default search action
Gerardo Pelosi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j29]Francesco Antognazza, Alessandro Barenghi, Gerardo Pelosi, Ruggero Susella:
Performance and Efficiency Exploration of Hardware Polynomial Multipliers for Post-Quantum Lattice-Based Cryptosystems. SN Comput. Sci. 5(2): 212 (2024) - [c89]Simone Perriello, Alessandro Barenghi, Gerardo Pelosi:
Quantum Circuit Design for the Lee-Brickell Based Information Set Decoding. ACNS Workshops (2) 2024: 8-28 - [c88]Francesco Antognazza, Alessandro Barenghi, Gerardo Pelosi, Ruggero Susella:
A Versatile and Unified HQC Hardware Accelerator. ACNS Workshops (2) 2024: 214-219 - [c87]Simone Orlando, Alessandro Barenghi, Gerardo Pelosi:
Investigating the Health State of X.509 Digital Certificates. CSR 2024: 222-227 - [c86]Giacomo Lancellotti, Simone Perriello, Alessandro Barenghi, Gerardo Pelosi:
Design of a Quantum Walk Circuit to Solve the Subset-Sum Problem. DAC 2024: 298:1-298:6 - [c85]Francesco Antognazza, Alessandro Barenghi, Gerardo Pelosi, Ruggero Susella:
A High Efficiency Hardware Design for the Post-Quantum KEM HQC. HOST 2024: 431-441 - [c84]Alessandro Annechini, Alessandro Barenghi, Gerardo Pelosi:
Bit-Flipping Decoder Failure Rate Estimation for (v, w)-Regular Codes. ISIT 2024: 3374-3379 - [i11]Alessandro Annechini, Alessandro Barenghi, Gerardo Pelosi:
Bit-flipping Decoder Failure Rate Estimation for (v, w)-regular Codes. CoRR abs/2401.16919 (2024) - 2023
- [c83]Francesco Antognazza, Alessandro Barenghi, Gerardo Pelosi, Ruggero Susella:
A Flexible ASIC-Oriented Design for a Full NTRU Accelerator. ASP-DAC 2023: 591-597 - [c82]Isabella Piacentini, Alessandro Barenghi, Gerardo Pelosi:
A Non Profiled and Profiled Side Channel Attack Countermeasure through Computation Interleaving. DSD 2023: 718-725 - [c81]Alessandro Barenghi, Gerardo Pelosi:
Fault Attacks Friendliness of Post-quantum Cryptosystems. FDTC 2023: 1 - [c80]Francesco Antognazza, Alessandro Barenghi, Gerardo Pelosi, Ruggero Susella:
An Efficient Unified Architecture for Polynomial Multiplications in Lattice-Based Cryptoschemes. ICISSP 2023: 81-88 - [c79]Alessandro Barenghi, Paolo Cremonesi, Gerardo Pelosi:
Quantum Computing Research Lines in the Italian Center for Supercomputing. SAMOS 2023: 423-434 - 2022
- [j28]Alessandro Barenghi, Gioele Falcetti, Gerardo Pelosi:
Locating Side Channel Leakage in Time through Matched Filters. Cryptogr. 6(2): 26 (2022) - [j27]Alessandro Barenghi, Diego Carrera, Silvia Mella, Andrea Pace, Gerardo Pelosi, Ruggero Susella:
Profiled side channel attacks against the RSA cryptosystem using neural networks. J. Inf. Secur. Appl. 66: 103122 (2022) - 2021
- [j26]Francesco Antognazza, Alessandro Barenghi, Gerardo Pelosi:
Metis: An Integrated Morphing Engine CPU to Protect Against Side Channel Attacks. IEEE Access 9: 69210-69225 (2021) - [j25]Alessandro Barenghi, Luca Breveglieri, Niccolò Izzo, Gerardo Pelosi:
Exploring Cortex-M Microarchitectural Side Channel Information Leakage. IEEE Access 9: 156507-156527 (2021) - [c78]Marco Baldi, Alessandro Barenghi, Franco Chiaraluce, Gerardo Pelosi, Paolo Santini:
Performance Bounds for QC-MDPC Codes Decoders. CBCrypto 2021: 95-122 - [c77]Alessandro Barenghi, Diego Carrera, Silvia Mella, Andrea Pace, Gerardo Pelosi, Ruggero Susella:
Profiled Attacks Against the Elliptic Curve Scalar Point Multiplication Using Neural Networks. NSS 2021: 238-257 - [c76]Simone Perriello, Alessandro Barenghi, Gerardo Pelosi:
A Complete Quantum Circuit to Solve the Information Set Decoding Problem. QCE 2021: 366-377 - [c75]Maurizio Atzori, Alessandro Barenghi, Sara Comai, Mariagrazia Fugini, Diego Marcia, Gerardo Pelosi, Manuela Sanguinetti, Vincenzo Scotti:
Improving Work Life Conditions via Portable Knowledge-Driven Recommender System (Discussion Paper). SEBD 2021: 498-505 - [c74]Simone Perriello, Alessandro Barenghi, Gerardo Pelosi:
A Quantum Circuit to Speed-Up the Cryptanalysis of Code-Based Cryptosystems. SecureComm (2) 2021: 458-474 - [i10]Marco Baldi, Alessandro Barenghi, Franco Chiaraluce, Gerardo Pelosi, Paolo Santini:
Performance bounds for QC-MDPC codes decoders. IACR Cryptol. ePrint Arch. 2021: 1557 (2021) - 2020
- [j24]Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi:
Compiler-Based Techniques to Secure Cryptographic Embedded Software Against Side-Channel Attacks. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39(8): 1550-1554 (2020) - [j23]Alessandro Barenghi, William Fornaciari, Gerardo Pelosi, Davide Zoni:
Scramble Suit: A Profile Differentiation Countermeasure to Prevent Template Attacks. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39(9): 1778-1791 (2020) - [c73]Nicholas Mainardi, Davide Sampietro, Alessandro Barenghi, Gerardo Pelosi:
Efficient Oblivious Substring Search via Architectural Support. ACSAC 2020: 526-541 - [c72]Alessandro Barenghi, Gerardo Pelosi:
Constant weight strings in constant time: a building block for code-based post-quantum cryptosystems. CF 2020: 132-141 - [c71]Alessandro Barenghi, Gerardo Pelosi:
A comprehensive analysis of constant-time polynomial inversion for post-quantum cryptosystems. CF 2020: 269-276 - [c70]Alessandro Barenghi, Matteo Brevi, William Fornaciari, Gerardo Pelosi, Davide Zoni:
Integrating Side Channel Security in the FPGA Hardware Design Flow. COSADE 2020: 275-290 - [c69]Marco Baldi, Alessandro Barenghi, Franco Chiaraluce, Gerardo Pelosi, Paolo Santini:
Analysis of In-Place Randomized Bit-Flipping Decoders for the Design of LDPC and MDPC Code-Based Cryptosystems. ICETE (Selected Papers) 2020: 151-174 - [c68]Marco Baldi, Alessandro Barenghi, Franco Chiaraluce, Gerardo Pelosi, Paolo Santini:
A Failure Rate Model of Bit-flipping Decoders for QC-LDPC and QC-MDPC Code-based Cryptosystems. ICETE (2) 2020: 238-249 - [c67]Rosa Maria Resende de Almeida, Adriana Grau Aberturas, Yolanda Bueno Aguado, Maurizio Atzori, Alessandro Barenghi, Gianluca Borghini, Carlos Alberto Catalina Ortega, Sara Comai, Raquel Losada Durán, Mariagrazia Fugini, Hatice Gunes, Basam Musleh Lancis, Gerardo Pelosi, Vincenzo Ronca, Licia Sbattella, Roberto Tedesco, Tian Xu:
Decision Support Systems to Promote Health and Well-Being of People During Their Working Age: The Case of the WorkingAge EU Project. SAMOS 2020: 336-347 - [d1]Marco Baldi, Alessandro Barenghi, Franco Chiaraluce, Gerardo Pelosi, Paolo Santini:
Dataset related to Analysis of Decoding Failures of LDPC and MDPC Codes in Out-of-Place Bit Flipping Decoding. Zenodo, 2020 - [i9]Nicholas Mainardi, Alessandro Barenghi, Gerardo Pelosi:
Plaintext Recovery Attacks against Linearly Decryptable Fully Homomorphic Encryption Schemes. IACR Cryptol. ePrint Arch. 2020: 264 (2020)
2010 – 2019
- 2019
- [j22]Marco Baldi, Alessandro Barenghi, Franco Chiaraluce, Gerardo Pelosi, Paolo Santini:
A Finite Regime Analysis of Information Set Decoding Algorithms. Algorithms 12(10): 209 (2019) - [j21]Nicholas Mainardi, Alessandro Barenghi, Gerardo Pelosi:
Plaintext recovery attacks against linearly decryptable fully homomorphic encryption schemes. Comput. Secur. 87 (2019) - [c66]Nicholas Mainardi, Alessandro Barenghi, Gerardo Pelosi:
Privacy preserving substring search protocol with polylogarithmic communication cost. ACSAC 2019: 297-312 - [c65]Marco Baldi, Alessandro Barenghi, Franco Chiaraluce, Gerardo Pelosi, Paolo Santini:
LEDAcrypt: QC-LDPC Code-Based Cryptosystems with Bounded Decryption Failure Rate. CBC 2019: 11-43 - [c64]Niccolò Izzo, Alessandro Barenghi, Luca Breveglieri, Gerardo Pelosi, Paolo Amato:
A secure and authenticated host-to-memory communication interface. CF 2019: 386-391 - [c63]Alessandro Barenghi, William Fornaciari, Andrea Galimberti, Gerardo Pelosi, Davide Zoni:
Evaluating the Trade-offs in the Hardware Design of the LEDAcrypt Encryption Functions. ICECS 2019: 739-742 - [c62]Giovanni Agosta, Carlo Brandolese, William Fornaciari, Nicholas Mainardi, Gerardo Pelosi, Federico Reghenzani, Michele Zanella, Gaetan Des Courchamps, Vincent Ducrot, Kevin Juilly, Sébastien Monot, Luca Ceva:
Accelerating Automotive Analytics: The M2DC Appliance Approach. SAMOS 2019: 455-469 - [i8]Paolo Santini, Alessandro Barenghi, Gerardo Pelosi, Marco Baldi, Franco Chiaraluce:
A Code-specific Conservative Model for the Failure Rate of Bit-flipping Decoding of LDPC Codes with Cryptographic Applications. CoRR abs/1912.05182 (2019) - [i7]Paolo Santini, Alessandro Barenghi, Gerardo Pelosi, Marco Baldi, Franco Chiaraluce:
A Code-specific Conservative Model for the Failure Rate of Bit-flipping Decoding of LDPC Codes with Cryptographic Applications. IACR Cryptol. ePrint Arch. 2019: 1441 (2019) - 2018
- [j20]Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati:
Enforcing authorizations while protecting access confidentiality. J. Comput. Secur. 26(2): 143-175 (2018) - [j19]Alessandro Barenghi, Nicholas Mainardi, Gerardo Pelosi:
Systematic parsing of X.509: Eradicating security issues with a parse tree. J. Comput. Secur. 26(6): 817-849 (2018) - [j18]Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, Michele Scandale:
Reactive side-channel countermeasures: Applicability and quantitative security evaluation. Microprocess. Microsystems 62: 50-60 (2018) - [j17]Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati:
Three-Server Swapping for Access Confidentiality. IEEE Trans. Cloud Comput. 6(2): 492-505 (2018) - [j16]Davide Zoni, Alessandro Barenghi, Gerardo Pelosi, William Fornaciari:
A Comprehensive Side-Channel Information Leakage Analysis of an In-Order RISC CPU Microarchitecture. ACM Trans. Design Autom. Electr. Syst. 23(5): 57:1-57:30 (2018) - [c61]Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati:
Access Privacy in the Cloud. From Database to Cyber Security 2018: 186-205 - [c60]Alessandro Barenghi, Gerardo Pelosi:
Side-channel security of superscalar CPUs: evaluating the impact of micro-architectural features. DAC 2018: 120:1-120:6 - [c59]Alessandro Barenghi, Nicholas Mainardi, Gerardo Pelosi:
Comparison-Based Attacks Against Noise-Free Fully Homomorphic Encryption Schemes. ICICS 2018: 177-191 - [c58]Alessandro Barenghi, Michele Madaschi, Nicholas Mainardi, Gerardo Pelosi:
OpenCL HLS Based Design of FPGA Accelerators for Cryptographic Primitives. HPCS 2018: 634-641 - [c57]Alessandro Barenghi, Luca Breveglieri, Niccolò Izzo, Gerardo Pelosi:
Software-only Reverse Engineering of Physical DRAM Mappings for Rowhammer Attacks. IVSW 2018: 19-24 - [c56]Marco Baldi, Alessandro Barenghi, Franco Chiaraluce, Gerardo Pelosi, Paolo Santini:
LEDAkem: A Post-quantum Key Encapsulation Mechanism Based on QC-LDPC Codes. PQCrypto 2018: 3-24 - [e5]John Goodacre, Mikel Luján, Giovanni Agosta, Alessandro Barenghi, Israel Koren, Gerardo Pelosi:
Proceedings of the Fifth Workshop on Cryptography and Security in Computing Systems, CS2 2018, Manchester, United Kingdom, January 24, 2018. ACM 2018, ISBN 978-1-4503-6374-7 [contents] - [i6]Marco Baldi, Alessandro Barenghi, Franco Chiaraluce, Gerardo Pelosi, Paolo Santini:
LEDAkem: a post-quantum key encapsulation mechanism based on QC-LDPC codes. CoRR abs/1801.08867 (2018) - [i5]Marco Baldi, Alessandro Barenghi, Franco Chiaraluce, Gerardo Pelosi, Joachim Rosenthal, Paolo Santini, Davide Schipani:
Design and Implementation of a Digital Signature Scheme Based on Low-density Generator Matrix Codes. CoRR abs/1807.06127 (2018) - [i4]Alessandro Barenghi, Nicholas Mainardi, Gerardo Pelosi:
Systematic Parsing of X.509: Eradicating Security Issues with a Parse Tree. CoRR abs/1812.04959 (2018) - 2017
- [j15]Ariel Oleksiak, Michal Kierzynka, Wojciech Piatek, Giovanni Agosta, Alessandro Barenghi, Carlo Brandolese, William Fornaciari, Gerardo Pelosi, Mariano Cecowski, Robert Plestenjak, Justin Cinkelj, Mario Porrmann, Jens Hagemeyer, René Griessl, Jan Lachmair, Meysam Peykanu, Lennart Tigges, Micha vor dem Berge, Wolfgang Christmann, Stefan Krupop, Alexandre Carbon, Loïc Cudennec, Thierry Goubier, Jean-Marc Philippe, Sven Rosinger, Daniel Schlitt, Christian Pieper, Chris Adeniyi-Jones, Javier Setoain, Luca Ceva, Udo Janssen:
M2DC - Modular Microserver DataCentre with heterogeneous hardware. Microprocess. Microsystems 52: 117-130 (2017) - [c55]Alessandro Barenghi, Nicholas Mainardi, Gerardo Pelosi:
A Security Audit of the OpenPGP Format. ISPAN-FCST-ISCC 2017: 336-343 - [c54]Alessandro Barenghi, Gerardo Pelosi:
An Enhanced Dataflow Analysis to Automatically Tailor Side Channel Attack Countermeasures to Software Block Ciphers. ITASEC 2017: 8-18 - [e4]Mats Brorsson, Zhonghai Lu, Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi:
Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2017, Stockholm, Sweden, January 24, 2017. ACM 2017, ISBN 978-1-4503-4869-0 [contents] - 2016
- [j14]Alessandro Barenghi, Michele Beretta, Alessandro Di Federico, Gerardo Pelosi:
A privacy-preserving encrypted OSN with stateless server interaction: The Snake design. Comput. Secur. 63: 67-84 (2016) - [j13]Alessandro Barenghi, Guido Marco Bertoni, Luca Breveglieri, Gerardo Pelosi, Stefano Sanfilippo, Ruggero Susella:
A Fault-Based Secret Key Retrieval Method for ECDSA: Analysis and Countermeasure. ACM J. Emerg. Technol. Comput. Syst. 13(1): 8:1-8:26 (2016) - [c53]Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi:
Automated instantiation of side-channel attacks countermeasures for software cipher implementations. Conf. Computing Frontiers 2016: 455-460 - [c52]Sabrina De Capitani di Vimercati, Sara Foresti, Riccardo Moretti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati:
A Dynamic Tree-Based Data Structure for Access Privacy in the Cloud. CloudCom 2016: 391-398 - [c51]Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati:
Access Control for the Shuffle Index. DBSec 2016: 130-147 - [c50]Mariano Cecowski, Giovanni Agosta, Ariel Oleksiak, Michal Kierzynka, Micha vor dem Berge, Wolfgang Christmann, Stefan Krupop, Mario Porrmann, Jens Hagemeyer, René Griessl, Meysam Peykanu, Lennart Tigges, Sven Rosinger, Daniel Schlitt, Christian Pieper, Carlo Brandolese, William Fornaciari, Gerardo Pelosi, Robert Plestenjak, Justin Cinkelj, Loïc Cudennec, Thierry Goubier, Jean-Marc Philippe, Udo Janssen, Chris Adeniyi-Jones:
The M2DC Project: Modular Microserver DataCentre. DSD 2016: 68-74 - [c49]Giovanni Agosta, Alessandro Barenghi, Carlo Brandolese, William Fornaciari, Gerardo Pelosi, Stefano Delucchi, Massimo Massa, Maurizio Mongelli, Enrico Ferrari, Leonardo Napoletani, Luciano Bozzi, Carlo Tieri, Dajana Cassioli, Luigi Pomante:
V2I Cooperation for Traffic Management with SafeCop. DSD 2016: 621-627 - [c48]Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, Michele Scandale:
Encasing block ciphers to foil key recovery attempts via side channel. ICCAD 2016: 96 - [c47]Alessandro Barenghi, Gerardo Pelosi:
A Note on Fault Attacks Against Deterministic Signature Schemes. IWSEC 2016: 182-192 - [c46]Michal Kierzynka, Ariel Oleksiak, Giovanni Agosta, Carlo Brandolese, William Fornaciari, Gerardo Pelosi, Micha vor dem Berge, Wolfgang Christmann, Stefan Krupop, Mariano Cecowski, Robert Plestenjak, Justin Cinkelj, Mario Porrmann, Jens Hagemeyer, René Griessl, Meysam Peykanu, Lennart Tigges, Loïc Cudennec, Thierry Goubier, Jean-Marc Philippe, Sven Rosinger, Daniel Schlitt, Christian Pieper, Chris Adeniyi-Jones, Udo Janssen, Luca Ceva:
Data centres for IoT applications: The M2DC approach (Invited paper). SAMOS 2016: 293-299 - [c45]Alessio Agneessens, Francesco Buemi, Stefano Delucchi, Massimo Massa, Giovanni Agosta, Alessandro Barenghi, Carlo Brandolese, William Fornaciari, Gerardo Pelosi, Enrico Ferrari, Dajana Cassioli, Luigi Pomante, Leonardo Napoletani, Luciano Bozzi, Carlo Tieri, Maurizio Mongelli:
Safe cooperative CPS: A V2I traffic management scenario in the SafeCOP project. SAMOS 2016: 320-327 - [e3]Martin Palkovic, Giovanni Agosta, Alessandro Barenghi, Israel Koren, Gerardo Pelosi:
Proceedings of the Third Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC, Prague, Czech Republic, January 20, 2016. ACM 2016, ISBN 978-1-4503-4065-6 [contents] - 2015
- [j12]Giovanni Agosta, Alessandro Barenghi, Alessandro Di Federico, Gerardo Pelosi:
OpenCL performance portability for general-purpose computation on graphics processor units: an exploration on cryptographic primitives. Concurr. Comput. Pract. Exp. 27(14): 3633-3660 (2015) - [j11]Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, Michele Scandale:
Trace-based schedulability analysis to enhance passive side-channel attack resilience of embedded software. Inf. Process. Lett. 115(2): 292-297 (2015) - [j10]Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, Michele Scandale:
The MEET Approach: Securing Cryptographic Embedded Software Against Side Channel Attacks. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 34(8): 1320-1333 (2015) - [j9]Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati:
Shuffle Index: Efficient and Private Access to Outsourced Data. ACM Trans. Storage 11(4): 19:1-19:55 (2015) - [c44]Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, Michele Scandale:
Information leakage chaff: feeding red herrings to side channel attackers. DAC 2015: 33:1-33:6 - [c43]Alessandro Barenghi, Alessandro Di Federico, Gerardo Pelosi, Stefano Sanfilippo:
Challenging the Trustworthiness of PGP: Is the Web-of-Trust Tear-Proof? ESORICS (1) 2015: 429-446 - [c42]Giovanni Agosta, Alessio Antonini, Alessandro Barenghi, Dario Galeri, Gerardo Pelosi:
Cyber-security analysis and evaluation for smart home management solutions. ICCST 2015: 1-6 - [e2]Andy D. Pimentel, Stephan Wong, Gerardo Pelosi, Israel Koren, Giovanni Agosta, Alessandro Barenghi:
Proceedings of the Second Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2015, Amsterdam, Netherlands, January 19-21, 2015. ACM 2015, ISBN 978-1-4503-3187-6 [contents] - 2014
- [j8]Giovanni Agosta, Alessandro Barenghi, Massimo Maggi, Gerardo Pelosi:
Design space extension for secure implementation of block ciphers. IET Comput. Digit. Tech. 8(6): 256-263 (2014) - [c41]Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati:
Protecting Access Confidentiality with Data Distribution and Swapping. BDCloud 2014: 167-174 - [c40]Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, Michele Scandale:
A Multiple Equivalent Execution Trace Approach to Secure Cryptographic Embedded Software. DAC 2014: 210:1-210:6 - [c39]Alessandro Barenghi, Michele Beretta, Alessandro Di Federico, Gerardo Pelosi:
Snake: An End-to-End Encrypted Online Social Network. HPCC/CSS/ICESS 2014: 763-770 - [c38]Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, Michele Scandale:
Towards Transparently Tackling Functionality and Performance Issues across Different OpenCL Platforms. CANDAR 2014: 130-136 - [c37]Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi:
Securing software cryptographic primitives for embedded systems against side channel attacks. ICCST 2014: 1-6 - [c36]Alessio Antonini, Alessandro Barenghi, Gerardo Pelosi, Saman A. Zonouz:
Security challenges in building automation and SCADA. ICCST 2014: 1-6 - [c35]Iyad Al Khatib, Gerardo Pelosi, Giovanni Agosta, Heikki Terio:
Security Integration in Medical Device Design: Extension of an Automated Bio-Medical Engineering Design Methodology. ITNG 2014: 137-142 - [c34]Alessandro Barenghi, Gerardo Pelosi:
On the Security of Partially Masked Software Implementations. SECRYPT 2014: 492-499 - [c33]Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, Michele Scandale:
Differential Fault Analysis for Block Ciphers: an Automated Conservative Analysis. SIN 2014: 137 - [e1]Jens Knoop, Valentina Salapura, Israel Koren, Gerardo Pelosi:
Proceedings of the First Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2014, Vienna, Austria, January 20, 2014. ACM 2014, ISBN 978-1-4503-2484-7 [contents] - [i3]Alessandro Barenghi, Gerardo Pelosi, Francesco Regazzoni:
Simulation-Time Security Margin Assessment against Power-Based Side Channel Attacks. IACR Cryptol. ePrint Arch. 2014: 307 (2014) - 2013
- [j7]Alessandro Barenghi, Gerardo Pelosi, Federico Terraneo:
Secure and efficient design of software block cipher implementations on microcontrollers. Int. J. Grid Util. Comput. 4(2/3): 110-118 (2013) - [j6]Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati:
Supporting concurrency and multiple indexes in private access to outsourced data. J. Comput. Secur. 21(3): 425-461 (2013) - [j5]Alessandro Barenghi, Guido Marco Bertoni, Luca Breveglieri, Gerardo Pelosi:
A fault induction technique based on voltage underfeeding with application to attacks against AES and RSA. J. Syst. Softw. 86(7): 1864-1878 (2013) - [c32]Giovanni Agosta, Alessandro Barenghi, Massimo Maggi, Gerardo Pelosi:
Compiler-based side channel vulnerability analysis and optimized countermeasures application. DAC 2013: 81:1-81:6 - [c31]Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati:
Distributed Shuffling for Preserving Access Confidentiality. ESORICS 2013: 628-645 - [c30]Alessandro Barenghi, Gerardo Pelosi, Fabio Pozzi:
Drop-In Control Flow Hijacking Prevention through Dynamic Library Interception. ITNG 2013: 640-647 - [c29]Giovanni Agosta, Gerardo Pelosi, Ettore Speziale:
On Task Assignment in Data Intensive Scalable Computing. JSSPP 2013: 136-155 - [c28]Alessio Antonini, Alessandro Barenghi, Gerardo Pelosi:
Security Analysis of Building Automation Networks - Threat Model and Viable Mitigation Techniques. NordSec 2013: 199-214 - [c27]Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, Michele Scandale:
Enhancing Passive Side-Channel Attack Resilience through Schedulability Analysis of Data-Dependency Graphs. NSS 2013: 692-698 - 2012
- [c26]Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi:
Exploiting Bit-level Parallelism in GPGPUs: a Case Study on KeeLoq Exhaustive Search Attacks. ARCS Workshops 2012: 385-396 - [c25]Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi:
A code morphing methodology to automate power analysis countermeasures. DAC 2012: 77-82 - [c24]Giovanni Agosta, Alessandro Barenghi, Antonio Parata, Gerardo Pelosi:
Automated Security Analysis of Dynamic Web Applications through Symbolic Code Execution. ITNG 2012: 189-194 - [p2]Alessandro Barenghi, Guido Marco Bertoni, Luca Breveglieri, Mauro Pellicioli, Gerardo Pelosi:
Injection Technologies for Fault Attacks on Microprocessors. Fault Analysis in Cryptography 2012: 275-293 - 2011
- [c23]Alessandro Barenghi, Gerardo Pelosi:
Security and Privacy in Smart Grid Infrastructures. DEXA Workshops 2011: 102-108 - [c22]Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati:
Supporting Concurrency in Private Data Outsourcing. ESORICS 2011: 648-664 - [c21]Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati:
Efficient and Private Access to Outsourced Data. ICDCS 2011: 710-719 - [c20]Alessandro Barenghi, Guido Marco Bertoni, Luca Breveglieri, Gerardo Pelosi, Andrea Palomba:
Fault attack to the elliptic curve digital signature algorithm with multiple bit faults. SIN 2011: 63-72 - [c19]Alessandro Barenghi, Gerardo Pelosi, Yannick Teglia:
Information Leakage Discovery Techniques to Enhance Secure Chip Design. WISTP 2011: 128-143 - [p1]Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati:
Selective Exchange of Confidential Data in the Outsourcing Scenario. Privacy and Identity Management for Life 2011: 181-198 - [r2]Gerardo Pelosi:
Secure Audit Logs. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1097-1099 - [r1]Gerardo Pelosi:
Secure Index. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1116-1119 - 2010
- [c18]Alessandro Barenghi, Guido Marco Bertoni, Luca Breveglieri, Mauro Pellicioli, Gerardo Pelosi:
Fault attack on AES with single-bit induced faults. IAS 2010: 167-172 - [c17]Alessandro Barenghi, Luca Breveglieri, Israel Koren, Gerardo Pelosi, Francesco Regazzoni:
Countermeasures against fault attacks on software implemented AES: effectiveness and cost. WESS 2010: 7 - [c16]Alessandro Barenghi, Guido Bertoni, Luca Breveglieri, Mauro Pellicioli, Gerardo Pelosi:
Low Voltage Fault Attacks to AES. HOST 2010: 7-12 - [c15]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati:
Encryption-Based Policy Enforcement for Cloud Storage. ICDCS Workshops 2010: 42-51 - [c14]Giovanni Agosta, Alessandro Barenghi, Fabrizio De Santis, Gerardo Pelosi:
Record Setting Software Implementation of DES Using CUDA. ITNG 2010: 748-755 - [c13]Gerardo Pelosi, Giuseppe Psaila:
SMaC: spatial map caching technique for mobile devices. SAC 2010: 1829-1830 - [c12]Alessandro Barenghi, Gerardo Pelosi, Yannick Teglia:
Improving first order differential power attacks through digital signal processing. SIN 2010: 124-133 - [i2]Alessandro Barenghi, Guido Bertoni, Luca Breveglieri, Mauro Pellicioli, Gerardo Pelosi:
Low Voltage Fault Attacks to AES and RSA on General Purpose Processors. IACR Cryptol. ePrint Arch. 2010: 130 (2010)
2000 – 2009
- 2009
- [j4]Giovanni Agosta, Francesco Bruschi, Gerardo Pelosi, Donatella Sciuto:
A Transform-Parametric Approach to Boolean Matching. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 28(6): 805-817 (2009) - [c11]Alessandro Barenghi, Guido Bertoni, Emanuele Parrinello, Gerardo Pelosi:
Low Voltage Fault Attacks on the RSA Cryptosystem. FDTC 2009: 23-31 - [c10]Andrea Di Biagio, Alessandro Barenghi, Giovanni Agosta, Gerardo Pelosi:
Design of a parallel AES for graphics hardware using the CUDA framework. IPDPS 2009: 1-8 - [c9]Giovanni Agosta, Alessandro Barenghi, Fabrizio De Santis, Andrea Di Biagio, Gerardo Pelosi:
Fast Disk Encryption through GPGPU Acceleration. PDCAT 2009: 102-109 - 2008
- [j3]Guido Marco Bertoni, Luca Breveglieri, Pasqualina Fragneto, Gerardo Pelosi:
Parallel Hardware Architectures for the Cryptographic Tate Pairing. Int. J. Netw. Secur. 7(1): 31-37 (2008) - [j2]Guido Bertoni, Luca Breveglieri, Liqun Chen, Pasqualina Fragneto, Keith A. Harrison, Gerardo Pelosi:
A pairing SW implementation for Smart-Cards. J. Syst. Softw. 81(7): 1240-1247 (2008) - [c8]Alessandro Barenghi, Guido Bertoni, Luca Breveglieri, Gerardo Pelosi:
A FPGA Coprocessor for the Cryptographic Tate Pairing over Fp. ITNG 2008: 112-119 - [c7]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati:
Preserving confidentiality of security policies in data outsourcing. WPES 2008: 75-84 - 2007
- [j1]Giovanni Agosta, Luca Breveglieri, Gerardo Pelosi, Martino Sykora:
Programming Highly Parallel Reconfigurable Architectures for Symmetric and Asymmetric Cryptographic Applications. J. Comput. 2(9): 50-59 (2007) - [c6]Giovanni Agosta, Francesco Bruschi, Gerardo Pelosi, Donatella Sciuto:
A Unified Approach to Canonical Form-based Boolean Matching. DAC 2007: 841-846 - [c5]Giovanni Agosta, Gerardo Pelosi:
A Domain Specific Language for Cryptography. FDL 2007: 159-164 - [c4]Giovanni Agosta, Luca Breveglieri, Gerardo Pelosi, Israel Koren:
Countermeasures against Branch Target Buffer Attacks. FDTC 2007: 75-79 - [c3]Giovanni Agosta, Luca Breveglieri, Gerardo Pelosi, Martino Sykora:
Programming Highly Parallel Reconfigurable Architectures for Public-Key Cryptographic Applications. ITNG 2007: 3-10 - 2006
- [c2]Guido Bertoni, Luca Breveglieri, Pasqualina Fragneto, Gerardo Pelosi, Luigi Sportiello:
Software implementation of Tate pairing over GF(2m). DATE Designers' Forum 2006: 7-11 - [c1]Guido Bertoni, Luca Breveglieri, Pasqualina Fragneto, Gerardo Pelosi:
Parallel Hardware Architectures for the Cryptographic Tate Pairing. ITNG 2006: 186-191 - [i1]Giovanni Agosta, Gerardo Pelosi:
Countermeasures for the Simple Branch Prediction Analysis. IACR Cryptol. ePrint Arch. 2006: 482 (2006)
Coauthor Index
aka: Guido Marco Bertoni
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-14 00:50 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint