BARENGHI, ALESSANDRO
 Distribuzione geografica
Continente #
NA - Nord America 7.042
EU - Europa 3.061
AS - Asia 1.439
SA - Sud America 348
AF - Africa 61
OC - Oceania 18
Continente sconosciuto - Info sul continente non disponibili 4
Totale 11.973
Nazione #
US - Stati Uniti d'America 6.874
IT - Italia 1.354
SG - Singapore 637
DE - Germania 340
BR - Brasile 324
GB - Regno Unito 202
SE - Svezia 193
CN - Cina 181
VN - Vietnam 175
CA - Canada 157
FI - Finlandia 155
ES - Italia 114
AT - Austria 102
FR - Francia 102
UA - Ucraina 101
IE - Irlanda 94
NL - Olanda 71
IN - India 58
HK - Hong Kong 51
ID - Indonesia 49
JO - Giordania 37
RU - Federazione Russa 33
JP - Giappone 32
CH - Svizzera 31
PK - Pakistan 29
KR - Corea 28
TW - Taiwan 26
BE - Belgio 25
TR - Turchia 24
PL - Polonia 22
DK - Danimarca 18
GR - Grecia 18
IR - Iran 16
PT - Portogallo 15
AU - Australia 13
CZ - Repubblica Ceca 13
MY - Malesia 13
EE - Estonia 12
IL - Israele 12
AR - Argentina 11
BD - Bangladesh 11
CI - Costa d'Avorio 11
PH - Filippine 10
TN - Tunisia 10
SK - Slovacchia (Repubblica Slovacca) 9
BJ - Benin 8
RO - Romania 8
EG - Egitto 7
IQ - Iraq 7
MA - Marocco 7
SA - Arabia Saudita 7
HU - Ungheria 6
MX - Messico 6
SI - Slovenia 6
UZ - Uzbekistan 6
ZA - Sudafrica 6
EC - Ecuador 5
NG - Nigeria 5
NZ - Nuova Zelanda 5
TH - Thailandia 5
AE - Emirati Arabi Uniti 4
EU - Europa 4
AL - Albania 3
AZ - Azerbaigian 3
BG - Bulgaria 3
CY - Cipro 3
BO - Bolivia 2
CR - Costa Rica 2
KH - Cambogia 2
LB - Libano 2
LT - Lituania 2
MU - Mauritius 2
NP - Nepal 2
PS - Palestinian Territory 2
RS - Serbia 2
SY - Repubblica araba siriana 2
VE - Venezuela 2
BY - Bielorussia 1
CL - Cile 1
CM - Camerun 1
CO - Colombia 1
DZ - Algeria 1
GA - Gabon 1
HN - Honduras 1
HR - Croazia 1
IS - Islanda 1
KE - Kenya 1
KG - Kirghizistan 1
KZ - Kazakistan 1
LK - Sri Lanka 1
LU - Lussemburgo 1
LV - Lettonia 1
ME - Montenegro 1
ML - Mali 1
MN - Mongolia 1
NI - Nicaragua 1
NO - Norvegia 1
OM - Oman 1
PE - Perù 1
SV - El Salvador 1
Totale 11.972
Città #
Fairfield 920
Woodbridge 637
Chandler 558
Ashburn 480
Houston 478
Wilmington 448
Milan 447
Ann Arbor 441
Seattle 407
Cambridge 337
Singapore 298
Santa Clara 212
Boardman 151
Council Bluffs 144
Dearborn 136
Ottawa 120
Medford 105
Lawrence 103
Dublin 93
Vienna 93
Dong Ket 91
Helsinki 69
Beijing 61
Jacksonville 59
Málaga 56
San Diego 56
Rome 51
Jakarta 46
Los Angeles 46
Des Moines 45
Redwood City 42
Amman 37
Dallas 36
Hong Kong 34
New York 33
Livorno 32
Amsterdam 30
Norwalk 30
Frankfurt am Main 29
The Dalles 28
London 27
Munich 24
Redmond 24
Nuremberg 23
Taipei 20
Brussels 17
Shanghai 17
Berlin 16
Leawood 16
Madrid 16
Paris 16
São Paulo 16
Düsseldorf 15
Washington 15
Zurich 15
Aarhus 14
Bresso 14
Falls Church 14
Modena 14
Naples 13
Nürnberg 13
Turin 13
Vedano al Lambro 13
Ancona 12
Centro 12
Fremont 12
Islamabad 12
Monza 12
Turku 12
Aachen 11
Abidjan 11
Toronto 11
Brescia 10
Messina 10
Vecchiano 10
Verona 10
Bologna 9
Hässelby 9
Lausanne 9
Phoenix 9
Auburn Hills 8
Boston 8
Columbus 8
Cotonou 8
Edinburgh 8
Glasgow 8
Rio de Janeiro 8
Tokyo 8
Athens 7
Chennai 7
Hyderabad 7
Izmir 7
Lappeenranta 7
Manila 7
Rennes 7
Warsaw 7
Atlanta 6
Belo Horizonte 6
Bratislava 6
Budapest 6
Totale 8.229
Nome #
WorkingAge: Providing Occupational Safety through Pervasive Sensing and Data Driven Behavior Modeling 347
The M2DC Approach towards Resource-efficient Computing 195
A Failure Rate Model of Bit-flipping Decoders for QC-LDPC and QC-MDPC Code-based Cryptosystems 195
A fault-based secret key retrieval method for ECDSA: analysis and countermeasure 186
Fault Sensitivity Analysis at Design Time 182
Computer Security Anchors in Smart Grids: The Smart Metering Scenario and Challenges 179
A Comprehensive Side-Channel Information Leakage Analysis of an In-Order RISC CPU Microarchitecture 172
Parallel parsing made practical 165
A privacy-preserving encrypted OSN with stateless server interaction: the Snake design 157
V2I Cooperation for Traffic Management with SafeCOP 156
Scramble Suit: A Profile Differentiation Countermeasure to Prevent Template Attacks 150
A Novel Regular Format for X.509 Digital Certificates 144
Plaintext recovery attacks against linearly decryptable fully homomorphic encryption schemes 144
Protection system and method for protecting a computer system against ransomware attack 141
Design Space Extension for Secure Implementation of Block Ciphers 140
Privacy Preserving Substring Search Protocol with Polylogarithmic Communication Cost 139
A novel fault attack against ECDSA 137
Software-only reverse engineering of physical dram mappings for rowhammer attacks 136
Reactive Side-channel Countermeasures: Applicability and Quantitative Security Evaluation 136
Decision Support Systems to Promote Health and Well-being of People during their Working Age: the Case of the WorkingAge EU Project 136
A combined design-time/test-time study of the vulnerability of sub-threshold devices to low voltage fault attacks 135
A Multiple Equivalent Execution Trace Approach to Secure Cryptographic Embedded Software 132
ShieldFS: a self-healing, ransomware-aware filesystem 130
Safe Cooperative CPS: A V2I Traffic Management scenario in the SafeCOP project 127
Challenging the Trustworthiness of PGP: Is the Web-of-Trust Tear-Proof? 127
Encasing Block Ciphers to Foil Key Recovery Attempts via Side Channel 124
M2DC – Modular Microserver DataCentre with Heterogeneous Hardware 124
Automated instantiation of side-channel attacks countermeasures for software cipher implementations 122
Security Challenges in Building Automation and SCADA 120
The MEET Approach: Securing Cryptographic Embedded Software Against Side Channel Attacks 120
Evaluating the Trade-offs in the Hardware Design of the LEDAcrypt Encryption Functions 119
Trace-based Schedulability Analysis to Enhance Passive Side-Channel Attack Resilience of Embedded Software 118
A Fault Induction Technique Based on Voltage Underfeeding with Application to Attacks against AES and RSA 116
A secure and authenticated host-to-memory communication interface 116
Design of a Quantum Walk Circuit to Solve the Subset-Sum Problem 112
A Code Morphing Methodology to Automate Power Analysis Countermeasures 111
Comparison-based Attacks against Noise-free Fully Homomorphic Encryption Schemes 111
A Complete Quantum Circuit to Solve the Information Set Decoding Problem 111
Design Time Engineering of Side Channel Resistant Cipher Implementations 110
Securing Software Cryptographic Primitives for Embedded Systems against Side Channel Attacks 110
Smart metering in power grids: Application scenarios and security 109
M2DC-A novel heterogeneous hyperscale microserver platform 109
LEDAcrypt: QC-LDPC Code-Based Cryptosystems with Bounded Decryption Failure Rate 107
Compiler-based Techniques to Secure Cryptographic Embedded Software against Side Channel Attacks 105
A comparison of deep learning approaches for power-based side-channel attacks 103
Compiler-based Side Channel Vulnerability Analysis and Optimized Countermeasures Application 103
LEDAkem: a post-quantum key encapsulation mechanism based on QC-LDPC codes 103
Security and Privacy in Smart Grid Infrastructures 102
Snake: an End-to-End Encrypted Online Social Network 102
Cyber-Security Analysis and Evaluation for Smart Home Management Solutions 102
An Enhanced Dataflow Analysis to Automatically Tailor Side Channel Attack Countermeasures to Software Block Ciphers 101
On the efficiency of design time evaluation of the resistance to power attacks 100
OpenCL HLS Based Design of FPGA Accelerators for Cryptographic Primitives 100
OpenCL performance portability for general-purpose computation on graphics processor units: an exploration on cryptographic primitives 99
Record Setting Software Implementation of DES Using CUDA 98
A note on fault attacks against deterministic signature schemes 98
Low Voltage Fault Attacks on the RSA Cryptosystem 97
Improving work life conditions via portable knowledge-driven recommender system 96
Towards transparently tackling functionality and performance issues across different OpenCL platforms 96
Foreword - Proceedings of the Second Workshop on Cryptography and Security in Computing Systems 95
A Security Audit of the OpenPGP Format 94
Systematic Parsing of X.509: Eradicating Security Issues with a Parse Tree 94
A FPGA coprocessor for the cryptographic Tate pairing over Fp 94
A Quantum Circuit to Execute a Key-Recovery Attack Against the DES and 3DES Block Ciphers 94
A comprehensive analysis of constant-time polynomial inversion for post-quantum cryptosystems 93
Side-channel security of superscalar CPUs: Evaluating the Impact of Micro-architectural Features 93
PAPAGENO: A Parallel Parser Generator for Operator Precedence Grammars 92
Parallel parsing of operator precedence grammars 92
Enhancing Passive Side-Channel Attack Resilience through Schedulability Analysis of Data-Dependency Graphs 91
Fault injection attacks on cryptographic devices: theory, practice, and countermeasures 90
On the Security of Partially Masked Software Implementations 89
A Quantum Circuit to Speed-up the Cryptanalysis of Code-based Cryptosystem 87
Efficient Oblivious Substring Search via Architectural Support 86
Post Quantum Cryptography Research Lines in the Italian Center for Security and Rights in Cyberspace 85
Fault attack on AES with single-bit induced faults 85
Exploring the Feasibility of Low Cost Fault Injection Attacks on Sub-Threshold Devices through an example of a 65nm AES implementation 85
Automated Security Analysis of Dynamic Web Applications through Symbolic Code Execution 85
Design of a Parallel AES for Graphics Hardware using the CUDA framework 85
A Finite Regime Analysis of Information Set Decoding Algorithms 85
Improving first order differential power attacks through Digital Signal Processing 84
Injection Technologies for Fault Attacks on Microprocessors 84
Fault attack to the elliptic curve digital signature algorithm with multiple bit faults 84
A Non Profiled and Profiled Side Channel Attack Countermeasure through Computation Interleaving 82
Differential Fault Analysis for Block Ciphers: an Automated Conservative Analysis 82
Low voltage fault attacks to AES 82
Symmetric key encryption acceleration on heterogeneous many-core architectures 81
Security Analysis of Building Automation Networks: Threat Model and Viable Mitigation Techniques 80
The PAPAGENO Parallel-Parser Generator 79
Integrating Side Channel Security in the FPGA Hardware Design Flow 79
Constant weight strings in constant time: a building block for code-based post-quantum cryptosystems 78
Fast Disk Encryption Through GPGPU Acceleration 75
Information Leakage Discovery Techniques to Enhance Secure Chip Design 73
Privacy-aware character pattern matching over outsourced encrypted data 73
Secure and Efficient Design of Block Cipher Implementations on Microcontrollers 71
Drop-In Control Flow Hijacking Prevention through Dynamic Library Interception 71
Metis: An Integrated Morphing Engine CPU to Protect Against Side Channel Attacks 71
An Efficient Unified Architecture for Polynomial Multiplications in Lattice-Based Cryptoschemes 66
Bit-flipping Decoder Failure Rate Estimation for (v,w)-regular Codes 61
Exploring Cortex-M Microarchitectural Side Channel Information Leakage 61
Countermeasures against fault attacks on software implemented AES: effectiveness and cost 60
Totale 11.033
Categoria #
all - tutte 42.298
article - articoli 10.355
book - libri 0
conference - conferenze 25.338
curatela - curatele 1.325
other - altro 0
patent - brevetti 315
selected - selezionate 0
volume - volumi 4.965
Totale 84.596


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/2020306 0 0 0 0 0 0 0 0 0 0 193 113
2020/20211.522 102 113 118 77 137 102 68 114 128 182 123 258
2021/20221.216 73 120 102 99 117 51 75 105 85 79 121 189
2022/20231.521 178 103 45 141 184 186 24 151 220 88 168 33
2023/2024826 56 137 62 54 71 84 62 56 39 52 40 113
2024/20252.671 33 80 115 150 477 282 227 352 483 177 295 0
Totale 12.278