Enhanced public key security for the McEliece cryptosystem M Baldi, M Bianchi, F Chiaraluce, J Rosenthal, D Schipani Journal of Cryptology 29 (1), 1-27, 2016 | 86 | 2016 |

Enhanced public key security for the McEliece cryptosystem M Baldi, M Bianchi, F Chiaraluce, J Rosenthal, D Schipani Journal of Cryptology 29 (1), 1-27, 2016 | 86 | 2016 |

Using LDGM codes and sparse syndromes to achieve digital signatures M Baldi, M Bianchi, F Chiaraluce, J Rosenthal, D Schipani International Workshop on Post-Quantum Cryptography, 1-15, 2013 | 37 | 2013 |

On the decoding complexity of cyclic codes up to the BCH bound D Schipani, M Elia, J Rosenthal 2011 IEEE International Symposium on Information Theory Proceedings, 835-839, 2011 | 20 | 2011 |

The Rabin cryptosystem revisited M Elia, M Piva, D Schipani Applicable Algebra in Engineering, Communication and Computing 26 (3), 251-275, 2015 | 19 | 2015 |

Group key management based on semigroup actions JA Lopez-Ramos, J Rosenthal, D Schipani, R Schnyder Journal of Algebra and its applications 16 (08), 1750148, 2017 | 15 | 2017 |

A variant of the McEliece cryptosystem with increased public key security M Baldi, M Bianchi, F Chiaraluce, J Rosenthal, D Schipani, D Augot, ... Proceedings of the... International Workshop on Coding and Cryptography, 173-182, 2011 | 13 | 2011 |

Polynomial evaluation over finite fields: new algorithms and complexity bounds M Elia, J Rosenthal, D Schipani Applicable Algebra in Engineering, Communication and Computing 23 (3-4), 129-141, 2012 | 11 | 2012 |

On fuzzy syndrome hashing with LDPC coding M Baldi, M Bianchi, F Chiaraluce, J Rosenthal, D Schipani Proceedings of the 4th International Symposium on Applied Sciences in …, 2011 | 10 | 2011 |

Coding solutions for the secure biometric storage problem D Schipani, J Rosenthal 2010 IEEE Information Theory Workshop, 1-4, 2010 | 9 | 2010 |

Efficient evaluations of polynomials over finite fields D Schipani, M Elia, J Rosenthal 2011 Australian Communications Theory Workshop, 154-157, 2011 | 7 | 2011 |

Gauss Sums of the Cubic Character over : an elementary derivation D Schipani, M Elia arXiv preprint arXiv:1012.5320, 2010 | 7 | 2010 |

Zeros of the Hurwitz zeta function in the interval (0, 1) D Schipani arXiv preprint arXiv:1003.2060, 2010 | 7 | 2010 |

Subspace fuzzy vault K Marshall, D Schipani, AL Trautmann, J Rosenthal Physical and Data-Link Security Techniques for Future Communication Systems …, 2016 | 6 | 2016 |

An application of group theory in confidential network communications JA López‐Ramos, J Rosenthal, D Schipani, R Schnyder Mathematical Methods in the Applied Sciences 41 (6), 2294-2298, 2018 | 5 | 2018 |

Managing key multicasting through orthogonal systems JA Alvarez-Bermejo, JA Lopez-Ramos, J Rosenthal, D Schipani Journal of Discrete Mathematical Sciences and Cryptography 20 (8), 1721-1740, 2017 | 5 | 2017 |

An active attack on a multiparty key exchange protocol R Schnyder, JA López-Ramos, J Rosenthal, D Schipani Journal of Algebra Combinatorics Discrete Structures and Applications 3 (1 …, 2016 | 5 | 2016 |

Enhanced public key security for the McEliece cryptosystem. Submitted M Baldi, M Bianchi, F Chiaraluce, J Rosenthal, D Schipani arXiv preprint arxiv:1108.2462, 2011 | 5 | 2011 |

Security of generalised Reed–Solomon code-based cryptosystems M Baldi, F Chiaraluce, J Rosenthal, P Santini, D Schipani IET Information Security 13 (4), 404-410, 2019 | 4 | 2019 |

Sufficient and equivalent criteria for the Riemann Hypothesis D Schipani arXiv preprint arXiv:1003.2064, 2010 | 4 | 2010 |