An algebraic attack on stream ciphers with application to nonlinear filter generators and WG-PRNG C Mascia, E Piccione, M Sala Advances in Mathematics of Communications, 2023 | 6 | 2023 |
An optimal universal construction for the threshold implementation of bijective S-boxes E Piccione, S Andreoli, L Budaghyan, C Carlet, S Dhooghe, S Nikova, ... IEEE Transactions on Information Theory 69 (10), 6700-6710, 2023 | 5 | 2023 |
On vectorial functions mapping strict affine subspaces of their domain into strict affine subspaces of their co-domain, and the strong D-property C Carlet, E Piccione Cryptology ePrint Archive, 2023 | 2 | 2023 |
On a classification of planar functions in characteristic three S Andreoli, L Budaghyan, R Coulter, A Haukenes, N Kaleyski, E Piccione arXiv preprint arXiv:2407.03170, 2024 | | 2024 |
Threshold implementations of cryptographic functions between finite Abelian groups E Piccione Cryptology ePrint Archive, 2024 | | 2024 |
On Decompositions of Permutations in Quadratic Functions S Andreoli, E Piccione, L Budaghyan, P Stănică, S Nikova Cryptology ePrint Archive, 2023 | | 2023 |
Restricting vectorial functions to affine spaces and deducing infinite families of 4-uniform permutations, in relation to the strong D-property E Piccione Book of abstracts, 31, 0 | | |