Follow
Davide Schipani
Davide Schipani
Verified email at math.uzh.ch
Title
Cited by
Cited by
Year
Enhanced public key security for the McEliece cryptosystem
M Baldi, M Bianchi, F Chiaraluce, J Rosenthal, D Schipani
Journal of Cryptology 29, 1-27, 2016
1302016
Using LDGM codes and sparse syndromes to achieve digital signatures
M Baldi, M Bianchi, F Chiaraluce, J Rosenthal, D Schipani
Post-Quantum Cryptography: 5th International Workshop, PQCrypto 2013 …, 2013
552013
Group key management based on semigroup actions
JA Lopez-Ramos, J Rosenthal, D Schipani, R Schnyder
Journal of Algebra and its applications 16 (08), 1750148, 2017
392017
The Rabin cryptosystem revisited
M Elia, M Piva, D Schipani
Applicable Algebra in Engineering, Communication and Computing 26, 251-275, 2015
342015
On the decoding complexity of cyclic codes up to the BCH bound
D Schipani, M Elia, J Rosenthal
2011 IEEE International Symposium on Information Theory Proceedings, 835-839, 2011
272011
A variant of the McEliece cryptosystem with increased public key security
M Baldi, M Bianchi, F Chiaraluce, J Rosenthal, D Schipani, D Augot, ...
Proceedings of the... International Workshop on Coding and Cryptography, 173-182, 2011
222011
Polynomial evaluation over finite fields: new algorithms and complexity bounds
M Elia, J Rosenthal, D Schipani
Applicable Algebra in Engineering, Communication and Computing 23 (3), 129-141, 2012
192012
On fuzzy syndrome hashing with LDPC coding
M Baldi, M Bianchi, F Chiaraluce, J Rosenthal, D Schipani
Proceedings of the 4th International Symposium on Applied Sciences in …, 2011
182011
Security of generalised Reed–Solomon code‐based cryptosystems
M Baldi, F Chiaraluce, J Rosenthal, P Santini, D Schipani
IET Information Security 13 (4), 404-410, 2019
142019
An application of group theory in confidential network communications
JA López‐Ramos, J Rosenthal, D Schipani, R Schnyder
Mathematical Methods in the Applied Sciences 41 (6), 2294-2298, 2018
132018
Coding solutions for the secure biometric storage problem
D Schipani, J Rosenthal
2010 IEEE Information Theory Workshop, 1-4, 2010
112010
Gauss Sums of the Cubic Character over : an elementary derivation
D Schipani, M Elia
arXiv preprint arXiv:1012.5320, 2010
92010
The efficacy of intra-articular HYADD4-G injection in the treatment of femoroacetabular impingement: results at one year follow up
M Ometti, D Schipani, P Conte, P Pironti, V Salini
Journal of drug assessment 9 (1), 159-166, 2020
82020
An active attack on a multiparty key exchange protocol
R Schnyder, JA López-Ramos, J Rosenthal, D Schipani
Journal of Algebra Combinatorics Discrete Structures and Applications 3 (1 …, 2016
82016
Subspace fuzzy vault
K Marshall, D Schipani, AL Trautmann, J Rosenthal
Physical and Data-Link Security Techniques for Future Communication Systems …, 2016
82016
Efficient evaluations of polynomials over finite fields
D Schipani, M Elia, J Rosenthal
2011 Australian Communications Theory Workshop, 154-157, 2011
82011
Enhanced public key security for the McEliece cryptosystem. submitted
M Baldi, M Bianchi, F Chiaraluce, J Rosenthal, D Schipani
arXiv preprint arxiv:1108.2462, 2011
72011
Zeros of the Hurwitz zeta function in the interval (0, 1)
D Schipani
arXiv preprint arXiv:1003.2060, 2010
72010
Design and implementation of a digital signature scheme based on low-density generator matrix codes
M Baldi, A Barenghi, F Chiaraluce, G Pelosi, J Rosenthal, P Santini, ...
arXiv preprint arXiv:1807.06127, 2018
42018
Fuzzy authentication using rank distance
A Neri, J Rosenthal, D Schipani
Proceedings of the 2nd Workshop on Communication Security: Cryptography and …, 2018
42018
The system can't perform the operation now. Try again later.
Articles 1–20