Author pages are created from data sourced from our academic publisher partnerships and public sources.

- Publications
- Influence

Error Analysis and Detection Procedures for a Hardware Implementation of the Advanced Encryption Standard

- G. Bertoni, L. Breveglieri, I. Koren, P. Maistri, V. Piuri
- Computer Science
- IEEE Trans. Computers
- 1 April 2003

The goal of the Advanced Encryption Standard (AES) is to achieve secure communication. The use of AES does not, however, guarantee reliable communication. Prior work has shown that even a single… Expand

On the Indifferentiability of the Sponge Construction

- G. Bertoni, J. Daemen, M. Peeters, G. V. Assche
- Computer Science
- EUROCRYPT
- 13 April 2008

In this paper we prove that the sponge construction introduced in [4] is indifferentiable from a random oracle when being used with a random transformation or a random permutation and discuss its… Expand

Duplexing the sponge: single-pass authenticated encryption and other applications

- G. Bertoni, J. Daemen, M. Peeters, G. V. Assche
- Computer Science
- IACR Cryptol. ePrint Arch.
- 11 August 2011

This paper proposes a novel construction, called duplex, closely related to the sponge construction, that accepts message blocks to be hashed and---at no extra cost---provides digests on the input… Expand

Keccak sponge function family main document

- G. Bertoni, J. Daemen, G. V. Assche
- Computer Science
- 2009

- 250
- 22

Sponge Functions

A good cryptographic hash function should behave like a random oracle: it should not have weaknesses that a random oracle does not have. Due to the existence of inner collisions, iterated hash… Expand

- 159
- 13

Keccak

- G. Bertoni, J. Daemen, M. Peeters, G. V. Assche
- Computer Science
- EUROCRYPT
- 2013

This concluded an open competition that was remarkable both for its magnitude and the involvement of the cryptographic community. Public review is of paramount importance to increase the confidence… Expand

On the security of the keyed sponge construction

The advantage in differentiating the sponge construction from a random oracle is upper bounded by N22−(c+1), with N the number of calls to the underlying transformation or permutation and c the… Expand

- 66
- 11

AES power attack based on induced cache miss and countermeasure

- G. Bertoni, V. Zaccaria, L. Breveglieri, M. Monchiero, G. Palermo
- Computer Science
- International Conference on Information…
- 4 April 2005

This paper presents a new attack against a software implementation of the Advanced Encryption Standard. The attack aims at flushing elements of the SBOX from the cache, thus inducing a cache miss… Expand

Efficient GF(pm) Arithmetic Architectures for Cryptographic Applications

- G. Bertoni, J. Guajardo, S. Kumar, G. Orlando, C. Paar, Thomas J. Wollinger
- Mathematics, Computer Science
- CT-RSA
- 13 April 2003

Several public key cryptosystems (HFE, Quartz, Sflash, etc.) are based on the problem MQ of solving a system of multivariate quadratic equations over a finite field. At Asiacrypt 2002, Courtois and… Expand

RadioGatún, a belt-and-mill hash function

- G. Bertoni, J. Daemen, M. Peeters, G. V. Assche
- Computer Science
- IACR Cryptol. ePrint Arch.
- 2006

We present an approach to design cryptographic hash functions that builds on and improves the one underlying the Panama hash function. We discuss the properties of the resulting hash functions that… Expand