BARENGHI, ALESSANDRO
 Distribuzione geografica
Continente #
NA - Nord America 8.874
EU - Europa 5.641
AS - Asia 3.695
SA - Sud America 745
AF - Africa 175
OC - Oceania 27
Continente sconosciuto - Info sul continente non disponibili 4
Totale 19.161
Nazione #
US - Stati Uniti d'America 8.628
RU - Federazione Russa 1.932
IT - Italia 1.626
SG - Singapore 1.462
CN - Cina 1.100
BR - Brasile 657
DE - Germania 384
GB - Regno Unito 305
VN - Vietnam 298
SE - Svezia 204
CA - Canada 188
FI - Finlandia 179
ES - Italia 160
NL - Olanda 149
FR - Francia 139
HK - Hong Kong 134
AT - Austria 114
KR - Corea 113
IN - India 109
UA - Ucraina 102
IE - Irlanda 98
MA - Marocco 66
ID - Indonesia 62
JP - Giappone 57
TR - Turchia 46
TW - Taiwan 42
JO - Giordania 40
BD - Bangladesh 38
PK - Pakistan 38
PL - Polonia 38
AR - Argentina 37
CH - Svizzera 33
MX - Messico 32
BE - Belgio 30
IQ - Iraq 27
ZA - Sudafrica 27
AU - Australia 20
DK - Danimarca 20
CI - Costa d'Avorio 19
GR - Grecia 19
PT - Portogallo 17
SA - Arabia Saudita 17
IR - Iran 16
CZ - Repubblica Ceca 14
MY - Malesia 14
TN - Tunisia 14
EC - Ecuador 13
IL - Israele 13
EE - Estonia 12
SK - Slovacchia (Repubblica Slovacca) 12
PH - Filippine 11
UZ - Uzbekistan 11
EG - Egitto 10
RO - Romania 9
BJ - Benin 8
BG - Bulgaria 7
CL - Cile 7
JM - Giamaica 7
LT - Lituania 7
NG - Nigeria 7
NZ - Nuova Zelanda 7
AE - Emirati Arabi Uniti 6
CO - Colombia 6
HU - Ungheria 6
KZ - Kazakistan 6
SI - Slovenia 6
VE - Venezuela 6
AL - Albania 5
KE - Kenya 5
PE - Perù 5
PY - Paraguay 5
TH - Thailandia 5
UY - Uruguay 5
AZ - Azerbaigian 4
CY - Cipro 4
EU - Europa 4
NP - Nepal 4
RS - Serbia 4
BB - Barbados 3
BO - Bolivia 3
DO - Repubblica Dominicana 3
DZ - Algeria 3
KH - Cambogia 3
LB - Libano 3
SY - Repubblica araba siriana 3
TT - Trinidad e Tobago 3
CG - Congo 2
CR - Costa Rica 2
ET - Etiopia 2
HR - Croazia 2
LU - Lussemburgo 2
ML - Mali 2
MU - Mauritius 2
PA - Panama 2
PS - Palestinian Territory 2
AO - Angola 1
BH - Bahrain 1
BM - Bermuda 1
BW - Botswana 1
BY - Bielorussia 1
Totale 19.138
Città #
Ashburn 1.134
Fairfield 920
Singapore 760
Woodbridge 638
Chandler 558
Milan 553
Houston 490
Wilmington 448
Ann Arbor 441
Seattle 410
Cambridge 342
San Jose 307
Moscow 278
Beijing 251
Santa Clara 233
Hefei 196
Boardman 155
Council Bluffs 155
Los Angeles 153
Dearborn 136
Ottawa 120
Medford 105
Lawrence 103
Hong Kong 98
Vienna 98
Dublin 96
Dong Ket 91
Seoul 86
New York 79
London 72
Helsinki 71
Dallas 70
Rome 62
Jacksonville 61
Málaga 56
San Diego 56
Des Moines 55
Buffalo 53
Amsterdam 51
Jakarta 48
São Paulo 47
Frankfurt am Main 45
Redwood City 42
Amman 40
Casablanca 37
Hanoi 37
Ho Chi Minh City 37
The Dalles 37
Munich 33
Livorno 32
Shanghai 32
Chicago 30
Norwalk 30
Taipei 29
Columbus 27
Orem 27
Kent 26
Tokyo 26
Redmond 24
Nuremberg 23
Turin 22
Verona 22
Guangzhou 21
Lappeenranta 21
Warsaw 21
Berlin 20
Brooklyn 20
Denver 20
Montreal 20
Rio de Janeiro 20
Abidjan 19
Boston 19
Turku 19
Brussels 18
Chennai 18
Kenitra 18
Paris 18
Redondo Beach 18
Toronto 18
Madrid 17
Monza 17
Phoenix 17
Zurich 17
Ancona 16
Johannesburg 16
Leawood 16
Washington 16
Zhengzhou 16
Düsseldorf 15
Aarhus 14
Baghdad 14
Brescia 14
Bresso 14
Changsha 14
Chengdu 14
Falls Church 14
Modena 14
Naples 14
Atlanta 13
Nürnberg 13
Totale 11.437
Nome #
WorkingAge: Providing Occupational Safety through Pervasive Sensing and Data Driven Behavior Modeling 399
A fault-based secret key retrieval method for ECDSA: analysis and countermeasure 273
A Comprehensive Side-Channel Information Leakage Analysis of an In-Order RISC CPU Microarchitecture 254
A Failure Rate Model of Bit-flipping Decoders for QC-LDPC and QC-MDPC Code-based Cryptosystems 253
The M2DC Approach towards Resource-efficient Computing 247
Parallel parsing made practical 235
Fault Sensitivity Analysis at Design Time 231
Computer Security Anchors in Smart Grids: The Smart Metering Scenario and Challenges 226
A comparison of deep learning approaches for power-based side-channel attacks 221
A privacy-preserving encrypted OSN with stateless server interaction: the Snake design 212
V2I Cooperation for Traffic Management with SafeCOP 210
Design of a Quantum Walk Circuit to Solve the Subset-Sum Problem 209
A Complete Quantum Circuit to Solve the Information Set Decoding Problem 208
A novel fault attack against ECDSA 204
A combined design-time/test-time study of the vulnerability of sub-threshold devices to low voltage fault attacks 200
A Non Profiled and Profiled Side Channel Attack Countermeasure through Computation Interleaving 199
Reactive Side-channel Countermeasures: Applicability and Quantitative Security Evaluation 199
Plaintext recovery attacks against linearly decryptable fully homomorphic encryption schemes 198
A Novel Regular Format for X.509 Digital Certificates 197
A Fault Induction Technique Based on Voltage Underfeeding with Application to Attacks against AES and RSA 196
Scramble Suit: A Profile Differentiation Countermeasure to Prevent Template Attacks 194
Decision Support Systems to Promote Health and Well-being of People during their Working Age: the Case of the WorkingAge EU Project 193
A Multiple Equivalent Execution Trace Approach to Secure Cryptographic Embedded Software 188
Privacy Preserving Substring Search Protocol with Polylogarithmic Communication Cost 188
A Quantum Circuit to Execute a Key-Recovery Attack Against the DES and 3DES Block Ciphers 188
ShieldFS: a self-healing, ransomware-aware filesystem 186
Protection system and method for protecting a computer system against ransomware attack 185
Software-only reverse engineering of physical dram mappings for rowhammer attacks 185
A Code Morphing Methodology to Automate Power Analysis Countermeasures 174
Security Challenges in Building Automation and SCADA 172
Challenging the Trustworthiness of PGP: Is the Web-of-Trust Tear-Proof? 171
Comparison-based Attacks against Noise-free Fully Homomorphic Encryption Schemes 169
A secure and authenticated host-to-memory communication interface 169
A note on fault attacks against deterministic signature schemes 168
Trace-based Schedulability Analysis to Enhance Passive Side-Channel Attack Resilience of Embedded Software 168
A FPGA coprocessor for the cryptographic Tate pairing over Fp 166
Design Space Extension for Secure Implementation of Block Ciphers 163
The MEET Approach: Securing Cryptographic Embedded Software Against Side Channel Attacks 163
Evaluating the Trade-offs in the Hardware Design of the LEDAcrypt Encryption Functions 163
M2DC – Modular Microserver DataCentre with Heterogeneous Hardware 162
Post Quantum Cryptography Research Lines in the Italian Center for Security and Rights in Cyberspace 161
Encasing Block Ciphers to Foil Key Recovery Attempts via Side Channel 160
Safe Cooperative CPS: A V2I Traffic Management scenario in the SafeCOP project 159
A Quantum Circuit to Speed-up the Cryptanalysis of Code-based Cryptosystem 158
Improving work life conditions via portable knowledge-driven recommender system 156
Review of Policy-as-code Approaches to Manage Security and Privacy Conditions in Edge and Cloud Computing Ecosystems 154
M2DC-A novel heterogeneous hyperscale microserver platform 154
Automated instantiation of side-channel attacks countermeasures for software cipher implementations 154
OpenCL performance portability for general-purpose computation on graphics processor units: an exploration on cryptographic primitives 153
Cyber-Security Analysis and Evaluation for Smart Home Management Solutions 150
OpenCL HLS Based Design of FPGA Accelerators for Cryptographic Primitives 148
A comprehensive analysis of constant-time polynomial inversion for post-quantum cryptosystems 147
Systematic Parsing of X.509: Eradicating Security Issues with a Parse Tree 146
Design Time Engineering of Side Channel Resistant Cipher Implementations 145
Compiler-based Techniques to Secure Cryptographic Embedded Software against Side Channel Attacks 145
Snake: an End-to-End Encrypted Online Social Network 144
A Finite Regime Analysis of Information Set Decoding Algorithms 144
Towards transparently tackling functionality and performance issues across different OpenCL platforms 144
LEDAcrypt: QC-LDPC Code-Based Cryptosystems with Bounded Decryption Failure Rate 143
LEDAkem: a post-quantum key encapsulation mechanism based on QC-LDPC codes 141
Efficient Oblivious Substring Search via Architectural Support 140
Enhancing Passive Side-Channel Attack Resilience through Schedulability Analysis of Data-Dependency Graphs 136
A Security Audit of the OpenPGP Format 136
Foreword - Proceedings of the Second Workshop on Cryptography and Security in Computing Systems 135
Securing Software Cryptographic Primitives for Embedded Systems against Side Channel Attacks 135
Smart metering in power grids: Application scenarios and security 134
A Flexible ASIC-Oriented Design for a Full NTRU Accelerator 133
Security and Privacy in Smart Grid Infrastructures 131
An Enhanced Dataflow Analysis to Automatically Tailor Side Channel Attack Countermeasures to Software Block Ciphers 131
An Efficient Unified Architecture for Polynomial Multiplications in Lattice-Based Cryptoschemes 130
Compiler-based Side Channel Vulnerability Analysis and Optimized Countermeasures Application 130
PAPAGENO: A Parallel Parser Generator for Operator Precedence Grammars 128
Fault injection attacks on cryptographic devices: theory, practice, and countermeasures 128
Security Analysis of Building Automation Networks: Threat Model and Viable Mitigation Techniques 127
Differential Fault Analysis for Block Ciphers: an Automated Conservative Analysis 127
Bit-flipping Decoder Failure Rate Estimation for (v,w)-regular Codes 126
Optimizing Quantum Circuit Synthesis with Dominator Analysis 125
Privacy-aware character pattern matching over outsourced encrypted data 125
Injection Technologies for Fault Attacks on Microprocessors 124
Private Boolean Queries on Encrypted Data 123
Parallel parsing of operator precedence grammars 123
Record Setting Software Implementation of DES Using CUDA 122
Low Voltage Fault Attacks on the RSA Cryptosystem 122
On the efficiency of design time evaluation of the resistance to power attacks 122
Side-channel security of superscalar CPUs: Evaluating the Impact of Micro-architectural Features 122
Quantum Circuit Design for the Lee-Brickell Based Information Set Decoding 121
Performance and Efficiency Exploration of Hardware Polynomial Multipliers for Post-Quantum Lattice-Based Cryptosystems 121
Exploring Cortex-M Microarchitectural Side Channel Information Leakage 121
Integrating Side Channel Security in the FPGA Hardware Design Flow 120
Low voltage fault attacks to AES 119
Threshold Selection for Iterative Decoding of (v,w)-regular Binary Codes 118
Fault attack on AES with single-bit induced faults 118
Scrambling Compiler: Automated and Unified Countermeasure for Profiled and Non-Profiled Side Channel Attacks 117
A High Efficiency Hardware Design for the Post-Quantum KEM HQC 116
Oblivious RAM (ORAM) 116
Symmetric key encryption acceleration on heterogeneous many-core architectures 116
A Quantum Method to Match Vector Boolean Functions Using Simon's Solver 115
Improving the Efficiency of Quantum Circuits for Information Set Decoding 114
Design of a Parallel AES for Graphics Hardware using the CUDA framework 113
Metis: An Integrated Morphing Engine CPU to Protect Against Side Channel Attacks 113
Totale 16.065
Categoria #
all - tutte 58.276
article - articoli 14.300
book - libri 0
conference - conferenze 34.967
curatela - curatele 1.716
other - altro 0
patent - brevetti 411
selected - selezionate 0
volume - volumi 6.882
Totale 116.552


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021873 0 0 0 0 0 0 68 114 128 182 123 258
2021/20221.216 73 120 102 99 117 51 75 105 85 79 121 189
2022/20231.521 178 103 45 141 184 186 24 151 220 88 168 33
2023/2024826 56 137 62 54 71 84 62 56 39 52 40 113
2024/20253.353 33 80 115 150 477 282 227 352 483 177 437 540
2025/20266.524 1.562 1.741 480 764 636 915 426 0 0 0 0 0
Totale 19.484