Search Results - "Emanuele Bellini"

Refine Results
  1. 1

    A blockchain based Trusted Persistent Identifier system for Big Data in Science by Bellini, Emanuele

    “…A stable reference of Internet resources is crucial not only to identify a resource in a trustworthy and certified way but also to guarantee continuous access…”
    Get full text
    Journal Article
  2. 2

    Blockchain-Based Distributed Trust and Reputation Management Systems: A Survey by Bellini, Emanuele, Iraqi, Youssef, Damiani, Ernesto

    Published in IEEE access (2020)
    “…Distributed Ledger Technologies (DLTs), like Blockchain, are characterized by features such as transparency, traceability, and security by design. These…”
    Get full text
    Journal Article
  3. 3

    An IoE and Big Multimedia Data Approach for Urban Transport System Resilience Management in Smart Cities by Bellini, Emanuele, Bellini, Pierfrancesco, Cenni, Daniele, Nesi, Paolo, Pantaleo, Gianni, Paoli, Irene, Paolucci, Michela

    Published in Sensors (Basel, Switzerland) (09-01-2021)
    “…Today, the complexity of urban systems combined with existing and emerging threats constrains administrations to consider smart technologies and related huge…”
    Get full text
    Journal Article
  4. 4

    Quantum search for scaled hash function preimages by Ramos-Calderer, Sergi, Bellini, Emanuele, Latorre, José I., Manzano, Marc, Mateu, Victor

    Published in Quantum information processing (01-05-2021)
    “…We present the implementation of Grover’s algorithm in a quantum simulator to perform a quantum search for preimages of two scaled hash functions, whose design…”
    Get full text
    Journal Article
  5. 5
  6. 6

    A Cipher-Agnostic Neural Training Pipeline with Automated Finding of Good Input Differences by Bellini, Emanuele, Gerault, David, Hambitzer, Anna, Rossi, Matteo

    Published in IACR Transactions on Symmetric Cryptology (19-09-2023)
    “…Neural cryptanalysis is the study of cryptographic primitives through machine learning techniques. Following Gohr’s seminal paper at CRYPTO 2019, a focus has…”
    Get full text
    Journal Article
  7. 7

    Rotational Cryptanalysis on ChaCha Stream Cipher by Barbero, Stefano, Bazzanella, Danilo, Bellini, Emanuele

    Published in Symmetry (Basel) (01-06-2022)
    “…In this paper we consider the ChaCha20 stream cipher in the related-key scenario and we study how to obtain rotational-XOR pairs with nonzero probability after…”
    Get full text
    Journal Article
  8. 8

    Nonlinearity of Boolean Functions: An Algorithmic Approach Based on Multivariate Polynomials by Bellini, Emanuele, Sala, Massimiliano, Simonetti, Ilaria

    Published in Symmetry (Basel) (01-02-2022)
    “…We review and compare three algebraic methods to compute the nonlinearity of Boolean functions. Two of them are based on Gröbner basis techniques: the first…”
    Get full text
    Journal Article
  9. 9

    Explainabilty Comparison between Random Forests and Neural Networks—Case Study of Amino Acid Volume Prediction by De Fazio, Roberta, Di Giovannantonio, Rosy, Bellini, Emanuele, Marrone, Stefano

    Published in Information (Basel) (01-01-2023)
    “…As explainability seems to be the driver for a wiser adoption of Artificial Intelligence in healthcare and in critical applications, in general, a…”
    Get full text
    Journal Article
  10. 10

    Enhancing IoT Data Dependability through a Blockchain Mirror Model by Bellini, Alessandro, Bellini, Emanuele, Gherardelli, Monica, Pirri, Franco

    Published in Future internet (01-05-2019)
    “…The Internet of Things (IoT) is a remarkable data producer and these data may be used to prevent or detect security vulnerabilities and increase productivity…”
    Get full text
    Journal Article
  11. 11

    The RESOLUTE project’s European Resilience Management Guidelines for Critical Infrastructure: development, operationalisation and testing for the urban transport system by Bellini, Emanuele, Gaitanidou, Evangelia, Bekiaris, Evangelos, Ferreira, Pedro

    Published in Environment systems & decisions (01-09-2020)
    “…Critical Infrastructure protection is an issue of priority in Europe, enabling numerous activities for rendering the European Critical infrastructure…”
    Get full text
    Journal Article
  12. 12

    Boosting Differential-Linear Cryptanalysis of ChaCha7 with MILP by Bellini, Emanuele, Gerault, David, Grados, Juan, Makarim, Rusydi H., Peyrin, Thomas

    Published in IACR Transactions on Symmetric Cryptology (16-06-2023)
    “…In this paper, we present an improved differential-linear cryptanalysis of the ChaCha stream cipher. Our main contributions are new differential-linear…”
    Get full text
    Journal Article
  13. 13

    An Application of p-Fibonacci Error-Correcting Codes to Cryptography by Bellini, Emanuele, Marcolla, Chiara, Murru, Nadir

    Published in Mathematics (Basel) (01-04-2021)
    “…In addition to their usefulness in proving one’s identity electronically, identification protocols based on zero-knowledge proofs allow designing secure…”
    Get full text
    Journal Article
  14. 14

    MiRitH: Efficient Post-Quantum Signatures from MinRank in the Head by Adj, Gora, Barbero, Stefano, Bellini, Emanuele, Esser, Andre, Rivera-Zamarripa, Luis, Sanna, Carlo, Verbel, Javier, Zweydinger, Floyd

    “…Since 2016’s NIST call for standardization of post-quantum cryptographic primitives, developing efficient post-quantum secure digital signature schemes has…”
    Get full text
    Journal Article
  15. 15

    Percolation and Internet Science by Bagnoli, Franco, Bellini, Emanuele, Massaro, Emanuele, Rechtman, Raúl

    Published in Future internet (02-02-2019)
    “…Percolation, in its most general interpretation, refers to the “flow” of something (a physical agent, data or information) in a network, possibly accompanied…”
    Get full text
    Journal Article
  16. 16

    Solving systems of Boolean multivariate equations with quantum annealing by Ramos-Calderer, Sergi, Bravo-Prieto, Carlos, Lin, Ruge, Bellini, Emanuele, Manzano, Marc, Aaraj, Najwa, Latorre, José I.

    Published in Physical review research (01-02-2022)
    “…Polynomial systems over the binary field have important applications, especially in symmetric and asymmetric cryptanalysis, multivariate-based postquantum…”
    Get full text
    Journal Article
  17. 17

    Trust and persistence for Internet resources by Lunghi, Maurizio, Bellini, Emanuele, Cirinnà, Chiara

    “…Internet has changed our way of working, communicating, living, producing and accessing information, everything available on an open and flexible…”
    Get full text
    Journal Article
  18. 18

    An efficient and secure RSA-like cryptosystem exploiting Rédei rational functions over conics by Bellini, Emanuele, Murru, Nadir

    Published in Finite fields and their applications (01-05-2016)
    “…We define an isomorphism between the group of points of a conic and the set of integers modulo a prime equipped with a non-standard product. This product can…”
    Get full text
    Journal Article
  19. 19

    A Functional Resonance Analysis Method Driven Resilience Quantification for Socio-Technical Systems by Bellini, Emanuele, Coconea, Laura, Nesi, Paolo

    Published in IEEE systems journal (01-03-2020)
    “…Due to the continuous increment in complexity of the socio-technical systems, decision makers call for new methods which are able to support timely as well as…”
    Get full text
    Journal Article
  20. 20

    Ontology based recommender system using social network data by Arafeh, Mohamad, Ceravolo, Paolo, Mourad, Azzam, Damiani, Ernesto, Bellini, Emanuele

    Published in Future generation computer systems (01-02-2021)
    “…Online Social Network (OSN) is considered a key source of information for real-time decision making. However, several constraints lead to decreasing the amount…”
    Get full text
    Journal Article