Follow
Alessandro Budroni
Alessandro Budroni
Senior Cryptography Engineer, Technology Innovation Institute
Verified email at tii.ae - Homepage
Title
Cited by
Cited by
Year
Efficient hash maps to on BLS curves
A Budroni, F Pintore
Applicable Algebra in Engineering, Communication and Computing, 1-21, 2018
22*2018
PERK
N Aaraj, S Bettaieb, L Bidoux, A Budroni, V Dyseryn, A Esser, P Gaborit, ...
162023
Making the bkw algorithm practical for lwe
A Budroni, Q Guo, T Johansson, E Mårtensson, PS Wagner
Progress in Cryptology–INDOCRYPT 2020: 21st International Conference on …, 2020
132020
A hybrid approach for multimedia use verification
QT Phan, A Budroni, C Pasquini, F De Natale
CEUR WORKSHOP PROCEEDINGS, [1]-[3], 2016
112016
Properties of Lattice Isomorphism as a Cryptographic Group Action
B Benčina, A Budroni, JJ Chi-Domínguez, M Kulkarni
International Conference on Post-Quantum Cryptography, 170-201, 2024
7*2024
Improvements on Making BKW Practical for Solving LWE
A Budroni, Q Guo, T Johansson, E Mårtensson, PS Wagner
Cryptography 5 (4), 31, 2021
62021
The mersenne low hamming combination search problem can be reduced to an ILP problem
A Budroni, A Tenti
International Conference on Cryptology in Africa, 41-55, 2019
62019
Don’t Use it Twice! Solving Relaxed Linear Equivalence Problems
A Budroni, JJ Chi-Domínguez, G D’Alconzo, AJ Di Scala, M Kulkarni
International Conference on the Theory and Application of Cryptology and …, 2024
5*2024
Further improvements of the estimation of key enumeration with applications to solving LWE
A Budroni, E Mårtensson
Cryptography and Communications, 1-20, 2024
42024
New Public-Key Crypto-System EHT
A Budroni, I Semaev
arXiv preprint arXiv:2103.01147, 2021
32021
Enabling PERK and other MPC-in-the-Head Signatures on Resource-Constrained Devices
S Bettaieb, L Bidoux, A Budroni, M Palumbi, LP Perin
IACR Transactions on Cryptographic Hardware and Embedded Systems 2024 (4 …, 2024
2*2024
SoK: Methods for Sampling Random Permutations in Post-Quantum Cryptography
A Budroni, IA Canales-Martínez, LP Perin
Cryptology ePrint Archive, 2024
22024
Attacks on integer-RLWE
A Budroni, B Chetioui, E Franch
Information and Communications Security: 22nd International Conference …, 2020
22020
Quasi-optimal Permutation Ranking and Applications to PERK
S Bettaieb, A Budroni, M Palumbi, DLG Filho
International Conference on Cryptology in Africa, 49-65, 2024
2024
On the Sample Complexity of Linear Code Equivalence for all Code Rates
A Budroni, A Natale
Cryptology ePrint Archive, 2024
2024
Notes on Lattice-Based Cryptography
A Budroni
The University of Bergen, 2022
2022
The system can't perform the operation now. Try again later.
Articles 1–16