Sfoglia per Autore
Enforcing authorizations while protecting access confidentiality
2018-01-01 De Capitani Di Vimercati, Sabrina; Foresti, Sara; Paraboschi, Stefano; Pelosi, Gerardo; Samarati, Pierangela
A Novel Regular Format for X.509 Digital Certificates
2018-01-01 Barenghi, Alessandro; Mainardi, Nicholas; Pelosi, Gerardo
OpenCL HLS Based Design of FPGA Accelerators for Cryptographic Primitives
2018-01-01 Barenghi, A.; Madaschi, M.; Mainardi, N.; Pelosi, G.
Software-only reverse engineering of physical dram mappings for rowhammer attacks
2018-01-01 Barenghi, A.; Breveglieri, L.; Izzo, Niccolo'; Pelosi, G.
Side-channel security of superscalar CPUs: Evaluating the Impact of Micro-architectural Features
2018-01-01 Barenghi, A.; Pelosi, G.
Systematic Parsing of X.509: Eradicating Security Issues with a Parse Tree
2018-01-01 Barenghi, A.; Mainardi, N.; Pelosi, G.
Foreword -Proceedings of the Fifth Workshop on Cryptography and Security in Computing Systems
2018-01-01 Agosta, G.; Barenghi, A.; Koren, I.; Pelosi, G.
Reactive Side-channel Countermeasures: Applicability and Quantitative Security Evaluation
2018-01-01 Agosta, G.; Barenghi, A.; Pelosi, G.; Scandale, M.
LEDAkem: a post-quantum key encapsulation mechanism based on QC-LDPC codes
2018-01-01 Baldi, M.; Barenghi, A.; Chiaraluce, F.; Pelosi, G.; Santini, P.
Comparison-based Attacks against Noise-free Fully Homomorphic Encryption Schemes
2018-01-01 Barenghi, A.; Mainardi, N.; Pelosi, G.
A Comprehensive Side-Channel Information Leakage Analysis of an In-Order RISC CPU Microarchitecture
2018-01-01 Zoni, D.; Barenghi, A.; Pelosi, G.; Fornaciari, W.
Three-server swapping for access confidentiality
2018-01-01 De Capitani di Vimercati, Sabrina; Foresti, Sara; Paraboschi, Stefano; Pelosi, Gerardo; Samarati, Pierangela
The M2DC Approach towards Resource-efficient Computing
2019-01-01 Agosta, Giovanni; Barenghi, Alessandro; Ciesielczyk, Tomasz; Dutta, Rahul; Fornaciari, William; Goubier, Thierry; Hagemeyer, Jens; Kosmann, Lars; Mainardi, Nicholas; Oleksiak, Ariel; Pelosi, Gerardo; Piatek, Wojciech; Pieper, Christian; Porrmann, Mario; Schlitt, Daniel; Zanella, Michele
Foreword -Proceedings of the Sixth Workshop on Cryptography and Security in Computing Systems - ISBN:978-1-4503-6182-8. In ACM INTERNATIONAL CONFERENCE PROCEEDINGS SERIES
2019-01-01 Agosta, G.; Barenghi, A.; Heydemann, K.; Pelosi, G.
A Finite Regime Analysis of Information Set Decoding Algorithms
2019-01-01 Baldi, M.; Barenghi, A.; Chiaraluce, F.; Pelosi, G.; Santini, P.
Evaluating the Trade-offs in the Hardware Design of the LEDAcrypt Encryption Functions
2019-01-01 Barenghi, A.; Fornaciari, W.; Galimberti, A.; Pelosi, G.; Zoni, D.
A secure and authenticated host-to-memory communication interface
2019-01-01 Izzo, Niccolò; Barenghi, Alessandro; Breveglieri, Luca; Pelosi, Gerardo; Amato, Paolo
Privacy Preserving Substring Search Protocol with Polylogarithmic Communication Cost
2019-01-01 Mainardi, N.; Barenghi, A.; Pelosi, G.
LEDAcrypt: QC-LDPC Code-Based Cryptosystems with Bounded Decryption Failure Rate
2019-01-01 Baldi, M.; Barenghi, A.; Chiaraluce, F.; Pelosi, G.; Santini, P.
Accelerating Automotive Analytics: The M2DC Appliance Approach
2019-01-01 Agosta, Giovanni; Brandolese, Carlo; Fornaciari, William; Mainardi, Nicholas; Pelosi, Gerardo; Reghenzani, Federico; Zanella, Michele; Des Courchamps, Gaetan; Ducrot, Vincent; Juilly, Kevin; Monot, Sebastien; Ceva, Luca
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile