BARENGHI, ALESSANDRO
 Distribuzione geografica
Continente #
NA - Nord America 6.359
EU - Europa 2.444
AS - Asia 662
AF - Africa 35
OC - Oceania 13
SA - Sud America 11
Continente sconosciuto - Info sul continente non disponibili 4
Totale 9.528
Nazione #
US - Stati Uniti d'America 6.209
IT - Italia 1.030
DE - Germania 244
SE - Svezia 193
GB - Regno Unito 180
VN - Vietnam 172
CA - Canada 149
SG - Singapore 143
CN - Cina 138
FI - Finlandia 136
ES - Italia 112
UA - Ucraina 97
IE - Irlanda 93
AT - Austria 89
FR - Francia 49
NL - Olanda 42
IN - India 41
JO - Giordania 36
CH - Svizzera 29
HK - Hong Kong 20
TW - Taiwan 19
PL - Polonia 18
TR - Turchia 18
GR - Grecia 17
DK - Danimarca 16
BE - Belgio 14
IR - Iran 14
RU - Federazione Russa 14
JP - Giappone 13
PT - Portogallo 13
CZ - Repubblica Ceca 12
EE - Estonia 12
KR - Corea 11
AU - Australia 8
BJ - Benin 8
BR - Brasile 8
CI - Costa d'Avorio 8
MY - Malesia 7
PK - Pakistan 7
RO - Romania 7
HU - Ungheria 6
SI - Slovenia 6
NG - Nigeria 5
NZ - Nuova Zelanda 5
SK - Slovacchia (Repubblica Slovacca) 5
TN - Tunisia 5
EU - Europa 4
IL - Israele 4
BG - Bulgaria 3
ID - Indonesia 3
MA - Marocco 3
TH - Thailandia 3
AE - Emirati Arabi Uniti 2
BD - Bangladesh 2
EC - Ecuador 2
LB - Libano 2
MU - Mauritius 2
SY - Repubblica araba siriana 2
AL - Albania 1
CM - Camerun 1
CR - Costa Rica 1
DZ - Algeria 1
EG - Egitto 1
HR - Croazia 1
IS - Islanda 1
KH - Cambogia 1
KZ - Kazakistan 1
LT - Lituania 1
LU - Lussemburgo 1
ME - Montenegro 1
MN - Mongolia 1
NO - Norvegia 1
PE - Perù 1
PS - Palestinian Territory 1
SA - Arabia Saudita 1
ZA - Sudafrica 1
Totale 9.528
Città #
Fairfield 920
Woodbridge 637
Chandler 558
Houston 478
Ashburn 466
Wilmington 448
Ann Arbor 441
Seattle 406
Cambridge 337
Milan 283
Dearborn 136
Ottawa 120
Medford 105
Lawrence 103
Dublin 92
Dong Ket 91
Vienna 87
Singapore 73
Helsinki 63
Beijing 60
Jacksonville 59
Málaga 56
San Diego 56
Des Moines 44
Redwood City 42
Rome 38
Amman 36
Dallas 34
New York 33
Livorno 32
Norwalk 30
Boardman 24
Redmond 24
Amsterdam 19
London 19
Taipei 19
Leawood 16
Madrid 15
Washington 15
Aarhus 14
Bresso 14
Brussels 14
Falls Church 14
Shanghai 14
Los Angeles 13
Munich 13
Nürnberg 13
Vedano al Lambro 13
Zurich 13
Berlin 12
Centro 12
Fremont 12
Monza 12
Toronto 11
Messina 10
Vecchiano 10
Aachen 9
Hässelby 9
Lausanne 9
Phoenix 9
Abidjan 8
Auburn Hills 8
Boston 8
Cotonou 8
Edinburgh 8
Glasgow 8
Naples 8
Paris 8
Athens 7
Frankfurt am Main 7
Islamabad 7
Izmir 7
Brescia 6
Budapest 6
Columbus 6
Gropello Cairoli 6
Gunzenhausen 6
Hong Kong 6
Lappeenranta 6
Lucca 6
Nanchang 6
Pamparato 6
Parma 6
Prague 6
Tallinn 6
Turin 6
Verona 6
Abuja 5
Atlanta 5
Bologna 5
Bratislava 5
Brno 5
Central 5
Chicago 5
Duncan 5
Hyderabad 5
Minden 5
Modena 5
Mountain View 5
Nuremberg 5
Totale 7.012
Nome #
WorkingAge: Providing Occupational Safety through Pervasive Sensing and Data Driven Behavior Modeling 303
The M2DC Approach towards Resource-efficient Computing 177
Fault Sensitivity Analysis at Design Time 168
A fault-based secret key retrieval method for ECDSA: analysis and countermeasure 164
Computer Security Anchors in Smart Grids: The Smart Metering Scenario and Challenges 160
A Comprehensive Side-Channel Information Leakage Analysis of an In-Order RISC CPU Microarchitecture 153
A Failure Rate Model of Bit-flipping Decoders for QC-LDPC and QC-MDPC Code-based Cryptosystems 149
V2I Cooperation for Traffic Management with SafeCOP 144
A privacy-preserving encrypted OSN with stateless server interaction: the Snake design 134
Plaintext recovery attacks against linearly decryptable fully homomorphic encryption schemes 128
Design Space Extension for Secure Implementation of Block Ciphers 127
Scramble Suit: A Profile Differentiation Countermeasure to Prevent Template Attacks 127
Privacy Preserving Substring Search Protocol with Polylogarithmic Communication Cost 126
Protection system and method for protecting a computer system against ransomware attack 124
A combined design-time/test-time study of the vulnerability of sub-threshold devices to low voltage fault attacks 123
A novel fault attack against ECDSA 122
Reactive Side-channel Countermeasures: Applicability and Quantitative Security Evaluation 122
A Multiple Equivalent Execution Trace Approach to Secure Cryptographic Embedded Software 121
A Novel Regular Format for X.509 Digital Certificates 121
Safe Cooperative CPS: A V2I Traffic Management scenario in the SafeCOP project 119
Decision Support Systems to Promote Health and Well-being of People during their Working Age: the Case of the WorkingAge EU Project 114
ShieldFS: a self-healing, ransomware-aware filesystem 113
Parallel parsing made practical 113
Challenging the Trustworthiness of PGP: Is the Web-of-Trust Tear-Proof? 113
M2DC – Modular Microserver DataCentre with Heterogeneous Hardware 112
The MEET Approach: Securing Cryptographic Embedded Software Against Side Channel Attacks 109
Encasing Block Ciphers to Foil Key Recovery Attempts via Side Channel 109
Evaluating the Trade-offs in the Hardware Design of the LEDAcrypt Encryption Functions 109
Security Challenges in Building Automation and SCADA 107
Trace-based Schedulability Analysis to Enhance Passive Side-Channel Attack Resilience of Embedded Software 107
Securing Software Cryptographic Primitives for Embedded Systems against Side Channel Attacks 103
Design Time Engineering of Side Channel Resistant Cipher Implementations 101
Automated instantiation of side-channel attacks countermeasures for software cipher implementations 101
A secure and authenticated host-to-memory communication interface 100
Smart metering in power grids: Application scenarios and security 99
LEDAcrypt: QC-LDPC Code-Based Cryptosystems with Bounded Decryption Failure Rate 98
Comparison-based Attacks against Noise-free Fully Homomorphic Encryption Schemes 97
Software-only reverse engineering of physical dram mappings for rowhammer attacks 96
Compiler-based Side Channel Vulnerability Analysis and Optimized Countermeasures Application 95
A Fault Induction Technique Based on Voltage Underfeeding with Application to Attacks against AES and RSA 95
Security and Privacy in Smart Grid Infrastructures 94
A Code Morphing Methodology to Automate Power Analysis Countermeasures 93
M2DC-A novel heterogeneous hyperscale microserver platform 93
Compiler-based Techniques to Secure Cryptographic Embedded Software against Side Channel Attacks 93
On the efficiency of design time evaluation of the resistance to power attacks 90
Snake: an End-to-End Encrypted Online Social Network 89
LEDAkem: a post-quantum key encapsulation mechanism based on QC-LDPC codes 89
Record Setting Software Implementation of DES Using CUDA 87
OpenCL performance portability for general-purpose computation on graphics processor units: an exploration on cryptographic primitives 87
OpenCL HLS Based Design of FPGA Accelerators for Cryptographic Primitives 87
Cyber-Security Analysis and Evaluation for Smart Home Management Solutions 86
Towards transparently tackling functionality and performance issues across different OpenCL platforms 86
Low Voltage Fault Attacks on the RSA Cryptosystem 85
A note on fault attacks against deterministic signature schemes 84
Parallel parsing of operator precedence grammars 83
A Security Audit of the OpenPGP Format 82
Systematic Parsing of X.509: Eradicating Security Issues with a Parse Tree 82
A FPGA coprocessor for the cryptographic Tate pairing over Fp 82
PAPAGENO: A Parallel Parser Generator for Operator Precedence Grammars 81
Side-channel security of superscalar CPUs: Evaluating the Impact of Micro-architectural Features 81
Enhancing Passive Side-Channel Attack Resilience through Schedulability Analysis of Data-Dependency Graphs 80
An Enhanced Dataflow Analysis to Automatically Tailor Side Channel Attack Countermeasures to Software Block Ciphers 80
Improving first order differential power attacks through Digital Signal Processing 78
On the Security of Partially Masked Software Implementations 78
Design of a Parallel AES for Graphics Hardware using the CUDA framework 78
A comprehensive analysis of constant-time polynomial inversion for post-quantum cryptosystems 78
Fault injection attacks on cryptographic devices: theory, practice, and countermeasures 77
Fault attack on AES with single-bit induced faults 76
Improving work life conditions via portable knowledge-driven recommender system 76
Exploring the Feasibility of Low Cost Fault Injection Attacks on Sub-Threshold Devices through an example of a 65nm AES implementation 75
Fault attack to the elliptic curve digital signature algorithm with multiple bit faults 75
Automated Security Analysis of Dynamic Web Applications through Symbolic Code Execution 75
Differential Fault Analysis for Block Ciphers: an Automated Conservative Analysis 73
Low voltage fault attacks to AES 73
Foreword - Proceedings of the Second Workshop on Cryptography and Security in Computing Systems 71
A Finite Regime Analysis of Information Set Decoding Algorithms 71
Efficient Oblivious Substring Search via Architectural Support 71
Fast Disk Encryption Through GPGPU Acceleration 70
Constant weight strings in constant time: a building block for code-based post-quantum cryptosystems 69
Symmetric key encryption acceleration on heterogeneous many-core architectures 69
Injection Technologies for Fault Attacks on Microprocessors 68
The PAPAGENO Parallel-Parser Generator 68
A Quantum Circuit to Speed-up the Cryptanalysis of Code-based Cryptosystem 67
Security Analysis of Building Automation Networks: Threat Model and Viable Mitigation Techniques 65
Information Leakage Discovery Techniques to Enhance Secure Chip Design 65
A Complete Quantum Circuit to Solve the Information Set Decoding Problem 65
Secure and Efficient Design of Block Cipher Implementations on Microcontrollers 62
Drop-In Control Flow Hijacking Prevention through Dynamic Library Interception 62
Integrating Side Channel Security in the FPGA Hardware Design Flow 60
Metis: An Integrated Morphing Engine CPU to Protect Against Side Channel Attacks 57
An Efficient Unified Architecture for Polynomial Multiplications in Lattice-Based Cryptoschemes 54
Privacy-aware character pattern matching over outsourced encrypted data 52
Countermeasures against fault attacks on software implemented AES: effectiveness and cost 51
Foreword - Proceedings of the Third Workshop on Cryptography and Security in Computing Systems 48
Foreword -Proceedings of the Sixth Workshop on Cryptography and Security in Computing Systems - ISBN:978-1-4503-6182-8. In ACM INTERNATIONAL CONFERENCE PROCEEDINGS SERIES 42
Exploring Cortex-M Microarchitectural Side Channel Information Leakage 42
Information Leakage Chaff: Feeding Red Herrings to Side Channel Attackers 40
Foreword - Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems 39
Smart Meters and Home Gateway Scenarios 38
Simulation-Time Security Margin Assessment against Power-Based Side Channel Attacks 37
Totale 9.312
Categoria #
all - tutte 32.392
article - articoli 8.206
book - libri 0
conference - conferenze 19.120
curatela - curatele 1.003
other - altro 0
patent - brevetti 246
selected - selezionate 0
volume - volumi 3.817
Totale 64.784


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/20201.977 0 0 72 185 276 295 269 218 230 126 193 113
2020/20211.522 102 113 118 77 137 102 68 114 128 182 123 258
2021/20221.216 73 120 102 99 117 51 75 105 85 79 121 189
2022/20231.521 178 103 45 141 184 186 24 151 220 88 168 33
2023/2024826 56 137 62 54 71 84 62 56 39 52 40 113
2024/2025184 33 80 71 0 0 0 0 0 0 0 0 0
Totale 9.791