation of ICEPOLE authenticated encryption schemes. HOST 2016: 49-54 - 2014
- [j1]Sonia Belaïd, Fabrizio De Santis, Johann Heyszl, Stefan Mangard, Marcel Medwed, Jörn-Marc Schmidt, François-Xavier Standaert, Stefan Tillich:
Towards fresh re-keying with leakage-resilient PRFs: cipher design principles and analysis. J. Cryptogr. Eng. 4(3): 157-171 (2014) - [c9]Fabrizio De Santis, Stefan Rass:
On Efficient Leakage-Resilient Pseudorandom Functions with Hard-to-Invert Leakages. LATINCRYPT 2014: 127-145 - [c8]Fabrizio De Santis, Oscar M. Guillen, Ermin Sakic, Georg Sigl:
Ciphertext-Only Fault Attacks on PRESENT. LightSec 2014: 85-108 - 2013
- [c7]Johann Heyszl, Andreas Ibing, Stefan Mangard, Fabrizio De Santis, Georg Sigl:
Clustering Algorithms for Non-profiled Single-Execution Attacks on Exponentiations. CARDIS 2013: 79-93 - [c6]Fabrizio De Santis, Michael Kasper, Stefan Mangard, Georg Sigl, Oliver Stein, Marc Stöttinger:
On the Relationship between Correlation Power Analysis and the Stochastic Approach: An ASIC Designer Perspective. INDOCRYPT 2013: 215-226 - [i2]Sonia Belaïd, Fabrizio De Santis, Johann Heyszl, Stefan Mangard, Marcel Medwed, Jörn-Marc Schmidt, François-Xavier Standaert, Stefan Tillich:
Towards Fresh Re-Keying with Leakage-Resilient PRFs: Cipher Design Principles and Analysis. IACR Cryptol. ePrint Arch. 2013: 305 (2013) - [i1]Johann Heyszl, Andreas Ibing, Stefan Mangard, Fabrizio De Santis, Georg Sigl:
Clustering Algorithms for Non-Profiled Single-Execution Attacks on Exponentiations. IACR Cryptol. ePrint Arch. 2013: 438 (2013) - 2012
- [c5]Matthias Hiller, Fabrizio De Santis, Dominik Merli, Georg Sigl:
Reliability bound and channel capacity of IBS-based fuzzy embedders. AHS 2012: 213-220 - [c4]Johann Heyszl, Dominik Merli, Benedikt Heinz, Fabrizio De Santis, Georg Sigl:
Strengths and Limitations of High-Resolution Electromagnetic Field Measurements for Side-Channel Analysis. CARDIS 2012: 248-262 - 2011
- [c3]Alessandro Barenghi, Guido Bertoni, Fabrizio De Santis, Filippo Melzani:
On the Efficiency of Design Time Evaluation of the Resistance to Power Attacks. DSD 2011: 777-785 - 2010
- [c2]Giovanni Agosta, Alessandro Barenghi, Fabrizio De Santis, Gerardo Pelosi:
Record Setting Software Implementation of DES Using CUDA. ITNG 2010: 748-755
2000 – 2009
- 2009
- [c1]Giovanni Agosta, Alessandro Barenghi, Fabrizio De Santis, Andrea Di Biagio, Gerardo Pelosi:
Fast Disk Encryption through GPGPU Acceleration. PDCAT 2009: 102-109
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint