Sfoglia per Autore  

Opzioni
Mostrati risultati da 1 a 50 di 131
Titolo Data di pubblicazione Autori File
Optimizing Quantum Circuit Synthesis with Dominator Analysis 1-gen-2025 Giacomo LancellottiGiovanni AgostaAlessandro BarenghiGerardo Pelosi
A Quantum Method to Match Vector Boolean Functions Using Simon's Solver 1-gen-2025 Marco VenereAlessandro BarenghiGerardo Pelosi
Post Quantum Cryptography Research Lines in the Italian Center for Security and Rights in Cyberspace 1-gen-2025 A. BarenghiG. Pelosi
Private Boolean Queries on Encrypted Data 1-gen-2025 Barenghi, AlessandroPelosi, Gerardo
Oblivious RAM (ORAM) 1-gen-2025 Barenghi, AlessandroPelosi, Gerardo
A comparison of deep learning approaches for power-based side-channel attacks 1-gen-2025 R. CapoferriA. BarenghiL. BreveglieriN. IzzoG. Pelosi
A Quantum Circuit to Execute a Key-Recovery Attack Against the DES and 3DES Block Ciphers 1-gen-2024 Simone PerrielloAlessandro BarenghiGerardo Pelosi
Quantum Circuit Design for the Lee-Brickell Based Information Set Decoding 1-gen-2024 Perriello, SimoneBarenghi, AlessandroPelosi, Gerardo
Bit-flipping Decoder Failure Rate Estimation for (v,w)-regular Codes 1-gen-2024 Alessandro AnnechiniAlessandro BarenghiGerardo Pelosi
A Versatile and Unified HQC Hardware Accelerator 1-gen-2024 Antognazza, FrancescoBarenghi, AlessandroPelosi, Gerardo +
Investigating The Health State Of X.509 Digital Certificate 1-gen-2024 S. OrlandoA. BarenghiG. Pelosi
A High Efficiency Hardware Design for the Post-Quantum KEM HQC 1-gen-2024 Antognazza, FrancescoBarenghi, AlessandroPelosi, Gerardo +
Design of a Quantum Walk Circuit to Solve the Subset-Sum Problem 1-gen-2024 G. LancellottiS. PerrielloA. BarenghiG. Pelosi
Performance and Efficiency Exploration of Hardware Polynomial Multipliers for Post-Quantum Lattice-Based Cryptosystems 1-gen-2024 Antognazza, FrancescoBarenghi, AlessandroPelosi, Gerardo +
Quantum Computing Research Lines in the Italian Center for Supercomputing 1-gen-2023 A. BarenghiP. CremonesiG. Pelosi
Improving the Efficiency of Quantum Circuits for Information Set Decoding 1-gen-2023 S. PerrielloA. BarenghiG. Pelosi
ON THE COMPUTATIONAL HARDNESS OF THE CODE EQUIVALENCE PROBLEM IN CRYPTOGRAPHY 1-gen-2023 Barenghi A. +
A Flexible ASIC-Oriented Design for a Full NTRU Accelerator 1-gen-2023 Antognazza F.Barenghi A.Pelosi G. +
A Non Profiled and Profiled Side Channel Attack Countermeasure through Computation Interleaving 1-gen-2023 Isabella PiacentiniAlessandro BarenghiGerardo Pelosi
An Efficient Unified Architecture for Polynomial Multiplications in Lattice-Based Cryptoschemes 1-gen-2023 Antognazza, FrancescoBarenghi, AlessandroPelosi, Gerardo +
Fault Attacks Friendliness of Post-quantum Cryptosystems 1-gen-2023 A. BarenghiG. Pelosi
Privacy-aware character pattern matching over outsourced encrypted data 1-gen-2022 N. MainardiA. BarenghiG. Pelosi
Locating Side Channel Leakage in Time through Matched Filters 1-gen-2022 Barenghi, AlessandroPelosi, Gerardo +
Profiled side channel attacks against the RSA cryptosystem using neural networks 1-gen-2022 Barenghi A.Pelosi G. +
Performance bounds for QC-MDPC codes decoders 1-gen-2022 A. BarenghiG. Pelosi +
Advanced signature functionalities from the code equivalence problem 1-gen-2022 Barenghi A. +
Metis: An Integrated Morphing Engine CPU to Protect Against Side Channel Attacks 1-gen-2021 Antognazza, FrancescoBarenghi, AlessandroPelosi, Gerardo
Improving work life conditions via portable knowledge-driven recommender system 1-gen-2021 A. BarenghiS. ComaiM. FuginiG. PelosiV. Scotti +
LESS-FM: Fine-Tuning Signatures from the Code Equivalence Problem 1-gen-2021 Barenghi A. +
Profiled Attacks Against the Elliptic Curve Scalar Point Multiplication Using Neural Networks 1-gen-2021 Barenghi A.Pelosi G. +
Integrating Side Channel Security in the FPGA Hardware Design Flow 1-gen-2021 A. BarenghiW. FornaciariG. PelosiD. Zoni +
Analysis of In-Place Randomized Bit-Flipping Decoders for the Design of LDPC and MDPC Code-Based Cryptosystems 1-gen-2021 Barenghi A.Pelosi G. +
Exploring Cortex-M Microarchitectural Side Channel Information Leakage 1-gen-2021 Barenghi A.Breveglieri L.Izzo N.Pelosi G.
A Complete Quantum Circuit to Solve the Information Set Decoding Problem 1-gen-2021 Perriello S.Barenghi A.Pelosi G.
A Quantum Circuit to Speed-up the Cryptanalysis of Code-based Cryptosystem 1-gen-2021 S. PerrielloA. BarenghiG. Pelosi
Decision Support Systems to Promote Health and Well-being of People during their Working Age: the Case of the WorkingAge EU Project 1-gen-2020 A. BarenghiS. ComaiM. FuginiG. PelosiL. SbattellaR. Tedesco +
WorkingAge: Providing Occupational Safety through Pervasive Sensing and Data Driven Behavior Modeling 1-gen-2020 M. FuginiA. BarenghiS. ComaiG. PelosiR. Tedesco +
Constant weight strings in constant time: a building block for code-based post-quantum cryptosystems 1-gen-2020 Barenghi, AlessandroPelosi, Gerardo
A Failure Rate Model of Bit-flipping Decoders for QC-LDPC and QC-MDPC Code-based Cryptosystems 1-gen-2020 A. BarenghiG. Pelosi +
Scramble Suit: A Profile Differentiation Countermeasure to Prevent Template Attacks 1-gen-2020 A. BarenghiW. FornaciariG. PelosiD. Zoni
Efficient Oblivious Substring Search via Architectural Support 1-gen-2020 N. MainardiA. BarenghiG. Pelosi +
A comprehensive analysis of constant-time polynomial inversion for post-quantum cryptosystems 1-gen-2020 Barenghi, AlessandroPelosi, Gerardo
Compiler-based Techniques to Secure Cryptographic Embedded Software against Side Channel Attacks 1-gen-2020 G. AgostaA. BarenghiG. Pelosi
The M2DC Approach towards Resource-efficient Computing 1-gen-2019 Giovanni AgostaAlessandro BarenghiWilliam FornaciariNicholas MainardiGerardo PelosiMichele Zanella +
Plaintext recovery attacks against linearly decryptable fully homomorphic encryption schemes 1-gen-2019 N. MainardiA. BarenghiG. Pelosi
Foreword -Proceedings of the Sixth Workshop on Cryptography and Security in Computing Systems - ISBN:978-1-4503-6182-8. In ACM INTERNATIONAL CONFERENCE PROCEEDINGS SERIES 1-gen-2019 G. AgostaA. BarenghiG. Pelosi +
Evaluating the Trade-offs in the Hardware Design of the LEDAcrypt Encryption Functions 1-gen-2019 A. BarenghiW. FornaciariA. GalimbertiG. PelosiD. Zoni
A secure and authenticated host-to-memory communication interface 1-gen-2019 Izzo, NiccolòBarenghi, AlessandroBreveglieri, LucaPelosi, GerardoAMATO, PAOLO
Privacy Preserving Substring Search Protocol with Polylogarithmic Communication Cost 1-gen-2019 N. MainardiA. BarenghiG. Pelosi
A Finite Regime Analysis of Information Set Decoding Algorithms 1-gen-2019 A. BarenghiG. Pelosi +
Mostrati risultati da 1 a 50 di 131
Legenda icone

  •  file ad accesso aperto
  •  file disponibili sulla rete interna
  •  file disponibili agli utenti autorizzati
  •  file disponibili solo agli amministratori
  •  file sotto embargo
  •  nessun file disponibile