Sala, Massimiliano
 Distribuzione geografica
Continente #
NA - Nord America 6.919
AS - Asia 2.309
EU - Europa 1.739
SA - Sud America 336
AF - Africa 48
OC - Oceania 10
Continente sconosciuto - Info sul continente non disponibili 2
AN - Antartide 1
Totale 11.364
Nazione #
US - Stati Uniti d'America 6.807
SG - Singapore 1.000
CN - Cina 412
RU - Federazione Russa 353
VN - Vietnam 344
IT - Italia 324
BR - Brasile 274
SE - Svezia 159
UA - Ucraina 138
GB - Regno Unito 134
FR - Francia 113
IN - India 109
FI - Finlandia 107
DE - Germania 106
LV - Lettonia 91
BG - Bulgaria 79
KR - Corea 78
CA - Canada 71
HK - Hong Kong 70
ID - Indonesia 44
BD - Bangladesh 32
NL - Olanda 30
JP - Giappone 29
AR - Argentina 28
MX - Messico 28
PH - Filippine 27
IQ - Iraq 25
PL - Polonia 24
JO - Giordania 20
TR - Turchia 20
PK - Pakistan 14
EC - Ecuador 12
ZA - Sudafrica 12
ES - Italia 11
MY - Malesia 11
AT - Austria 10
AE - Emirati Arabi Uniti 9
IE - Irlanda 9
IL - Israele 9
BE - Belgio 8
UZ - Uzbekistan 8
CH - Svizzera 7
IR - Iran 7
KE - Kenya 7
SA - Arabia Saudita 7
VE - Venezuela 7
AU - Australia 6
CL - Cile 6
NP - Nepal 6
EG - Egitto 5
LT - Lituania 5
SK - Slovacchia (Repubblica Slovacca) 5
AO - Angola 4
AZ - Azerbaigian 4
CO - Colombia 4
CZ - Repubblica Ceca 4
DO - Repubblica Dominicana 4
MA - Marocco 4
OM - Oman 4
RO - Romania 4
KG - Kirghizistan 3
NO - Norvegia 3
NZ - Nuova Zelanda 3
PT - Portogallo 3
SC - Seychelles 3
SN - Senegal 3
TH - Thailandia 3
TT - Trinidad e Tobago 3
TW - Taiwan 3
AL - Albania 2
BN - Brunei Darussalam 2
BY - Bielorussia 2
DZ - Algeria 2
HR - Croazia 2
JM - Giamaica 2
MM - Myanmar 2
NI - Nicaragua 2
PY - Paraguay 2
RS - Serbia 2
SY - Repubblica araba siriana 2
TN - Tunisia 2
A2 - ???statistics.table.value.countryCode.A2??? 1
AQ - Antartide 1
BO - Bolivia 1
CI - Costa d'Avorio 1
CY - Cipro 1
DK - Danimarca 1
EE - Estonia 1
EU - Europa 1
FJ - Figi 1
GA - Gabon 1
GR - Grecia 1
GT - Guatemala 1
GY - Guiana 1
HN - Honduras 1
HU - Ungheria 1
KZ - Kazakistan 1
LB - Libano 1
LK - Sri Lanka 1
ML - Mali 1
Totale 11.359
Città #
Fairfield 738
Ashburn 735
Singapore 678
Chandler 537
Dallas 520
Woodbridge 367
Seattle 301
Jacksonville 294
Houston 278
San Jose 270
Wilmington 266
Cambridge 234
Santa Clara 209
Ann Arbor 167
Moscow 166
Columbus 163
Princeton 139
Trento 124
San Mateo 120
Beijing 119
Riga 91
Los Angeles 90
Ho Chi Minh City 89
Sofia 78
Seoul 77
Lauterbourg 76
The Dalles 72
Hanoi 71
New York 64
Council Bluffs 59
Helsinki 52
Hong Kong 52
Boardman 39
San Diego 39
Chicago 36
London 35
São Paulo 35
Munich 32
Orem 31
Buffalo 30
Jakarta 30
Lawrence 27
New Delhi 26
Rome 26
Tokyo 25
Toronto 25
Montreal 23
San Paolo di Civitate 23
Fremont 22
Hefei 20
Redondo Beach 20
Da Nang 19
Warsaw 19
Dearborn 18
Stockholm 18
Dong Ket 17
Falkenstein 17
Pune 17
Shanghai 17
Milan 16
Delhi 15
Haiphong 15
Cebu City 14
Denver 14
Poplar 14
Des Moines 13
Frankfurt am Main 13
Guangzhou 13
Washington 13
Phoenix 12
Mexico City 11
Paris 11
Baghdad 10
Boston 10
Brooklyn 10
Chennai 10
Como 10
Lappeenranta 10
Brasília 9
Mumbai 9
Naaldwijk 9
Norwalk 9
Rio de Janeiro 9
Amsterdam 8
Belo Horizonte 8
Dhaka 8
Dublin 8
Manchester 8
Miami 8
Ankara 7
Atlanta 7
Hangzhou 7
Hải Dương 7
Izmir 7
Johannesburg 7
Nairobi 7
Ottawa 7
San Francisco 7
Udine 7
Brussels 6
Totale 8.385
Nome #
Several proofs of security for a tokenization algorithm 228
A note on an infeasible linearization of some block ciphers 223
A note on APN permutations in even dimension 218
On weak differential uniformity of vectorial Boolean functions as a cryptographic criterion 216
Hilbert quasi-polynomial for order domains and application to coding theory 213
Key-Policy Multi-Authority Attribute-Based Encryption 205
A Small Subgroup Attack on Bitcoin Address Generation 205
On the discrete logarithm problem for prime-field elliptic curves 191
Code generator matrices as RNG conditioners 184
A coercion-resistant blockchain-based E-voting protocol with receipts 184
Generation of high quality random numbers via an all-silicon-based approach 181
On differential uniformity of maps that may hide an algebraic trapdoor 181
On the small-weight codewords of some Hermitian codes 180
A new bound for cyclic codes beating the roos bound 178
Implementation and improvement of the partial sum attack on 6-round AES 174
Generalized AG codes as evaluation codes 172
A PROOF OF SECURITY FOR A KEY-POLICY RS-ABE SCHEME 171
On the group generated by the round functions of translation based ciphers over arbitrary finite fields 166
On weakly APN functions and 4-bit S-Boxes 163
A post-processing free Si nanocrystals based quantum random number generator 163
Some security bounds for the key sizes of DGHV scheme 159
On the Security of the Blockchain BIX Protocol and Certificates 157
A discrete logarithm-based approach to compute low-weight multiples of binary polynomials 156
A Survey on Efficient Parallelization of Blockchain-Based Smart Contracts 155
Differential Attacks: Using Alternative Operations 151
Encoding in the DTMF channel for two-channel authentication 150
A Note on an ECDLP-based PoW Model 150
An application of the O'Nan-Scott theorem to the group generated by the round functions of an AES-like cipher 149
The group generated by the round functions of a GOST-like cipher 148
On the Shape of the General Error Locator Polynomial for Cyclic Codes 148
Low Cost Error Recovery in Delay-Intolerant Wireless Sensor Networks 147
On the Hermitian curve and its intersections with some conics 147
Improved decoding of affine-variety codes 145
Abelian regular subgroups of the affine group and radical rings 143
On the provable security of BEAR and LION schemes 140
Intersections between the norm-trace curve and some low degree curves 139
A real life project in cryptography: Assessment of RSA keys 138
A commutative algebra approach to linear codes 138
A Survey on PoW-based Consensus 137
Geometric features for hand-written signatures 130
Computing the distance distribution of systematic non-linear codes 128
Threshold ECDSA with an Offline Recovery Party 128
A survey on functional encryption 128
A New ECDLP-Based PoW Model 127
Postulation of general quintuple fat point schemes in P3 123
An algebraic approach to the classification of some non-linear codes 121
Attacking BEAR and LION schemes in a realistic scenario 121
Efficient Construction and Implementation of Short LDPC Codes for Wireless Sensor Networks 119
HELP: a sparse error locator polynomial for BCH codes 117
Error resilient data transport in sensor network applications: a generic perspective 116
On cryptographic properties of cubic and splitting Boolean functions 115
Some security bounds for the DGHV scheme 112
Wave-shaped round functions and primitive groups 111
Efficient low-density parity-check decoding 110
On some block ciphers and imprimitive groups 107
Two-tier blockchain timestamped notarization with incremental security 107
On the evaluation of multivariate polynomials over finite fields 106
Some bounds on the sizes of codes 102
Two-tier blockchain timestamped notarization with incremental security 102
Gröbner bases, coding, and cryptography: A guide to the state-of-art 101
On Optimal Nonlinear Systematic Codes 96
On properties of translation groups in the affine general linear group with applications to cryptography 96
On the distance distribution of non-linear codes 95
Searchable encryption with randomized ciphertext and randomized keyword search 92
On hidden sums compatible with a given block cipher diffusion layer 91
A new bound for the minimum distance of a cyclic code from its defining set 90
Groebner basis techniques to compute weight distributions of shortened cyclic codes 88
On the Groebner basis of a family of quasi-cyclic LDPC codes 87
On Second-Order Derivatives of Boolean Functions and Cubic APN Permutations in Even Dimension 85
Collaborative Multi-Authority Key-Policy Attribute-Based Encryption for Shorter Keys and Parameters 85
A formula on the weight distribution of linear codes with applications to AMDS codes 84
Low-Weight Common Multiples of Binary Primitive Polynomials through Discrete Logarithms 84
On the weights of affine-variety codes and some Hermitian codes 81
Differential attacks: using alternative operations 81
Provably Unforgeable Threshold EdDSA with an Offline Participant and Trustless Setup 78
General error locator polynomials for nth-root codes 77
Eruditorum Acta 2024 72
General error locator polynomials for binary cyclic codes with t <2 and n < 63 72
A linear programming estimate of the weight distribution of BCH(255,k) 69
Some bounds on the size of codes 67
null 65
Hidden sums and their application on block ciphers 64
Weight distribution of Hermitian codes and matrices rank 64
null 63
Symmetric Cryptography, provable security, and group theory 61
null 60
null 59
Correcting errors and erasures via the syndrome variety 58
Su alcuni metodi algebrici per la teoria dei codici a correzione d'errore 57
Preface [to: Eruditorum Acta 2024] 56
Upper bounds on the dual distance of BCH(255,k) 51
On the equivalence of two post-quantum cryptographic families 51
On Groebner bases of some symmetric systems and their applications to coding theory 43
null 41
Groebner bases and distance of cyclic codes 33
null 26
null 24
null 23
null 22
Totale 11.615
Categoria #
all - tutte 50.317
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 2.622
Totale 52.939


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021254 0 0 0 0 0 0 0 0 0 68 110 76
2021/2022975 30 121 13 45 10 32 79 228 34 67 151 165
2022/20231.122 132 166 20 150 112 156 8 98 154 13 80 33
2023/2024488 29 38 47 26 52 101 33 22 5 20 61 54
2024/20251.756 14 12 154 338 107 253 12 122 111 356 112 165
2025/20263.940 309 77 787 642 452 276 715 81 309 292 0 0
Totale 11.615