PELOSI, GERARDO

PELOSI, GERARDO  

DIPARTIMENTO DI ELETTRONICA, INFORMAZIONE E BIOINGEGNERIA  

Mostra records
Risultati 1 - 20 di 141 (tempo di esecuzione: 0.025 secondi).
Titolo Data di pubblicazione Autori File
A Code Morphing Methodology to Automate Power Analysis Countermeasures 1-gen-2012 AGOSTA, GIOVANNIBARENGHI, ALESSANDROPELOSI, GERARDO
A Message deciphering method 1-gen-2007 PELOSI, GERARDO +
A Multiple Equivalent Execution Trace Approach to Secure Cryptographic Embedded Software 1-gen-2014 AGOSTA, GIOVANNIBARENGHI, ALESSANDROPELOSI, GERARDOSCANDALE, MICHELE
A pairing SW implementation for smart-cards 1-gen-2008 BREVEGLIERI, LUCA ODDONEPELOSI, GERARDO +
A Transform-Parametric Approach to Boolean Matching 1-gen-2009 AGOSTA, GIOVANNIBRUSCHI, FRANCESCOPELOSI, GERARDOSCIUTO, DONATELLA
A Unified Approach to Canonical Form-based Boolean Matching 1-gen-2007 AGOSTA, GIOVANNIBRUSCHI, FRANCESCOPELOSI, GERARDOSCIUTO, DONATELLA
Accelerating Automotive Analytics: The M2DC Appliance Approach 1-gen-2019 Giovanni AgostaCarlo BrandoleseWilliam FornaciariNicholas MainardiGerardo PelosiFederico ReghenzaniMichele Zanella +
Access control for the shuffle index 1-gen-2016 PELOSI, GERARDO +
Access Privacy in the Cloud 1-gen-2018 G. Pelosi +
Analysis of In-Place Randomized Bit-Flipping Decoders for the Design of LDPC and MDPC Code-Based Cryptosystems 1-gen-2021 Barenghi A.Pelosi G. +
Authentication Method 1-gen-2014 PELOSI, GERARDO +
Automated instantiation of side-channel attacks countermeasures for software cipher implementations 1-gen-2016 AGOSTA, GIOVANNIBARENGHI, ALESSANDROPELOSI, GERARDO
Automated Methodology Integrating Security and Privacy in the Design Process of Medical Devices 1-gen-2014 PELOSI, GERARDOAGOSTA, GIOVANNI +
Automated Security Analysis of Dynamic Web Applications through Symbolic Code Execution 1-gen-2012 AGOSTA, GIOVANNIBARENGHI, ALESSANDROPELOSI, GERARDO +
Challenging the Trustworthiness of PGP: Is the Web-of-Trust Tear-Proof? 1-gen-2015 BARENGHI, ALESSANDRODI FEDERICO, ALESSANDROPELOSI, GERARDO +
Comparison-based Attacks against Noise-free Fully Homomorphic Encryption Schemes 1-gen-2018 A. BarenghiN. MainardiG. Pelosi
Compiler-based Side Channel Vulnerability Analysis and Optimized Countermeasures Application 1-gen-2013 AGOSTA, GIOVANNIBARENGHI, ALESSANDROPELOSI, GERARDO +
Compiler-based Techniques to Secure Cryptographic Embedded Software against Side Channel Attacks 1-gen-2020 G. AgostaA. BarenghiG. Pelosi
A Complete Quantum Circuit to Solve the Information Set Decoding Problem 1-gen-2021 Perriello S.Barenghi A.Pelosi G.
A comprehensive analysis of constant-time polynomial inversion for post-quantum cryptosystems 1-gen-2020 Barenghi, AlessandroPelosi, Gerardo