Emanuele Bellini
Emanuele Bellini
Technology Innovation Institute
Verified email at
Cited by
Cited by
Syndrome decoding estimator
A Esser, E Bellini
IACR International Conference on Public-Key Cryptography, 112-141, 2022
Improved veron identification and signature schemes in the rank metric
E Bellini, F Caullery, P Gaborit, M Manzano, V Mateu
2019 IEEE International Symposium on Information Theory (ISIT), 1872-1876, 2019
An efficient and secure RSA-like cryptosystem exploiting Rédei rational functions over conics
E Bellini, N Murru
Finite fields and their applications 39, 179-194, 2016
Code-based signature schemes from identification protocols in the rank metric
E Bellini, F Caullery, A Hasikos, M Manzano, V Mateu
Cryptology and Network Security: 17th International Conference, CANS 2018 …, 2018
Mr-dss–smaller minrank-based (ring-) signatures
E Bellini, A Esser, C Sanna, J Verbel
International Conference on Post-Quantum Cryptography, 144-169, 2022
Quantum search for scaled hash function preimages
S Ramos-Calderer, E Bellini, JI Latorre, M Manzano, V Mateu
Quantum Information Processing 20 (5), 180, 2021
Performance comparison between deep learning-based and conventional cryptographic distinguishers
E Bellini, M Rossi
Intelligent Computing: Proceedings of the 2021 Computing Conference, Volume …, 2021
An Estimator for the Hardness of the MQ Problem
E Bellini, RH Makarim, C Sanna, J Verbel
International Conference on Cryptology in Africa, 323-347, 2022
MinRank in the Head: Short signatures from zero-knowledge proofs
G Adj, L Rivera-Zamarripa, J Verbel
International Conference on Cryptology in Africa, 3-27, 2023
An ind-cca-secure code-based encryption scheme using rank metric
HA Shehhi, E Bellini, F Borba, F Caullery, M Manzano, V Mateu
Progress in Cryptology–AFRICACRYPT 2019: 11th International Conference on …, 2019
Rotational analysis of ChaCha permutation
S Barbero, E Bellini, R Makarim
arXiv preprint arXiv:2008.13406, 2020
DRANKULA: a McEliece-like rank metric based cryptosystem implementation
AS Al Abdouli, M Al Ali, E Bellini, F Caullery, A Hasikos, M Manzano, ...
Cryptology ePrint Archive, 2018
An optimized quantum implementation of ISD on scalable quantum resources
A Esser, S Ramos-Calderer, E Bellini, JI Latorre, M Manzano
arXiv preprint arXiv:2112.06157, 2021
Enhancing code based zero-knowledge proofs using rank metric
E Bellini, P Gaborit, A Hasikos, V Mateu
Cryptology and Network Security: 19th International Conference, CANS 2020 …, 2020
Some bounds on the size of codes
E Bellini, E Guerrini, M Sala
IEEE Transactions on Information Theory 60 (3), 1475-1480, 2014
Fully Automated Differential-Linear Attacks Against ARX Ciphers
E Bellini, D Gerault, J Grados, RH Makarim, T Peyrin
Cryptographers’ Track at the RSA Conference, 252-276, 2023
Functional cryptanalysis: Application to reduced-round Xoodoo
E Bellini, RH Makarim
Cryptology ePrint Archive, 2022
: a Software Library for Cryptographic Hardness Estimation
A Esser, J Verbel, F Zweydinger, E Bellini
Cryptology ePrint Archive, 2023
A Cipher-Agnostic Neural Training Pipeline with Automated Finding of Good Input Differences
E Bellini, D Gerault, A Hambitzer, M Rossi
Cryptology ePrint Archive, 2022
A deterministic algorithm for the distance and weight distribution of binary nonlinear codes
E Bellini, M Sala
International Journal of Information and Coding Theory 5 (1), 18-35, 2018
The system can't perform the operation now. Try again later.
Articles 1–20