In this paper we present an improvement of the differential attack on hash functions based on block ciphers. By using the specific properties of the collision attack on hash functi...
Finding efficient countermeasures for cryptosystems against fault attacks is challenged by a constant discovery of flaws in designs. Even elements, such as public keys, that do no...
This paper presents a new approach for Handwritten Word Recognition based on Hidden Markov Model theory and the sliding window technique. The new approach uses specific singularit...
Sebastiano Impedovo, Anna Ferrante, Raffaele Modug...
In this paper we present two attacks that exploit cache events, which are visible in some side channel, to derive a secret key used in an implementation of AES. The first is an imp...
In this paper, three fundamental techniques to improve laminated passive elements are proposed for wearable haptic displays. First, a new shape of sheet surfaces in laminated pass...