Sfoglia per Autore
Parallel hardware architectures for the cryptographic Tate pairing
2006-01-01 G., Bertoni; Breveglieri, LUCA ODDONE; P., Fragneto; Pelosi, Gerardo
Software implementation of Tate pairing over GF(2m)
2006-01-01 G., Bertoni; Breveglieri, LUCA ODDONE; P., Fragneto; Pelosi, Gerardo; L., Sportiello
Computational intelligence techniques to detect toxic gas presence
2006-01-01 Alippi, Cesare; Pelosi, Gerardo; Roveri, Manuel
A Message deciphering method
2007-01-01 G. M., Bertoni; P., Fragneto; Pelosi, Gerardo; R. V., Sannino; F., Sozzani
Countermeasures against branch target buffer attacks
2007-01-01 Agosta, Giovanni; Breveglieri, LUCA ODDONE; I., Koren; Pelosi, Gerardo
A Domain Specific Language for Cryptography
2007-01-01 Agosta, Giovanni; Pelosi, Gerardo
Programming highly parallel reconfigurable architectures for symmetric and asymmetric cryptographic applications
2007-01-01 Agosta, Giovanni; Breveglieri, LUCA ODDONE; Pelosi, Gerardo; Sykora, Martino
A Unified Approach to Canonical Form-based Boolean Matching
2007-01-01 Agosta, Giovanni; Bruschi, Francesco; Pelosi, Gerardo; Sciuto, Donatella
A pairing SW implementation for smart-cards
2008-01-01 G. M., Bertoni; Breveglieri, LUCA ODDONE; L., Chen; P., Fragneto; K. A., Harrison; Pelosi, Gerardo
Improvements in the Use of Bilinear Mappings in Cryptographic Applications
2008-01-01 G. M., Bertoni; L., Chen; P., Fragneto; Pelosi, Gerardo; K. A., Harrison
A FPGA coprocessor for the cryptographic Tate pairing over Fp
2008-01-01 Barenghi, Alessandro; Bertoni, G.; Breveglieri, LUCA ODDONE; Pelosi, Gerardo
Parallel hardware architectures for the cryptographic Tate pairing
2008-01-01 G. M., Bertoni; Breveglieri, LUCA ODDONE; P., Fragneto; Pelosi, Gerardo
Preserving confidentiality of security policies in data outsourcing scenarios
2008-01-01 De Capitani di Vimercati, S.; Foresti, S.; Jajodia, S.; Paraboschi, S.; Pelosi, Gerardo; Samarati, P.
Low Voltage Fault Attacks on the RSA Cryptosystem
2009-01-01 Barenghi, Alessandro; G., Bertoni; E., Parrinello; Pelosi, Gerardo
Design of a Parallel AES for Graphics Hardware using the CUDA framework
2009-01-01 A., Di Biagio; Barenghi, Alessandro; Pelosi, Gerardo; Agosta, Giovanni
Method for Establishing an Encrypted Communication by Means of Keys
2009-01-01 G. M., Bertoni; P., Fragneto; Pelosi, Gerardo; R. V., Sannino; F., Sozzani
A Transform-Parametric Approach to Boolean Matching
2009-01-01 Agosta, Giovanni; Bruschi, Francesco; Pelosi, Gerardo; Sciuto, Donatella
Fast Disk Encryption Through GPGPU Acceleration
2009-01-01 Agosta, Giovanni; Barenghi, Alessandro; A., Di Biagio; F., De Santis; Pelosi, Gerardo
Record Setting Software Implementation of DES Using CUDA
2010-01-01 Agosta, Giovanni; Barenghi, Alessandro; F., De Santis; Pelosi, Gerardo
SMaC: Spatial Map Caching Technique for Mobile Devices
2010-01-01 Pelosi, Gerardo; G., Psaila
Encryption-based Policy Enforcement for Cloud Storage
2010-01-01 S., De Capitani di Vimercati; S., Foresti; S., Jajodia; S., Paraboschi; Pelosi, Gerardo; P., Samarati
Countermeasures against fault attacks on software implemented AES: effectiveness and cost
2010-01-01 Barenghi, Alessandro; Breveglieri, LUCA ODDONE; I., Koren; Pelosi, Gerardo; F., Regazzoni
Low voltage fault attacks to AES
2010-01-01 Barenghi, Alessandro; G., Bertoni; Breveglieri, LUCA ODDONE; M., Pellicioli; Pelosi, Gerardo
Method for Establishing a Communication between Two Devices
2010-01-01 G. M., Bertoni; P., Fragneto; Pelosi, Gerardo; R. V., Sannino; F., Sozzani
Fault attack on AES with single-bit induced faults
2010-01-01 Barenghi, Alessandro; G., Bertoni; Breveglieri, LUCA ODDONE; M., Pellicioli; Pelosi, Gerardo
Improving first order differential power attacks through Digital Signal Processing
2010-01-01 Barenghi, Alessandro; Pelosi, Gerardo; Y., Teglia
Use of Bilinear Mappings in Cryptographic Applications
2011-01-01 G. M., Bertoni; L., Chen; P., Fragneto; K. A., Harrison; Pelosi, Gerardo
Secure Audit Logs
2011-01-01 Pelosi, Gerardo
Fault attack to the elliptic curve digital signature algorithm with multiple bit faults
2011-01-01 Barenghi, Alessandro; G., Bertoni; Breveglieri, LUCA ODDONE; A., Palomba; Pelosi, Gerardo
Smart metering in power grids: Application scenarios and security
2011-01-01 Barenghi, Alessandro; Breveglieri, LUCA ODDONE; Fugini, Mariagrazia; Pelosi, Gerardo
Secure Index
2011-01-01 Pelosi, Gerardo
Efficient and Private Access to Outsourced Data
2011-01-01 S., De Capitani di Vimercati; S., Foresti; S., Paraboschi; Pelosi, Gerardo; P., Samarati
Security and Privacy in Smart Grid Infrastructures
2011-01-01 Barenghi, Alessandro; Pelosi, Gerardo
Information Leakage Discovery Techniques to Enhance Secure Chip Design
2011-01-01 Barenghi, Alessandro; Pelosi, Gerardo; Y., Teglia
Selective Exchange of Confidential Data in the Outsourcing Scenario
2011-01-01 S., De Capitani di Vimercati; S., Foresti; S., Paraboschi; Pelosi, Gerardo; P., Samarati
Computation of a Modular Multiplication with an Electronic Circuit
2011-01-01 G. M., Bertoni; P., Fragneto; Pelosi, Gerardo; A., Marsh; M., Ravasio
Supporting Concurrency in Private Data Outsourcing
2011-01-01 S., De Capitani di Vimercati; S., Foresti; S., Paraboschi; Pelosi, Gerardo; P., Samarati
Automated Security Analysis of Dynamic Web Applications through Symbolic Code Execution
2012-01-01 Agosta, Giovanni; Barenghi, Alessandro; A., Parata; Pelosi, Gerardo
Simulation-Time Security Margin Assessment against Power-Based Side Channel Attacks
2012-01-01 Barenghi, Alessandro; Pelosi, Gerardo; F., Regazzoni
Message Deciphering Method, System and Article
2012-01-01 G. M., Bertoni; P., Fragneto; Pelosi, Gerardo; R. V., Sannino; F., Sozzani
Smart Meters and Home Gateway Scenarios
2012-01-01 Barenghi, Alessandro; Breveglieri, LUCA ODDONE; Fugini, Mariagrazia; Pelosi, Gerardo
Exploiting Bit-level Parallelism in GPGPUs: a Case Study on KEELOQ Exhaustive Key Search Attack
2012-01-01 Agosta, Giovanni; Barenghi, Alessandro; Pelosi, Gerardo
A Code Morphing Methodology to Automate Power Analysis Countermeasures
2012-01-01 Agosta, Giovanni; Barenghi, Alessandro; Pelosi, Gerardo
Injection Technologies for Fault Attacks on Microprocessors
2012-01-01 Barenghi, Alessandro; G. M., Bertoni; Breveglieri, LUCA ODDONE; M., Pellicioli; Pelosi, Gerardo
Computation of a Multiplication Operation with an Electronic Circuit and Method
2012-01-01 G. M., Bertoni; P., Fragneto; A., Marsh; Pelosi, Gerardo; M., Ravasio
Distributed Shuffling for Preserving Access Confidentiality
2013-01-01 S., De Capitani Di Vimercati; S., Foresti; S., Paraboschi; Pelosi, Gerardo; P., Samarati
Compiler-based Side Channel Vulnerability Analysis and Optimized Countermeasures Application
2013-01-01 Agosta, Giovanni; Barenghi, Alessandro; M., Maggi; Pelosi, Gerardo
Method of Processing Information to be Confidentially Transmitted
2013-01-01 G. M., Bertoni; L., Chen; P., Fragneto; K. A., Harrison; Pelosi, Gerardo
A Fault Induction Technique Based on Voltage Underfeeding with Application to Attacks against AES and RSA
2013-01-01 Barenghi, Alessandro; G., Bertoni; Breveglieri, LUCA ODDONE; Pelosi, Gerardo
Enhancing Passive Side-Channel Attack Resilience through Schedulability Analysis of Data-Dependency Graphs
2013-01-01 Agosta, Giovanni; Barenghi, Alessandro; Pelosi, Gerardo; Scandale, Michele
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile