Follow
Gerardo Pelosi
Title
Cited by
Cited by
Year
Low voltage fault attacks on the RSA cryptosystem
A Barenghi, G Bertoni, E Parrinello, G Pelosi
2009 Workshop on Fault Diagnosis and Tolerance in Cryptography, 23-31, 2009
1372009
Efficient and private access to outsourced data
S De Capitani di Vimercati, S Foresti, S Paraboschi, G Pelosi, P Samarati
Distributed Computing Systems (ICDCS), 2011 31st International Conference on …, 2011
1302011
Countermeasures against fault attacks on software implemented AES: effectiveness and cost
A Barenghi, L Breveglieri, I Koren, G Pelosi, F Regazzoni
Proceedings of the 5th Workshop on Embedded Systems Security, 1-10, 2010
1262010
Design of a parallel AES for graphics hardware using the CUDA framework
AD Biagio, A Barenghi, G Agosta, G Pelosi
Parallel & Distributed Processing, 2009. IPDPS 2009. IEEE International …, 2009
1262009
Low voltage fault attacks to AES
A Barenghi, GM Bertoni, L Breveglieri, M Pellicioli, G Pelosi
2010 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2010
912010
A code morphing methodology to automate power analysis countermeasures
G Agosta, A Barenghi, G Pelosi
Proceedings of the 49th Annual Design Automation Conference, 77-82, 2012
812012
LEDAkem: A post-quantum key encapsulation mechanism based on QC-LDPC codes
M Baldi, A Barenghi, F Chiaraluce, G Pelosi, P Santini
International Conference on Post-Quantum Cryptography, 3-24, 2018
722018
Distance measurement methods for improved insider threat detection
O Lo, WJ Buchanan, P Griffiths, R Macfarlane
Security and Communication Networks 2018 (1), 5906368, 2018
722018
Preserving confidentiality of security policies in data outsourcing
S De Capitani di Vimercati, S Foresti, S Jajodia, S Paraboschi, G Pelosi, ...
Proceedings of the 7th ACM workshop on Privacy in the electronic society, 75-84, 2008
702008
Encryption-based policy enforcement for cloud storage
S De Capitani di Vimercati, S Foresti, S Jajodia, S Paraboschi, G Pelosi, ...
Distributed Computing Systems Workshops (ICDCSW), 2010 IEEE 30th …, 2010
68*2010
Automated security analysis of dynamic web applications through symbolic code execution
G Agosta, A Barenghi, A Parata, G Pelosi
2012 Ninth International Conference on Information Technology-New …, 2012
632012
A fault induction technique based on voltage underfeeding with application to attacks against AES and RSA
A Barenghi, GM Bertoni, L Breveglieri, G Pelosi
Journal of Systems and Software 86 (7), 1864-1878, 2013
562013
A finite regime analysis of information set decoding algorithms
M Baldi, A Barenghi, F Chiaraluce, G Pelosi, P Santini
Algorithms 12 (10), 209, 2019
532019
Method for establishing a communication between two devices
F Sozzani, RV Sannino, GM Bertoni, G Pelosi, P Fragneto
US Patent 7,716,483, 2010
532010
Praxisorientierung und Gemeinschaftskonzeption: Hermann Mosler als Wegbereiter der westdeutschen Völkerrechtswissenschaft nach 1945
F Lange
Springer-Verlag, 2017
49*2017
Software-only reverse engineering of physical DRAM mappings for RowHammer attacks
A Barenghi, L Breveglieri, N Izzo, G Pelosi
2018 IEEE 3rd International Verification and Security Workshop (IVSW), 19-24, 2018
482018
Shuffle index: Efficient and private access to outsourced data
SDCD Vimercati, S Foresti, S Paraboschi, G Pelosi, P Samarati
ACM Transactions on Storage (TOS) 11 (4), 1-55, 2015
482015
Compiler-based side channel vulnerability analysis and optimized countermeasures application
G Agosta, A Barenghi, M Maggi, G Pelosi
Proceedings of the 50th Annual Design Automation Conference, 1-6, 2013
472013
Improving first order differential power attacks through digital signal processing
A Barenghi, G Pelosi, Y Teglia
Proceedings of the 3rd international conference on Security of information …, 2010
452010
Computing tate pairing on smartcards
G Bertoni, L Chen, P Fragneto, K Harrison, G Pelosi
White Paper STMicroelectronics, 2005
452005
The system can't perform the operation now. Try again later.
Articles 1–20