iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://dblp.org/pid/25/2565.bib
@article{DBLP:journals/sncs/AntognazzaBPS24, author = {Francesco Antognazza and Alessandro Barenghi and Gerardo Pelosi and Ruggero Susella}, title = {Performance and Efficiency Exploration of Hardware Polynomial Multipliers for Post-Quantum Lattice-Based Cryptosystems}, journal = {{SN} Comput. Sci.}, volume = {5}, number = {2}, pages = {212}, year = {2024}, url = {https://doi.org/10.1007/s42979-023-02547-w}, doi = {10.1007/S42979-023-02547-W}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sncs/AntognazzaBPS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/acns/PerrielloBP24, author = {Simone Perriello and Alessandro Barenghi and Gerardo Pelosi}, editor = {Martin Andreoni}, title = {Quantum Circuit Design for the Lee-Brickell Based Information Set Decoding}, booktitle = {Applied Cryptography and Network Security Workshops - {ACNS} 2024 Satellite Workshops, AIBlock, AIHWS, AIoTS, SCI, AAC, SiMLA, LLE, and CIMSS, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14587}, pages = {8--28}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-61489-7\_2}, doi = {10.1007/978-3-031-61489-7\_2}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/PerrielloBP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/acns/AntognazzaBPS24, author = {Francesco Antognazza and Alessandro Barenghi and Gerardo Pelosi and Ruggero Susella}, editor = {Martin Andreoni}, title = {A Versatile and Unified {HQC} Hardware Accelerator}, booktitle = {Applied Cryptography and Network Security Workshops - {ACNS} 2024 Satellite Workshops, AIBlock, AIHWS, AIoTS, SCI, AAC, SiMLA, LLE, and CIMSS, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14587}, pages = {214--219}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-61489-7\_17}, doi = {10.1007/978-3-031-61489-7\_17}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/AntognazzaBPS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/csr2/OrlandoBP24, author = {Simone Orlando and Alessandro Barenghi and Gerardo Pelosi}, title = {Investigating the Health State of {X.509} Digital Certificates}, booktitle = {{IEEE} International Conference on Cyber Security and Resilience, {CSR} 2024, London, UK, September 2-4, 2024}, pages = {222--227}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/CSR61664.2024.10679412}, doi = {10.1109/CSR61664.2024.10679412}, timestamp = {Tue, 01 Oct 2024 21:41:39 +0200}, biburl = {https://dblp.org/rec/conf/csr2/OrlandoBP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/dac/LancellottiPBP24, author = {Giacomo Lancellotti and Simone Perriello and Alessandro Barenghi and Gerardo Pelosi}, editor = {Vivek De}, title = {Design of a Quantum Walk Circuit to Solve the Subset-Sum Problem}, booktitle = {Proceedings of the 61st {ACM/IEEE} Design Automation Conference, {DAC} 2024, San Francisco, CA, USA, June 23-27, 2024}, pages = {298:1--298:6}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3649329.3657337}, doi = {10.1145/3649329.3657337}, timestamp = {Sat, 30 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dac/LancellottiPBP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/host/AntognazzaBPS24, author = {Francesco Antognazza and Alessandro Barenghi and Gerardo Pelosi and Ruggero Susella}, title = {A High Efficiency Hardware Design for the Post-Quantum {KEM} {HQC}}, booktitle = {{IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2024, Tysons Corner, VA, USA, May 6-9, 2024}, pages = {431--441}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/HOST55342.2024.10545409}, doi = {10.1109/HOST55342.2024.10545409}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/host/AntognazzaBPS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/isit/AnnechiniBP24, author = {Alessandro Annechini and Alessandro Barenghi and Gerardo Pelosi}, title = {Bit-Flipping Decoder Failure Rate Estimation for (v, w)-Regular Codes}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2024, Athens, Greece, July 7-12, 2024}, pages = {3374--3379}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ISIT57864.2024.10619629}, doi = {10.1109/ISIT57864.2024.10619629}, timestamp = {Fri, 11 Oct 2024 11:43:42 +0200}, biburl = {https://dblp.org/rec/conf/isit/AnnechiniBP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/corr/abs-2401-16919, author = {Alessandro Annechini and Alessandro Barenghi and Gerardo Pelosi}, title = {Bit-flipping Decoder Failure Rate Estimation for (v, w)-regular Codes}, journal = {CoRR}, volume = {abs/2401.16919}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2401.16919}, doi = {10.48550/ARXIV.2401.16919}, eprinttype = {arXiv}, eprint = {2401.16919}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2401-16919.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/amco/BarenghiBPS23, author = {Alessandro Barenghi and Jean{-}Fran{\c{c}}ois Biasse and Edoardo Persichetti and Paolo Santini}, title = {On the computational hardness of the code equivalence problem in cryptography}, journal = {Adv. Math. Commun.}, volume = {17}, number = {1}, pages = {23--55}, year = {2023}, url = {https://doi.org/10.3934/amc.2022064}, doi = {10.3934/AMC.2022064}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/amco/BarenghiBPS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/aspdac/AntognazzaBPS23, author = {Francesco Antognazza and Alessandro Barenghi and Gerardo Pelosi and Ruggero Susella}, editor = {Atsushi Takahashi}, title = {A Flexible ASIC-Oriented Design for a Full {NTRU} Accelerator}, booktitle = {Proceedings of the 28th Asia and South Pacific Design Automation Conference, {ASPDAC} 2023, Tokyo, Japan, January 16-19, 2023}, pages = {591--597}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3566097.3567916}, doi = {10.1145/3566097.3567916}, timestamp = {Mon, 26 Jun 2023 20:46:40 +0200}, biburl = {https://dblp.org/rec/conf/aspdac/AntognazzaBPS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/dsd/PiacentiniBP23, author = {Isabella Piacentini and Alessandro Barenghi and Gerardo Pelosi}, title = {A Non Profiled and Profiled Side Channel Attack Countermeasure through Computation Interleaving}, booktitle = {26th Euromicro Conference on Digital System Design, {DSD} 2023, Golem, Albania, September 6-8, 2023}, pages = {718--725}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DSD60849.2023.00103}, doi = {10.1109/DSD60849.2023.00103}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dsd/PiacentiniBP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/fdtc/BarenghiP23, author = {Alessandro Barenghi and Gerardo Pelosi}, title = {Fault Attacks Friendliness of Post-quantum Cryptosystems}, booktitle = {Workshop on Fault Detection and Tolerance in Cryptography, {FDTC} 2023, Prague, Czech Republic, September 10, 2023}, pages = {1}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/FDTC60478.2023.00006}, doi = {10.1109/FDTC60478.2023.00006}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fdtc/BarenghiP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/icissp/AntognazzaBPS23, author = {Francesco Antognazza and Alessandro Barenghi and Gerardo Pelosi and Ruggero Susella}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {An Efficient Unified Architecture for Polynomial Multiplications in Lattice-Based Cryptoschemes}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {81--88}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011654200003405}, doi = {10.5220/0011654200003405}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AntognazzaBPS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/samos/BarenghiCP23, author = {Alessandro Barenghi and Paolo Cremonesi and Gerardo Pelosi}, editor = {Cristina Silvano and Christian Pilato and Marc Reichenbach}, title = {Quantum Computing Research Lines in the Italian Center for Supercomputing}, booktitle = {Embedded Computer Systems: Architectures, Modeling, and Simulation - 23rd International Conference, {SAMOS} 2023, Samos, Greece, July 2-6, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14385}, pages = {423--434}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-46077-7\_28}, doi = {10.1007/978-3-031-46077-7\_28}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/samos/BarenghiCP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/cryptography/BarenghiFP22, author = {Alessandro Barenghi and Gioele Falcetti and Gerardo Pelosi}, title = {Locating Side Channel Leakage in Time through Matched Filters}, journal = {Cryptogr.}, volume = {6}, number = {2}, pages = {26}, year = {2022}, url = {https://doi.org/10.3390/cryptography6020026}, doi = {10.3390/CRYPTOGRAPHY6020026}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/BarenghiFP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/dtrap/MainardiBP22, author = {Nicholas Mainardi and Alessandro Barenghi and Gerardo Pelosi}, title = {Privacy-aware Character Pattern Matching over Outsourced Encrypted Data}, journal = {{DTRAP}}, volume = {3}, number = {1}, pages = {7:1--7:38}, year = {2022}, url = {https://doi.org/10.1145/3462333}, doi = {10.1145/3462333}, timestamp = {Thu, 21 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/MainardiBP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/ijcmcst/BarenghiBNPS22, author = {Alessandro Barenghi and Jean{-}Fran{\c{c}}ois Biasse and Tran Ngo and Edoardo Persichetti and Paolo Santini}, title = {Advanced signature functionalities from the code equivalence problem}, journal = {Int. J. Comput. Math. Comput. Syst. Theory}, volume = {7}, number = {2}, pages = {112--128}, year = {2022}, url = {https://doi.org/10.1080/23799927.2022.2048206}, doi = {10.1080/23799927.2022.2048206}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcmcst/BarenghiBNPS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/istr/BarenghiCMPPS22, author = {Alessandro Barenghi and Diego Carrera and Silvia Mella and Andrea Pace and Gerardo Pelosi and Ruggero Susella}, title = {Profiled side channel attacks against the {RSA} cryptosystem using neural networks}, journal = {J. Inf. Secur. Appl.}, volume = {66}, pages = {103122}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103122}, doi = {10.1016/J.JISA.2022.103122}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/BarenghiCMPPS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/iacr/BarenghiBNPS22, author = {Alessandro Barenghi and Jean{-}Fran{\c{c}}ois Biasse and Tran Ngo and Edoardo Persichetti and Paolo Santini}, title = {Advanced Signature Functionalities from the Code Equivalence Problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {710}, year = {2022}, url = {https://eprint.iacr.org/2022/710}, timestamp = {Mon, 20 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarenghiBNPS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/iacr/BarenghiBPS22, author = {Alessandro Barenghi and Jean{-}Fran{\c{c}}ois Biasse and Edoardo Persichetti and Paolo Santini}, title = {On the Computational Hardness of the Code Equivalence Problem in Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {967}, year = {2022}, url = {https://eprint.iacr.org/2022/967}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarenghiBPS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/access/AntognazzaBP21, author = {Francesco Antognazza and Alessandro Barenghi and Gerardo Pelosi}, title = {Metis: An Integrated Morphing Engine {CPU} to Protect Against Side Channel Attacks}, journal = {{IEEE} Access}, volume = {9}, pages = {69210--69225}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3077977}, doi = {10.1109/ACCESS.2021.3077977}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/AntognazzaBP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/access/BarenghiBIP21, author = {Alessandro Barenghi and Luca Breveglieri and Niccol{\`{o}} Izzo and Gerardo Pelosi}, title = {Exploring Cortex-M Microarchitectural Side Channel Information Leakage}, journal = {{IEEE} Access}, volume = {9}, pages = {156507--156527}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3124761}, doi = {10.1109/ACCESS.2021.3124761}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/BarenghiBIP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/cbc/BaldiBCPS21, author = {Marco Baldi and Alessandro Barenghi and Franco Chiaraluce and Gerardo Pelosi and Paolo Santini}, editor = {Antonia Wachter{-}Zeh and Hannes Bartz and Gianluigi Liva}, title = {Performance Bounds for {QC-MDPC} Codes Decoders}, booktitle = {Code-Based Cryptography - 9th International Workshop, CBCrypto 2021, Munich, Germany, June 21-22, 2021 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13150}, pages = {95--122}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-98365-9\_6}, doi = {10.1007/978-3-030-98365-9\_6}, timestamp = {Mon, 06 Nov 2023 12:57:51 +0100}, biburl = {https://dblp.org/rec/conf/cbc/BaldiBCPS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/nss/BarenghiCMPPS21, author = {Alessandro Barenghi and Diego Carrera and Silvia Mella and Andrea Pace and Gerardo Pelosi and Ruggero Susella}, editor = {Min Yang and Chao Chen and Yang Liu}, title = {Profiled Attacks Against the Elliptic Curve Scalar Point Multiplication Using Neural Networks}, booktitle = {Network and System Security - 15th International Conference, {NSS} 2021, Tianjin, China, October 23, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13041}, pages = {238--257}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92708-0\_15}, doi = {10.1007/978-3-030-92708-0\_15}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/BarenghiCMPPS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/pqcrypto/BarenghiBPS21, author = {Alessandro Barenghi and Jean{-}Fran{\c{c}}ois Biasse and Edoardo Persichetti and Paolo Santini}, editor = {Jung Hee Cheon and Jean{-}Pierre Tillich}, title = {{LESS-FM:} Fine-Tuning Signatures from the Code Equivalence Problem}, booktitle = {Post-Quantum Cryptography - 12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20-22, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12841}, pages = {23--43}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-81293-5\_2}, doi = {10.1007/978-3-030-81293-5\_2}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pqcrypto/BarenghiBPS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/qce/PerrielloBP21, author = {Simone Perriello and Alessandro Barenghi and Gerardo Pelosi}, editor = {Hausi A. M{\"{u}}ller and Greg Byrd and Candace Culhane and Travis S. Humble}, title = {A Complete Quantum Circuit to Solve the Information Set Decoding Problem}, booktitle = {{IEEE} International Conference on Quantum Computing and Engineering, {QCE} 2021, Broomfield, CO, USA, October 17-22, 2021}, pages = {366--377}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/QCE52317.2021.00056}, doi = {10.1109/QCE52317.2021.00056}, timestamp = {Thu, 14 Dec 2023 11:20:44 +0100}, biburl = {https://dblp.org/rec/conf/qce/PerrielloBP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/sebd/AtzoriBCFMPS021, author = {Maurizio Atzori and Alessandro Barenghi and Sara Comai and Mariagrazia Fugini and Diego Marcia and Gerardo Pelosi and Manuela Sanguinetti and Vincenzo Scotti}, editor = {Sergio Greco and Maurizio Lenzerini and Elio Masciari and Andrea Tagarelli}, title = {Improving Work Life Conditions via Portable Knowledge-Driven Recommender System (Discussion Paper)}, booktitle = {Proceedings of the 29th Italian Symposium on Advanced Database Systems, {SEBD} 2021, Pizzo Calabro (VV), Italy, September 5-9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {2994}, pages = {498--505}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-2994/paper57.pdf}, timestamp = {Fri, 11 Oct 2024 07:47:20 +0200}, biburl = {https://dblp.org/rec/conf/sebd/AtzoriBCFMPS021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/securecomm/PerrielloBP21, author = {Simone Perriello and Alessandro Barenghi and Gerardo Pelosi}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Shujun Li and Radha Poovendran and Herv{\'{e}} Debar and Moti Yung}, title = {A Quantum Circuit to Speed-Up the Cryptanalysis of Code-Based Cryptosystems}, booktitle = {Security and Privacy in Communication Networks - 17th {EAI} International Conference, SecureComm 2021, Virtual Event, September 6-9, 2021, Proceedings, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {399}, pages = {458--474}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90022-9\_25}, doi = {10.1007/978-3-030-90022-9\_25}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/PerrielloBP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/iacr/BarenghiBPS21, author = {Alessandro Barenghi and Jean{-}Fran{\c{c}}ois Biasse and Edoardo Persichetti and Paolo Santini}, title = {{LESS-FM:} Fine-tuning Signatures from a Code-based Cryptographic Group Action}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {396}, year = {2021}, url = {https://eprint.iacr.org/2021/396}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarenghiBPS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/iacr/BaldiBCPS21, author = {Marco Baldi and Alessandro Barenghi and Franco Chiaraluce and Gerardo Pelosi and Paolo Santini}, title = {Performance bounds for {QC-MDPC} codes decoders}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1557}, year = {2021}, url = {https://eprint.iacr.org/2021/1557}, timestamp = {Fri, 10 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BaldiBCPS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/tcad/AgostaBP20, author = {Giovanni Agosta and Alessandro Barenghi and Gerardo Pelosi}, title = {Compiler-Based Techniques to Secure Cryptographic Embedded Software Against Side-Channel Attacks}, journal = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.}, volume = {39}, number = {8}, pages = {1550--1554}, year = {2020}, url = {https://doi.org/10.1109/TCAD.2019.2912924}, doi = {10.1109/TCAD.2019.2912924}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcad/AgostaBP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/tcad/BarenghiFPZ20, author = {Alessandro Barenghi and William Fornaciari and Gerardo Pelosi and Davide Zoni}, title = {Scramble Suit: {A} Profile Differentiation Countermeasure to Prevent Template Attacks}, journal = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.}, volume = {39}, number = {9}, pages = {1778--1791}, year = {2020}, url = {https://doi.org/10.1109/TCAD.2019.2926389}, doi = {10.1109/TCAD.2019.2926389}, timestamp = {Thu, 02 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcad/BarenghiFPZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/acsac/MainardiSBP20, author = {Nicholas Mainardi and Davide Sampietro and Alessandro Barenghi and Gerardo Pelosi}, title = {Efficient Oblivious Substring Search via Architectural Support}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {526--541}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427296}, doi = {10.1145/3427228.3427296}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/MainardiSBP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/cf/BarenghiP20, author = {Alessandro Barenghi and Gerardo Pelosi}, editor = {Maurizio Palesi and Gianluca Palermo and Catherine Graves and Eishi Arima}, title = {Constant weight strings in constant time: a building block for code-based post-quantum cryptosystems}, booktitle = {Proceedings of the 17th {ACM} International Conference on Computing Frontiers, {CF} 2020, Catania, Sicily, Italy, May 11-13, 2020}, pages = {132--141}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3387902.3392630}, doi = {10.1145/3387902.3392630}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cf/BarenghiP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/cf/BarenghiP20a, author = {Alessandro Barenghi and Gerardo Pelosi}, editor = {Maurizio Palesi and Gianluca Palermo and Catherine Graves and Eishi Arima}, title = {A comprehensive analysis of constant-time polynomial inversion for post-quantum cryptosystems}, booktitle = {Proceedings of the 17th {ACM} International Conference on Computing Frontiers, {CF} 2020, Catania, Sicily, Italy, May 11-13, 2020}, pages = {269--276}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3387902.3397224}, doi = {10.1145/3387902.3397224}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cf/BarenghiP20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/cosade/BarenghiBFPZ20, author = {Alessandro Barenghi and Matteo Brevi and William Fornaciari and Gerardo Pelosi and Davide Zoni}, editor = {Guido Marco Bertoni and Francesco Regazzoni}, title = {Integrating Side Channel Security in the {FPGA} Hardware Design Flow}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 11th International Workshop, {COSADE} 2020, Lugano, Switzerland, April 1-3, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12244}, pages = {275--290}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-68773-1\_13}, doi = {10.1007/978-3-030-68773-1\_13}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cosade/BarenghiBFPZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/icete/BaldiBCPS20a, author = {Marco Baldi and Alessandro Barenghi and Franco Chiaraluce and Gerardo Pelosi and Paolo Santini}, editor = {Mohammad S. Obaidat and Jalel Ben{-}Othman}, title = {Analysis of In-Place Randomized Bit-Flipping Decoders for the Design of {LDPC} and {MDPC} Code-Based Cryptosystems}, booktitle = {E-Business and Telecommunications - 17th International Conference on E-Business and Telecommunications, {ICETE} 2020, Online Event, July 8-10, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1484}, pages = {151--174}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-90428-9\_7}, doi = {10.1007/978-3-030-90428-9\_7}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icete/BaldiBCPS20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/icete/BaldiBCPS20, author = {Marco Baldi and Alessandro Barenghi and Franco Chiaraluce and Gerardo Pelosi and Paolo Santini}, editor = {Pierangela Samarati and Sabrina De Capitani di Vimercati and Mohammad S. Obaidat and Jalel Ben{-}Othman}, title = {A Failure Rate Model of Bit-flipping Decoders for {QC-LDPC} and {QC-MDPC} Code-based Cryptosystems}, booktitle = {Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, {ICETE} 2020 - Volume 2: SECRYPT, Lieusaint, Paris, France, July 8-10, 2020}, pages = {238--249}, publisher = {ScitePress}, year = {2020}, url = {https://doi.org/10.5220/0009891702380249}, doi = {10.5220/0009891702380249}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icete/BaldiBCPS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/samos/AlmeidaAAABBOCD20, author = {Rosa Maria Resende de Almeida and Adriana Grau Aberturas and Yolanda Bueno Aguado and Maurizio Atzori and Alessandro Barenghi and Gianluca Borghini and Carlos Alberto Catalina Ortega and Sara Comai and Raquel Losada Dur{\'{a}}n and Mariagrazia Fugini and Hatice Gunes and Basam Musleh Lancis and Gerardo Pelosi and Vincenzo Ronca and Licia Sbattella and Roberto Tedesco and Tian Xu}, editor = {Alex Orailoglu and Matthias Jung and Marc Reichenbach}, title = {Decision Support Systems to Promote Health and Well-Being of People During Their Working Age: The Case of the WorkingAge {EU} Project}, booktitle = {Embedded Computer Systems: Architectures, Modeling, and Simulation - 20th International Conference, {SAMOS} 2020, Samos, Greece, July 5-9, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12471}, pages = {336--347}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-60939-9\_24}, doi = {10.1007/978-3-030-60939-9\_24}, timestamp = {Tue, 20 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/samos/AlmeidaAAABBOCD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @misc{DBLP:data/10/BaldiBCPS20, author = {Marco Baldi and Alessandro Barenghi and Franco Chiaraluce and Gerardo Pelosi and Paolo Santini}, title = {Dataset related to Analysis of Decoding Failures of {LDPC} and {MDPC} Codes in Out-of-Place Bit Flipping Decoding (Version 1)}, publisher = {Zenodo}, year = {2020}, month = oct, howpublished = {\url{https://doi.org/10.5281/zenodo.4161456}}, note = {Accessed on YYYY-MM-DD.}, url = {https://doi.org/10.5281/zenodo.4161456}, doi = {10.5281/ZENODO.4161456}, timestamp = {Fri, 27 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/data/10/BaldiBCPS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/iacr/MainardiBP20, author = {Nicholas Mainardi and Alessandro Barenghi and Gerardo Pelosi}, title = {Plaintext Recovery Attacks against Linearly Decryptable Fully Homomorphic Encryption Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {264}, year = {2020}, url = {https://eprint.iacr.org/2020/264}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MainardiBP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/algorithms/BaldiBCPS19, author = {Marco Baldi and Alessandro Barenghi and Franco Chiaraluce and Gerardo Pelosi and Paolo Santini}, title = {A Finite Regime Analysis of Information Set Decoding Algorithms}, journal = {Algorithms}, volume = {12}, number = {10}, pages = {209}, year = {2019}, url = {https://doi.org/10.3390/a12100209}, doi = {10.3390/A12100209}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/algorithms/BaldiBCPS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/compsec/MainardiBP19, author = {Nicholas Mainardi and Alessandro Barenghi and Gerardo Pelosi}, title = {Plaintext recovery attacks against linearly decryptable fully homomorphic encryption schemes}, journal = {Comput. Secur.}, volume = {87}, year = {2019}, url = {https://doi.org/10.1016/j.cose.2019.101587}, doi = {10.1016/J.COSE.2019.101587}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MainardiBP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/acsac/MainardiBP19, author = {Nicholas Mainardi and Alessandro Barenghi and Gerardo Pelosi}, editor = {David M. Balenson}, title = {Privacy preserving substring search protocol with polylogarithmic communication cost}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {297--312}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359842}, doi = {10.1145/3359789.3359842}, timestamp = {Thu, 30 May 2024 10:08:27 +0200}, biburl = {https://dblp.org/rec/conf/acsac/MainardiBP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/cbc/BaldiBCPS19, author = {Marco Baldi and Alessandro Barenghi and Franco Chiaraluce and Gerardo Pelosi and Paolo Santini}, editor = {Marco Baldi and Edoardo Persichetti and Paolo Santini}, title = {LEDAcrypt: {QC-LDPC} Code-Based Cryptosystems with Bounded Decryption Failure Rate}, booktitle = {Code-Based Cryptography - 7th International Workshop, {CBC} 2019, Darmstadt, Germany, May 18-19, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11666}, pages = {11--43}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-25922-8\_2}, doi = {10.1007/978-3-030-25922-8\_2}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cbc/BaldiBCPS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/cf/IzzoBBPA19, author = {Niccol{\`{o}} Izzo and Alessandro Barenghi and Luca Breveglieri and Gerardo Pelosi and Paolo Amato}, editor = {Francesca Palumbo and Michela Becchi and Martin Schulz and Kento Sato}, title = {A secure and authenticated host-to-memory communication interface}, booktitle = {Proceedings of the 16th {ACM} International Conference on Computing Frontiers, {CF} 2019, Alghero, Italy, April 30 - May 2, 2019}, pages = {386--391}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3310273.3323401}, doi = {10.1145/3310273.3323401}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cf/IzzoBBPA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/icecsys/BarenghiFGPZ19, author = {Alessandro Barenghi and William Fornaciari and Andrea Galimberti and Gerardo Pelosi and Davide Zoni}, title = {Evaluating the Trade-offs in the Hardware Design of the LEDAcrypt Encryption Functions}, booktitle = {26th {IEEE} International Conference on Electronics, Circuits and Systems, {ICECS} 2019, Genoa, Italy, November 27-29, 2019}, pages = {739--742}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICECS46596.2019.8964882}, doi = {10.1109/ICECS46596.2019.8964882}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icecsys/BarenghiFGPZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/corr/abs-1912-05182, author = {Paolo Santini and Alessandro Barenghi and Gerardo Pelosi and Marco Baldi and Franco Chiaraluce}, title = {A Code-specific Conservative Model for the Failure Rate of Bit-flipping Decoding of {LDPC} Codes with Cryptographic Applications}, journal = {CoRR}, volume = {abs/1912.05182}, year = {2019}, url = {http://arxiv.org/abs/1912.05182}, eprinttype = {arXiv}, eprint = {1912.05182}, timestamp = {Thu, 02 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1912-05182.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/iacr/SantiniBPBC19, author = {Paolo Santini and Alessandro Barenghi and Gerardo Pelosi and Marco Baldi and Franco Chiaraluce}, title = {A Code-specific Conservative Model for the Failure Rate of Bit-flipping Decoding of {LDPC} Codes with Cryptographic Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1441}, year = {2019}, url = {https://eprint.iacr.org/2019/1441}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SantiniBPBC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/jcs/BarenghiMP18, author = {Alessandro Barenghi and Nicholas Mainardi and Gerardo Pelosi}, title = {Systematic parsing of {X.509:} Eradicating security issues with a parse tree}, journal = {J. Comput. Secur.}, volume = {26}, number = {6}, pages = {817--849}, year = {2018}, url = {https://doi.org/10.3233/JCS-171110}, doi = {10.3233/JCS-171110}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BarenghiMP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/mam/AgostaBPS18, author = {Giovanni Agosta and Alessandro Barenghi and Gerardo Pelosi and Michele Scandale}, title = {Reactive side-channel countermeasures: Applicability and quantitative security evaluation}, journal = {Microprocess. Microsystems}, volume = {62}, pages = {50--60}, year = {2018}, url = {https://doi.org/10.1016/j.micpro.2018.07.001}, doi = {10.1016/J.MICPRO.2018.07.001}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mam/AgostaBPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/todaes/ZoniBPF18, author = {Davide Zoni and Alessandro Barenghi and Gerardo Pelosi and William Fornaciari}, title = {A Comprehensive Side-Channel Information Leakage Analysis of an In-Order {RISC} {CPU} Microarchitecture}, journal = {{ACM} Trans. Design Autom. Electr. Syst.}, volume = {23}, number = {5}, pages = {57:1--57:30}, year = {2018}, url = {https://doi.org/10.1145/3212719}, doi = {10.1145/3212719}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/todaes/ZoniBPF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/dac/BarenghiP18, author = {Alessandro Barenghi and Gerardo Pelosi}, title = {Side-channel security of superscalar CPUs: evaluating the impact of micro-architectural features}, booktitle = {Proceedings of the 55th Annual Design Automation Conference, {DAC} 2018, San Francisco, CA, USA, June 24-29, 2018}, pages = {120:1--120:6}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3195970.3196112}, doi = {10.1145/3195970.3196112}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/dac/BarenghiP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/icics/BarenghiMP18, author = {Alessandro Barenghi and Nicholas Mainardi and Gerardo Pelosi}, editor = {David Naccache and Shouhuai Xu and Sihan Qing and Pierangela Samarati and Gregory Blanc and Rongxing Lu and Zonghua Zhang and Ahmed Meddahi}, title = {Comparison-Based Attacks Against Noise-Free Fully Homomorphic Encryption Schemes}, booktitle = {Information and Communications Security - 20th International Conference, {ICICS} 2018, Lille, France, October 29-31, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11149}, pages = {177--191}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01950-1\_11}, doi = {10.1007/978-3-030-01950-1\_11}, timestamp = {Sat, 05 Sep 2020 18:01:07 +0200}, biburl = {https://dblp.org/rec/conf/icics/BarenghiMP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/ieeehpcs/BarenghiMMP18, author = {Alessandro Barenghi and Michele Madaschi and Nicholas Mainardi and Gerardo Pelosi}, title = {OpenCL {HLS} Based Design of {FPGA} Accelerators for Cryptographic Primitives}, booktitle = {2018 International Conference on High Performance Computing {\&} Simulation, {HPCS} 2018, Orleans, France, July 16-20, 2018}, pages = {634--641}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/HPCS.2018.00105}, doi = {10.1109/HPCS.2018.00105}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/ieeehpcs/BarenghiMMP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/ivsw/BarenghiBIP18, author = {Alessandro Barenghi and Luca Breveglieri and Niccol{\`{o}} Izzo and Gerardo Pelosi}, title = {Software-only Reverse Engineering of Physical {DRAM} Mappings for Rowhammer Attacks}, booktitle = {3rd {IEEE} International Verification and Security Workshop, {IVSW} 2018, Costa Brava, Spain, July 2-4, 2018}, pages = {19--24}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/IVSW.2018.8494868}, doi = {10.1109/IVSW.2018.8494868}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/BarenghiBIP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/pqcrypto/BaldiBCPS18, author = {Marco Baldi and Alessandro Barenghi and Franco Chiaraluce and Gerardo Pelosi and Paolo Santini}, editor = {Tanja Lange and Rainer Steinwandt}, title = {LEDAkem: {A} Post-quantum Key Encapsulation Mechanism Based on {QC-LDPC} Codes}, booktitle = {Post-Quantum Cryptography - 9th International Conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10786}, pages = {3--24}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-79063-3\_1}, doi = {10.1007/978-3-319-79063-3\_1}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/pqcrypto/BaldiBCPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @proceedings{DBLP:conf/hipeac/2018cs, editor = {John Goodacre and Mikel Luj{\'{a}}n and Giovanni Agosta and Alessandro Barenghi and Israel Koren and Gerardo Pelosi}, title = {Proceedings of the Fifth Workshop on Cryptography and Security in Computing Systems, {CS2} 2018, Manchester, United Kingdom, January 24, 2018}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3178291}, doi = {10.1145/3178291}, isbn = {978-1-4503-6374-7}, timestamp = {Tue, 18 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hipeac/2018cs.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/corr/abs-1801-08867, author = {Marco Baldi and Alessandro Barenghi and Franco Chiaraluce and Gerardo Pelosi and Paolo Santini}, title = {LEDAkem: a post-quantum key encapsulation mechanism based on {QC-LDPC} codes}, journal = {CoRR}, volume = {abs/1801.08867}, year = {2018}, url = {http://arxiv.org/abs/1801.08867}, eprinttype = {arXiv}, eprint = {1801.08867}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1801-08867.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/corr/abs-1807-06127, author = {Marco Baldi and Alessandro Barenghi and Franco Chiaraluce and Gerardo Pelosi and Joachim Rosenthal and Paolo Santini and Davide Schipani}, title = {Design and Implementation of a Digital Signature Scheme Based on Low-density Generator Matrix Codes}, journal = {CoRR}, volume = {abs/1807.06127}, year = {2018}, url = {http://arxiv.org/abs/1807.06127}, eprinttype = {arXiv}, eprint = {1807.06127}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1807-06127.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/corr/abs-1812-04959, author = {Alessandro Barenghi and Nicholas Mainardi and Gerardo Pelosi}, title = {Systematic Parsing of {X.509:} Eradicating Security Issues with a Parse Tree}, journal = {CoRR}, volume = {abs/1812.04959}, year = {2018}, url = {http://arxiv.org/abs/1812.04959}, eprinttype = {arXiv}, eprint = {1812.04959}, timestamp = {Tue, 01 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1812-04959.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/mam/OleksiakKPABBFP17, author = {Ariel Oleksiak and Michal Kierzynka and Wojciech Piatek and Giovanni Agosta and Alessandro Barenghi and Carlo Brandolese and William Fornaciari and Gerardo Pelosi and Mariano Cecowski and Robert Plestenjak and Justin Cinkelj and Mario Porrmann and Jens Hagemeyer and Ren{\'{e}} Griessl and Jan Lachmair and Meysam Peykanu and Lennart Tigges and Micha vor dem Berge and Wolfgang Christmann and Stefan Krupop and Alexandre Carbon and Lo{\"{\i}}c Cudennec and Thierry Goubier and Jean{-}Marc Philippe and Sven Rosinger and Daniel Schlitt and Christian Pieper and Chris Adeniyi{-}Jones and Javier Setoain and Luca Ceva and Udo Janssen}, title = {{M2DC} - Modular Microserver DataCentre with heterogeneous hardware}, journal = {Microprocess. Microsystems}, volume = {52}, pages = {117--130}, year = {2017}, url = {https://doi.org/10.1016/j.micpro.2017.05.019}, doi = {10.1016/J.MICPRO.2017.05.019}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mam/OleksiakKPABBFP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/ispan/BarenghiMP17, author = {Alessandro Barenghi and Nicholas Mainardi and Gerardo Pelosi}, title = {A Security Audit of the OpenPGP Format}, booktitle = {14th International Symposium on Pervasive Systems, Algorithms and Networks {\&} 11th International Conference on Frontier of Computer Science and Technology {\&} Third International Symposium of Creative Computing, {ISPAN-FCST-ISCC} 2017, Exeter, United Kingdom, June 21-23, 2017}, pages = {336--343}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/ISPAN-FCST-ISCC.2017.35}, doi = {10.1109/ISPAN-FCST-ISCC.2017.35}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispan/BarenghiMP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/itasec/BarenghiP17, author = {Alessandro Barenghi and Gerardo Pelosi}, editor = {Alessandro Armando and Roberto Baldoni and Riccardo Focardi}, title = {An Enhanced Dataflow Analysis to Automatically Tailor Side Channel Attack Countermeasures to Software Block Ciphers}, booktitle = {Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), Venice, Italy, January 17-20, 2017}, series = {{CEUR} Workshop Proceedings}, volume = {1816}, pages = {8--18}, publisher = {CEUR-WS.org}, year = {2017}, url = {https://ceur-ws.org/Vol-1816/paper-02.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:11 +0100}, biburl = {https://dblp.org/rec/conf/itasec/BarenghiP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @proceedings{DBLP:conf/hipeac/2017cs, editor = {Mats Brorsson and Zhonghai Lu and Giovanni Agosta and Alessandro Barenghi and Gerardo Pelosi}, title = {Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2017, Stockholm, Sweden, January 24, 2017}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3031836}, doi = {10.1145/3031836}, isbn = {978-1-4503-4869-0}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hipeac/2017cs.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/compsec/BarenghiBFP16, author = {Alessandro Barenghi and Michele Beretta and Alessandro Di Federico and Gerardo Pelosi}, title = {A privacy-preserving encrypted {OSN} with stateless server interaction: The Snake design}, journal = {Comput. Secur.}, volume = {63}, pages = {67--84}, year = {2016}, url = {https://doi.org/10.1016/j.cose.2016.09.005}, doi = {10.1016/J.COSE.2016.09.005}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/BarenghiBFP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/jetc/BarenghiBBPSS16, author = {Alessandro Barenghi and Guido Marco Bertoni and Luca Breveglieri and Gerardo Pelosi and Stefano Sanfilippo and Ruggero Susella}, title = {A Fault-Based Secret Key Retrieval Method for {ECDSA:} Analysis and Countermeasure}, journal = {{ACM} J. Emerg. Technol. Comput. Syst.}, volume = {13}, number = {1}, pages = {8:1--8:26}, year = {2016}, url = {https://doi.org/10.1145/2767132}, doi = {10.1145/2767132}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jetc/BarenghiBBPSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/acsac/ContinellaGZPBZ16, author = {Andrea Continella and Alessandro Guagnelli and Giovanni Zingaro and Giulio De Pasquale and Alessandro Barenghi and Stefano Zanero and Federico Maggi}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {ShieldFS: a self-healing, ransomware-aware filesystem}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {336--347}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991110}, timestamp = {Tue, 06 Nov 2018 16:59:24 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ContinellaGZPBZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/cd/AgostaBP16, author = {Giovanni Agosta and Alessandro Barenghi and Gerardo Pelosi}, editor = {Gianluca Palermo and John Feo}, title = {Automated instantiation of side-channel attacks countermeasures for software cipher implementations}, booktitle = {Proceedings of the {ACM} International Conference on Computing Frontiers, CF'16, Como, Italy, May 16-19, 2016}, pages = {455--460}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2903150.2911707}, doi = {10.1145/2903150.2911707}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cd/AgostaBP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/dsd/AgostaBBFPDMMFN16, author = {Giovanni Agosta and Alessandro Barenghi and Carlo Brandolese and William Fornaciari and Gerardo Pelosi and Stefano Delucchi and Massimo Massa and Maurizio Mongelli and Enrico Ferrari and Leonardo Napoletani and Luciano Bozzi and Carlo Tieri and Dajana Cassioli and Luigi Pomante}, editor = {Paris Kitsos}, title = {{V2I} Cooperation for Traffic Management with SafeCop}, booktitle = {2016 Euromicro Conference on Digital System Design, {DSD} 2016, Limassol, Cyprus, August 31 - September 2, 2016}, pages = {621--627}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/DSD.2016.18}, doi = {10.1109/DSD.2016.18}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsd/AgostaBBFPDMMFN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/iccad/AgostaBPS16, author = {Giovanni Agosta and Alessandro Barenghi and Gerardo Pelosi and Michele Scandale}, editor = {Frank Liu}, title = {Encasing block ciphers to foil key recovery attempts via side channel}, booktitle = {Proceedings of the 35th International Conference on Computer-Aided Design, {ICCAD} 2016, Austin, TX, USA, November 7-10, 2016}, pages = {96}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2966986.2967033}, doi = {10.1145/2966986.2967033}, timestamp = {Fri, 23 Jun 2023 22:29:48 +0200}, biburl = {https://dblp.org/rec/conf/iccad/AgostaBPS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/iwsec/BarenghiP16, author = {Alessandro Barenghi and Gerardo Pelosi}, editor = {Kazuto Ogawa and Katsunari Yoshioka}, title = {A Note on Fault Attacks Against Deterministic Signature Schemes}, booktitle = {Advances in Information and Computer Security - 11th International Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9836}, pages = {182--192}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44524-3\_11}, doi = {10.1007/978-3-319-44524-3\_11}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/BarenghiP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/samos/AgneessensBDMAB16, author = {Alessio Agneessens and Francesco Buemi and Stefano Delucchi and Massimo Massa and Giovanni Agosta and Alessandro Barenghi and Carlo Brandolese and William Fornaciari and Gerardo Pelosi and Enrico Ferrari and Dajana Cassioli and Luigi Pomante and Leonardo Napoletani and Luciano Bozzi and Carlo Tieri and Maurizio Mongelli}, editor = {Walid A. Najjar and Andreas Gerstlauer}, title = {Safe cooperative {CPS:} {A} {V2I} traffic management scenario in the SafeCOP project}, booktitle = {International Conference on Embedded Computer Systems: Architectures, Modeling and Simulation, {SAMOS} 2016, Agios Konstantinos, Samos Island, Greece, July 17-21, 2016}, pages = {320--327}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/SAMOS.2016.7818365}, doi = {10.1109/SAMOS.2016.7818365}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/samos/AgneessensBDMAB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @proceedings{DBLP:conf/hipeac/2016cs, editor = {Martin Palkovic and Giovanni Agosta and Alessandro Barenghi and Israel Koren and Gerardo Pelosi}, title = {Proceedings of the Third Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC, Prague, Czech Republic, January 20, 2016}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2858930}, doi = {10.1145/2858930}, isbn = {978-1-4503-4065-6}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hipeac/2016cs.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/concurrency/AgostaBFP15, author = {Giovanni Agosta and Alessandro Barenghi and Alessandro Di Federico and Gerardo Pelosi}, title = {OpenCL performance portability for general-purpose computation on graphics processor units: an exploration on cryptographic primitives}, journal = {Concurr. Comput. Pract. Exp.}, volume = {27}, number = {14}, pages = {3633--3660}, year = {2015}, url = {https://doi.org/10.1002/cpe.3358}, doi = {10.1002/CPE.3358}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/AgostaBFP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/ipl/AgostaBPS15, author = {Giovanni Agosta and Alessandro Barenghi and Gerardo Pelosi and Michele Scandale}, title = {Trace-based schedulability analysis to enhance passive side-channel attack resilience of embedded software}, journal = {Inf. Process. Lett.}, volume = {115}, number = {2}, pages = {292--297}, year = {2015}, url = {https://doi.org/10.1016/j.ipl.2014.09.030}, doi = {10.1016/J.IPL.2014.09.030}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ipl/AgostaBPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/scp/BarenghiCMPP15, author = {Alessandro Barenghi and Stefano Crespi{-}Reghizzi and Dino Mandrioli and Federica Panella and Matteo Pradella}, title = {Parallel parsing made practical}, journal = {Sci. Comput. Program.}, volume = {112}, pages = {195--226}, year = {2015}, url = {https://doi.org/10.1016/j.scico.2015.09.002}, doi = {10.1016/J.SCICO.2015.09.002}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scp/BarenghiCMPP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/tcad/AgostaBPS15, author = {Giovanni Agosta and Alessandro Barenghi and Gerardo Pelosi and Michele Scandale}, title = {The {MEET} Approach: Securing Cryptographic Embedded Software Against Side Channel Attacks}, journal = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.}, volume = {34}, number = {8}, pages = {1320--1333}, year = {2015}, url = {https://doi.org/10.1109/TCAD.2015.2430320}, doi = {10.1109/TCAD.2015.2430320}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcad/AgostaBPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/dac/AgostaBPS15, author = {Giovanni Agosta and Alessandro Barenghi and Gerardo Pelosi and Michele Scandale}, title = {Information leakage chaff: feeding red herrings to side channel attackers}, booktitle = {Proceedings of the 52nd Annual Design Automation Conference, San Francisco, CA, USA, June 7-11, 2015}, pages = {33:1--33:6}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2744769.2744859}, doi = {10.1145/2744769.2744859}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dac/AgostaBPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/esorics/BarenghiFPS15, author = {Alessandro Barenghi and Alessandro Di Federico and Gerardo Pelosi and Stefano Sanfilippo}, editor = {G{\"{u}}nther Pernul and Peter Y. A. Ryan and Edgar R. Weippl}, title = {Challenging the Trustworthiness of {PGP:} Is the Web-of-Trust Tear-Proof?}, booktitle = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9326}, pages = {429--446}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24174-6\_22}, doi = {10.1007/978-3-319-24174-6\_22}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BarenghiFPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/iccst/AgostaABGP15, author = {Giovanni Agosta and Alessio Antonini and Alessandro Barenghi and Dario Galeri and Gerardo Pelosi}, title = {Cyber-security analysis and evaluation for smart home management solutions}, booktitle = {International Carnahan Conference on Security Technology, {ICCST} 2015, Taipei, Taiwan, September 21-24, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CCST.2015.7389663}, doi = {10.1109/CCST.2015.7389663}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccst/AgostaABGP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @proceedings{DBLP:conf/hipeac/2015cs, editor = {Andy D. Pimentel and Stephan Wong and Gerardo Pelosi and Israel Koren and Giovanni Agosta and Alessandro Barenghi}, title = {Proceedings of the Second Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2015, Amsterdam, Netherlands, January 19-21, 2015}, publisher = {{ACM}}, year = {2015}, url = {http://dl.acm.org/citation.cfm?id=2694805}, isbn = {978-1-4503-3187-6}, timestamp = {Sun, 25 Jan 2015 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hipeac/2015cs.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/iet-cdt/AgostaBMP14, author = {Giovanni Agosta and Alessandro Barenghi and Massimo Maggi and Gerardo Pelosi}, title = {Design space extension for secure implementation of block ciphers}, journal = {{IET} Comput. Digit. Tech.}, volume = {8}, number = {6}, pages = {256--263}, year = {2014}, url = {https://doi.org/10.1049/iet-cdt.2014.0037}, doi = {10.1049/IET-CDT.2014.0037}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-cdt/AgostaBMP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/tetc/BarenghiHBSRK14, author = {Alessandro Barenghi and C{\'{e}}dric Hocquet and David Bol and Fran{\c{c}}ois{-}Xavier Standaert and Francesco Regazzoni and Israel Koren}, title = {A Combined Design-Time/Test-Time Study of the Vulnerability of Sub-Threshold Devices to Low Voltage Fault Attacks}, journal = {{IEEE} Trans. Emerg. Top. Comput.}, volume = {2}, number = {2}, pages = {107--118}, year = {2014}, url = {https://doi.org/10.1109/TETC.2014.2316509}, doi = {10.1109/TETC.2014.2316509}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tetc/BarenghiHBSRK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/cc/BarenghiCMPP14, author = {Alessandro Barenghi and Stefano Crespi{-}Reghizzi and Dino Mandrioli and Federica Panella and Matteo Pradella}, editor = {Albert Cohen}, title = {The {PAPAGENO} Parallel-Parser Generator}, booktitle = {Compiler Construction - 23rd International Conference, {CC} 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8409}, pages = {192--196}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54807-9\_11}, doi = {10.1007/978-3-642-54807-9\_11}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cc/BarenghiCMPP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/dac/AgostaBPS14, author = {Giovanni Agosta and Alessandro Barenghi and Gerardo Pelosi and Michele Scandale}, title = {A Multiple Equivalent Execution Trace Approach to Secure Cryptographic Embedded Software}, booktitle = {The 51st Annual Design Automation Conference 2014, {DAC} '14, San Francisco, CA, USA, June 1-5, 2014}, pages = {210:1--210:6}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2593069.2593073}, doi = {10.1145/2593069.2593073}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dac/AgostaBPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/hpcc/BarenghiBFP14, author = {Alessandro Barenghi and Michele Beretta and Alessandro Di Federico and Gerardo Pelosi}, title = {Snake: An End-to-End Encrypted Online Social Network}, booktitle = {2014 {IEEE} International Conference on High Performance Computing and Communications, 6th {IEEE} International Symposium on Cyberspace Safety and Security, 11th {IEEE} International Conference on Embedded Software and Systems, {HPCC/CSS/ICESS} 2014, Paris, France, August 20-22, 2014}, pages = {763--770}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/HPCC.2014.128}, doi = {10.1109/HPCC.2014.128}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hpcc/BarenghiBFP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/ic-nc/AgostaBPS14, author = {Giovanni Agosta and Alessandro Barenghi and Gerardo Pelosi and Michele Scandale}, title = {Towards Transparently Tackling Functionality and Performance Issues across Different OpenCL Platforms}, booktitle = {Second International Symposium on Computing and Networking, {CANDAR} 2014, Shizuoka, Japan, December 10-12, 2014}, pages = {130--136}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CANDAR.2014.53}, doi = {10.1109/CANDAR.2014.53}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ic-nc/AgostaBPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/iccst/AgostaBP14, author = {Giovanni Agosta and Alessandro Barenghi and Gerardo Pelosi}, title = {Securing software cryptographic primitives for embedded systems against side channel attacks}, booktitle = {International Carnahan Conference on Security Technology, {ICCST} 2014, Rome, Italy, October 13-16, 2014}, pages = {1--6}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CCST.2014.6987032}, doi = {10.1109/CCST.2014.6987032}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/iccst/AgostaBP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/iccst/AntoniniBPZ14, author = {Alessio Antonini and Alessandro Barenghi and Gerardo Pelosi and Saman A. Zonouz}, title = {Security challenges in building automation and {SCADA}}, booktitle = {International Carnahan Conference on Security Technology, {ICCST} 2014, Rome, Italy, October 13-16, 2014}, pages = {1--6}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CCST.2014.6986996}, doi = {10.1109/CCST.2014.6986996}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccst/AntoniniBPZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/secrypt/BarenghiP14, author = {Alessandro Barenghi and Gerardo Pelosi}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {On the Security of Partially Masked Software Implementations}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {492--499}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005120504920499}, doi = {10.5220/0005120504920499}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BarenghiP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/sin/AgostaBPS14, author = {Giovanni Agosta and Alessandro Barenghi and Gerardo Pelosi and Michele Scandale}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Differential Fault Analysis for Block Ciphers: an Automated Conservative Analysis}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {137}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659709}, doi = {10.1145/2659651.2659709}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/AgostaBPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/iacr/BarenghiPR14, author = {Alessandro Barenghi and Gerardo Pelosi and Francesco Regazzoni}, title = {Simulation-Time Security Margin Assessment against Power-Based Side Channel Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {307}, year = {2014}, url = {http://eprint.iacr.org/2014/307}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarenghiPR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/ijguc/BarenghiPT13, author = {Alessandro Barenghi and Gerardo Pelosi and Federico Terraneo}, title = {Secure and efficient design of software block cipher implementations on microcontrollers}, journal = {Int. J. Grid Util. Comput.}, volume = {4}, number = {2/3}, pages = {110--118}, year = {2013}, url = {https://doi.org/10.1504/IJGUC.2013.056246}, doi = {10.1504/IJGUC.2013.056246}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijguc/BarenghiPT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/ipl/BarenghiCMP13, author = {Alessandro Barenghi and Stefano Crespi{-}Reghizzi and Dino Mandrioli and Matteo Pradella}, title = {Parallel parsing of operator precedence grammars}, journal = {Inf. Process. Lett.}, volume = {113}, number = {7}, pages = {245--249}, year = {2013}, url = {https://doi.org/10.1016/j.ipl.2013.01.008}, doi = {10.1016/J.IPL.2013.01.008}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ipl/BarenghiCMP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/jss/BarenghiBBP13, author = {Alessandro Barenghi and Guido Marco Bertoni and Luca Breveglieri and Gerardo Pelosi}, title = {A fault induction technique based on voltage underfeeding with application to attacks against {AES} and {RSA}}, journal = {J. Syst. Softw.}, volume = {86}, number = {7}, pages = {1864--1878}, year = {2013}, url = {https://doi.org/10.1016/j.jss.2013.02.021}, doi = {10.1016/J.JSS.2013.02.021}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/BarenghiBBP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/dac/AgostaBMP13, author = {Giovanni Agosta and Alessandro Barenghi and Massimo Maggi and Gerardo Pelosi}, title = {Compiler-based side channel vulnerability analysis and optimized countermeasures application}, booktitle = {The 50th Annual Design Automation Conference 2013, {DAC} '13, Austin, TX, USA, May 29 - June 07, 2013}, pages = {81:1--81:6}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2463209.2488833}, doi = {10.1145/2463209.2488833}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dac/AgostaBMP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/itng/BarenghiPP13, author = {Alessandro Barenghi and Gerardo Pelosi and Fabio Pozzi}, editor = {Shahram Latifi}, title = {Drop-In Control Flow Hijacking Prevention through Dynamic Library Interception}, booktitle = {Tenth International Conference on Information Technology: New Generations, {ITNG} 2013, 15-17 April, 2013, Las Vegas, Nevada, {USA}}, pages = {640--647}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ITNG.2013.99}, doi = {10.1109/ITNG.2013.99}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itng/BarenghiPP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/nordsec/AntoniniBP13, author = {Alessio Antonini and Alessandro Barenghi and Gerardo Pelosi}, editor = {Hanne Riis Nielson and Dieter Gollmann}, title = {Security Analysis of Building Automation Networks - Threat Model and Viable Mitigation Techniques}, booktitle = {Secure {IT} Systems - 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8208}, pages = {199--214}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41488-6\_14}, doi = {10.1007/978-3-642-41488-6\_14}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/AntoniniBP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/nss/AgostaBPS13, author = {Giovanni Agosta and Alessandro Barenghi and Gerardo Pelosi and Michele Scandale}, editor = {Javier L{\'{o}}pez and Xinyi Huang and Ravi S. Sandhu}, title = {Enhancing Passive Side-Channel Attack Resilience through Schedulability Analysis of Data-Dependency Graphs}, booktitle = {Network and System Security - 7th International Conference, {NSS} 2013, Madrid, Spain, June 3-4, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7873}, pages = {692--698}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38631-2\_58}, doi = {10.1007/978-3-642-38631-2\_58}, timestamp = {Tue, 20 Aug 2024 07:54:43 +0200}, biburl = {https://dblp.org/rec/conf/nss/AgostaBPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/pieee/BarenghiBKN12, author = {Alessandro Barenghi and Luca Breveglieri and Israel Koren and David Naccache}, title = {Fault Injection Attacks on Cryptographic Devices: Theory, Practice, and Countermeasures}, journal = {Proc. {IEEE}}, volume = {100}, number = {11}, pages = {3056--3076}, year = {2012}, url = {https://doi.org/10.1109/JPROC.2012.2188769}, doi = {10.1109/JPROC.2012.2188769}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pieee/BarenghiBKN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/arcs/AgostaBP11, author = {Giovanni Agosta and Alessandro Barenghi and Gerardo Pelosi}, editor = {Gero M{\"{u}}hl and Jan Richling and Andreas Herkersdorf}, title = {Exploiting Bit-level Parallelism in GPGPUs: a Case Study on KeeLoq Exhaustive Search Attacks}, booktitle = {{ARCS} 2012 Workshops, 28. Februar - 2. M{\"{a}}rz 2012, M{\"{u}}nchen, Germany}, series = {{LNI}}, volume = {{P-200}}, pages = {385--396}, publisher = {{GI}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6222213/}, timestamp = {Mon, 14 Oct 2024 17:07:54 +0200}, biburl = {https://dblp.org/rec/conf/arcs/AgostaBP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/dac/AgostaBP12, author = {Giovanni Agosta and Alessandro Barenghi and Gerardo Pelosi}, editor = {Patrick Groeneveld and Donatella Sciuto and Soha Hassoun}, title = {A code morphing methodology to automate power analysis countermeasures}, booktitle = {The 49th Annual Design Automation Conference 2012, {DAC} '12, San Francisco, CA, USA, June 3-7, 2012}, pages = {77--82}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2228360.2228376}, doi = {10.1145/2228360.2228376}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dac/AgostaBP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/itng/AgostaBPP12, author = {Giovanni Agosta and Alessandro Barenghi and Antonio Parata and Gerardo Pelosi}, editor = {Shahram Latifi}, title = {Automated Security Analysis of Dynamic Web Applications through Symbolic Code Execution}, booktitle = {Ninth International Conference on Information Technology: New Generations, {ITNG} 2012, Las Vegas, Nevada, USA, 16-18 April, 2012}, pages = {189--194}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ITNG.2012.167}, doi = {10.1109/ITNG.2012.167}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itng/AgostaBPP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/sle/BarenghiVCMP12, author = {Alessandro Barenghi and Ermes Viviani and Stefano Crespi{-}Reghizzi and Dino Mandrioli and Matteo Pradella}, editor = {Krzysztof Czarnecki and G{\"{o}}rel Hedin}, title = {{PAPAGENO:} {A} Parallel Parser Generator for Operator Precedence Grammars}, booktitle = {Software Language Engineering, 5th International Conference, {SLE} 2012, Dresden, Germany, September 26-28, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7745}, pages = {264--274}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-36089-3\_15}, doi = {10.1007/978-3-642-36089-3\_15}, timestamp = {Fri, 30 Dec 2022 23:08:55 +0100}, biburl = {https://dblp.org/rec/conf/sle/BarenghiVCMP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @incollection{DBLP:series/isc/BarenghiT12, author = {Alessandro Barenghi and Elena Trichina}, editor = {Marc Joye and Michael Tunstall}, title = {Fault Attacks on Stream Ciphers}, booktitle = {Fault Analysis in Cryptography}, series = {Information Security and Cryptography}, pages = {239--255}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29656-7\_14}, doi = {10.1007/978-3-642-29656-7\_14}, timestamp = {Fri, 27 Mar 2020 08:31:50 +0100}, biburl = {https://dblp.org/rec/series/isc/BarenghiT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @incollection{DBLP:series/isc/BarenghiBBPP12, author = {Alessandro Barenghi and Guido Marco Bertoni and Luca Breveglieri and Mauro Pellicioli and Gerardo Pelosi}, editor = {Marc Joye and Michael Tunstall}, title = {Injection Technologies for Fault Attacks on Microprocessors}, booktitle = {Fault Analysis in Cryptography}, series = {Information Security and Cryptography}, pages = {275--293}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29656-7\_16}, doi = {10.1007/978-3-642-29656-7\_16}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/isc/BarenghiBBPP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @phdthesis{DBLP:phd/it/Barenghi11, author = {Alessandro Barenghi}, title = {Developments in side channel attacks to digital cryptographic devices}, school = {Polytechnic University of Milan, Italy}, year = {2011}, url = {https://opac.bncf.firenze.sbn.it/bncf-prod/resource?uri=CFI0775078}, timestamp = {Wed, 29 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/it/Barenghi11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/ccs/MoradiBKP11, author = {Amir Moradi and Alessandro Barenghi and Timo Kasper and Christof Paar}, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, title = {On the vulnerability of {FPGA} bitstream encryption against power analysis attacks: extracting keys from xilinx Virtex-II FPGAs}, booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011}, pages = {111--124}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046707.2046722}, doi = {10.1145/2046707.2046722}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MoradiBKP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/dexaw/BarenghiP11, author = {Alessandro Barenghi and Gerardo Pelosi}, editor = {Franck Morvan and A Min Tjoa and Roland R. Wagner}, title = {Security and Privacy in Smart Grid Infrastructures}, booktitle = {2011 Database and Expert Systems Applications, DEXA, International Workshops, Toulouse, France, August 29 - Sept. 2, 2011}, pages = {102--108}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/DEXA.2011.74}, doi = {10.1109/DEXA.2011.74}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dexaw/BarenghiP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/dsd/BarenghiBSM11, author = {Alessandro Barenghi and Guido Bertoni and Fabrizio De Santis and Filippo Melzani}, title = {On the Efficiency of Design Time Evaluation of the Resistance to Power Attacks}, booktitle = {14th Euromicro Conference on Digital System Design, Architectures, Methods and Tools, {DSD} 2011, August 31 - September 2, 2011, Oulu, Finland}, pages = {777--785}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/DSD.2011.103}, doi = {10.1109/DSD.2011.103}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsd/BarenghiBSM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/host/BarenghiBPS11, author = {Alessandro Barenghi and Guido Bertoni and Andrea Palomba and Ruggero Susella}, title = {A novel fault attack against {ECDSA}}, booktitle = {{HOST} 2011, Proceedings of the 2011 {IEEE} International Symposium on Hardware-Oriented Security and Trust (HOST), 5-6 June 2011, San Diego, California, {USA}}, pages = {161--166}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/HST.2011.5955015}, doi = {10.1109/HST.2011.5955015}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/BarenghiBPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/rfidsec/BarenghiHBSRK11, author = {Alessandro Barenghi and C{\'{e}}dric Hocquet and David Bol and Fran{\c{c}}ois{-}Xavier Standaert and Francesco Regazzoni and Israel Koren}, editor = {Ari Juels and Christof Paar}, title = {Exploring the Feasibility of Low Cost Fault Injection Attacks on Sub-threshold Devices through an Example of a 65nm {AES} Implementation}, booktitle = {{RFID.} Security and Privacy - 7th International Workshop, RFIDSec 2011, Amherst, USA, June 26-28, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7055}, pages = {48--60}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25286-0\_4}, doi = {10.1007/978-3-642-25286-0\_4}, timestamp = {Tue, 31 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rfidsec/BarenghiHBSRK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/sin/BarenghiBBPP11, author = {Alessandro Barenghi and Guido Marco Bertoni and Luca Breveglieri and Gerardo Pelosi and Andrea Palomba}, editor = {Mehmet A. Orgun and Atilla El{\c{c}}i and Oleg B. Makarevich and Sorin A. Huss and Josef Pieprzyk and Lyudmila K. Babenko and Alexander G. Chefranov and Rajan Shankaran}, title = {Fault attack to the elliptic curve digital signature algorithm with multiple bit faults}, booktitle = {Proceedings of the 4th International Conference on Security of Information and Networks, {SIN} 2011, Sydney, NSW, Australia, November 14-19, 2011}, pages = {63--72}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2070425.2070438}, doi = {10.1145/2070425.2070438}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/BarenghiBBPP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/wistp/BarenghiPT11, author = {Alessandro Barenghi and Gerardo Pelosi and Yannick Teglia}, editor = {Claudio A. Ardagna and Jianying Zhou}, title = {Information Leakage Discovery Techniques to Enhance Secure Chip Design}, booktitle = {Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6633}, pages = {128--143}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21040-2\_9}, doi = {10.1007/978-3-642-21040-2\_9}, timestamp = {Mon, 21 Mar 2022 18:09:53 +0100}, biburl = {https://dblp.org/rec/conf/wistp/BarenghiPT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/iacr/MoradiBKP11, author = {Amir Moradi and Alessandro Barenghi and Timo Kasper and Christof Paar}, title = {On the Vulnerability of {FPGA} Bitstream Encryption against Power Analysis Attacks - Extracting Keys from Xilinx Virtex-II FPGAs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {390}, year = {2011}, url = {http://eprint.iacr.org/2011/390}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MoradiBKP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/IEEEias/BarenghiBBPP10, author = {Alessandro Barenghi and Guido Marco Bertoni and Luca Breveglieri and Mauro Pellicioli and Gerardo Pelosi}, title = {Fault attack on {AES} with single-bit induced faults}, booktitle = {Sixth International Conference on Information Assurance and Security, {IAS} 2010, Atlanta, GA, USA, August 23-25, 2010}, pages = {167--172}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ISIAS.2010.5604061}, doi = {10.1109/ISIAS.2010.5604061}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/BarenghiBBPP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/cases/BarenghiBKPR10, author = {Alessandro Barenghi and Luca Breveglieri and Israel Koren and Gerardo Pelosi and Francesco Regazzoni}, title = {Countermeasures against fault attacks on software implemented {AES:} effectiveness and cost}, booktitle = {Proceedings of the 5th Workshop on Embedded Systems Security, {WESS} 2010, Scottsdale, AZ, USA, October 24, 2010}, pages = {7}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1873548.1873555}, doi = {10.1145/1873548.1873555}, timestamp = {Tue, 31 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cases/BarenghiBKPR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/host/BarenghiBBPP10, author = {Alessandro Barenghi and Guido Bertoni and Luca Breveglieri and Mauro Pellicioli and Gerardo Pelosi}, editor = {Jim Plusquellic and Ken Mai}, title = {Low Voltage Fault Attacks to {AES}}, booktitle = {{HOST} 2010, Proceedings of the 2010 {IEEE} International Symposium on Hardware-Oriented Security and Trust (HOST), 13-14 June 2010, Anaheim Convention Center, California, {USA}}, pages = {7--12}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/HST.2010.5513121}, doi = {10.1109/HST.2010.5513121}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/BarenghiBBPP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/itng/AgostaBSP10, author = {Giovanni Agosta and Alessandro Barenghi and Fabrizio De Santis and Gerardo Pelosi}, editor = {Shahram Latifi}, title = {Record Setting Software Implementation of {DES} Using {CUDA}}, booktitle = {Seventh International Conference on Information Technology: New Generations, {ITNG} 2010, Las Vegas, Nevada, USA, 12-14 April 2010}, pages = {748--755}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ITNG.2010.43}, doi = {10.1109/ITNG.2010.43}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itng/AgostaBSP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/sin/BarenghiPT10, author = {Alessandro Barenghi and Gerardo Pelosi and Yannick Teglia}, editor = {Oleg B. Makarevich and Atilla El{\c{c}}i and Mehmet A. Orgun and Sorin A. Huss and Ludmila K. Babenko and Alexander G. Chefranov and Vijay Varadharajan}, title = {Improving first order differential power attacks through digital signal processing}, booktitle = {Proceedings of the 3rd International Conference on Security of Information and Networks, {SIN} 2010, Rostov-on-Don, Russian Federation, September 7-11, 2010}, pages = {124--133}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1854099.1854126}, doi = {10.1145/1854099.1854126}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/BarenghiPT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/iacr/BarenghiBBPP10, author = {Alessandro Barenghi and Guido Bertoni and Luca Breveglieri and Mauro Pellicioli and Gerardo Pelosi}, title = {Low Voltage Fault Attacks to {AES} and {RSA} on General Purpose Processors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {130}, year = {2010}, url = {http://eprint.iacr.org/2010/130}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarenghiBBPP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/fdtc/BarenghiBPP09, author = {Alessandro Barenghi and Guido Bertoni and Emanuele Parrinello and Gerardo Pelosi}, editor = {Luca Breveglieri and Israel Koren and David Naccache and Elisabeth Oswald and Jean{-}Pierre Seifert}, title = {Low Voltage Fault Attacks on the {RSA} Cryptosystem}, booktitle = {Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC} 2009, Lausanne, Switzerland, 6 September 2009}, pages = {23--31}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/FDTC.2009.30}, doi = {10.1109/FDTC.2009.30}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fdtc/BarenghiBPP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/ipps/BiagioBAP09, author = {Andrea Di Biagio and Alessandro Barenghi and Giovanni Agosta and Gerardo Pelosi}, title = {Design of a parallel {AES} for graphics hardware using the {CUDA} framework}, booktitle = {23rd {IEEE} International Symposium on Parallel and Distributed Processing, {IPDPS} 2009, Rome, Italy, May 23-29, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/IPDPS.2009.5161242}, doi = {10.1109/IPDPS.2009.5161242}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipps/BiagioBAP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/pdcat/AgostaBSBP09, author = {Giovanni Agosta and Alessandro Barenghi and Fabrizio De Santis and Andrea Di Biagio and Gerardo Pelosi}, title = {Fast Disk Encryption through {GPGPU} Acceleration}, booktitle = {2009 International Conference on Parallel and Distributed Computing, Applications and Technologies, {PDCAT} 2009, Higashi Hiroshima, Japan, 8-11 December 2009}, pages = {102--109}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/PDCAT.2009.72}, doi = {10.1109/PDCAT.2009.72}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pdcat/AgostaBSBP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/itng/BarenghiBBP08, author = {Alessandro Barenghi and Guido Bertoni and Luca Breveglieri and Gerardo Pelosi}, editor = {Shahram Latifi}, title = {A {FPGA} Coprocessor for the Cryptographic Tate Pairing over Fp}, booktitle = {Fifth International Conference on Information Technology: New Generations {(ITNG} 2008), 7-8 April 2008, Las Vegas, Nevada, {USA}}, pages = {112--119}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ITNG.2008.260}, doi = {10.1109/ITNG.2008.260}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itng/BarenghiBBP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }