Sfoglia per Autore  

Opzioni
Mostrati risultati da 101 a 120 di 148
Titolo Data di pubblicazione Autori File
Enforcing authorizations while protecting access confidentiality 1-gen-2018 Pelosi, Gerardo +
A Novel Regular Format for X.509 Digital Certificates 1-gen-2018 BARENGHI, ALESSANDROMAINARDI, NICHOLASPELOSI, GERARDO
OpenCL HLS Based Design of FPGA Accelerators for Cryptographic Primitives 1-gen-2018 A. BarenghiN. MainardiG. Pelosi +
Software-only reverse engineering of physical dram mappings for rowhammer attacks 1-gen-2018 A. BarenghiL. BreveglieriIZZO, NICCOLO'G. Pelosi
Side-channel security of superscalar CPUs: Evaluating the Impact of Micro-architectural Features 1-gen-2018 A. BarenghiG. Pelosi
Systematic Parsing of X.509: Eradicating Security Issues with a Parse Tree 1-gen-2018 A. BarenghiN. MainardiG. Pelosi
Foreword -Proceedings of the Fifth Workshop on Cryptography and Security in Computing Systems 1-gen-2018 G. AgostaA. BarenghiG. Pelosi +
Reactive Side-channel Countermeasures: Applicability and Quantitative Security Evaluation 1-gen-2018 G. AgostaA. BarenghiG. PelosiM. Scandale
LEDAkem: a post-quantum key encapsulation mechanism based on QC-LDPC codes 1-gen-2018 A. BarenghiG. Pelosi +
Comparison-based Attacks against Noise-free Fully Homomorphic Encryption Schemes 1-gen-2018 A. BarenghiN. MainardiG. Pelosi
A Comprehensive Side-Channel Information Leakage Analysis of an In-Order RISC CPU Microarchitecture 1-gen-2018 D. ZoniA. BarenghiG. PelosiW. Fornaciari
Three-server swapping for access confidentiality 1-gen-2018 PELOSI, GERARDO +
The M2DC Approach towards Resource-efficient Computing 1-gen-2019 Giovanni AgostaAlessandro BarenghiWilliam FornaciariNicholas MainardiGerardo PelosiMichele Zanella +
Foreword -Proceedings of the Sixth Workshop on Cryptography and Security in Computing Systems - ISBN:978-1-4503-6182-8. In ACM INTERNATIONAL CONFERENCE PROCEEDINGS SERIES 1-gen-2019 G. AgostaA. BarenghiG. Pelosi +
A Finite Regime Analysis of Information Set Decoding Algorithms 1-gen-2019 A. BarenghiG. Pelosi +
Evaluating the Trade-offs in the Hardware Design of the LEDAcrypt Encryption Functions 1-gen-2019 A. BarenghiW. FornaciariA. GalimbertiG. PelosiD. Zoni
A secure and authenticated host-to-memory communication interface 1-gen-2019 Izzo, NiccolòBarenghi, AlessandroBreveglieri, LucaPelosi, GerardoAMATO, PAOLO
Privacy Preserving Substring Search Protocol with Polylogarithmic Communication Cost 1-gen-2019 N. MainardiA. BarenghiG. Pelosi
LEDAcrypt: QC-LDPC Code-Based Cryptosystems with Bounded Decryption Failure Rate 1-gen-2019 A. BarenghiG. Pelosi +
Accelerating Automotive Analytics: The M2DC Appliance Approach 1-gen-2019 Giovanni AgostaCarlo BrandoleseWilliam FornaciariNicholas MainardiGerardo PelosiFederico ReghenzaniMichele Zanella +
Mostrati risultati da 101 a 120 di 148
Legenda icone

  •  file ad accesso aperto
  •  file disponibili sulla rete interna
  •  file disponibili agli utenti autorizzati
  •  file disponibili solo agli amministratori
  •  file sotto embargo
  •  nessun file disponibile