BARENGHI, ALESSANDRO
 Distribuzione geografica
Continente #
NA - Nord America 8.381
EU - Europa 5.559
AS - Asia 3.332
SA - Sud America 725
AF - Africa 151
OC - Oceania 27
Continente sconosciuto - Info sul continente non disponibili 4
Totale 18.179
Nazione #
US - Stati Uniti d'America 8.150
RU - Federazione Russa 1.931
IT - Italia 1.589
SG - Singapore 1.302
CN - Cina 955
BR - Brasile 644
DE - Germania 383
GB - Regno Unito 290
VN - Vietnam 290
SE - Svezia 200
CA - Canada 181
FI - Finlandia 178
ES - Italia 158
NL - Olanda 143
FR - Francia 139
KR - Corea 113
AT - Austria 109
HK - Hong Kong 107
UA - Ucraina 102
IN - India 101
IE - Irlanda 98
ID - Indonesia 61
JP - Giappone 55
MA - Marocco 47
TR - Turchia 42
TW - Taiwan 40
JO - Giordania 39
PK - Pakistan 38
BD - Bangladesh 37
AR - Argentina 35
PL - Polonia 34
CH - Svizzera 33
BE - Belgio 28
IQ - Iraq 26
MX - Messico 25
ZA - Sudafrica 24
AU - Australia 20
DK - Danimarca 20
CI - Costa d'Avorio 19
GR - Grecia 19
IR - Iran 16
PT - Portogallo 16
SA - Arabia Saudita 16
CZ - Repubblica Ceca 14
MY - Malesia 14
EC - Ecuador 13
IL - Israele 13
TN - Tunisia 13
EE - Estonia 12
SK - Slovacchia (Repubblica Slovacca) 12
UZ - Uzbekistan 11
PH - Filippine 10
EG - Egitto 9
RO - Romania 9
BJ - Benin 8
JM - Giamaica 7
LT - Lituania 7
NG - Nigeria 7
NZ - Nuova Zelanda 7
AE - Emirati Arabi Uniti 6
CO - Colombia 6
HU - Ungheria 6
SI - Slovenia 6
AL - Albania 5
KE - Kenya 5
KZ - Kazakistan 5
PE - Perù 5
PY - Paraguay 5
TH - Thailandia 5
UY - Uruguay 5
VE - Venezuela 5
AZ - Azerbaigian 4
BG - Bulgaria 4
CL - Cile 4
CY - Cipro 4
EU - Europa 4
NP - Nepal 4
RS - Serbia 4
BB - Barbados 3
BO - Bolivia 3
DO - Repubblica Dominicana 3
DZ - Algeria 3
KH - Cambogia 3
LB - Libano 3
SY - Repubblica araba siriana 3
TT - Trinidad e Tobago 3
CG - Congo 2
CR - Costa Rica 2
ET - Etiopia 2
HR - Croazia 2
LU - Lussemburgo 2
ML - Mali 2
MU - Mauritius 2
PS - Palestinian Territory 2
AO - Angola 1
BH - Bahrain 1
BM - Bermuda 1
BW - Botswana 1
BY - Bielorussia 1
CM - Camerun 1
Totale 18.157
Città #
Ashburn 1.076
Fairfield 920
Singapore 705
Woodbridge 638
Chandler 558
Milan 545
Houston 485
Wilmington 448
Ann Arbor 441
Seattle 409
Cambridge 342
Moscow 278
Beijing 246
Santa Clara 231
Hefei 193
Boardman 153
Council Bluffs 148
Los Angeles 143
Dearborn 136
Ottawa 120
Medford 105
Lawrence 103
Vienna 97
Dublin 96
Dong Ket 91
Seoul 86
Hong Kong 83
Helsinki 71
New York 70
Dallas 69
London 69
Jacksonville 61
Málaga 56
San Diego 56
Des Moines 55
Rome 55
Buffalo 53
Amsterdam 49
Jakarta 48
Frankfurt am Main 44
São Paulo 44
Redwood City 42
Amman 39
Casablanca 37
Hanoi 35
The Dalles 35
Ho Chi Minh City 34
Munich 33
Livorno 32
Norwalk 30
Shanghai 28
Columbus 27
Taipei 27
Kent 26
Chicago 25
Tokyo 25
Redmond 24
Nuremberg 23
Turin 22
Berlin 20
Lappeenranta 20
Rio de Janeiro 20
Abidjan 19
Turku 19
Boston 18
Brussels 18
Montreal 18
Paris 18
Redondo Beach 18
Madrid 17
Monza 17
Warsaw 17
Zurich 17
Ancona 16
Leawood 16
Phoenix 16
Washington 16
Düsseldorf 15
Toronto 15
Aarhus 14
Brescia 14
Bresso 14
Brooklyn 14
Chennai 14
Falls Church 14
Johannesburg 14
Modena 14
Naples 14
Verona 14
Baghdad 13
Denver 13
Guangzhou 13
Nürnberg 13
Vedano al Lambro 13
Zhengzhou 13
Belo Horizonte 12
Centro 12
Fremont 12
Islamabad 12
Orem 12
Totale 10.848
Nome #
WorkingAge: Providing Occupational Safety through Pervasive Sensing and Data Driven Behavior Modeling 393
A fault-based secret key retrieval method for ECDSA: analysis and countermeasure 265
A Comprehensive Side-Channel Information Leakage Analysis of an In-Order RISC CPU Microarchitecture 247
A Failure Rate Model of Bit-flipping Decoders for QC-LDPC and QC-MDPC Code-based Cryptosystems 247
The M2DC Approach towards Resource-efficient Computing 241
Parallel parsing made practical 226
Fault Sensitivity Analysis at Design Time 225
Computer Security Anchors in Smart Grids: The Smart Metering Scenario and Challenges 220
A comparison of deep learning approaches for power-based side-channel attacks 206
V2I Cooperation for Traffic Management with SafeCOP 205
A privacy-preserving encrypted OSN with stateless server interaction: the Snake design 204
A novel fault attack against ECDSA 201
A Complete Quantum Circuit to Solve the Information Set Decoding Problem 198
Design of a Quantum Walk Circuit to Solve the Subset-Sum Problem 195
A Novel Regular Format for X.509 Digital Certificates 193
A combined design-time/test-time study of the vulnerability of sub-threshold devices to low voltage fault attacks 192
Plaintext recovery attacks against linearly decryptable fully homomorphic encryption schemes 192
Reactive Side-channel Countermeasures: Applicability and Quantitative Security Evaluation 191
A Non Profiled and Profiled Side Channel Attack Countermeasure through Computation Interleaving 189
A Fault Induction Technique Based on Voltage Underfeeding with Application to Attacks against AES and RSA 189
Scramble Suit: A Profile Differentiation Countermeasure to Prevent Template Attacks 188
Decision Support Systems to Promote Health and Well-being of People during their Working Age: the Case of the WorkingAge EU Project 186
A Multiple Equivalent Execution Trace Approach to Secure Cryptographic Embedded Software 181
ShieldFS: a self-healing, ransomware-aware filesystem 181
Privacy Preserving Substring Search Protocol with Polylogarithmic Communication Cost 181
Protection system and method for protecting a computer system against ransomware attack 180
A Quantum Circuit to Execute a Key-Recovery Attack Against the DES and 3DES Block Ciphers 178
Software-only reverse engineering of physical dram mappings for rowhammer attacks 177
A Code Morphing Methodology to Automate Power Analysis Countermeasures 167
Security Challenges in Building Automation and SCADA 167
Challenging the Trustworthiness of PGP: Is the Web-of-Trust Tear-Proof? 166
A secure and authenticated host-to-memory communication interface 165
Comparison-based Attacks against Noise-free Fully Homomorphic Encryption Schemes 162
Design Space Extension for Secure Implementation of Block Ciphers 160
Trace-based Schedulability Analysis to Enhance Passive Side-Channel Attack Resilience of Embedded Software 160
A FPGA coprocessor for the cryptographic Tate pairing over Fp 160
The MEET Approach: Securing Cryptographic Embedded Software Against Side Channel Attacks 159
A note on fault attacks against deterministic signature schemes 158
Evaluating the Trade-offs in the Hardware Design of the LEDAcrypt Encryption Functions 157
M2DC – Modular Microserver DataCentre with Heterogeneous Hardware 155
Safe Cooperative CPS: A V2I Traffic Management scenario in the SafeCOP project 155
Post Quantum Cryptography Research Lines in the Italian Center for Security and Rights in Cyberspace 153
Encasing Block Ciphers to Foil Key Recovery Attempts via Side Channel 152
Automated instantiation of side-channel attacks countermeasures for software cipher implementations 151
Improving work life conditions via portable knowledge-driven recommender system 149
A Quantum Circuit to Speed-up the Cryptanalysis of Code-based Cryptosystem 149
M2DC-A novel heterogeneous hyperscale microserver platform 146
Cyber-Security Analysis and Evaluation for Smart Home Management Solutions 145
Review of Policy-as-code Approaches to Manage Security and Privacy Conditions in Edge and Cloud Computing Ecosystems 144
OpenCL performance portability for general-purpose computation on graphics processor units: an exploration on cryptographic primitives 144
A comprehensive analysis of constant-time polynomial inversion for post-quantum cryptosystems 142
OpenCL HLS Based Design of FPGA Accelerators for Cryptographic Primitives 142
Towards transparently tackling functionality and performance issues across different OpenCL platforms 141
Systematic Parsing of X.509: Eradicating Security Issues with a Parse Tree 139
A Finite Regime Analysis of Information Set Decoding Algorithms 139
Design Time Engineering of Side Channel Resistant Cipher Implementations 138
Compiler-based Techniques to Secure Cryptographic Embedded Software against Side Channel Attacks 138
LEDAcrypt: QC-LDPC Code-Based Cryptosystems with Bounded Decryption Failure Rate 137
Snake: an End-to-End Encrypted Online Social Network 135
LEDAkem: a post-quantum key encapsulation mechanism based on QC-LDPC codes 134
Efficient Oblivious Substring Search via Architectural Support 134
Enhancing Passive Side-Channel Attack Resilience through Schedulability Analysis of Data-Dependency Graphs 130
Securing Software Cryptographic Primitives for Embedded Systems against Side Channel Attacks 129
Smart metering in power grids: Application scenarios and security 129
Foreword - Proceedings of the Second Workshop on Cryptography and Security in Computing Systems 128
Security and Privacy in Smart Grid Infrastructures 128
A Security Audit of the OpenPGP Format 127
A Flexible ASIC-Oriented Design for a Full NTRU Accelerator 126
An Enhanced Dataflow Analysis to Automatically Tailor Side Channel Attack Countermeasures to Software Block Ciphers 126
Compiler-based Side Channel Vulnerability Analysis and Optimized Countermeasures Application 125
An Efficient Unified Architecture for Polynomial Multiplications in Lattice-Based Cryptoschemes 124
Security Analysis of Building Automation Networks: Threat Model and Viable Mitigation Techniques 122
Fault injection attacks on cryptographic devices: theory, practice, and countermeasures 122
Privacy-aware character pattern matching over outsourced encrypted data 121
Differential Fault Analysis for Block Ciphers: an Automated Conservative Analysis 120
On the efficiency of design time evaluation of the resistance to power attacks 118
Record Setting Software Implementation of DES Using CUDA 117
Injection Technologies for Fault Attacks on Microprocessors 117
Low Voltage Fault Attacks on the RSA Cryptosystem 117
Parallel parsing of operator precedence grammars 117
Bit-flipping Decoder Failure Rate Estimation for (v,w)-regular Codes 116
Side-channel security of superscalar CPUs: Evaluating the Impact of Micro-architectural Features 116
PAPAGENO: A Parallel Parser Generator for Operator Precedence Grammars 115
Exploring Cortex-M Microarchitectural Side Channel Information Leakage 115
Optimizing Quantum Circuit Synthesis with Dominator Analysis 114
Quantum Circuit Design for the Lee-Brickell Based Information Set Decoding 113
Fault attack on AES with single-bit induced faults 113
Symmetric key encryption acceleration on heterogeneous many-core architectures 113
Low voltage fault attacks to AES 112
Performance and Efficiency Exploration of Hardware Polynomial Multipliers for Post-Quantum Lattice-Based Cryptosystems 111
Oblivious RAM (ORAM) 110
Integrating Side Channel Security in the FPGA Hardware Design Flow 110
Scrambling Compiler: Automated and Unified Countermeasure for Profiled and Non-Profiled Side Channel Attacks 109
Private Boolean Queries on Encrypted Data 108
A Quantum Method to Match Vector Boolean Functions Using Simon's Solver 107
A High Efficiency Hardware Design for the Post-Quantum KEM HQC 107
Threshold Selection for Iterative Decoding of (v,w)-regular Binary Codes 107
Design of a Parallel AES for Graphics Hardware using the CUDA framework 107
Metis: An Integrated Morphing Engine CPU to Protect Against Side Channel Attacks 107
On the Security of Partially Masked Software Implementations 106
Totale 15.373
Categoria #
all - tutte 56.367
article - articoli 13.836
book - libri 0
conference - conferenze 33.802
curatela - curatele 1.659
other - altro 0
patent - brevetti 400
selected - selezionate 0
volume - volumi 6.670
Totale 112.734


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021975 0 0 0 0 0 102 68 114 128 182 123 258
2021/20221.216 73 120 102 99 117 51 75 105 85 79 121 189
2022/20231.521 178 103 45 141 184 186 24 151 220 88 168 33
2023/2024826 56 137 62 54 71 84 62 56 39 52 40 113
2024/20253.353 33 80 115 150 477 282 227 352 483 177 437 540
2025/20265.540 1.562 1.741 480 764 636 357 0 0 0 0 0 0
Totale 18.500