Search Results - "Emanuele Bellini"
-
1
A blockchain based Trusted Persistent Identifier system for Big Data in Science
Published in Foundations of computing and decision sciences (01-12-2019)“…A stable reference of Internet resources is crucial not only to identify a resource in a trustworthy and certified way but also to guarantee continuous access…”
Get full text
Journal Article -
2
Blockchain-Based Distributed Trust and Reputation Management Systems: A Survey
Published in IEEE access (2020)“…Distributed Ledger Technologies (DLTs), like Blockchain, are characterized by features such as transparency, traceability, and security by design. These…”
Get full text
Journal Article -
3
An IoE and Big Multimedia Data Approach for Urban Transport System Resilience Management in Smart Cities
Published in Sensors (Basel, Switzerland) (09-01-2021)“…Today, the complexity of urban systems combined with existing and emerging threats constrains administrations to consider smart technologies and related huge…”
Get full text
Journal Article -
4
Quantum search for scaled hash function preimages
Published in Quantum information processing (01-05-2021)“…We present the implementation of Grover’s algorithm in a quantum simulator to perform a quantum search for preimages of two scaled hash functions, whose design…”
Get full text
Journal Article -
5
Tiered Approach to Resilience Assessment
Published in Risk analysis (01-09-2018)“…Regulatory agencies have long adopted a three‐tier framework for risk assessment. We build on this structure to propose a tiered approach for resilience…”
Get full text
Journal Article -
6
A Cipher-Agnostic Neural Training Pipeline with Automated Finding of Good Input Differences
Published in IACR Transactions on Symmetric Cryptology (19-09-2023)“…Neural cryptanalysis is the study of cryptographic primitives through machine learning techniques. Following Gohr’s seminal paper at CRYPTO 2019, a focus has…”
Get full text
Journal Article -
7
Rotational Cryptanalysis on ChaCha Stream Cipher
Published in Symmetry (Basel) (01-06-2022)“…In this paper we consider the ChaCha20 stream cipher in the related-key scenario and we study how to obtain rotational-XOR pairs with nonzero probability after…”
Get full text
Journal Article -
8
Nonlinearity of Boolean Functions: An Algorithmic Approach Based on Multivariate Polynomials
Published in Symmetry (Basel) (01-02-2022)“…We review and compare three algebraic methods to compute the nonlinearity of Boolean functions. Two of them are based on Gröbner basis techniques: the first…”
Get full text
Journal Article -
9
Explainabilty Comparison between Random Forests and Neural Networks—Case Study of Amino Acid Volume Prediction
Published in Information (Basel) (01-01-2023)“…As explainability seems to be the driver for a wiser adoption of Artificial Intelligence in healthcare and in critical applications, in general, a…”
Get full text
Journal Article -
10
Enhancing IoT Data Dependability through a Blockchain Mirror Model
Published in Future internet (01-05-2019)“…The Internet of Things (IoT) is a remarkable data producer and these data may be used to prevent or detect security vulnerabilities and increase productivity…”
Get full text
Journal Article -
11
The RESOLUTE project’s European Resilience Management Guidelines for Critical Infrastructure: development, operationalisation and testing for the urban transport system
Published in Environment systems & decisions (01-09-2020)“…Critical Infrastructure protection is an issue of priority in Europe, enabling numerous activities for rendering the European Critical infrastructure…”
Get full text
Journal Article -
12
Boosting Differential-Linear Cryptanalysis of ChaCha7 with MILP
Published in IACR Transactions on Symmetric Cryptology (16-06-2023)“…In this paper, we present an improved differential-linear cryptanalysis of the ChaCha stream cipher. Our main contributions are new differential-linear…”
Get full text
Journal Article -
13
An Application of p-Fibonacci Error-Correcting Codes to Cryptography
Published in Mathematics (Basel) (01-04-2021)“…In addition to their usefulness in proving one’s identity electronically, identification protocols based on zero-knowledge proofs allow designing secure…”
Get full text
Journal Article -
14
MiRitH: Efficient Post-Quantum Signatures from MinRank in the Head
Published in IACR transactions on cryptographic hardware and embedded systems (12-03-2024)“…Since 2016’s NIST call for standardization of post-quantum cryptographic primitives, developing efficient post-quantum secure digital signature schemes has…”
Get full text
Journal Article -
15
Percolation and Internet Science
Published in Future internet (02-02-2019)“…Percolation, in its most general interpretation, refers to the “flow” of something (a physical agent, data or information) in a network, possibly accompanied…”
Get full text
Journal Article -
16
Solving systems of Boolean multivariate equations with quantum annealing
Published in Physical review research (01-02-2022)“…Polynomial systems over the binary field have important applications, especially in symmetric and asymmetric cryptanalysis, multivariate-based postquantum…”
Get full text
Journal Article -
17
Trust and persistence for Internet resources
Published in JLIS.it : Italian journal of library and information science (2013)“…Internet has changed our way of working, communicating, living, producing and accessing information, everything available on an open and flexible…”
Get full text
Journal Article -
18
An efficient and secure RSA-like cryptosystem exploiting Rédei rational functions over conics
Published in Finite fields and their applications (01-05-2016)“…We define an isomorphism between the group of points of a conic and the set of integers modulo a prime equipped with a non-standard product. This product can…”
Get full text
Journal Article -
19
A Functional Resonance Analysis Method Driven Resilience Quantification for Socio-Technical Systems
Published in IEEE systems journal (01-03-2020)“…Due to the continuous increment in complexity of the socio-technical systems, decision makers call for new methods which are able to support timely as well as…”
Get full text
Journal Article -
20
Ontology based recommender system using social network data
Published in Future generation computer systems (01-02-2021)“…Online Social Network (OSN) is considered a key source of information for real-time decision making. However, several constraints lead to decreasing the amount…”
Get full text
Journal Article