Sfoglia per Autore  

Opzioni
Mostrati risultati da 51 a 100 di 123
Titolo Data di pubblicazione Autori File
Challenging the Trustworthiness of PGP: Is the Web-of-Trust Tear-Proof? 1-gen-2015 BARENGHI, ALESSANDRODI FEDERICO, ALESSANDROPELOSI, GERARDO +
OpenCL performance portability for general-purpose computation on graphics processor units: an exploration on cryptographic primitives 1-gen-2015 AGOSTA, GIOVANNIBARENGHI, ALESSANDRODI FEDERICO, ALESSANDROPELOSI, GERARDO
Parallel parsing made practical 1-gen-2015 BARENGHI, ALESSANDROCRESPI REGHIZZI, STEFANOMANDRIOLI, DINOPANELLA, FEDERICAPRADELLA, MATTEO
The MEET Approach: Securing Cryptographic Embedded Software Against Side Channel Attacks 1-gen-2015 AGOSTA, GIOVANNIBARENGHI, ALESSANDROPELOSI, GERARDOSCANDALE, MICHELE
Cyber-Security Analysis and Evaluation for Smart Home Management Solutions 1-gen-2015 AGOSTA, GIOVANNIANTONINI, ALESSIOBARENGHI, ALESSANDROPELOSI, GERARDO +
A privacy-preserving encrypted OSN with stateless server interaction: the Snake design 1-gen-2016 BARENGHI, ALESSANDRODI FEDERICO, ALESSANDROPELOSI, GERARDO +
A fault-based secret key retrieval method for ECDSA: analysis and countermeasure 1-gen-2016 BARENGHI, ALESSANDROBREVEGLIERI, LUCA ODDONEPELOSI, GERARDO +
Encasing Block Ciphers to Foil Key Recovery Attempts via Side Channel 1-gen-2016 AGOSTA, GIOVANNIBARENGHI, ALESSANDROPELOSI, GERARDO +
V2I Cooperation for Traffic Management with SafeCOP 1-gen-2016 AGOSTA, GIOVANNIBARENGHI, ALESSANDROBRANDOLESE, CARLOFORNACIARI, WILLIAMPELOSI, GERARDO +
Protection system and method for protecting a computer system against ransomware attack 1-gen-2016 A. BarenghiS. ZaneroF. MaggiA. ContinellaG. De PasqualeA. Guagnelli +
Automated instantiation of side-channel attacks countermeasures for software cipher implementations 1-gen-2016 AGOSTA, GIOVANNIBARENGHI, ALESSANDROPELOSI, GERARDO
Foreword - Proceedings of the Third Workshop on Cryptography and Security in Computing Systems 1-gen-2016 AGOSTA, GIOVANNIBARENGHI, ALESSANDROPELOSI, GERARDO +
A note on fault attacks against deterministic signature schemes 1-gen-2016 BARENGHI, ALESSANDROPELOSI, GERARDO
ShieldFS: a self-healing, ransomware-aware filesystem 1-gen-2016 CONTINELLA, ANDREABARENGHI, ALESSANDROZANERO, STEFANOMAGGI, FEDERICO +
An Enhanced Dataflow Analysis to Automatically Tailor Side Channel Attack Countermeasures to Software Block Ciphers 1-gen-2017 BARENGHI, ALESSANDROPELOSI, GERARDO
Foreword - Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems 1-gen-2017 AGOSTA, GIOVANNIBARENGHI, ALESSANDROPELOSI, GERARDO
Safe Cooperative CPS: A V2I Traffic Management scenario in the SafeCOP project 1-gen-2017 AGOSTA, GIOVANNIBARENGHI, ALESSANDROBRANDOLESE, CARLOFORNACIARI, WILLIAMPELOSI, GERARDO +
A Security Audit of the OpenPGP Format 1-gen-2017 A. BarenghiN. MainardiG. Pelosi
M2DC – Modular Microserver DataCentre with Heterogeneous Hardware 1-gen-2017 AGOSTA, GIOVANNIBARENGHI, ALESSANDROBRANDOLESE, CARLOFORNACIARI, WILLIAMPELOSI, GERARDO +
OpenCL HLS Based Design of FPGA Accelerators for Cryptographic Primitives 1-gen-2018 A. BarenghiN. MainardiG. Pelosi +
A Comprehensive Side-Channel Information Leakage Analysis of an In-Order RISC CPU Microarchitecture 1-gen-2018 D. ZoniA. BarenghiG. PelosiW. Fornaciari
Software-only reverse engineering of physical dram mappings for rowhammer attacks 1-gen-2018 A. BarenghiL. BreveglieriIZZO, NICCOLO'G. Pelosi
Reactive Side-channel Countermeasures: Applicability and Quantitative Security Evaluation 1-gen-2018 G. AgostaA. BarenghiG. PelosiM. Scandale
M2DC-A novel heterogeneous hyperscale microserver platform 1-gen-2018 G. AgostaA. BarenghiC. BrandoleseW. FornaciariG. Pelosi +
Comparison-based Attacks against Noise-free Fully Homomorphic Encryption Schemes 1-gen-2018 A. BarenghiN. MainardiG. Pelosi
Systematic Parsing of X.509: Eradicating Security Issues with a Parse Tree 1-gen-2018 A. BarenghiN. MainardiG. Pelosi
LEDAkem: a post-quantum key encapsulation mechanism based on QC-LDPC codes 1-gen-2018 A. BarenghiG. Pelosi +
Side-channel security of superscalar CPUs: Evaluating the Impact of Micro-architectural Features 1-gen-2018 A. BarenghiG. Pelosi
A Novel Regular Format for X.509 Digital Certificates 1-gen-2018 BARENGHI, ALESSANDROMAINARDI, NICHOLASPELOSI, GERARDO
Foreword -Proceedings of the Fifth Workshop on Cryptography and Security in Computing Systems 1-gen-2018 G. AgostaA. BarenghiG. Pelosi +
A secure and authenticated host-to-memory communication interface 1-gen-2019 Izzo, NiccolòBarenghi, AlessandroBreveglieri, LucaPelosi, GerardoAMATO, PAOLO
LEDAcrypt: QC-LDPC Code-Based Cryptosystems with Bounded Decryption Failure Rate 1-gen-2019 A. BarenghiG. Pelosi +
Evaluating the Trade-offs in the Hardware Design of the LEDAcrypt Encryption Functions 1-gen-2019 A. BarenghiW. FornaciariA. GalimbertiG. PelosiD. Zoni
Plaintext recovery attacks against linearly decryptable fully homomorphic encryption schemes 1-gen-2019 N. MainardiA. BarenghiG. Pelosi
Privacy Preserving Substring Search Protocol with Polylogarithmic Communication Cost 1-gen-2019 N. MainardiA. BarenghiG. Pelosi
The M2DC Approach towards Resource-efficient Computing 1-gen-2019 Giovanni AgostaAlessandro BarenghiWilliam FornaciariNicholas MainardiGerardo PelosiMichele Zanella +
A Finite Regime Analysis of Information Set Decoding Algorithms 1-gen-2019 A. BarenghiG. Pelosi +
Foreword -Proceedings of the Sixth Workshop on Cryptography and Security in Computing Systems - ISBN:978-1-4503-6182-8. In ACM INTERNATIONAL CONFERENCE PROCEEDINGS SERIES 1-gen-2019 G. AgostaA. BarenghiG. Pelosi +
Efficient Oblivious Substring Search via Architectural Support 1-gen-2020 N. MainardiA. BarenghiG. Pelosi +
WorkingAge: Providing Occupational Safety through Pervasive Sensing and Data Driven Behavior Modeling 1-gen-2020 M. FuginiA. BarenghiS. ComaiG. PelosiR. Tedesco +
Decision Support Systems to Promote Health and Well-being of People during their Working Age: the Case of the WorkingAge EU Project 1-gen-2020 A. BarenghiS. ComaiM. FuginiG. PelosiL. SbattellaR. Tedesco +
Compiler-based Techniques to Secure Cryptographic Embedded Software against Side Channel Attacks 1-gen-2020 G. AgostaA. BarenghiG. Pelosi
A Failure Rate Model of Bit-flipping Decoders for QC-LDPC and QC-MDPC Code-based Cryptosystems 1-gen-2020 A. BarenghiG. Pelosi +
Scramble Suit: A Profile Differentiation Countermeasure to Prevent Template Attacks 1-gen-2020 A. BarenghiW. FornaciariG. PelosiD. Zoni
Constant weight strings in constant time: a building block for code-based post-quantum cryptosystems 1-gen-2020 Barenghi, AlessandroPelosi, Gerardo
A comprehensive analysis of constant-time polynomial inversion for post-quantum cryptosystems 1-gen-2020 Barenghi, AlessandroPelosi, Gerardo
Exploring Cortex-M Microarchitectural Side Channel Information Leakage 1-gen-2021 Barenghi A.Breveglieri L.Izzo N.Pelosi G.
Profiled Attacks Against the Elliptic Curve Scalar Point Multiplication Using Neural Networks 1-gen-2021 Barenghi A.Pelosi G. +
Analysis of In-Place Randomized Bit-Flipping Decoders for the Design of LDPC and MDPC Code-Based Cryptosystems 1-gen-2021 Barenghi A.Pelosi G. +
A Complete Quantum Circuit to Solve the Information Set Decoding Problem 1-gen-2021 Perriello S.Barenghi A.Pelosi G.
Mostrati risultati da 51 a 100 di 123
Legenda icone

  •  file ad accesso aperto
  •  file disponibili sulla rete interna
  •  file disponibili agli utenti autorizzati
  •  file disponibili solo agli amministratori
  •  file sotto embargo
  •  nessun file disponibile