Udovenko, A., & Vitto, G. (2023). Revisiting Meet-in-the-Middle Cryptanalysis of SIDH/SIKE with Application to the $IKEp182 Challenge. In B. Smith & H. Wu (Eds.), Selected Areas in Cryptography 2022. Springer. Peer reviewed |
Vitto, G., & Biryukov, A. (2022). Dynamic Universal Accumulator with Batch Update over Bilinear Groups. In Topics in Cryptology - CT-RSA 2022 - Cryptographers' Track at the RSA Conference 2022. Springer. doi:10.1007/978-3-030-95312-6_17 Peer reviewed |
Biryukov, A., Cardoso Dos Santos, L., Feher, D., Velichkov, V., & Vitto, G. (2022). Automated Truncation of Differential Trails and Trail Clustering in ARX. In Selected Areas in Cryptography - 28th International Conference, Revised Selected Papers. Springer. doi:10.1007/978-3-030-99277-4_14 Peer reviewed |
Vitto, G. (2022). Security, Scalability and Privacy in Applied Cryptography [Doctoral thesis, Unilu - University of Luxembourg]. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/50228 |
Vitto, G. (2021). Factoring Primes to Factor Moduli: Backdooring and Distributed Generation of Semiprimes. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/49472. |
Biryukov, A., Udovenko, A., & Vitto, G. (2021). Cryptanalysis of a Dynamic Universal Accumulator over Bilinear Groups. In Topics in Cryptology – CT-RSA 2021. doi:10.1007/978-3-030-75539-3_12 Peer reviewed |
Beullens, W., Beyne, T., Udovenko, A., & Vitto, G. (2020). Cryptanalysis of the Legendre PRF and generalizations. IACR Transactions on Symmetric Cryptology, 2020 (1). doi:10.13154/tosc.v2020.i1.313-330 Peer reviewed |
Biryukov, A., Feher, D., & Vitto, G. (2019). Privacy Aspects and Subliminal Channels in Zcash. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Securit. doi:10.1145/3319535.3345663 Peer reviewed |