Davide Schipani
Davide Schipani
Verified email at math.uzh.ch
TitleCited byYear
Enhanced public key security for the McEliece cryptosystem
M Baldi, M Bianchi, F Chiaraluce, J Rosenthal, D Schipani
Journal of Cryptology 29 (1), 1-27, 2016
502016
Using LDGM codes and sparse syndromes to achieve digital signatures
M Baldi, M Bianchi, F Chiaraluce, J Rosenthal, D Schipani
International Workshop on Post-Quantum Cryptography, 1-15, 2013
282013
On the decoding complexity of cyclic codes up to the BCH bound
D Schipani, M Elia, J Rosenthal
Information Theory Proceedings (ISIT), 2011 IEEE International Symposium on …, 2011
172011
The Rabin cryptosystem revisited
M Elia, M Piva, D Schipani
Applicable Algebra in Engineering, Communication and Computing 26 (3), 251-275, 2015
152015
A variant of the McEliece cryptosystem with increased public key security
M Baldi, M Bianchi, F Chiaraluce, J Rosenthal, D Schipani
WCC 2011-Workshop on coding and cryptography, 173-182, 2011
92011
Coding solutions for the secure biometric storage problem
D Schipani, J Rosenthal
Information Theory Workshop (ITW), 2010 IEEE, 1-4, 2010
82010
Polynomial evaluation over finite fields: new algorithms and complexity bounds
M Elia, J Rosenthal, D Schipani
Applicable Algebra in Engineering, Communication and Computing 23 (3-4), 129-141, 2012
72012
On fuzzy syndrome hashing with LDPC coding
M Baldi, M Bianchi, F Chiaraluce, J Rosenthal, D Schipani
Proceedings of the 4th International Symposium on Applied Sciences in …, 2011
72011
Subspace fuzzy vault
K Marshall, D Schipani, AL Trautmann, J Rosenthal
Physical and Data-Link Security Techniques for Future Communication Systems …, 2016
62016
Gauss Sums of the Cubic Character over : an elementary derivation
D Schipani, M Elia
arXiv preprint arXiv:1012.5320, 2010
62010
Zeros of the Hurwitz zeta function in the interval (0, 1)
D Schipani
arXiv preprint arXiv:1003.2060, 2010
62010
Enhanced public key security for the McEliece cryptosystem. submitted, 2011
M Baldi, M Bianchi, F Chiaraluce, J Rosenthal, D Schipani
arXiv preprint arxiv:1108.2462, 0
5
Managing key multicasting through orthogonal systems
JA Alvarez-Bermejo, JA Lopez-Ramos, J Rosenthal, D Schipani
Journal of Discrete Mathematical Sciences and Cryptography 20 (8), 1721-1740, 2017
42017
Group key management based on semigroup actions
JA Lopez-Ramos, J Rosenthal, D Schipani, R Schnyder
Journal of Algebra and Its Applications 16 (08), 1750148, 2017
42017
Efficient evaluations of polynomials over finite fields
D Schipani, M Elia, J Rosenthal
Communications Theory Workshop (AusCTW), 2011 Australian, 154-157, 2011
42011
An active attack on a multiparty key exchange protocol
R Schnyder, JA López-Ramos, J Rosenthal, D Schipani
arXiv preprint arXiv:1509.01081, 2015
32015
Method and system for computing fourier series coefficients for mask layouts using FFT
PT Hurley, K Kryszczuk, R Scheibler, D Schipani
US Patent 8,402,399, 2013
22013
On burst error correction and storage security of noisy data
F Fontein, K Marshall, J Rosenthal, D Schipani, AL Trautmann
arXiv preprint arXiv:1205.5148, 2012
22012
Gauss sums of cubic characters over Fpr, p odd
D Schipani, M Elia
Bulletin of the Polish Academy of Sciences, Mathematics 60 (1), 1-19, 2012
2*2012
Additive decompositions induced by multiplicative characters over finite fields
D Schipani, M Elia
Theory and Applications of Finite Fields, Contemporary Mathematics 579, 179-186, 2011
22011
The system can't perform the operation now. Try again later.
Articles 1–20