Sfoglia per Autore
Challenging the Trustworthiness of PGP: Is the Web-of-Trust Tear-Proof?
2015-01-01 Barenghi, Alessandro; DI FEDERICO, Alessandro; Pelosi, Gerardo; Sanfilippo, Stefano
OpenCL performance portability for general-purpose computation on graphics processor units: an exploration on cryptographic primitives
2015-01-01 Agosta, Giovanni; Barenghi, Alessandro; DI FEDERICO, Alessandro; Pelosi, Gerardo
Parallel parsing made practical
2015-01-01 Barenghi, Alessandro; CRESPI REGHIZZI, Stefano; Mandrioli, Dino; Panella, Federica; Pradella, Matteo
The MEET Approach: Securing Cryptographic Embedded Software Against Side Channel Attacks
2015-01-01 Agosta, Giovanni; Barenghi, Alessandro; Pelosi, Gerardo; Scandale, Michele
Cyber-Security Analysis and Evaluation for Smart Home Management Solutions
2015-01-01 Agosta, Giovanni; Antonini, Alessio; Barenghi, Alessandro; Galeri, Dario; Pelosi, Gerardo
A privacy-preserving encrypted OSN with stateless server interaction: the Snake design
2016-01-01 Barenghi, Alessandro; Beretta, Michele; DI FEDERICO, Alessandro; Pelosi, Gerardo
A fault-based secret key retrieval method for ECDSA: analysis and countermeasure
2016-01-01 Barenghi, Alessandro; G., Bertoni; Breveglieri, LUCA ODDONE; Pelosi, Gerardo; S., Sanfilippo; R., Susella
Encasing Block Ciphers to Foil Key Recovery Attempts via Side Channel
2016-01-01 Agosta, Giovanni; Barenghi, Alessandro; Pelosi, Gerardo; Scandale, Michele
V2I Cooperation for Traffic Management with SafeCOP
2016-01-01 Agosta, Giovanni; Barenghi, Alessandro; Brandolese, Carlo; Fornaciari, William; Pelosi, Gerardo; Delucchi, Stefano; Massa, Massimo; Mongelli, Maurizio; Ferrari, Enrico; Napoletani, Leonardo; Bozzi, Luciano; Tieri, Carlo; Cassioli, Dajana; Pomante, Luigi
Protection system and method for protecting a computer system against ransomware attack
2016-01-01 Barenghi, A.; Zanero, S.; Maggi, F.; Continella, A.; De Pasquale, G.; Guagnelli, A.; Zingaro, G.
Automated instantiation of side-channel attacks countermeasures for software cipher implementations
2016-01-01 Agosta, Giovanni; Barenghi, Alessandro; Pelosi, Gerardo
Foreword - Proceedings of the Third Workshop on Cryptography and Security in Computing Systems
2016-01-01 Agosta, Giovanni; Barenghi, Alessandro; Koren, Israel; Pelosi, Gerardo
A note on fault attacks against deterministic signature schemes
2016-01-01 Barenghi, Alessandro; Pelosi, Gerardo
ShieldFS: a self-healing, ransomware-aware filesystem
2016-01-01 Continella, Andrea; Guagnelli, Alessandro; Zingaro, Giovanni; De Pasquale, Giulio; Barenghi, Alessandro; Zanero, Stefano; Maggi, Federico
An Enhanced Dataflow Analysis to Automatically Tailor Side Channel Attack Countermeasures to Software Block Ciphers
2017-01-01 Barenghi, Alessandro; Pelosi, Gerardo
Foreword - Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems
2017-01-01 Agosta, Giovanni; Barenghi, Alessandro; Pelosi, Gerardo
Safe Cooperative CPS: A V2I Traffic Management scenario in the SafeCOP project
2017-01-01 Agneessens, Alessio; Buemi, Francesco; Delucchi, Stefano; Massa, Massimo; Agosta, Giovanni; Barenghi, Alessandro; Brandolese, Carlo; Fornaciari, William; Pelosi, Gerardo; Ferrari, Enrico; Cassioli, Dajana; Pomante, Luigi; Napoletani, Leonardo; Bozzi, Luciano; Tieri, Carlo; Mongelli, Maurizio
A Security Audit of the OpenPGP Format
2017-01-01 Barenghi, A.; Mainardi, N.; Pelosi, G.
M2DC – Modular Microserver DataCentre with Heterogeneous Hardware
2017-01-01 Oleksiak, Ariel; Kierzynka, Michal; Piatek, Wojciech; Agosta, Giovanni; Barenghi, Alessandro; Brandolese, Carlo; Fornaciari, William; Pelosi, Gerardo; Cecowski, Mariano; Plestenjak, Robert; Činkelj, Justin; Porrmann, Mario; Hagemeyer, Jens; Griessl, René; Lachmair, Jan; Peykanu, Meysam; Tigges, Lennart; Berge, Micha vor dem; Christmann, Wolfgang; Krupop, Stefan; Carbon, Alexandre; Cudennec, Loïc; Goubier, Thierry; Philippe, Jean Marc; Rosinger, Sven; Schlitt, Daniel; Pieper, Christian; Adeniyi Jones, Chris; Setoain, Javier; Ceva, Luca; Janssen, Udo
OpenCL HLS Based Design of FPGA Accelerators for Cryptographic Primitives
2018-01-01 Barenghi, A.; Madaschi, M.; Mainardi, N.; Pelosi, G.
A Comprehensive Side-Channel Information Leakage Analysis of an In-Order RISC CPU Microarchitecture
2018-01-01 Zoni, D.; Barenghi, A.; Pelosi, G.; Fornaciari, W.
Software-only reverse engineering of physical dram mappings for rowhammer attacks
2018-01-01 Barenghi, A.; Breveglieri, L.; Izzo, Niccolo'; Pelosi, G.
Reactive Side-channel Countermeasures: Applicability and Quantitative Security Evaluation
2018-01-01 Agosta, G.; Barenghi, A.; Pelosi, G.; Scandale, M.
M2DC-A novel heterogeneous hyperscale microserver platform
2018-01-01 Oleksiak, A.; Kierzynka, M.; Piatek, W.; vor dem Berge, M.; Christmann, W.; Krupop, S.; Porrmann, M.; Hagemeyer, J.; Griessl, R.; Peykanu, M.; Tigges, L.; Rosinger, S.; Schlitt, D.; Pieper, C.; Janssen, U.; Rauchfuss, H.; Agosta, G.; Barenghi, A.; Brandolese, C.; Fornaciari, W.; Pelosi, G.; Pita Costa, J.; Cecowski, M.; Plestenjak, R.; Cinkelj, J.; Cudennec, L.; Goubier, T.; Philippe, J.; Adeniyi-Jones, C.; Setoain, J.; Ceva, L.
Comparison-based Attacks against Noise-free Fully Homomorphic Encryption Schemes
2018-01-01 Barenghi, A.; Mainardi, N.; Pelosi, G.
Systematic Parsing of X.509: Eradicating Security Issues with a Parse Tree
2018-01-01 Barenghi, A.; Mainardi, N.; Pelosi, G.
LEDAkem: a post-quantum key encapsulation mechanism based on QC-LDPC codes
2018-01-01 Baldi, M.; Barenghi, A.; Chiaraluce, F.; Pelosi, G.; Santini, P.
Side-channel security of superscalar CPUs: Evaluating the Impact of Micro-architectural Features
2018-01-01 Barenghi, A.; Pelosi, G.
A Novel Regular Format for X.509 Digital Certificates
2018-01-01 Barenghi, Alessandro; Mainardi, Nicholas; Pelosi, Gerardo
Foreword -Proceedings of the Fifth Workshop on Cryptography and Security in Computing Systems
2018-01-01 Agosta, G.; Barenghi, A.; Koren, I.; Pelosi, G.
A secure and authenticated host-to-memory communication interface
2019-01-01 Izzo, Niccolò; Barenghi, Alessandro; Breveglieri, Luca; Pelosi, Gerardo; Amato, Paolo
LEDAcrypt: QC-LDPC Code-Based Cryptosystems with Bounded Decryption Failure Rate
2019-01-01 Baldi, M.; Barenghi, A.; Chiaraluce, F.; Pelosi, G.; Santini, P.
Evaluating the Trade-offs in the Hardware Design of the LEDAcrypt Encryption Functions
2019-01-01 Barenghi, A.; Fornaciari, W.; Galimberti, A.; Pelosi, G.; Zoni, D.
Plaintext recovery attacks against linearly decryptable fully homomorphic encryption schemes
2019-01-01 Mainardi, N.; Barenghi, A.; Pelosi, G.
Privacy Preserving Substring Search Protocol with Polylogarithmic Communication Cost
2019-01-01 Mainardi, N.; Barenghi, A.; Pelosi, G.
The M2DC Approach towards Resource-efficient Computing
2019-01-01 Agosta, Giovanni; Barenghi, Alessandro; Ciesielczyk, Tomasz; Dutta, Rahul; Fornaciari, William; Goubier, Thierry; Hagemeyer, Jens; Kosmann, Lars; Mainardi, Nicholas; Oleksiak, Ariel; Pelosi, Gerardo; Piatek, Wojciech; Pieper, Christian; Porrmann, Mario; Schlitt, Daniel; Zanella, Michele
A Finite Regime Analysis of Information Set Decoding Algorithms
2019-01-01 Baldi, M.; Barenghi, A.; Chiaraluce, F.; Pelosi, G.; Santini, P.
Foreword -Proceedings of the Sixth Workshop on Cryptography and Security in Computing Systems - ISBN:978-1-4503-6182-8. In ACM INTERNATIONAL CONFERENCE PROCEEDINGS SERIES
2019-01-01 Agosta, G.; Barenghi, A.; Heydemann, K.; Pelosi, G.
Efficient Oblivious Substring Search via Architectural Support
2020-01-01 Mainardi, N.; Sampietro, D.; Barenghi, A.; Pelosi, G.
WorkingAge: Providing Occupational Safety through Pervasive Sensing and Data Driven Behavior Modeling
2020-01-01 Fugini, M.; Barenghi, A.; Comai, S.; Pelosi, G.; Tedesco, R.; van Gasteren, M.; Catalina, C. A.; Arribas Leal, E.; Losada Durán, R.; Martins de Almeida, R. M.; Mertens, A.; Rick, V.; Gunes, H.; Xu, T.; Borghini, G.; Ronca, V.; Sagha, H.
Decision Support Systems to Promote Health and Well-being of People during their Working Age: the Case of the WorkingAge EU Project
2020-01-01 Resende de Almeida, R. M.; Grau Aberturas, A.; Bueno Aguado, Y.; Atzori, M.; Barenghi, A.; Borghini, G.; Catalina Ortega, C. A.; Comai, S.; Losada Durán, R.; Fugini, M.; Gunes, H.; Musleh Lancis, B.; Pelosi, G.; Ronca, V.; Sbattella, L.; Tedesco, R.; Xu, T.
Compiler-based Techniques to Secure Cryptographic Embedded Software against Side Channel Attacks
2020-01-01 Agosta, G.; Barenghi, A.; Pelosi, G.
A Failure Rate Model of Bit-flipping Decoders for QC-LDPC and QC-MDPC Code-based Cryptosystems
2020-01-01 Baldi, M.; Barenghi, A.; Chiaraluce, F.; Pelosi, G.; Santini, P.
Scramble Suit: A Profile Differentiation Countermeasure to Prevent Template Attacks
2020-01-01 Barenghi, A.; Fornaciari, W.; Pelosi, G.; Zoni, D.
Constant weight strings in constant time: a building block for code-based post-quantum cryptosystems
2020-01-01 Barenghi, Alessandro; Pelosi, Gerardo
A comprehensive analysis of constant-time polynomial inversion for post-quantum cryptosystems
2020-01-01 Barenghi, Alessandro; Pelosi, Gerardo
Exploring Cortex-M Microarchitectural Side Channel Information Leakage
2021-01-01 Barenghi, A.; Breveglieri, L.; Izzo, N.; Pelosi, G.
Profiled Attacks Against the Elliptic Curve Scalar Point Multiplication Using Neural Networks
2021-01-01 Barenghi, A.; Carrera, D.; Mella, S.; Pace, A.; Pelosi, G.; Susella, R.
Analysis of In-Place Randomized Bit-Flipping Decoders for the Design of LDPC and MDPC Code-Based Cryptosystems
2021-01-01 Baldi, M.; Barenghi, A.; Chiaraluce, F.; Pelosi, G.; Santini, P.
A Complete Quantum Circuit to Solve the Information Set Decoding Problem
2021-01-01 Perriello, S.; Barenghi, A.; Pelosi, G.
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile