BARENGHI, ALESSANDRO
 Distribuzione geografica
Continente #
NA - Nord America 8.735
EU - Europa 5.634
AS - Asia 3.671
SA - Sud America 741
AF - Africa 175
OC - Oceania 27
Continente sconosciuto - Info sul continente non disponibili 4
Totale 18.987
Nazione #
US - Stati Uniti d'America 8.489
RU - Federazione Russa 1.932
IT - Italia 1.623
SG - Singapore 1.453
CN - Cina 1.095
BR - Brasile 654
DE - Germania 384
GB - Regno Unito 305
VN - Vietnam 298
SE - Svezia 204
CA - Canada 188
FI - Finlandia 179
ES - Italia 160
NL - Olanda 145
FR - Francia 139
HK - Hong Kong 126
AT - Austria 114
KR - Corea 113
IN - India 109
UA - Ucraina 102
IE - Irlanda 98
MA - Marocco 66
ID - Indonesia 62
JP - Giappone 57
TR - Turchia 46
TW - Taiwan 41
JO - Giordania 40
BD - Bangladesh 38
PK - Pakistan 38
PL - Polonia 38
AR - Argentina 37
CH - Svizzera 33
MX - Messico 32
BE - Belgio 30
IQ - Iraq 27
ZA - Sudafrica 27
AU - Australia 20
DK - Danimarca 20
CI - Costa d'Avorio 19
GR - Grecia 19
PT - Portogallo 17
SA - Arabia Saudita 17
IR - Iran 16
CZ - Repubblica Ceca 14
MY - Malesia 14
TN - Tunisia 14
EC - Ecuador 13
IL - Israele 13
EE - Estonia 12
SK - Slovacchia (Repubblica Slovacca) 12
UZ - Uzbekistan 11
EG - Egitto 10
PH - Filippine 10
RO - Romania 9
BJ - Benin 8
BG - Bulgaria 7
JM - Giamaica 7
LT - Lituania 7
NG - Nigeria 7
NZ - Nuova Zelanda 7
AE - Emirati Arabi Uniti 6
CL - Cile 6
CO - Colombia 6
HU - Ungheria 6
KZ - Kazakistan 6
SI - Slovenia 6
VE - Venezuela 6
AL - Albania 5
KE - Kenya 5
PE - Perù 5
PY - Paraguay 5
TH - Thailandia 5
UY - Uruguay 5
AZ - Azerbaigian 4
CY - Cipro 4
EU - Europa 4
NP - Nepal 4
RS - Serbia 4
BB - Barbados 3
BO - Bolivia 3
DO - Repubblica Dominicana 3
DZ - Algeria 3
KH - Cambogia 3
LB - Libano 3
SY - Repubblica araba siriana 3
TT - Trinidad e Tobago 3
CG - Congo 2
CR - Costa Rica 2
ET - Etiopia 2
HR - Croazia 2
LU - Lussemburgo 2
ML - Mali 2
MU - Mauritius 2
PA - Panama 2
PS - Palestinian Territory 2
AO - Angola 1
BH - Bahrain 1
BM - Bermuda 1
BW - Botswana 1
BY - Bielorussia 1
Totale 18.964
Città #
Ashburn 1.117
Fairfield 920
Singapore 751
Woodbridge 638
Chandler 558
Milan 553
Houston 490
Wilmington 448
Ann Arbor 441
Seattle 410
Cambridge 342
Moscow 278
Beijing 251
Santa Clara 233
Hefei 196
San Jose 192
Boardman 154
Council Bluffs 154
Los Angeles 151
Dearborn 136
Ottawa 120
Medford 105
Lawrence 103
Vienna 98
Dublin 96
Dong Ket 91
Hong Kong 90
Seoul 86
New York 79
London 72
Helsinki 71
Dallas 70
Rome 62
Jacksonville 61
Málaga 56
San Diego 56
Des Moines 55
Buffalo 53
Amsterdam 51
Jakarta 48
São Paulo 46
Frankfurt am Main 45
Redwood City 42
Amman 40
Casablanca 37
Hanoi 37
Ho Chi Minh City 37
The Dalles 37
Munich 33
Livorno 32
Shanghai 32
Norwalk 30
Chicago 29
Taipei 28
Columbus 27
Orem 27
Kent 26
Tokyo 26
Redmond 24
Nuremberg 23
Turin 22
Verona 22
Guangzhou 21
Lappeenranta 21
Warsaw 21
Berlin 20
Brooklyn 20
Denver 20
Montreal 20
Rio de Janeiro 20
Abidjan 19
Boston 19
Turku 19
Brussels 18
Chennai 18
Kenitra 18
Paris 18
Redondo Beach 18
Toronto 18
Madrid 17
Monza 17
Phoenix 17
Zurich 17
Ancona 16
Johannesburg 16
Leawood 16
Washington 16
Zhengzhou 16
Düsseldorf 15
Aarhus 14
Baghdad 14
Brescia 14
Bresso 14
Changsha 14
Chengdu 14
Falls Church 14
Modena 14
Naples 14
Atlanta 13
Nürnberg 13
Totale 11.281
Nome #
WorkingAge: Providing Occupational Safety through Pervasive Sensing and Data Driven Behavior Modeling 398
A fault-based secret key retrieval method for ECDSA: analysis and countermeasure 269
A Failure Rate Model of Bit-flipping Decoders for QC-LDPC and QC-MDPC Code-based Cryptosystems 252
A Comprehensive Side-Channel Information Leakage Analysis of an In-Order RISC CPU Microarchitecture 251
The M2DC Approach towards Resource-efficient Computing 246
Parallel parsing made practical 233
Fault Sensitivity Analysis at Design Time 230
Computer Security Anchors in Smart Grids: The Smart Metering Scenario and Challenges 224
A comparison of deep learning approaches for power-based side-channel attacks 219
V2I Cooperation for Traffic Management with SafeCOP 210
A privacy-preserving encrypted OSN with stateless server interaction: the Snake design 209
Design of a Quantum Walk Circuit to Solve the Subset-Sum Problem 206
A Complete Quantum Circuit to Solve the Information Set Decoding Problem 204
A novel fault attack against ECDSA 203
A combined design-time/test-time study of the vulnerability of sub-threshold devices to low voltage fault attacks 198
Reactive Side-channel Countermeasures: Applicability and Quantitative Security Evaluation 197
Plaintext recovery attacks against linearly decryptable fully homomorphic encryption schemes 197
A Non Profiled and Profiled Side Channel Attack Countermeasure through Computation Interleaving 196
A Novel Regular Format for X.509 Digital Certificates 196
A Fault Induction Technique Based on Voltage Underfeeding with Application to Attacks against AES and RSA 195
Scramble Suit: A Profile Differentiation Countermeasure to Prevent Template Attacks 192
Decision Support Systems to Promote Health and Well-being of People during their Working Age: the Case of the WorkingAge EU Project 190
A Multiple Equivalent Execution Trace Approach to Secure Cryptographic Embedded Software 187
A Quantum Circuit to Execute a Key-Recovery Attack Against the DES and 3DES Block Ciphers 187
ShieldFS: a self-healing, ransomware-aware filesystem 185
Protection system and method for protecting a computer system against ransomware attack 185
Privacy Preserving Substring Search Protocol with Polylogarithmic Communication Cost 185
Software-only reverse engineering of physical dram mappings for rowhammer attacks 184
A Code Morphing Methodology to Automate Power Analysis Countermeasures 172
Security Challenges in Building Automation and SCADA 171
Challenging the Trustworthiness of PGP: Is the Web-of-Trust Tear-Proof? 171
Comparison-based Attacks against Noise-free Fully Homomorphic Encryption Schemes 169
A secure and authenticated host-to-memory communication interface 168
Trace-based Schedulability Analysis to Enhance Passive Side-Channel Attack Resilience of Embedded Software 167
A note on fault attacks against deterministic signature schemes 166
A FPGA coprocessor for the cryptographic Tate pairing over Fp 165
Design Space Extension for Secure Implementation of Block Ciphers 163
The MEET Approach: Securing Cryptographic Embedded Software Against Side Channel Attacks 163
M2DC – Modular Microserver DataCentre with Heterogeneous Hardware 161
Evaluating the Trade-offs in the Hardware Design of the LEDAcrypt Encryption Functions 161
Encasing Block Ciphers to Foil Key Recovery Attempts via Side Channel 160
Safe Cooperative CPS: A V2I Traffic Management scenario in the SafeCOP project 159
Post Quantum Cryptography Research Lines in the Italian Center for Security and Rights in Cyberspace 158
Improving work life conditions via portable knowledge-driven recommender system 156
A Quantum Circuit to Speed-up the Cryptanalysis of Code-based Cryptosystem 156
Automated instantiation of side-channel attacks countermeasures for software cipher implementations 154
Review of Policy-as-code Approaches to Manage Security and Privacy Conditions in Edge and Cloud Computing Ecosystems 153
M2DC-A novel heterogeneous hyperscale microserver platform 153
OpenCL performance portability for general-purpose computation on graphics processor units: an exploration on cryptographic primitives 152
Cyber-Security Analysis and Evaluation for Smart Home Management Solutions 149
OpenCL HLS Based Design of FPGA Accelerators for Cryptographic Primitives 147
Design Time Engineering of Side Channel Resistant Cipher Implementations 144
Systematic Parsing of X.509: Eradicating Security Issues with a Parse Tree 144
A comprehensive analysis of constant-time polynomial inversion for post-quantum cryptosystems 144
Compiler-based Techniques to Secure Cryptographic Embedded Software against Side Channel Attacks 144
Snake: an End-to-End Encrypted Online Social Network 143
A Finite Regime Analysis of Information Set Decoding Algorithms 143
Towards transparently tackling functionality and performance issues across different OpenCL platforms 143
LEDAcrypt: QC-LDPC Code-Based Cryptosystems with Bounded Decryption Failure Rate 142
LEDAkem: a post-quantum key encapsulation mechanism based on QC-LDPC codes 139
Efficient Oblivious Substring Search via Architectural Support 139
Enhancing Passive Side-Channel Attack Resilience through Schedulability Analysis of Data-Dependency Graphs 135
Foreword - Proceedings of the Second Workshop on Cryptography and Security in Computing Systems 134
Securing Software Cryptographic Primitives for Embedded Systems against Side Channel Attacks 134
A Security Audit of the OpenPGP Format 134
Smart metering in power grids: Application scenarios and security 133
A Flexible ASIC-Oriented Design for a Full NTRU Accelerator 132
Security and Privacy in Smart Grid Infrastructures 131
An Enhanced Dataflow Analysis to Automatically Tailor Side Channel Attack Countermeasures to Software Block Ciphers 131
An Efficient Unified Architecture for Polynomial Multiplications in Lattice-Based Cryptoschemes 129
Compiler-based Side Channel Vulnerability Analysis and Optimized Countermeasures Application 129
Fault injection attacks on cryptographic devices: theory, practice, and countermeasures 128
PAPAGENO: A Parallel Parser Generator for Operator Precedence Grammars 127
Security Analysis of Building Automation Networks: Threat Model and Viable Mitigation Techniques 126
Differential Fault Analysis for Block Ciphers: an Automated Conservative Analysis 126
Privacy-aware character pattern matching over outsourced encrypted data 125
Bit-flipping Decoder Failure Rate Estimation for (v,w)-regular Codes 124
Optimizing Quantum Circuit Synthesis with Dominator Analysis 123
Injection Technologies for Fault Attacks on Microprocessors 123
Quantum Circuit Design for the Lee-Brickell Based Information Set Decoding 121
Record Setting Software Implementation of DES Using CUDA 121
Low Voltage Fault Attacks on the RSA Cryptosystem 121
Parallel parsing of operator precedence grammars 121
On the efficiency of design time evaluation of the resistance to power attacks 121
Side-channel security of superscalar CPUs: Evaluating the Impact of Micro-architectural Features 121
Performance and Efficiency Exploration of Hardware Polynomial Multipliers for Post-Quantum Lattice-Based Cryptosystems 120
Exploring Cortex-M Microarchitectural Side Channel Information Leakage 119
Threshold Selection for Iterative Decoding of (v,w)-regular Binary Codes 118
Scrambling Compiler: Automated and Unified Countermeasure for Profiled and Non-Profiled Side Channel Attacks 117
Fault attack on AES with single-bit induced faults 117
Oblivious RAM (ORAM) 116
Low voltage fault attacks to AES 116
Symmetric key encryption acceleration on heterogeneous many-core architectures 116
A Quantum Method to Match Vector Boolean Functions Using Simon's Solver 115
Integrating Side Channel Security in the FPGA Hardware Design Flow 115
A High Efficiency Hardware Design for the Post-Quantum KEM HQC 114
Improving the Efficiency of Quantum Circuits for Information Set Decoding 113
Private Boolean Queries on Encrypted Data 113
Design of a Parallel AES for Graphics Hardware using the CUDA framework 112
Metis: An Integrated Morphing Engine CPU to Protect Against Side Channel Attacks 112
Totale 15.930
Categoria #
all - tutte 57.870
article - articoli 14.211
book - libri 0
conference - conferenze 34.711
curatela - curatele 1.710
other - altro 0
patent - brevetti 409
selected - selezionate 0
volume - volumi 6.829
Totale 115.740


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021873 0 0 0 0 0 0 68 114 128 182 123 258
2021/20221.216 73 120 102 99 117 51 75 105 85 79 121 189
2022/20231.521 178 103 45 141 184 186 24 151 220 88 168 33
2023/2024826 56 137 62 54 71 84 62 56 39 52 40 113
2024/20253.353 33 80 115 150 477 282 227 352 483 177 437 540
2025/20266.350 1.562 1.741 480 764 636 915 252 0 0 0 0 0
Totale 19.310