
Gerardo Pelosi
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2020
- [j24]Giovanni Agosta, Alessandro Barenghi
, Gerardo Pelosi
:
Compiler-Based Techniques to Secure Cryptographic Embedded Software Against Side-Channel Attacks. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39(8): 1550-1554 (2020) - [j23]Alessandro Barenghi
, William Fornaciari
, Gerardo Pelosi
, Davide Zoni
:
Scramble Suit: A Profile Differentiation Countermeasure to Prevent Template Attacks. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39(9): 1778-1791 (2020) - [c71]Nicholas Mainardi, Davide Sampietro, Alessandro Barenghi, Gerardo Pelosi:
Efficient Oblivious Substring Search via Architectural Support. ACSAC 2020: 526-541 - [c70]Alessandro Barenghi, Gerardo Pelosi
:
Constant weight strings in constant time: a building block for code-based post-quantum cryptosystems. CF 2020: 132-141 - [c69]Alessandro Barenghi, Gerardo Pelosi
:
A comprehensive analysis of constant-time polynomial inversion for post-quantum cryptosystems. CF 2020: 269-276 - [c68]Marco Baldi, Alessandro Barenghi, Franco Chiaraluce, Gerardo Pelosi
, Paolo Santini:
A Failure Rate Model of Bit-flipping Decoders for QC-LDPC and QC-MDPC Code-based Cryptosystems. ICETE (2) 2020: 238-249 - [c67]Rosa Maria Resende de Almeida
, Adriana Grau Aberturas, Yolanda Bueno Aguado, Maurizio Atzori
, Alessandro Barenghi
, Gianluca Borghini
, Carlos Alberto Catalina Ortega
, Sara Comai
, Raquel Losada Durán, Mariagrazia Fugini
, Hatice Gunes
, Basam Musleh Lancis
, Gerardo Pelosi
, Vincenzo Ronca
, Licia Sbattella, Roberto Tedesco
, Tian Xu:
Decision Support Systems to Promote Health and Well-Being of People During Their Working Age: The Case of the WorkingAge EU Project. SAMOS 2020: 336-347 - [i9]Nicholas Mainardi, Alessandro Barenghi, Gerardo Pelosi:
Plaintext Recovery Attacks against Linearly Decryptable Fully Homomorphic Encryption Schemes. IACR Cryptol. ePrint Arch. 2020: 264 (2020)
2010 – 2019
- 2019
- [j22]Marco Baldi
, Alessandro Barenghi, Franco Chiaraluce
, Gerardo Pelosi
, Paolo Santini:
A Finite Regime Analysis of Information Set Decoding Algorithms. Algorithms 12(10): 209 (2019) - [j21]Nicholas Mainardi
, Alessandro Barenghi
, Gerardo Pelosi
:
Plaintext recovery attacks against linearly decryptable fully homomorphic encryption schemes. Comput. Secur. 87 (2019) - [c66]Nicholas Mainardi, Alessandro Barenghi, Gerardo Pelosi
:
Privacy preserving substring search protocol with polylogarithmic communication cost. ACSAC 2019: 297-312 - [c65]Marco Baldi, Alessandro Barenghi, Franco Chiaraluce
, Gerardo Pelosi
, Paolo Santini:
LEDAcrypt: QC-LDPC Code-Based Cryptosystems with Bounded Decryption Failure Rate. CBC 2019: 11-43 - [c64]Niccolò Izzo, Alessandro Barenghi, Luca Breveglieri, Gerardo Pelosi
, Paolo Amato:
A secure and authenticated host-to-memory communication interface. CF 2019: 386-391 - [c63]Alessandro Barenghi, William Fornaciari
, Andrea Galimberti, Gerardo Pelosi
, Davide Zoni
:
Evaluating the Trade-offs in the Hardware Design of the LEDAcrypt Encryption Functions. ICECS 2019: 739-742 - [c62]Giovanni Agosta, Carlo Brandolese, William Fornaciari
, Nicholas Mainardi, Gerardo Pelosi
, Federico Reghenzani
, Michele Zanella, Gaetan Des Courchamps, Vincent Ducrot, Kevin Juilly, Sébastien Monot, Luca Ceva:
Accelerating Automotive Analytics: The M2DC Appliance Approach. SAMOS 2019: 455-469 - [i8]Paolo Santini, Alessandro Barenghi, Gerardo Pelosi, Marco Baldi, Franco Chiaraluce:
A Code-specific Conservative Model for the Failure Rate of Bit-flipping Decoding of LDPC Codes with Cryptographic Applications. CoRR abs/1912.05182 (2019) - [i7]Paolo Santini, Alessandro Barenghi, Gerardo Pelosi, Marco Baldi, Franco Chiaraluce:
A Code-specific Conservative Model for the Failure Rate of Bit-flipping Decoding of LDPC Codes with Cryptographic Applications. IACR Cryptol. ePrint Arch. 2019: 1441 (2019) - 2018
- [j20]Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi
, Pierangela Samarati:
Enforcing authorizations while protecting access confidentiality. J. Comput. Secur. 26(2): 143-175 (2018) - [j19]Alessandro Barenghi
, Nicholas Mainardi
, Gerardo Pelosi
:
Systematic parsing of X.509: Eradicating security issues with a parse tree. J. Comput. Secur. 26(6): 817-849 (2018) - [j18]Giovanni Agosta
, Alessandro Barenghi
, Gerardo Pelosi
, Michele Scandale:
Reactive side-channel countermeasures: Applicability and quantitative security evaluation. Microprocess. Microsystems 62: 50-60 (2018) - [j17]Sabrina De Capitani di Vimercati, Sara Foresti
, Stefano Paraboschi, Gerardo Pelosi
, Pierangela Samarati
:
Three-Server Swapping for Access Confidentiality. IEEE Trans. Cloud Comput. 6(2): 492-505 (2018) - [j16]Davide Zoni
, Alessandro Barenghi
, Gerardo Pelosi
, William Fornaciari
:
A Comprehensive Side-Channel Information Leakage Analysis of an In-Order RISC CPU Microarchitecture. ACM Trans. Design Autom. Electr. Syst. 23(5): 57:1-57:30 (2018) - [c61]Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi
, Pierangela Samarati:
Access Privacy in the Cloud. From Database to Cyber Security 2018: 186-205 - [c60]Alessandro Barenghi
, Gerardo Pelosi
:
Side-channel security of superscalar CPUs: evaluating the impact of micro-architectural features. DAC 2018: 120:1-120:6 - [c59]Alessandro Barenghi
, Nicholas Mainardi
, Gerardo Pelosi
:
Comparison-Based Attacks Against Noise-Free Fully Homomorphic Encryption Schemes. ICICS 2018: 177-191 - [c58]Alessandro Barenghi
, Michele Madaschi, Nicholas Mainardi, Gerardo Pelosi
:
OpenCL HLS Based Design of FPGA Accelerators for Cryptographic Primitives. HPCS 2018: 634-641 - [c57]Alessandro Barenghi
, Luca Breveglieri, Niccolò Izzo, Gerardo Pelosi
:
Software-only Reverse Engineering of Physical DRAM Mappings for Rowhammer Attacks. IVSW 2018: 19-24 - [c56]Marco Baldi
, Alessandro Barenghi
, Franco Chiaraluce
, Gerardo Pelosi
, Paolo Santini
:
LEDAkem: A Post-quantum Key Encapsulation Mechanism Based on QC-LDPC Codes. PQCrypto 2018: 3-24 - [e5]John Goodacre, Mikel Luján, Giovanni Agosta, Alessandro Barenghi, Israel Koren, Gerardo Pelosi:
Proceedings of the Fifth Workshop on Cryptography and Security in Computing Systems, CS2 2018, Manchester, United Kingdom, January 24, 2018. ACM 2018, ISBN 978-1-4503-6374-7 [contents] - [i6]Marco Baldi, Alessandro Barenghi, Franco Chiaraluce, Gerardo Pelosi, Paolo Santini:
LEDAkem: a post-quantum key encapsulation mechanism based on QC-LDPC codes. CoRR abs/1801.08867 (2018) - [i5]Marco Baldi, Alessandro Barenghi, Franco Chiaraluce, Gerardo Pelosi, Joachim Rosenthal, Paolo Santini, Davide Schipani:
Design and Implementation of a Digital Signature Scheme Based on Low-density Generator Matrix Codes. CoRR abs/1807.06127 (2018) - [i4]Alessandro Barenghi, Nicholas Mainardi, Gerardo Pelosi:
Systematic Parsing of X.509: Eradicating Security Issues with a Parse Tree. CoRR abs/1812.04959 (2018) - 2017
- [j15]Ariel Oleksiak, Michal Kierzynka, Wojciech Piatek, Giovanni Agosta
, Alessandro Barenghi, Carlo Brandolese, William Fornaciari
, Gerardo Pelosi
, Mariano Cecowski, Robert Plestenjak, Justin Cinkelj, Mario Porrmann
, Jens Hagemeyer, René Griessl, Jan Lachmair, Meysam Peykanu
, Lennart Tigges, Micha vor dem Berge, Wolfgang Christmann, Stefan Krupop, Alexandre Carbon, Loïc Cudennec
, Thierry Goubier, Jean-Marc Philippe, Sven Rosinger, Daniel Schlitt, Christian Pieper, Chris Adeniyi-Jones, Javier Setoain, Luca Ceva, Udo Janssen:
M2DC - Modular Microserver DataCentre with heterogeneous hardware. Microprocess. Microsystems 52: 117-130 (2017) - [c55]Alessandro Barenghi
, Nicholas Mainardi
, Gerardo Pelosi
:
A Security Audit of the OpenPGP Format. ISPAN-FCST-ISCC 2017: 336-343 - [c54]Alessandro Barenghi, Gerardo Pelosi:
An Enhanced Dataflow Analysis to Automatically Tailor Side Channel Attack Countermeasures to Software Block Ciphers. ITASEC 2017: 8-18 - [e4]Mats Brorsson, Zhonghai Lu, Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi:
Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2017, Stockholm, Sweden, January 24, 2017. ACM 2017, ISBN 978-1-4503-4869-0 [contents] - 2016
- [j14]Alessandro Barenghi
, Michele Beretta, Alessandro Di Federico, Gerardo Pelosi
:
A privacy-preserving encrypted OSN with stateless server interaction: The Snake design. Comput. Secur. 63: 67-84 (2016) - [j13]Alessandro Barenghi
, Guido Marco Bertoni
, Luca Breveglieri, Gerardo Pelosi
, Stefano Sanfilippo, Ruggero Susella:
A Fault-Based Secret Key Retrieval Method for ECDSA: Analysis and Countermeasure. ACM J. Emerg. Technol. Comput. Syst. 13(1): 8:1-8:26 (2016) - [c53]Giovanni Agosta
, Alessandro Barenghi
, Gerardo Pelosi
:
Automated instantiation of side-channel attacks countermeasures for software cipher implementations. Conf. Computing Frontiers 2016: 455-460 - [c52]Sabrina De Capitani di Vimercati, Sara Foresti, Riccardo Moretti, Stefano Paraboschi, Gerardo Pelosi
, Pierangela Samarati
:
A Dynamic Tree-Based Data Structure for Access Privacy in the Cloud. CloudCom 2016: 391-398 - [c51]Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi
, Pierangela Samarati
:
Access Control for the Shuffle Index. DBSec 2016: 130-147 - [c50]Mariano Cecowski, Giovanni Agosta
, Ariel Oleksiak, Michal Kierzynka, Micha vor dem Berge, Wolfgang Christmann, Stefan Krupop, Mario Porrmann
, Jens Hagemeyer, René Griessl, Meysam Peykanu
, Lennart Tigges, Sven Rosinger, Daniel Schlitt, Christian Pieper, Carlo Brandolese, William Fornaciari
, Gerardo Pelosi
, Robert Plestenjak, Justin Cinkelj, Loïc Cudennec
, Thierry Goubier, Jean-Marc Philippe, Udo Janssen, Chris Adeniyi-Jones:
The M2DC Project: Modular Microserver DataCentre. DSD 2016: 68-74 - [c49]Giovanni Agosta
, Alessandro Barenghi
, Carlo Brandolese, William Fornaciari
, Gerardo Pelosi
, Stefano Delucchi, Massimo Massa, Maurizio Mongelli, Enrico Ferrari, Leonardo Napoletani, Luciano Bozzi, Carlo Tieri, Dajana Cassioli, Luigi Pomante
:
V2I Cooperation for Traffic Management with SafeCop. DSD 2016: 621-627 - [c48]Giovanni Agosta
, Alessandro Barenghi
, Gerardo Pelosi
, Michele Scandale:
Encasing block ciphers to foil key recovery attempts via side channel. ICCAD 2016: 96 - [c47]Alessandro Barenghi
, Gerardo Pelosi
:
A Note on Fault Attacks Against Deterministic Signature Schemes. IWSEC 2016: 182-192 - [c46]Michal Kierzynka, Ariel Oleksiak, Giovanni Agosta
, Carlo Brandolese, William Fornaciari
, Gerardo Pelosi
, Micha vor dem Berge, Wolfgang Christmann, Stefan Krupop, Mariano Cecowski, Robert Plestenjak, Justin Cinkelj, Mario Porrmann
, Jens Hagemeyer, René Griessl, Meysam Peykanu
, Lennart Tigges, Loïc Cudennec
, Thierry Goubier, Jean-Marc Philippe, Sven Rosinger, Daniel Schlitt, Christian Pieper, Chris Adeniyi-Jones, Udo Janssen, Luca Ceva:
Data centres for IoT applications: The M2DC approach (Invited paper). SAMOS 2016: 293-299 - [c45]Alessio Agneessens, Francesco Buemi, Stefano Delucchi, Massimo Massa, Giovanni Agosta
, Alessandro Barenghi
, Carlo Brandolese, William Fornaciari
, Gerardo Pelosi
, Enrico Ferrari, Dajana Cassioli, Luigi Pomante
, Leonardo Napoletani, Luciano Bozzi, Carlo Tieri, Maurizio Mongelli:
Safe cooperative CPS: A V2I traffic management scenario in the SafeCOP project. SAMOS 2016: 320-327 - [e3]Martin Palkovic, Giovanni Agosta, Alessandro Barenghi, Israel Koren, Gerardo Pelosi:
Proceedings of the Third Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC, Prague, Czech Republic, January 20, 2016. ACM 2016, ISBN 978-1-4503-4065-6 [contents] - 2015
- [j12]Giovanni Agosta
, Alessandro Barenghi, Alessandro Di Federico, Gerardo Pelosi
:
OpenCL performance portability for general-purpose computation on graphics processor units: an exploration on cryptographic primitives. Concurr. Comput. Pract. Exp. 27(14): 3633-3660 (2015) - [j11]Giovanni Agosta
, Alessandro Barenghi
, Gerardo Pelosi
, Michele Scandale:
Trace-based schedulability analysis to enhance passive side-channel attack resilience of embedded software. Inf. Process. Lett. 115(2): 292-297 (2015) - [j10]Giovanni Agosta
, Alessandro Barenghi
, Gerardo Pelosi
, Michele Scandale:
The MEET Approach: Securing Cryptographic Embedded Software Against Side Channel Attacks. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 34(8): 1320-1333 (2015) - [j9]Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi
, Gerardo Pelosi
, Pierangela Samarati
:
Shuffle Index: Efficient and Private Access to Outsourced Data. ACM Trans. Storage 11(4): 19:1-19:55 (2015) - [c44]Giovanni Agosta
, Alessandro Barenghi
, Gerardo Pelosi
, Michele Scandale:
Information leakage chaff: feeding red herrings to side channel attackers. DAC 2015: 33:1-33:6 - [c43]Alessandro Barenghi, Alessandro Di Federico, Gerardo Pelosi
, Stefano Sanfilippo:
Challenging the Trustworthiness of PGP: Is the Web-of-Trust Tear-Proof? ESORICS (1) 2015: 429-446 - [c42]Giovanni Agosta
, Alessio Antonini
, Alessandro Barenghi, Dario Galeri, Gerardo Pelosi
:
Cyber-security analysis and evaluation for smart home management solutions. ICCST 2015: 1-6 - [e2]Andy D. Pimentel, Stephan Wong, Gerardo Pelosi, Israel Koren, Giovanni Agosta, Alessandro Barenghi:
Proceedings of the Second Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2015, Amsterdam, Netherlands, January 19-21, 2015. ACM 2015, ISBN 978-1-4503-3187-6 [contents] - 2014
- [j8]Giovanni Agosta
, Alessandro Barenghi, Massimo Maggi, Gerardo Pelosi
:
Design space extension for secure implementation of block ciphers. IET Comput. Digit. Tech. 8(6): 256-263 (2014) - [c41]Sabrina De Capitani di Vimercati
, Sara Foresti
, Stefano Paraboschi
, Gerardo Pelosi
, Pierangela Samarati
:
Protecting Access Confidentiality with Data Distribution and Swapping. BDCloud 2014: 167-174 - [c40]Giovanni Agosta
, Alessandro Barenghi
, Gerardo Pelosi
, Michele Scandale:
A Multiple Equivalent Execution Trace Approach to Secure Cryptographic Embedded Software. DAC 2014: 210:1-210:6 - [c39]Alessandro Barenghi, Michele Beretta, Alessandro Di Federico, Gerardo Pelosi
:
Snake: An End-to-End Encrypted Online Social Network. HPCC/CSS/ICESS 2014: 763-770 - [c38]Giovanni Agosta
, Alessandro Barenghi
, Gerardo Pelosi
, Michele Scandale:
Towards Transparently Tackling Functionality and Performance Issues across Different OpenCL Platforms. CANDAR 2014: 130-136 - [c37]Giovanni Agosta
, Alessandro Barenghi
, Gerardo Pelosi
:
Securing software cryptographic primitives for embedded systems against side channel attacks. ICCST 2014: 1-6 - [c36]Alessio Antonini
, Alessandro Barenghi
, Gerardo Pelosi
, Saman A. Zonouz:
Security challenges in building automation and SCADA. ICCST 2014: 1-6 - [c35]Iyad Al Khatib, Gerardo Pelosi
, Giovanni Agosta
, Heikki Terio:
Security Integration in Medical Device Design: Extension of an Automated Bio-Medical Engineering Design Methodology. ITNG 2014: 137-142 - [c34]Alessandro Barenghi
, Gerardo Pelosi
:
On the Security of Partially Masked Software Implementations. SECRYPT 2014: 492-499 - [c33]Giovanni Agosta
, Alessandro Barenghi
, Gerardo Pelosi
, Michele Scandale:
Differential Fault Analysis for Block Ciphers: an Automated Conservative Analysis. SIN 2014: 137 - [e1]Jens Knoop, Valentina Salapura, Israel Koren, Gerardo Pelosi:
Proceedings of the First Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2014, Vienna, Austria, January 20, 2014. ACM 2014, ISBN 978-1-4503-2484-7 [contents] - [i3]Alessandro Barenghi, Gerardo Pelosi, Francesco Regazzoni:
Simulation-Time Security Margin Assessment against Power-Based Side Channel Attacks. IACR Cryptol. ePrint Arch. 2014: 307 (2014) - 2013
- [j7]Alessandro Barenghi
, Gerardo Pelosi
, Federico Terraneo:
Secure and efficient design of software block cipher implementations on microcontrollers. Int. J. Grid Util. Comput. 4(2/3): 110-118 (2013) - [j6]Sabrina De Capitani di Vimercati
, Sara Foresti
, Stefano Paraboschi
, Gerardo Pelosi
, Pierangela Samarati
:
Supporting concurrency and multiple indexes in private access to outsourced data. J. Comput. Secur. 21(3): 425-461 (2013) - [j5]Alessandro Barenghi
, Guido Marco Bertoni
, Luca Breveglieri, Gerardo Pelosi
:
A fault induction technique based on voltage underfeeding with application to attacks against AES and RSA. J. Syst. Softw. 86(7): 1864-1878 (2013) - [c32]Giovanni Agosta
, Alessandro Barenghi
, Massimo Maggi, Gerardo Pelosi
:
Compiler-based side channel vulnerability analysis and optimized countermeasures application. DAC 2013: 81:1-81:6 - [c31]Sabrina De Capitani di Vimercati
, Sara Foresti
, Stefano Paraboschi
, Gerardo Pelosi
, Pierangela Samarati
:
Distributed Shuffling for Preserving Access Confidentiality. ESORICS 2013: 628-645 - [c30]Alessandro Barenghi
, Gerardo Pelosi
, Fabio Pozzi:
Drop-In Control Flow Hijacking Prevention through Dynamic Library Interception. ITNG 2013: 640-647 - [c29]Giovanni Agosta
, Gerardo Pelosi
, Ettore Speziale:
On Task Assignment in Data Intensive Scalable Computing. JSSPP 2013: 136-155 - [c28]Alessio Antonini
, Alessandro Barenghi
, Gerardo Pelosi
:
Security Analysis of Building Automation Networks - Threat Model and Viable Mitigation Techniques. NordSec 2013: 199-214 - [c27]Giovanni Agosta
, Alessandro Barenghi
, Gerardo Pelosi
, Michele Scandale:
Enhancing Passive Side-Channel Attack Resilience through Schedulability Analysis of Data-Dependency Graphs. NSS 2013: 692-698 - 2012
- [c26]Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi:
Exploiting Bit-level Parallelism in GPGPUs: a Case Study on KeeLoq Exhaustive Search Attacks. ARCS Workshops 2012: 385-396 - [c25]Giovanni Agosta
, Alessandro Barenghi
, Gerardo Pelosi
:
A code morphing methodology to automate power analysis countermeasures. DAC 2012: 77-82 - [c24]Giovanni Agosta
, Alessandro Barenghi
, Antonio Parata, Gerardo Pelosi
:
Automated Security Analysis of Dynamic Web Applications through Symbolic Code Execution. ITNG 2012: 189-194 - [p2]Alessandro Barenghi
, Guido Marco Bertoni
, Luca Breveglieri, Mauro Pellicioli, Gerardo Pelosi
:
Injection Technologies for Fault Attacks on Microprocessors. Fault Analysis in Cryptography 2012: 275-293 - 2011
- [c23]Alessandro Barenghi
, Gerardo Pelosi
:
Security and Privacy in Smart Grid Infrastructures. DEXA Workshops 2011: 102-108 - [c22]Sabrina De Capitani di Vimercati
, Sara Foresti
, Stefano Paraboschi
, Gerardo Pelosi
, Pierangela Samarati
:
Supporting Concurrency in Private Data Outsourcing. ESORICS 2011: 648-664 - [c21]Sabrina De Capitani di Vimercati
, Sara Foresti
, Stefano Paraboschi
, Gerardo Pelosi
, Pierangela Samarati
:
Efficient and Private Access to Outsourced Data. ICDCS 2011: 710-719 - [c20]Alessandro Barenghi
, Guido Marco Bertoni
, Luca Breveglieri, Gerardo Pelosi
, Andrea Palomba:
Fault attack to the elliptic curve digital signature algorithm with multiple bit faults. SIN 2011: 63-72 - [c19]Alessandro Barenghi
, Gerardo Pelosi
, Yannick Teglia:
Information Leakage Discovery Techniques to Enhance Secure Chip Design. WISTP 2011: 128-143 - [p1]Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi
, Pierangela Samarati:
Selective Exchange of Confidential Data in the Outsourcing Scenario. Privacy and Identity Management for Life 2011: 181-198 - [r2]Gerardo Pelosi
:
Secure Audit Logs. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1097-1099 - [r1]Gerardo Pelosi
:
Secure Index. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1116-1119 - 2010
- [c18]Alessandro Barenghi
, Guido Marco Bertoni
, Luca Breveglieri, Mauro Pellicioli, Gerardo Pelosi
:
Fault attack on AES with single-bit induced faults. IAS 2010: 167-172 - [c17]Alessandro Barenghi
, Luca Breveglieri, Israel Koren, Gerardo Pelosi
, Francesco Regazzoni
:
Countermeasures against fault attacks on software implemented AES: effectiveness and cost. WESS 2010: 7 - [c16]Alessandro Barenghi
, Guido Bertoni
, Luca Breveglieri, Mauro Pellicioli, Gerardo Pelosi
:
Low Voltage Fault Attacks to AES. HOST 2010: 7-12 - [c15]Sabrina De Capitani di Vimercati
, Sara Foresti
, Sushil Jajodia
, Stefano Paraboschi
, Gerardo Pelosi
, Pierangela Samarati
:
Encryption-Based Policy Enforcement for Cloud Storage. ICDCS Workshops 2010: 42-51 - [c14]Giovanni Agosta
, Alessandro Barenghi
, Fabrizio De Santis, Gerardo Pelosi
:
Record Setting Software Implementation of DES Using CUDA. ITNG 2010: 748-755 - [c13]Gerardo Pelosi
, Giuseppe Psaila
:
SMaC: spatial map caching technique for mobile devices. SAC 2010: 1829-1830 - [c12]Alessandro Barenghi
, Gerardo Pelosi
, Yannick Teglia:
Improving first order differential power attacks through digital signal processing. SIN 2010: 124-133 - [i2]Alessandro Barenghi, Guido Bertoni, Luca Breveglieri, Mauro Pellicioli, Gerardo Pelosi:
Low Voltage Fault Attacks to AES and RSA on General Purpose Processors. IACR Cryptol. ePrint Arch. 2010: 130 (2010)
2000 – 2009
- 2009
- [j4]Giovanni Agosta
, Francesco Bruschi, Gerardo Pelosi
, Donatella Sciuto
:
A Transform-Parametric Approach to Boolean Matching. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 28(6): 805-817 (2009) - [c11]Alessandro Barenghi
, Guido Bertoni
, Emanuele Parrinello, Gerardo Pelosi
:
Low Voltage Fault Attacks on the RSA Cryptosystem. FDTC 2009: 23-31 - [c10]Andrea Di Biagio, Alessandro Barenghi
, Giovanni Agosta
, Gerardo Pelosi
:
Design of a parallel AES for graphics hardware using the CUDA framework. IPDPS 2009: 1-8 - [c9]Giovanni Agosta
, Alessandro Barenghi
, Fabrizio De Santis, Andrea Di Biagio, Gerardo Pelosi
:
Fast Disk Encryption through GPGPU Acceleration. PDCAT 2009: 102-109 - 2008
- [j3]Guido Marco Bertoni, Luca Breveglieri, Pasqualina Fragneto, Gerardo Pelosi:
Parallel Hardware Architectures for the Cryptographic Tate Pairing. Int. J. Netw. Secur. 7(1): 31-37 (2008) - [j2]Guido Bertoni
, Luca Breveglieri, Liqun Chen, Pasqualina Fragneto, Keith A. Harrison, Gerardo Pelosi
:
A pairing SW implementation for Smart-Cards. J. Syst. Softw. 81(7): 1240-1247 (2008) - [c8]Alessandro Barenghi
, Guido Bertoni
, Luca Breveglieri, Gerardo Pelosi
:
A FPGA Coprocessor for the Cryptographic Tate Pairing over Fp. ITNG 2008: 112-119 - [c7]Sabrina De Capitani di Vimercati
, Sara Foresti
, Sushil Jajodia, Stefano Paraboschi
, Gerardo Pelosi
, Pierangela Samarati
:
Preserving confidentiality of security policies in data outsourcing. WPES 2008: 75-84 - 2007
- [j1]Giovanni Agosta
, Luca Breveglieri, Gerardo Pelosi
, Martino Sykora:
Programming Highly Parallel Reconfigurable Architectures for Symmetric and Asymmetric Cryptographic Applications. J. Comput. 2(9): 50-59 (2007) - [c6]Giovanni Agosta
, Francesco Bruschi, Gerardo Pelosi
, Donatella Sciuto:
A Unified Approach to Canonical Form-based Boolean Matching. DAC 2007: 841-846 - [c5]Giovanni Agosta, Gerardo Pelosi:
A Domain Specific Language for Cryptography. FDL 2007: 159-164 - [c4]Giovanni Agosta
, Luca Breveglieri, Gerardo Pelosi
, Israel Koren:
Countermeasures against Branch Target Buffer Attacks. FDTC 2007: 75-79 - [c3]Giovanni Agosta
, Luca Breveglieri, Gerardo Pelosi
, Martino Sykora:
Programming Highly Parallel Reconfigurable Architectures for Public-Key Cryptographic Applications. ITNG 2007: 3-10 - 2006
- [c2]Guido Bertoni, Luca Breveglieri, Pasqualina Fragneto, Gerardo Pelosi
, Luigi Sportiello:
Software implementation of Tate pairing over GF(2m). DATE Designers' Forum 2006: 7-11 - [c1]Guido Bertoni
, Luca Breveglieri, Pasqualina Fragneto, Gerardo Pelosi
:
Parallel Hardware Architectures for the Cryptographic Tate Pairing. ITNG 2006: 186-191 - [i1]