Sfoglia per Autore
Performance and Efficiency Exploration of Hardware Polynomial Multipliers for Post-Quantum Lattice-Based Cryptosystems
2024-01-01 Antognazza, Francesco; Barenghi, Alessandro; Pelosi, Gerardo; Susella, Ruggero
Fault Attacks Friendliness of Post-quantum Cryptosystems
2023-01-01 Barenghi, A.; Pelosi, G.
A Non Profiled and Profiled Side Channel Attack Countermeasure through Computation Interleaving
2023-01-01 Piacentini, Isabella; Barenghi, Alessandro; Pelosi, Gerardo
Quantum Computing Research Lines in the Italian Center for Supercomputing
2023-01-01 Barenghi, A.; Cremonesi, P.; Pelosi, G.
An Efficient Unified Architecture for Polynomial Multiplications in Lattice-Based Cryptoschemes
2023-01-01 Antognazza, Francesco; Barenghi, Alessandro; Pelosi, Gerardo; Susella, Ruggero
Improving the Efficiency of Quantum Circuits for Information Set Decoding
2023-01-01 Perriello, S.; Barenghi, A.; Pelosi, G.
A Flexible ASIC-Oriented Design for a Full NTRU Accelerator
2023-01-01 Antognazza, F.; Barenghi, A.; Pelosi, G.; Susella, R.
Locating Side Channel Leakage in Time through Matched Filters
2022-01-01 Barenghi, Alessandro; Falcetti, Gioele; Pelosi, Gerardo
Privacy-aware character pattern matching over outsourced encrypted data
2022-01-01 Mainardi, N.; Barenghi, A.; Pelosi, G.
Performance bounds for QC-MDPC codes decoders
2022-01-01 Baldi, M.; Barenghi, A.; Chiaraluce, F.; Pelosi, G.; Santini, P.
Profiled side channel attacks against the RSA cryptosystem using neural networks
2022-01-01 Barenghi, A.; Carrera, D.; Mella, S.; Pace, A.; Pelosi, G.; Susella, R.
A Quantum Circuit to Speed-up the Cryptanalysis of Code-based Cryptosystem
2021-01-01 Perriello, S.; Barenghi, A.; Pelosi, G.
Integrating Side Channel Security in the FPGA Hardware Design Flow
2021-01-01 Barenghi, A.; Brevi, M.; Fornaciari, W.; Pelosi, G.; Zoni, D.
Metis: An Integrated Morphing Engine CPU to Protect Against Side Channel Attacks
2021-01-01 Antognazza, Francesco; Barenghi, Alessandro; Pelosi, Gerardo
Improving work life conditions via portable knowledge-driven recommender system
2021-01-01 Atzori, M.; Barenghi, A.; Comai, S.; Fugini, M.; Marcia, D.; Pelosi, G.; Sanguinetti, M.; Scotti, V.
Exploring Cortex-M Microarchitectural Side Channel Information Leakage
2021-01-01 Barenghi, A.; Breveglieri, L.; Izzo, N.; Pelosi, G.
Analysis of In-Place Randomized Bit-Flipping Decoders for the Design of LDPC and MDPC Code-Based Cryptosystems
2021-01-01 Baldi, M.; Barenghi, A.; Chiaraluce, F.; Pelosi, G.; Santini, P.
Profiled Attacks Against the Elliptic Curve Scalar Point Multiplication Using Neural Networks
2021-01-01 Barenghi, A.; Carrera, D.; Mella, S.; Pace, A.; Pelosi, G.; Susella, R.
A Complete Quantum Circuit to Solve the Information Set Decoding Problem
2021-01-01 Perriello, S.; Barenghi, A.; Pelosi, G.
WorkingAge: Providing Occupational Safety through Pervasive Sensing and Data Driven Behavior Modeling
2020-01-01 Fugini, M.; Barenghi, A.; Comai, S.; Pelosi, G.; Tedesco, R.; van Gasteren, M.; Catalina, C. A.; Arribas Leal, E.; Losada Durán, R.; Martins de Almeida, R. M.; Mertens, A.; Rick, V.; Gunes, H.; Xu, T.; Borghini, G.; Ronca, V.; Sagha, H.
Compiler-based Techniques to Secure Cryptographic Embedded Software against Side Channel Attacks
2020-01-01 Agosta, G.; Barenghi, A.; Pelosi, G.
A comprehensive analysis of constant-time polynomial inversion for post-quantum cryptosystems
2020-01-01 Barenghi, Alessandro; Pelosi, Gerardo
A Failure Rate Model of Bit-flipping Decoders for QC-LDPC and QC-MDPC Code-based Cryptosystems
2020-01-01 Baldi, M.; Barenghi, A.; Chiaraluce, F.; Pelosi, G.; Santini, P.
Scramble Suit: A Profile Differentiation Countermeasure to Prevent Template Attacks
2020-01-01 Barenghi, A.; Fornaciari, W.; Pelosi, G.; Zoni, D.
Efficient Oblivious Substring Search via Architectural Support
2020-01-01 Mainardi, N.; Sampietro, D.; Barenghi, A.; Pelosi, G.
Constant weight strings in constant time: a building block for code-based post-quantum cryptosystems
2020-01-01 Barenghi, Alessandro; Pelosi, Gerardo
Decision Support Systems to Promote Health and Well-being of People during their Working Age: the Case of the WorkingAge EU Project
2020-01-01 Resende de Almeida, R. M.; Grau Aberturas, A.; Bueno Aguado, Y.; Atzori, M.; Barenghi, A.; Borghini, G.; Catalina Ortega, C. A.; Comai, S.; Losada Durán, R.; Fugini, M.; Gunes, H.; Musleh Lancis, B.; Pelosi, G.; Ronca, V.; Sbattella, L.; Tedesco, R.; Xu, T.
The M2DC Approach towards Resource-efficient Computing
2019-01-01 Agosta, Giovanni; Barenghi, Alessandro; Ciesielczyk, Tomasz; Dutta, Rahul; Fornaciari, William; Goubier, Thierry; Hagemeyer, Jens; Kosmann, Lars; Mainardi, Nicholas; Oleksiak, Ariel; Pelosi, Gerardo; Piatek, Wojciech; Pieper, Christian; Porrmann, Mario; Schlitt, Daniel; Zanella, Michele
A Finite Regime Analysis of Information Set Decoding Algorithms
2019-01-01 Baldi, M.; Barenghi, A.; Chiaraluce, F.; Pelosi, G.; Santini, P.
Foreword -Proceedings of the Sixth Workshop on Cryptography and Security in Computing Systems - ISBN:978-1-4503-6182-8. In ACM INTERNATIONAL CONFERENCE PROCEEDINGS SERIES
2019-01-01 Agosta, G.; Barenghi, A.; Heydemann, K.; Pelosi, G.
A secure and authenticated host-to-memory communication interface
2019-01-01 Izzo, Niccolò; Barenghi, Alessandro; Breveglieri, Luca; Pelosi, Gerardo; Amato, Paolo
LEDAcrypt: QC-LDPC Code-Based Cryptosystems with Bounded Decryption Failure Rate
2019-01-01 Baldi, M.; Barenghi, A.; Chiaraluce, F.; Pelosi, G.; Santini, P.
Accelerating Automotive Analytics: The M2DC Appliance Approach
2019-01-01 Agosta, Giovanni; Brandolese, Carlo; Fornaciari, William; Mainardi, Nicholas; Pelosi, Gerardo; Reghenzani, Federico; Zanella, Michele; Des Courchamps, Gaetan; Ducrot, Vincent; Juilly, Kevin; Monot, Sebastien; Ceva, Luca
Privacy Preserving Substring Search Protocol with Polylogarithmic Communication Cost
2019-01-01 Mainardi, N.; Barenghi, A.; Pelosi, G.
Evaluating the Trade-offs in the Hardware Design of the LEDAcrypt Encryption Functions
2019-01-01 Barenghi, A.; Fornaciari, W.; Galimberti, A.; Pelosi, G.; Zoni, D.
Plaintext recovery attacks against linearly decryptable fully homomorphic encryption schemes
2019-01-01 Mainardi, N.; Barenghi, A.; Pelosi, G.
M2DC-A novel heterogeneous hyperscale microserver platform
2018-01-01 Oleksiak, A.; Kierzynka, M.; Piatek, W.; vor dem Berge, M.; Christmann, W.; Krupop, S.; Porrmann, M.; Hagemeyer, J.; Griessl, R.; Peykanu, M.; Tigges, L.; Rosinger, S.; Schlitt, D.; Pieper, C.; Janssen, U.; Rauchfuss, H.; Agosta, G.; Barenghi, A.; Brandolese, C.; Fornaciari, W.; Pelosi, G.; Pita Costa, J.; Cecowski, M.; Plestenjak, R.; Cinkelj, J.; Cudennec, L.; Goubier, T.; Philippe, J.; Adeniyi-Jones, C.; Setoain, J.; Ceva, L.
Three-server swapping for access confidentiality
2018-01-01 De Capitani di Vimercati, Sabrina; Foresti, Sara; Paraboschi, Stefano; Pelosi, Gerardo; Samarati, Pierangela
A Novel Regular Format for X.509 Digital Certificates
2018-01-01 Barenghi, Alessandro; Mainardi, Nicholas; Pelosi, Gerardo
Side-channel security of superscalar CPUs: Evaluating the Impact of Micro-architectural Features
2018-01-01 Barenghi, A.; Pelosi, G.
Foreword -Proceedings of the Fifth Workshop on Cryptography and Security in Computing Systems
2018-01-01 Agosta, G.; Barenghi, A.; Koren, I.; Pelosi, G.
Comparison-based Attacks against Noise-free Fully Homomorphic Encryption Schemes
2018-01-01 Barenghi, A.; Mainardi, N.; Pelosi, G.
A Comprehensive Side-Channel Information Leakage Analysis of an In-Order RISC CPU Microarchitecture
2018-01-01 Zoni, D.; Barenghi, A.; Pelosi, G.; Fornaciari, W.
LEDAkem: a post-quantum key encapsulation mechanism based on QC-LDPC codes
2018-01-01 Baldi, M.; Barenghi, A.; Chiaraluce, F.; Pelosi, G.; Santini, P.
Systematic Parsing of X.509: Eradicating Security Issues with a Parse Tree
2018-01-01 Barenghi, A.; Mainardi, N.; Pelosi, G.
Enforcing authorizations while protecting access confidentiality
2018-01-01 De Capitani Di Vimercati, Sabrina; Foresti, Sara; Paraboschi, Stefano; Pelosi, Gerardo; Samarati, Pierangela
OpenCL HLS Based Design of FPGA Accelerators for Cryptographic Primitives
2018-01-01 Barenghi, A.; Madaschi, M.; Mainardi, N.; Pelosi, G.
Software-only reverse engineering of physical dram mappings for rowhammer attacks
2018-01-01 Barenghi, A.; Breveglieri, L.; Izzo, Niccolo'; Pelosi, G.
Reactive Side-channel Countermeasures: Applicability and Quantitative Security Evaluation
2018-01-01 Agosta, G.; Barenghi, A.; Pelosi, G.; Scandale, M.
Access Privacy in the Cloud
2018-01-01 De Capitani di Vimercati, S.; Foresti, S.; Paraboschi, S.; Pelosi, G.; Samarati, P.
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile