Spook: Sponge-based leakage-resistant authenticated encryption with a masked tweakable block cipher D Bellizia, F Berti, O Bronchain, G Cassiers, S Duval, C Guo, G Leander, ... IACR Transactions on Symmetric Cryptology 2020 (S1), 295--349, 2020 | 72 | 2020 |
Mode-level vs. implementation-level physical security in symmetric cryptography: a practical guide through the leakage-resistance jungle D Bellizia, O Bronchain, G Cassiers, V Grosso, C Guo, C Momin, ... Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020 | 70 | 2020 |
A systematic appraisal of side channel evaluation strategies M Azouaoui, D Bellizia, I Buhan, N Debande, S Duval, C Giraud, ... Security Standardisation Research: 6th International Conference, SSR 2020 …, 2020 | 49 | 2020 |
Design of low-voltage high-speed CML D-latches in nanometer CMOS technologies G Scotti, D Bellizia, A Trifiletti, G Palumbo IEEE Transactions on Very Large Scale Integration (VLSI) Systems 25 (12 …, 2017 | 42 | 2017 |
A novel ultra-compact FPGA-compatible TRNG architecture exploiting latched ring oscillators R Della Sala, D Bellizia, G Scotti IEEE Transactions on Circuits and Systems II: Express Briefs 69 (3), 1672-1676, 2021 | 40 | 2021 |
Reducing a masked Implementation’s effective security order with setup manipulations: And an explanation based on externally-amplified couplings I Levi, D Bellizia, FX Standaert IACR Transactions on Cryptographic Hardware and Embedded Systems, 293-317, 2019 | 38 | 2019 |
Secure double rate registers as an RTL countermeasure against power analysis attacks D Bellizia, S Bongiovanni, P Monsurrò, G Scotti, A Trifiletti, FB Trotta IEEE transactions on very large scale integration (vlsi) systems 26 (7 …, 2018 | 37 | 2018 |
Univariate power analysis attacks exploiting static dissipation of nanometer CMOS VLSI circuits for cryptographic applications D Bellizia, S Bongiovanni, P Monsurrò, G Scotti, A Trifiletti IEEE Transactions on Emerging Topics in Computing 5 (3), 329-339, 2016 | 32 | 2016 |
A novel ultra-compact fpga puf: The dd-puf R Della Sala, D Bellizia, G Scotti Cryptography 5 (3), 23, 2021 | 25 | 2021 |
Ask less, get more: Side-channel signal hiding, revisited I Levi, D Bellizia, D Bol, FX Standaert IEEE Transactions on Circuits and Systems I: Regular Papers 67 (12), 4904-4917, 2020 | 25 | 2020 |
TEL logic style as a countermeasure against side-channel attacks: Secure cells library in 65nm CMOS and experimental results D Bellizia, G Scotti, A Trifiletti IEEE Transactions on Circuits and Systems I: Regular Papers 65 (11), 3874-3884, 2018 | 25 | 2018 |
A lightweight FPGA compatible weak-PUF primitive based on XOR gates R Della Sala, D Bellizia, G Scotti IEEE Transactions on Circuits and Systems II: Express Briefs 69 (6), 2972-2976, 2022 | 24 | 2022 |
SC-DDPL: A Novel Standard-Cell Based Approach for Counteracting Power Analysis Attacks in the Presence of Unbalanced Routing D Bellizia, S Bongiovanni, M Olivieri, G Scotti IEEE Transactions on Circuits and Systems I: Regular Papers, 1-14, 2020 | 24 | 2020 |
Implementation of the PRESENT-80 block cipher and analysis of its vulnerability to Side Channel Attacks Exploiting Static Power D Bellizia, G Scotti, A Trifiletti 2016 MIXDES-23rd International Conference Mixed Design of Integrated …, 2016 | 24 | 2016 |
High-throughput FPGA-compatible TRNG architecture exploiting multistimuli metastable cells R Della Sala, D Bellizia, G Scotti IEEE Transactions on Circuits and Systems I: Regular Papers 69 (12), 4886-4897, 2022 | 23 | 2022 |
Template attacks exploiting static power and application to CMOS lightweight crypto‐hardware D Bellizia, M Djukanovic, G Scotti, A Trifiletti International Journal of Circuit Theory and Applications 45 (2), 229-241, 2017 | 18 | 2017 |
Novel measurements setup for attacks exploiting static power using DC pico-ammeter D Bellizia, D Cellucci, V Di Stefano, G Scotti, A Trifiletti 2017 European Conference on Circuit Theory and Design (ECCTD), 1-4, 2017 | 13 | 2017 |
Multivariate analysis exploiting static power on nanoscale CMOS circuits for cryptographic applications M Djukanovic, D Bellizia, G Scotti, A Trifiletti Progress in Cryptology-AFRICACRYPT 2017: 9th International Conference on …, 2017 | 13 | 2017 |
Beyond algorithmic noise or how to shuffle parallel implementations? I Levi, D Bellizia, FX Standaert International Journal of Circuit Theory and Applications 48 (5), 674-695, 2020 | 12 | 2020 |
Post-quantum cryptography: Challenges and opportunities for robust and secure HW design D Bellizia, N El Mrabet, AP Fournaris, S Pontié, F Regazzoni, ... 2021 IEEE International Symposium on Defect and fault tolerance in VLSI and …, 2021 | 11 | 2021 |