Anonymous authentication with TLS and DAA E Cesena, H Löhr, G Ramunno, AR Sadeghi, D Vernizzi Trust and Trustworthy Computing: Third International Conference, TRUST 2010 …, 2010 | 39 | 2010 |
On scalability of remote attestation E Cesena, G Ramunno, R Sassu, D Vernizzi, A Lioy Proceedings of the sixth ACM workshop on Scalable trusted computing, 25-30, 2011 | 19 | 2011 |
Secure storage using a sealing proxy E Cesena, G Ramunno, D Vernizzi Proceedings of the 1st European workshop on system security, 27-34, 2008 | 19 | 2008 |
Trace zero varieties over fields of characteristic 2 for cryptographic applications RM Avanzi, E Cesena Algebraic Geometry And Its Applications: Dedicated to Gilles Lachaud on His …, 2008 | 14 | 2008 |
Trace zero varietes in pairing-based cryptography E Cesena Università degli studi Roma Tre, 2010 | 12 | 2010 |
The trusted platform agent G Cabiddu, E Cesena, R Sassu, D Vernizzi, G Ramunno, A Lioy IEEE software 28 (2), 35-41, 2010 | 10 | 2010 |
Pairing with supersingular trace zero varieties revisited E Cesena Cryptology ePrint Archive, 2008 | 9 | 2008 |
Typing a core binary-field arithmetic in a light logic E Cesena, M Pedicini, L Roversi Foundational and Practical Aspects of Resource Analysis: Second …, 2012 | 4 | 2012 |
A unified ontology for the virtualization domain J Silvestro, D Canavese, E Cesena, P Smiraglia On the Move to Meaningful Internet Systems: OTM 2011: Confederated …, 2011 | 4 | 2011 |
Towards trusted broadcast encryption E Cesena, G Ramunno, D Vernizzi 2008 The 9th International Conference for Young Computer Scientists, 2125-2130, 2008 | 3 | 2008 |
Varietaa traccia zero su campi binari–applicazioni crittografiche E Cesena Master’s thesis, Universita degli Studi di Milano, 2004 | 3 | 2004 |
FPGA Acceleration of Multi-Scalar Multiplication: CycloneMSM K Aasaraai, D Beaver, E Cesena, R Maganti, N Stalder, J Varela Cryptology ePrint Archive, 2022 | 2 | 2022 |
Can a light typing discipline be compatible with an efficient implementation of finite fields inversion? D Canavese, E Cesena, R Ouchary, M Pedicini, L Roversi Foundational and Practical Aspects of Resource Analysis: Third International …, 2014 | 2 | 2014 |
Light combinators for finite fields arithmetic D Canavese, E Cesena, R Ouchary, M Pedicini, L Roversi Science of Computer Programming 111, 365-394, 2015 | 1 | 2015 |
CycloneNTT: An NTT/FFT Architecture Using Quasi-Streaming of Large Datasets on DDR-and HBM-based FPGA Platforms K Aasaraai, E Cesena, R Maganti, N Stalder, J Varela, K Bowers Cryptology ePrint Archive, 2022 | | 2022 |
Slides for teaching: the slim approach E Cesena, D Vernizzi | | 2019 |
Crittografia al liceo: approfondire le classi di resto modulo n OG Rizzo, E Cesena DIDAMATICA 2011, 2011 | | 2011 |
Anonymous services: Enhancing end-user privacy exploiting anonymous networks G Cabiddu, E Cesena, D Vernizzi 2010 International Conference on Security and Cryptography (SECRYPT), 1-5, 2010 | | 2010 |
Can a light typing discipline be compatible with an D Canavese, E Cesena, R Ouchary, M Pedicini, L Roversi, E Cesena, ... Foundational and Practical Aspects of Resource Analysis (subtitle: 6324, 330-344, 2010 | | 2010 |
Toward a Formal Framework to Evaluate Wireless Sensor Network Security S Lindskog, S Fischer Hübner, L Martucci, A Abou El Kalam, A Atzeni, ... NEWCOM++/ACoRN Joint Workshop Barcelona, March 30-April 1, 2009, 2009 | | 2009 |