Sfoglia per Autore  

Opzioni
Mostrati risultati da 1 a 50 di 179
Titolo Data di pubblicazione Autori File
Parallel hardware architectures for the cryptographic Tate pairing 1-gen-2006 BREVEGLIERI, LUCA ODDONEPELOSI, GERARDO +
Software implementation of Tate pairing over GF(2m) 1-gen-2006 BREVEGLIERI, LUCA ODDONEPELOSI, GERARDO +
Computational intelligence techniques to detect toxic gas presence 1-gen-2006 ALIPPI, CESAREPELOSI, GERARDOROVERI, MANUEL
A Message deciphering method 1-gen-2007 PELOSI, GERARDO +
Countermeasures against branch target buffer attacks 1-gen-2007 AGOSTA, GIOVANNIBREVEGLIERI, LUCA ODDONEPELOSI, GERARDO +
A Domain Specific Language for Cryptography 1-gen-2007 AGOSTA, GIOVANNIPELOSI, GERARDO
Programming highly parallel reconfigurable architectures for symmetric and asymmetric cryptographic applications 1-gen-2007 AGOSTA, GIOVANNIBREVEGLIERI, LUCA ODDONEPELOSI, GERARDOSYKORA, MARTINO
A Unified Approach to Canonical Form-based Boolean Matching 1-gen-2007 AGOSTA, GIOVANNIBRUSCHI, FRANCESCOPELOSI, GERARDOSCIUTO, DONATELLA
A pairing SW implementation for smart-cards 1-gen-2008 BREVEGLIERI, LUCA ODDONEPELOSI, GERARDO +
Improvements in the Use of Bilinear Mappings in Cryptographic Applications 1-gen-2008 PELOSI, GERARDO +
A FPGA coprocessor for the cryptographic Tate pairing over Fp 1-gen-2008 BARENGHI, ALESSANDROBREVEGLIERI, LUCA ODDONEPELOSI, GERARDO +
Parallel hardware architectures for the cryptographic Tate pairing 1-gen-2008 BREVEGLIERI, LUCA ODDONEPELOSI, GERARDO +
Preserving confidentiality of security policies in data outsourcing scenarios 1-gen-2008 PELOSI, GERARDO +
Low Voltage Fault Attacks on the RSA Cryptosystem 1-gen-2009 BARENGHI, ALESSANDROPELOSI, GERARDO +
Design of a Parallel AES for Graphics Hardware using the CUDA framework 1-gen-2009 BARENGHI, ALESSANDROPELOSI, GERARDOAGOSTA, GIOVANNI +
Method for Establishing an Encrypted Communication by Means of Keys 1-gen-2009 PELOSI, GERARDO +
A Transform-Parametric Approach to Boolean Matching 1-gen-2009 AGOSTA, GIOVANNIBRUSCHI, FRANCESCOPELOSI, GERARDOSCIUTO, DONATELLA
Fast Disk Encryption Through GPGPU Acceleration 1-gen-2009 AGOSTA, GIOVANNIBARENGHI, ALESSANDROPELOSI, GERARDO +
Record Setting Software Implementation of DES Using CUDA 1-gen-2010 AGOSTA, GIOVANNIBARENGHI, ALESSANDROPELOSI, GERARDO +
SMaC: Spatial Map Caching Technique for Mobile Devices 1-gen-2010 PELOSI, GERARDO +
Encryption-based Policy Enforcement for Cloud Storage 1-gen-2010 PELOSI, GERARDO +
Countermeasures against fault attacks on software implemented AES: effectiveness and cost 1-gen-2010 BARENGHI, ALESSANDROBREVEGLIERI, LUCA ODDONEPELOSI, GERARDO +
Low voltage fault attacks to AES 1-gen-2010 BARENGHI, ALESSANDROBREVEGLIERI, LUCA ODDONEPELOSI, GERARDO +
Method for Establishing a Communication between Two Devices 1-gen-2010 PELOSI, GERARDO +
Fault attack on AES with single-bit induced faults 1-gen-2010 BARENGHI, ALESSANDROBREVEGLIERI, LUCA ODDONEPELOSI, GERARDO +
Improving first order differential power attacks through Digital Signal Processing 1-gen-2010 BARENGHI, ALESSANDROPELOSI, GERARDO +
Use of Bilinear Mappings in Cryptographic Applications 1-gen-2011 PELOSI, GERARDO +
Secure Audit Logs 1-gen-2011 PELOSI, GERARDO
Fault attack to the elliptic curve digital signature algorithm with multiple bit faults 1-gen-2011 BARENGHI, ALESSANDROBREVEGLIERI, LUCA ODDONEPELOSI, GERARDO +
Smart metering in power grids: Application scenarios and security 1-gen-2011 BARENGHI, ALESSANDROBREVEGLIERI, LUCA ODDONEFUGINI, MARIAGRAZIAPELOSI, GERARDO
Secure Index 1-gen-2011 PELOSI, GERARDO
Efficient and Private Access to Outsourced Data 1-gen-2011 PELOSI, GERARDO +
Security and Privacy in Smart Grid Infrastructures 1-gen-2011 BARENGHI, ALESSANDROPELOSI, GERARDO
Information Leakage Discovery Techniques to Enhance Secure Chip Design 1-gen-2011 BARENGHI, ALESSANDROPELOSI, GERARDO +
Selective Exchange of Confidential Data in the Outsourcing Scenario 1-gen-2011 PELOSI, GERARDO +
Computation of a Modular Multiplication with an Electronic Circuit 1-gen-2011 PELOSI, GERARDO +
Supporting Concurrency in Private Data Outsourcing 1-gen-2011 PELOSI, GERARDO +
Automated Security Analysis of Dynamic Web Applications through Symbolic Code Execution 1-gen-2012 AGOSTA, GIOVANNIBARENGHI, ALESSANDROPELOSI, GERARDO +
Simulation-Time Security Margin Assessment against Power-Based Side Channel Attacks 1-gen-2012 BARENGHI, ALESSANDROPELOSI, GERARDO +
Message Deciphering Method, System and Article 1-gen-2012 PELOSI, GERARDO +
Smart Meters and Home Gateway Scenarios 1-gen-2012 BARENGHI, ALESSANDROBREVEGLIERI, LUCA ODDONEFUGINI, MARIAGRAZIAPELOSI, GERARDO
Exploiting Bit-level Parallelism in GPGPUs: a Case Study on KEELOQ Exhaustive Key Search Attack 1-gen-2012 AGOSTA, GIOVANNIBARENGHI, ALESSANDROPELOSI, GERARDO
A Code Morphing Methodology to Automate Power Analysis Countermeasures 1-gen-2012 AGOSTA, GIOVANNIBARENGHI, ALESSANDROPELOSI, GERARDO
Injection Technologies for Fault Attacks on Microprocessors 1-gen-2012 BARENGHI, ALESSANDROBREVEGLIERI, LUCA ODDONEPELOSI, GERARDO +
Computation of a Multiplication Operation with an Electronic Circuit and Method 1-gen-2012 PELOSI, GERARDO +
Distributed Shuffling for Preserving Access Confidentiality 1-gen-2013 PELOSI, GERARDO +
Compiler-based Side Channel Vulnerability Analysis and Optimized Countermeasures Application 1-gen-2013 AGOSTA, GIOVANNIBARENGHI, ALESSANDROPELOSI, GERARDO +
Method of Processing Information to be Confidentially Transmitted 1-gen-2013 PELOSI, GERARDO +
A Fault Induction Technique Based on Voltage Underfeeding with Application to Attacks against AES and RSA 1-gen-2013 BARENGHI, ALESSANDROBREVEGLIERI, LUCA ODDONEPELOSI, GERARDO +
Enhancing Passive Side-Channel Attack Resilience through Schedulability Analysis of Data-Dependency Graphs 1-gen-2013 AGOSTA, GIOVANNIBARENGHI, ALESSANDROPELOSI, GERARDOSCANDALE, MICHELE
Mostrati risultati da 1 a 50 di 179
Legenda icone

  •  file ad accesso aperto
  •  file disponibili sulla rete interna
  •  file disponibili agli utenti autorizzati
  •  file disponibili solo agli amministratori
  •  file sotto embargo
  •  nessun file disponibile