@article{DBLP:journals/sncs/AntognazzaBPS24,
author = {Francesco Antognazza and
Alessandro Barenghi and
Gerardo Pelosi and
Ruggero Susella},
title = {Performance and Efficiency Exploration of Hardware Polynomial Multipliers
for Post-Quantum Lattice-Based Cryptosystems},
journal = {{SN} Comput. Sci.},
volume = {5},
number = {2},
pages = {212},
year = {2024},
url = {https://doi.org/10.1007/s42979-023-02547-w},
doi = {10.1007/S42979-023-02547-W},
timestamp = {Fri, 22 Mar 2024 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/sncs/AntognazzaBPS24.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/PerrielloBP24,
author = {Simone Perriello and
Alessandro Barenghi and
Gerardo Pelosi},
editor = {Martin Andreoni},
title = {Quantum Circuit Design for the Lee-Brickell Based Information Set
Decoding},
booktitle = {Applied Cryptography and Network Security Workshops - {ACNS} 2024
Satellite Workshops, AIBlock, AIHWS, AIoTS, SCI, AAC, SiMLA, LLE,
and CIMSS, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
Part {II}},
series = {Lecture Notes in Computer Science},
volume = {14587},
pages = {8--28},
publisher = {Springer},
year = {2024},
url = {https://doi.org/10.1007/978-3-031-61489-7\_2},
doi = {10.1007/978-3-031-61489-7\_2},
timestamp = {Fri, 02 Aug 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/acns/PerrielloBP24.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/AntognazzaBPS24,
author = {Francesco Antognazza and
Alessandro Barenghi and
Gerardo Pelosi and
Ruggero Susella},
editor = {Martin Andreoni},
title = {A Versatile and Unified {HQC} Hardware Accelerator},
booktitle = {Applied Cryptography and Network Security Workshops - {ACNS} 2024
Satellite Workshops, AIBlock, AIHWS, AIoTS, SCI, AAC, SiMLA, LLE,
and CIMSS, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
Part {II}},
series = {Lecture Notes in Computer Science},
volume = {14587},
pages = {214--219},
publisher = {Springer},
year = {2024},
url = {https://doi.org/10.1007/978-3-031-61489-7\_17},
doi = {10.1007/978-3-031-61489-7\_17},
timestamp = {Fri, 02 Aug 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/acns/AntognazzaBPS24.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csr2/OrlandoBP24,
author = {Simone Orlando and
Alessandro Barenghi and
Gerardo Pelosi},
title = {Investigating the Health State of {X.509} Digital Certificates},
booktitle = {{IEEE} International Conference on Cyber Security and Resilience,
{CSR} 2024, London, UK, September 2-4, 2024},
pages = {222--227},
publisher = {{IEEE}},
year = {2024},
url = {https://doi.org/10.1109/CSR61664.2024.10679412},
doi = {10.1109/CSR61664.2024.10679412},
timestamp = {Tue, 01 Oct 2024 21:41:39 +0200},
biburl = {https://dblp.org/rec/conf/csr2/OrlandoBP24.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dac/LancellottiPBP24,
author = {Giacomo Lancellotti and
Simone Perriello and
Alessandro Barenghi and
Gerardo Pelosi},
editor = {Vivek De},
title = {Design of a Quantum Walk Circuit to Solve the Subset-Sum Problem},
booktitle = {Proceedings of the 61st {ACM/IEEE} Design Automation Conference, {DAC}
2024, San Francisco, CA, USA, June 23-27, 2024},
pages = {298:1--298:6},
publisher = {{ACM}},
year = {2024},
url = {https://doi.org/10.1145/3649329.3657337},
doi = {10.1145/3649329.3657337},
timestamp = {Sat, 30 Nov 2024 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/dac/LancellottiPBP24.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/AntognazzaBPS24,
author = {Francesco Antognazza and
Alessandro Barenghi and
Gerardo Pelosi and
Ruggero Susella},
title = {A High Efficiency Hardware Design for the Post-Quantum {KEM} {HQC}},
booktitle = {{IEEE} International Symposium on Hardware Oriented Security and Trust,
{HOST} 2024, Tysons Corner, VA, USA, May 6-9, 2024},
pages = {431--441},
publisher = {{IEEE}},
year = {2024},
url = {https://doi.org/10.1109/HOST55342.2024.10545409},
doi = {10.1109/HOST55342.2024.10545409},
timestamp = {Sun, 04 Aug 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/host/AntognazzaBPS24.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/AnnechiniBP24,
author = {Alessandro Annechini and
Alessandro Barenghi and
Gerardo Pelosi},
title = {Bit-Flipping Decoder Failure Rate Estimation for (v, w)-Regular Codes},
booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2024,
Athens, Greece, July 7-12, 2024},
pages = {3374--3379},
publisher = {{IEEE}},
year = {2024},
url = {https://doi.org/10.1109/ISIT57864.2024.10619629},
doi = {10.1109/ISIT57864.2024.10619629},
timestamp = {Fri, 11 Oct 2024 11:43:42 +0200},
biburl = {https://dblp.org/rec/conf/isit/AnnechiniBP24.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2401-16919,
author = {Alessandro Annechini and
Alessandro Barenghi and
Gerardo Pelosi},
title = {Bit-flipping Decoder Failure Rate Estimation for (v, w)-regular Codes},
journal = {CoRR},
volume = {abs/2401.16919},
year = {2024},
url = {https://doi.org/10.48550/arXiv.2401.16919},
doi = {10.48550/ARXIV.2401.16919},
eprinttype = {arXiv},
eprint = {2401.16919},
timestamp = {Tue, 07 May 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-2401-16919.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amco/BarenghiBPS23,
author = {Alessandro Barenghi and
Jean{-}Fran{\c{c}}ois Biasse and
Edoardo Persichetti and
Paolo Santini},
title = {On the computational hardness of the code equivalence problem in cryptography},
journal = {Adv. Math. Commun.},
volume = {17},
number = {1},
pages = {23--55},
year = {2023},
url = {https://doi.org/10.3934/amc.2022064},
doi = {10.3934/AMC.2022064},
timestamp = {Sat, 30 Sep 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/amco/BarenghiBPS23.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aspdac/AntognazzaBPS23,
author = {Francesco Antognazza and
Alessandro Barenghi and
Gerardo Pelosi and
Ruggero Susella},
editor = {Atsushi Takahashi},
title = {A Flexible ASIC-Oriented Design for a Full {NTRU} Accelerator},
booktitle = {Proceedings of the 28th Asia and South Pacific Design Automation Conference,
{ASPDAC} 2023, Tokyo, Japan, January 16-19, 2023},
pages = {591--597},
publisher = {{ACM}},
year = {2023},
url = {https://doi.org/10.1145/3566097.3567916},
doi = {10.1145/3566097.3567916},
timestamp = {Mon, 26 Jun 2023 20:46:40 +0200},
biburl = {https://dblp.org/rec/conf/aspdac/AntognazzaBPS23.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsd/PiacentiniBP23,
author = {Isabella Piacentini and
Alessandro Barenghi and
Gerardo Pelosi},
title = {A Non Profiled and Profiled Side Channel Attack Countermeasure through
Computation Interleaving},
booktitle = {26th Euromicro Conference on Digital System Design, {DSD} 2023, Golem,
Albania, September 6-8, 2023},
pages = {718--725},
publisher = {{IEEE}},
year = {2023},
url = {https://doi.org/10.1109/DSD60849.2023.00103},
doi = {10.1109/DSD60849.2023.00103},
timestamp = {Tue, 07 May 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/dsd/PiacentiniBP23.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/BarenghiP23,
author = {Alessandro Barenghi and
Gerardo Pelosi},
title = {Fault Attacks Friendliness of Post-quantum Cryptosystems},
booktitle = {Workshop on Fault Detection and Tolerance in Cryptography, {FDTC}
2023, Prague, Czech Republic, September 10, 2023},
pages = {1},
publisher = {{IEEE}},
year = {2023},
url = {https://doi.org/10.1109/FDTC60478.2023.00006},
doi = {10.1109/FDTC60478.2023.00006},
timestamp = {Sun, 06 Oct 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/fdtc/BarenghiP23.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/AntognazzaBPS23,
author = {Francesco Antognazza and
Alessandro Barenghi and
Gerardo Pelosi and
Ruggero Susella},
editor = {Paolo Mori and
Gabriele Lenzini and
Steven Furnell},
title = {An Efficient Unified Architecture for Polynomial Multiplications in
Lattice-Based Cryptoschemes},
booktitle = {Proceedings of the 9th International Conference on Information Systems
Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
2023},
pages = {81--88},
publisher = {SciTePress},
year = {2023},
url = {https://doi.org/10.5220/0011654200003405},
doi = {10.5220/0011654200003405},
timestamp = {Mon, 26 Jun 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/icissp/AntognazzaBPS23.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/samos/BarenghiCP23,
author = {Alessandro Barenghi and
Paolo Cremonesi and
Gerardo Pelosi},
editor = {Cristina Silvano and
Christian Pilato and
Marc Reichenbach},
title = {Quantum Computing Research Lines in the Italian Center for Supercomputing},
booktitle = {Embedded Computer Systems: Architectures, Modeling, and Simulation
- 23rd International Conference, {SAMOS} 2023, Samos, Greece, July
2-6, 2023, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {14385},
pages = {423--434},
publisher = {Springer},
year = {2023},
url = {https://doi.org/10.1007/978-3-031-46077-7\_28},
doi = {10.1007/978-3-031-46077-7\_28},
timestamp = {Tue, 28 Nov 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/samos/BarenghiCP23.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/BarenghiFP22,
author = {Alessandro Barenghi and
Gioele Falcetti and
Gerardo Pelosi},
title = {Locating Side Channel Leakage in Time through Matched Filters},
journal = {Cryptogr.},
volume = {6},
number = {2},
pages = {26},
year = {2022},
url = {https://doi.org/10.3390/cryptography6020026},
doi = {10.3390/CRYPTOGRAPHY6020026},
timestamp = {Mon, 28 Aug 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/cryptography/BarenghiFP22.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/MainardiBP22,
author = {Nicholas Mainardi and
Alessandro Barenghi and
Gerardo Pelosi},
title = {Privacy-aware Character Pattern Matching over Outsourced Encrypted
Data},
journal = {{DTRAP}},
volume = {3},
number = {1},
pages = {7:1--7:38},
year = {2022},
url = {https://doi.org/10.1145/3462333},
doi = {10.1145/3462333},
timestamp = {Thu, 21 Nov 2024 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/dtrap/MainardiBP22.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcmcst/BarenghiBNPS22,
author = {Alessandro Barenghi and
Jean{-}Fran{\c{c}}ois Biasse and
Tran Ngo and
Edoardo Persichetti and
Paolo Santini},
title = {Advanced signature functionalities from the code equivalence problem},
journal = {Int. J. Comput. Math. Comput. Syst. Theory},
volume = {7},
number = {2},
pages = {112--128},
year = {2022},
url = {https://doi.org/10.1080/23799927.2022.2048206},
doi = {10.1080/23799927.2022.2048206},
timestamp = {Mon, 26 Jun 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/ijcmcst/BarenghiBNPS22.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BarenghiCMPPS22,
author = {Alessandro Barenghi and
Diego Carrera and
Silvia Mella and
Andrea Pace and
Gerardo Pelosi and
Ruggero Susella},
title = {Profiled side channel attacks against the {RSA} cryptosystem using
neural networks},
journal = {J. Inf. Secur. Appl.},
volume = {66},
pages = {103122},
year = {2022},
url = {https://doi.org/10.1016/j.jisa.2022.103122},
doi = {10.1016/J.JISA.2022.103122},
timestamp = {Thu, 23 Jun 2022 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/istr/BarenghiCMPPS22.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarenghiBNPS22,
author = {Alessandro Barenghi and
Jean{-}Fran{\c{c}}ois Biasse and
Tran Ngo and
Edoardo Persichetti and
Paolo Santini},
title = {Advanced Signature Functionalities from the Code Equivalence Problem},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {710},
year = {2022},
url = {https://eprint.iacr.org/2022/710},
timestamp = {Mon, 20 Jun 2022 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/BarenghiBNPS22.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarenghiBPS22,
author = {Alessandro Barenghi and
Jean{-}Fran{\c{c}}ois Biasse and
Edoardo Persichetti and
Paolo Santini},
title = {On the Computational Hardness of the Code Equivalence Problem in Cryptography},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {967},
year = {2022},
url = {https://eprint.iacr.org/2022/967},
timestamp = {Tue, 27 Sep 2022 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/BarenghiBPS22.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AntognazzaBP21,
author = {Francesco Antognazza and
Alessandro Barenghi and
Gerardo Pelosi},
title = {Metis: An Integrated Morphing Engine {CPU} to Protect Against Side
Channel Attacks},
journal = {{IEEE} Access},
volume = {9},
pages = {69210--69225},
year = {2021},
url = {https://doi.org/10.1109/ACCESS.2021.3077977},
doi = {10.1109/ACCESS.2021.3077977},
timestamp = {Tue, 01 Jun 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/access/AntognazzaBP21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/BarenghiBIP21,
author = {Alessandro Barenghi and
Luca Breveglieri and
Niccol{\`{o}} Izzo and
Gerardo Pelosi},
title = {Exploring Cortex-M Microarchitectural Side Channel Information Leakage},
journal = {{IEEE} Access},
volume = {9},
pages = {156507--156527},
year = {2021},
url = {https://doi.org/10.1109/ACCESS.2021.3124761},
doi = {10.1109/ACCESS.2021.3124761},
timestamp = {Sat, 25 Dec 2021 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/access/BarenghiBIP21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cbc/BaldiBCPS21,
author = {Marco Baldi and
Alessandro Barenghi and
Franco Chiaraluce and
Gerardo Pelosi and
Paolo Santini},
editor = {Antonia Wachter{-}Zeh and
Hannes Bartz and
Gianluigi Liva},
title = {Performance Bounds for {QC-MDPC} Codes Decoders},
booktitle = {Code-Based Cryptography - 9th International Workshop, CBCrypto 2021,
Munich, Germany, June 21-22, 2021 Revised Selected Papers},
series = {Lecture Notes in Computer Science},
volume = {13150},
pages = {95--122},
publisher = {Springer},
year = {2021},
url = {https://doi.org/10.1007/978-3-030-98365-9\_6},
doi = {10.1007/978-3-030-98365-9\_6},
timestamp = {Mon, 06 Nov 2023 12:57:51 +0100},
biburl = {https://dblp.org/rec/conf/cbc/BaldiBCPS21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/BarenghiCMPPS21,
author = {Alessandro Barenghi and
Diego Carrera and
Silvia Mella and
Andrea Pace and
Gerardo Pelosi and
Ruggero Susella},
editor = {Min Yang and
Chao Chen and
Yang Liu},
title = {Profiled Attacks Against the Elliptic Curve Scalar Point Multiplication
Using Neural Networks},
booktitle = {Network and System Security - 15th International Conference, {NSS}
2021, Tianjin, China, October 23, 2021, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {13041},
pages = {238--257},
publisher = {Springer},
year = {2021},
url = {https://doi.org/10.1007/978-3-030-92708-0\_15},
doi = {10.1007/978-3-030-92708-0\_15},
timestamp = {Fri, 21 Jan 2022 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/nss/BarenghiCMPPS21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/BarenghiBPS21,
author = {Alessandro Barenghi and
Jean{-}Fran{\c{c}}ois Biasse and
Edoardo Persichetti and
Paolo Santini},
editor = {Jung Hee Cheon and
Jean{-}Pierre Tillich},
title = {{LESS-FM:} Fine-Tuning Signatures from the Code Equivalence Problem},
booktitle = {Post-Quantum Cryptography - 12th International Workshop, PQCrypto
2021, Daejeon, South Korea, July 20-22, 2021, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {12841},
pages = {23--43},
publisher = {Springer},
year = {2021},
url = {https://doi.org/10.1007/978-3-030-81293-5\_2},
doi = {10.1007/978-3-030-81293-5\_2},
timestamp = {Sat, 30 Sep 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/pqcrypto/BarenghiBPS21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qce/PerrielloBP21,
author = {Simone Perriello and
Alessandro Barenghi and
Gerardo Pelosi},
editor = {Hausi A. M{\"{u}}ller and
Greg Byrd and
Candace Culhane and
Travis S. Humble},
title = {A Complete Quantum Circuit to Solve the Information Set Decoding Problem},
booktitle = {{IEEE} International Conference on Quantum Computing and Engineering,
{QCE} 2021, Broomfield, CO, USA, October 17-22, 2021},
pages = {366--377},
publisher = {{IEEE}},
year = {2021},
url = {https://doi.org/10.1109/QCE52317.2021.00056},
doi = {10.1109/QCE52317.2021.00056},
timestamp = {Thu, 14 Dec 2023 11:20:44 +0100},
biburl = {https://dblp.org/rec/conf/qce/PerrielloBP21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sebd/AtzoriBCFMPS021,
author = {Maurizio Atzori and
Alessandro Barenghi and
Sara Comai and
Mariagrazia Fugini and
Diego Marcia and
Gerardo Pelosi and
Manuela Sanguinetti and
Vincenzo Scotti},
editor = {Sergio Greco and
Maurizio Lenzerini and
Elio Masciari and
Andrea Tagarelli},
title = {Improving Work Life Conditions via Portable Knowledge-Driven Recommender
System (Discussion Paper)},
booktitle = {Proceedings of the 29th Italian Symposium on Advanced Database Systems,
{SEBD} 2021, Pizzo Calabro (VV), Italy, September 5-9, 2021},
series = {{CEUR} Workshop Proceedings},
volume = {2994},
pages = {498--505},
publisher = {CEUR-WS.org},
year = {2021},
url = {https://ceur-ws.org/Vol-2994/paper57.pdf},
timestamp = {Fri, 11 Oct 2024 07:47:20 +0200},
biburl = {https://dblp.org/rec/conf/sebd/AtzoriBCFMPS021.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/PerrielloBP21,
author = {Simone Perriello and
Alessandro Barenghi and
Gerardo Pelosi},
editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
Shujun Li and
Radha Poovendran and
Herv{\'{e}} Debar and
Moti Yung},
title = {A Quantum Circuit to Speed-Up the Cryptanalysis of Code-Based Cryptosystems},
booktitle = {Security and Privacy in Communication Networks - 17th {EAI} International
Conference, SecureComm 2021, Virtual Event, September 6-9, 2021, Proceedings,
Part {II}},
series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
and Telecommunications Engineering},
volume = {399},
pages = {458--474},
publisher = {Springer},
year = {2021},
url = {https://doi.org/10.1007/978-3-030-90022-9\_25},
doi = {10.1007/978-3-030-90022-9\_25},
timestamp = {Wed, 15 Dec 2021 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/securecomm/PerrielloBP21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarenghiBPS21,
author = {Alessandro Barenghi and
Jean{-}Fran{\c{c}}ois Biasse and
Edoardo Persichetti and
Paolo Santini},
title = {{LESS-FM:} Fine-tuning Signatures from a Code-based Cryptographic
Group Action},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {396},
year = {2021},
url = {https://eprint.iacr.org/2021/396},
timestamp = {Wed, 07 Apr 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/BarenghiBPS21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaldiBCPS21,
author = {Marco Baldi and
Alessandro Barenghi and
Franco Chiaraluce and
Gerardo Pelosi and
Paolo Santini},
title = {Performance bounds for {QC-MDPC} codes decoders},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {1557},
year = {2021},
url = {https://eprint.iacr.org/2021/1557},
timestamp = {Fri, 10 Dec 2021 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/iacr/BaldiBCPS21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcad/AgostaBP20,
author = {Giovanni Agosta and
Alessandro Barenghi and
Gerardo Pelosi},
title = {Compiler-Based Techniques to Secure Cryptographic Embedded Software
Against Side-Channel Attacks},
journal = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.},
volume = {39},
number = {8},
pages = {1550--1554},
year = {2020},
url = {https://doi.org/10.1109/TCAD.2019.2912924},
doi = {10.1109/TCAD.2019.2912924},
timestamp = {Mon, 28 Aug 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/tcad/AgostaBP20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcad/BarenghiFPZ20,
author = {Alessandro Barenghi and
William Fornaciari and
Gerardo Pelosi and
Davide Zoni},
title = {Scramble Suit: {A} Profile Differentiation Countermeasure to Prevent
Template Attacks},
journal = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.},
volume = {39},
number = {9},
pages = {1778--1791},
year = {2020},
url = {https://doi.org/10.1109/TCAD.2019.2926389},
doi = {10.1109/TCAD.2019.2926389},
timestamp = {Thu, 02 Sep 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/tcad/BarenghiFPZ20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MainardiSBP20,
author = {Nicholas Mainardi and
Davide Sampietro and
Alessandro Barenghi and
Gerardo Pelosi},
title = {Efficient Oblivious Substring Search via Architectural Support},
booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
Event / Austin, TX, USA, 7-11 December, 2020},
pages = {526--541},
publisher = {{ACM}},
year = {2020},
url = {https://doi.org/10.1145/3427228.3427296},
doi = {10.1145/3427228.3427296},
timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/acsac/MainardiSBP20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cf/BarenghiP20,
author = {Alessandro Barenghi and
Gerardo Pelosi},
editor = {Maurizio Palesi and
Gianluca Palermo and
Catherine Graves and
Eishi Arima},
title = {Constant weight strings in constant time: a building block for code-based
post-quantum cryptosystems},
booktitle = {Proceedings of the 17th {ACM} International Conference on Computing
Frontiers, {CF} 2020, Catania, Sicily, Italy, May 11-13, 2020},
pages = {132--141},
publisher = {{ACM}},
year = {2020},
url = {https://doi.org/10.1145/3387902.3392630},
doi = {10.1145/3387902.3392630},
timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/cf/BarenghiP20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cf/BarenghiP20a,
author = {Alessandro Barenghi and
Gerardo Pelosi},
editor = {Maurizio Palesi and
Gianluca Palermo and
Catherine Graves and
Eishi Arima},
title = {A comprehensive analysis of constant-time polynomial inversion for
post-quantum cryptosystems},
booktitle = {Proceedings of the 17th {ACM} International Conference on Computing
Frontiers, {CF} 2020, Catania, Sicily, Italy, May 11-13, 2020},
pages = {269--276},
publisher = {{ACM}},
year = {2020},
url = {https://doi.org/10.1145/3387902.3397224},
doi = {10.1145/3387902.3397224},
timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/cf/BarenghiP20a.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/BarenghiBFPZ20,
author = {Alessandro Barenghi and
Matteo Brevi and
William Fornaciari and
Gerardo Pelosi and
Davide Zoni},
editor = {Guido Marco Bertoni and
Francesco Regazzoni},
title = {Integrating Side Channel Security in the {FPGA} Hardware Design Flow},
booktitle = {Constructive Side-Channel Analysis and Secure Design - 11th International
Workshop, {COSADE} 2020, Lugano, Switzerland, April 1-3, 2020, Revised
Selected Papers},
series = {Lecture Notes in Computer Science},
volume = {12244},
pages = {275--290},
publisher = {Springer},
year = {2020},
url = {https://doi.org/10.1007/978-3-030-68773-1\_13},
doi = {10.1007/978-3-030-68773-1\_13},
timestamp = {Thu, 11 Feb 2021 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/cosade/BarenghiBFPZ20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/BaldiBCPS20a,
author = {Marco Baldi and
Alessandro Barenghi and
Franco Chiaraluce and
Gerardo Pelosi and
Paolo Santini},
editor = {Mohammad S. Obaidat and
Jalel Ben{-}Othman},
title = {Analysis of In-Place Randomized Bit-Flipping Decoders for the Design
of {LDPC} and {MDPC} Code-Based Cryptosystems},
booktitle = {E-Business and Telecommunications - 17th International Conference
on E-Business and Telecommunications, {ICETE} 2020, Online Event,
July 8-10, 2020, Revised Selected Papers},
series = {Communications in Computer and Information Science},
volume = {1484},
pages = {151--174},
publisher = {Springer},
year = {2020},
url = {https://doi.org/10.1007/978-3-030-90428-9\_7},
doi = {10.1007/978-3-030-90428-9\_7},
timestamp = {Wed, 15 Dec 2021 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/icete/BaldiBCPS20a.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/BaldiBCPS20,
author = {Marco Baldi and
Alessandro Barenghi and
Franco Chiaraluce and
Gerardo Pelosi and
Paolo Santini},
editor = {Pierangela Samarati and
Sabrina De Capitani di Vimercati and
Mohammad S. Obaidat and
Jalel Ben{-}Othman},
title = {A Failure Rate Model of Bit-flipping Decoders for {QC-LDPC} and {QC-MDPC}
Code-based Cryptosystems},
booktitle = {Proceedings of the 17th International Joint Conference on e-Business
and Telecommunications, {ICETE} 2020 - Volume 2: SECRYPT, Lieusaint,
Paris, France, July 8-10, 2020},
pages = {238--249},
publisher = {ScitePress},
year = {2020},
url = {https://doi.org/10.5220/0009891702380249},
doi = {10.5220/0009891702380249},
timestamp = {Mon, 03 Jan 2022 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/icete/BaldiBCPS20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/samos/AlmeidaAAABBOCD20,
author = {Rosa Maria Resende de Almeida and
Adriana Grau Aberturas and
Yolanda Bueno Aguado and
Maurizio Atzori and
Alessandro Barenghi and
Gianluca Borghini and
Carlos Alberto Catalina Ortega and
Sara Comai and
Raquel Losada Dur{\'{a}}n and
Mariagrazia Fugini and
Hatice Gunes and
Basam Musleh Lancis and
Gerardo Pelosi and
Vincenzo Ronca and
Licia Sbattella and
Roberto Tedesco and
Tian Xu},
editor = {Alex Orailoglu and
Matthias Jung and
Marc Reichenbach},
title = {Decision Support Systems to Promote Health and Well-Being of People
During Their Working Age: The Case of the WorkingAge {EU} Project},
booktitle = {Embedded Computer Systems: Architectures, Modeling, and Simulation
- 20th International Conference, {SAMOS} 2020, Samos, Greece, July
5-9, 2020, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {12471},
pages = {336--347},
publisher = {Springer},
year = {2020},
url = {https://doi.org/10.1007/978-3-030-60939-9\_24},
doi = {10.1007/978-3-030-60939-9\_24},
timestamp = {Tue, 20 Oct 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/samos/AlmeidaAAABBOCD20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@misc{DBLP:data/10/BaldiBCPS20,
author = {Marco Baldi and
Alessandro Barenghi and
Franco Chiaraluce and
Gerardo Pelosi and
Paolo Santini},
title = {Dataset related to Analysis of Decoding Failures of {LDPC} and {MDPC}
Codes in Out-of-Place Bit Flipping Decoding (Version 1)},
publisher = {Zenodo},
year = {2020},
month = oct,
howpublished = {\url{https://doi.org/10.5281/zenodo.4161456}},
note = {Accessed on YYYY-MM-DD.},
url = {https://doi.org/10.5281/zenodo.4161456},
doi = {10.5281/ZENODO.4161456},
timestamp = {Fri, 27 Sep 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/data/10/BaldiBCPS20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MainardiBP20,
author = {Nicholas Mainardi and
Alessandro Barenghi and
Gerardo Pelosi},
title = {Plaintext Recovery Attacks against Linearly Decryptable Fully Homomorphic
Encryption Schemes},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {264},
year = {2020},
url = {https://eprint.iacr.org/2020/264},
timestamp = {Mon, 11 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/MainardiBP20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/algorithms/BaldiBCPS19,
author = {Marco Baldi and
Alessandro Barenghi and
Franco Chiaraluce and
Gerardo Pelosi and
Paolo Santini},
title = {A Finite Regime Analysis of Information Set Decoding Algorithms},
journal = {Algorithms},
volume = {12},
number = {10},
pages = {209},
year = {2019},
url = {https://doi.org/10.3390/a12100209},
doi = {10.3390/A12100209},
timestamp = {Mon, 03 Jan 2022 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/algorithms/BaldiBCPS19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MainardiBP19,
author = {Nicholas Mainardi and
Alessandro Barenghi and
Gerardo Pelosi},
title = {Plaintext recovery attacks against linearly decryptable fully homomorphic
encryption schemes},
journal = {Comput. Secur.},
volume = {87},
year = {2019},
url = {https://doi.org/10.1016/j.cose.2019.101587},
doi = {10.1016/J.COSE.2019.101587},
timestamp = {Mon, 28 Aug 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/compsec/MainardiBP19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MainardiBP19,
author = {Nicholas Mainardi and
Alessandro Barenghi and
Gerardo Pelosi},
editor = {David M. Balenson},
title = {Privacy preserving substring search protocol with polylogarithmic
communication cost},
booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference,
{ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
pages = {297--312},
publisher = {{ACM}},
year = {2019},
url = {https://doi.org/10.1145/3359789.3359842},
doi = {10.1145/3359789.3359842},
timestamp = {Thu, 30 May 2024 10:08:27 +0200},
biburl = {https://dblp.org/rec/conf/acsac/MainardiBP19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cbc/BaldiBCPS19,
author = {Marco Baldi and
Alessandro Barenghi and
Franco Chiaraluce and
Gerardo Pelosi and
Paolo Santini},
editor = {Marco Baldi and
Edoardo Persichetti and
Paolo Santini},
title = {LEDAcrypt: {QC-LDPC} Code-Based Cryptosystems with Bounded Decryption
Failure Rate},
booktitle = {Code-Based Cryptography - 7th International Workshop, {CBC} 2019,
Darmstadt, Germany, May 18-19, 2019, Revised Selected Papers},
series = {Lecture Notes in Computer Science},
volume = {11666},
pages = {11--43},
publisher = {Springer},
year = {2019},
url = {https://doi.org/10.1007/978-3-030-25922-8\_2},
doi = {10.1007/978-3-030-25922-8\_2},
timestamp = {Mon, 03 Jan 2022 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/cbc/BaldiBCPS19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cf/IzzoBBPA19,
author = {Niccol{\`{o}} Izzo and
Alessandro Barenghi and
Luca Breveglieri and
Gerardo Pelosi and
Paolo Amato},
editor = {Francesca Palumbo and
Michela Becchi and
Martin Schulz and
Kento Sato},
title = {A secure and authenticated host-to-memory communication interface},
booktitle = {Proceedings of the 16th {ACM} International Conference on Computing
Frontiers, {CF} 2019, Alghero, Italy, April 30 - May 2, 2019},
pages = {386--391},
publisher = {{ACM}},
year = {2019},
url = {https://doi.org/10.1145/3310273.3323401},
doi = {10.1145/3310273.3323401},
timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/cf/IzzoBBPA19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icecsys/BarenghiFGPZ19,
author = {Alessandro Barenghi and
William Fornaciari and
Andrea Galimberti and
Gerardo Pelosi and
Davide Zoni},
title = {Evaluating the Trade-offs in the Hardware Design of the LEDAcrypt
Encryption Functions},
booktitle = {26th {IEEE} International Conference on Electronics, Circuits and
Systems, {ICECS} 2019, Genoa, Italy, November 27-29, 2019},
pages = {739--742},
publisher = {{IEEE}},
year = {2019},
url = {https://doi.org/10.1109/ICECS46596.2019.8964882},
doi = {10.1109/ICECS46596.2019.8964882},
timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/icecsys/BarenghiFGPZ19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1912-05182,
author = {Paolo Santini and
Alessandro Barenghi and
Gerardo Pelosi and
Marco Baldi and
Franco Chiaraluce},
title = {A Code-specific Conservative Model for the Failure Rate of Bit-flipping
Decoding of {LDPC} Codes with Cryptographic Applications},
journal = {CoRR},
volume = {abs/1912.05182},
year = {2019},
url = {http://arxiv.org/abs/1912.05182},
eprinttype = {arXiv},
eprint = {1912.05182},
timestamp = {Thu, 02 Jan 2020 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/corr/abs-1912-05182.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SantiniBPBC19,
author = {Paolo Santini and
Alessandro Barenghi and
Gerardo Pelosi and
Marco Baldi and
Franco Chiaraluce},
title = {A Code-specific Conservative Model for the Failure Rate of Bit-flipping
Decoding of {LDPC} Codes with Cryptographic Applications},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {1441},
year = {2019},
url = {https://eprint.iacr.org/2019/1441},
timestamp = {Mon, 11 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/SantiniBPBC19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BarenghiMP18,
author = {Alessandro Barenghi and
Nicholas Mainardi and
Gerardo Pelosi},
title = {Systematic parsing of {X.509:} Eradicating security issues with a
parse tree},
journal = {J. Comput. Secur.},
volume = {26},
number = {6},
pages = {817--849},
year = {2018},
url = {https://doi.org/10.3233/JCS-171110},
doi = {10.3233/JCS-171110},
timestamp = {Mon, 11 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/jcs/BarenghiMP18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mam/AgostaBPS18,
author = {Giovanni Agosta and
Alessandro Barenghi and
Gerardo Pelosi and
Michele Scandale},
title = {Reactive side-channel countermeasures: Applicability and quantitative
security evaluation},
journal = {Microprocess. Microsystems},
volume = {62},
pages = {50--60},
year = {2018},
url = {https://doi.org/10.1016/j.micpro.2018.07.001},
doi = {10.1016/J.MICPRO.2018.07.001},
timestamp = {Sat, 22 Feb 2020 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/mam/AgostaBPS18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/todaes/ZoniBPF18,
author = {Davide Zoni and
Alessandro Barenghi and
Gerardo Pelosi and
William Fornaciari},
title = {A Comprehensive Side-Channel Information Leakage Analysis of an In-Order
{RISC} {CPU} Microarchitecture},
journal = {{ACM} Trans. Design Autom. Electr. Syst.},
volume = {23},
number = {5},
pages = {57:1--57:30},
year = {2018},
url = {https://doi.org/10.1145/3212719},
doi = {10.1145/3212719},
timestamp = {Wed, 25 Sep 2019 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/todaes/ZoniBPF18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dac/BarenghiP18,
author = {Alessandro Barenghi and
Gerardo Pelosi},
title = {Side-channel security of superscalar CPUs: evaluating the impact of
micro-architectural features},
booktitle = {Proceedings of the 55th Annual Design Automation Conference, {DAC}
2018, San Francisco, CA, USA, June 24-29, 2018},
pages = {120:1--120:6},
publisher = {{ACM}},
year = {2018},
url = {https://doi.org/10.1145/3195970.3196112},
doi = {10.1145/3195970.3196112},
timestamp = {Wed, 16 Oct 2019 14:14:54 +0200},
biburl = {https://dblp.org/rec/conf/dac/BarenghiP18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/BarenghiMP18,
author = {Alessandro Barenghi and
Nicholas Mainardi and
Gerardo Pelosi},
editor = {David Naccache and
Shouhuai Xu and
Sihan Qing and
Pierangela Samarati and
Gregory Blanc and
Rongxing Lu and
Zonghua Zhang and
Ahmed Meddahi},
title = {Comparison-Based Attacks Against Noise-Free Fully Homomorphic Encryption
Schemes},
booktitle = {Information and Communications Security - 20th International Conference,
{ICICS} 2018, Lille, France, October 29-31, 2018, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {11149},
pages = {177--191},
publisher = {Springer},
year = {2018},
url = {https://doi.org/10.1007/978-3-030-01950-1\_11},
doi = {10.1007/978-3-030-01950-1\_11},
timestamp = {Sat, 05 Sep 2020 18:01:07 +0200},
biburl = {https://dblp.org/rec/conf/icics/BarenghiMP18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ieeehpcs/BarenghiMMP18,
author = {Alessandro Barenghi and
Michele Madaschi and
Nicholas Mainardi and
Gerardo Pelosi},
title = {OpenCL {HLS} Based Design of {FPGA} Accelerators for Cryptographic
Primitives},
booktitle = {2018 International Conference on High Performance Computing {\&} Simulation,
{HPCS} 2018, Orleans, France, July 16-20, 2018},
pages = {634--641},
publisher = {{IEEE}},
year = {2018},
url = {https://doi.org/10.1109/HPCS.2018.00105},
doi = {10.1109/HPCS.2018.00105},
timestamp = {Wed, 16 Oct 2019 14:14:54 +0200},
biburl = {https://dblp.org/rec/conf/ieeehpcs/BarenghiMMP18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/BarenghiBIP18,
author = {Alessandro Barenghi and
Luca Breveglieri and
Niccol{\`{o}} Izzo and
Gerardo Pelosi},
title = {Software-only Reverse Engineering of Physical {DRAM} Mappings for
Rowhammer Attacks},
booktitle = {3rd {IEEE} International Verification and Security Workshop, {IVSW}
2018, Costa Brava, Spain, July 2-4, 2018},
pages = {19--24},
publisher = {{IEEE}},
year = {2018},
url = {https://doi.org/10.1109/IVSW.2018.8494868},
doi = {10.1109/IVSW.2018.8494868},
timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/ivsw/BarenghiBIP18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/BaldiBCPS18,
author = {Marco Baldi and
Alessandro Barenghi and
Franco Chiaraluce and
Gerardo Pelosi and
Paolo Santini},
editor = {Tanja Lange and
Rainer Steinwandt},
title = {LEDAkem: {A} Post-quantum Key Encapsulation Mechanism Based on {QC-LDPC}
Codes},
booktitle = {Post-Quantum Cryptography - 9th International Conference, PQCrypto
2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {10786},
pages = {3--24},
publisher = {Springer},
year = {2018},
url = {https://doi.org/10.1007/978-3-319-79063-3\_1},
doi = {10.1007/978-3-319-79063-3\_1},
timestamp = {Tue, 14 May 2019 10:00:42 +0200},
biburl = {https://dblp.org/rec/conf/pqcrypto/BaldiBCPS18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/hipeac/2018cs,
editor = {John Goodacre and
Mikel Luj{\'{a}}n and
Giovanni Agosta and
Alessandro Barenghi and
Israel Koren and
Gerardo Pelosi},
title = {Proceedings of the Fifth Workshop on Cryptography and Security in
Computing Systems, {CS2} 2018, Manchester, United Kingdom, January
24, 2018},
publisher = {{ACM}},
year = {2018},
url = {https://doi.org/10.1145/3178291},
doi = {10.1145/3178291},
isbn = {978-1-4503-6374-7},
timestamp = {Tue, 18 Dec 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/hipeac/2018cs.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1801-08867,
author = {Marco Baldi and
Alessandro Barenghi and
Franco Chiaraluce and
Gerardo Pelosi and
Paolo Santini},
title = {LEDAkem: a post-quantum key encapsulation mechanism based on {QC-LDPC}
codes},
journal = {CoRR},
volume = {abs/1801.08867},
year = {2018},
url = {http://arxiv.org/abs/1801.08867},
eprinttype = {arXiv},
eprint = {1801.08867},
timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-1801-08867.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1807-06127,
author = {Marco Baldi and
Alessandro Barenghi and
Franco Chiaraluce and
Gerardo Pelosi and
Joachim Rosenthal and
Paolo Santini and
Davide Schipani},
title = {Design and Implementation of a Digital Signature Scheme Based on Low-density
Generator Matrix Codes},
journal = {CoRR},
volume = {abs/1807.06127},
year = {2018},
url = {http://arxiv.org/abs/1807.06127},
eprinttype = {arXiv},
eprint = {1807.06127},
timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-1807-06127.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1812-04959,
author = {Alessandro Barenghi and
Nicholas Mainardi and
Gerardo Pelosi},
title = {Systematic Parsing of {X.509:} Eradicating Security Issues with a
Parse Tree},
journal = {CoRR},
volume = {abs/1812.04959},
year = {2018},
url = {http://arxiv.org/abs/1812.04959},
eprinttype = {arXiv},
eprint = {1812.04959},
timestamp = {Tue, 01 Jan 2019 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/corr/abs-1812-04959.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mam/OleksiakKPABBFP17,
author = {Ariel Oleksiak and
Michal Kierzynka and
Wojciech Piatek and
Giovanni Agosta and
Alessandro Barenghi and
Carlo Brandolese and
William Fornaciari and
Gerardo Pelosi and
Mariano Cecowski and
Robert Plestenjak and
Justin Cinkelj and
Mario Porrmann and
Jens Hagemeyer and
Ren{\'{e}} Griessl and
Jan Lachmair and
Meysam Peykanu and
Lennart Tigges and
Micha vor dem Berge and
Wolfgang Christmann and
Stefan Krupop and
Alexandre Carbon and
Lo{\"{\i}}c Cudennec and
Thierry Goubier and
Jean{-}Marc Philippe and
Sven Rosinger and
Daniel Schlitt and
Christian Pieper and
Chris Adeniyi{-}Jones and
Javier Setoain and
Luca Ceva and
Udo Janssen},
title = {{M2DC} - Modular Microserver DataCentre with heterogeneous hardware},
journal = {Microprocess. Microsystems},
volume = {52},
pages = {117--130},
year = {2017},
url = {https://doi.org/10.1016/j.micpro.2017.05.019},
doi = {10.1016/J.MICPRO.2017.05.019},
timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/mam/OleksiakKPABBFP17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispan/BarenghiMP17,
author = {Alessandro Barenghi and
Nicholas Mainardi and
Gerardo Pelosi},
title = {A Security Audit of the OpenPGP Format},
booktitle = {14th International Symposium on Pervasive Systems, Algorithms and
Networks {\&} 11th International Conference on Frontier of Computer
Science and Technology {\&} Third International Symposium of Creative
Computing, {ISPAN-FCST-ISCC} 2017, Exeter, United Kingdom, June 21-23,
2017},
pages = {336--343},
publisher = {{IEEE} Computer Society},
year = {2017},
url = {https://doi.org/10.1109/ISPAN-FCST-ISCC.2017.35},
doi = {10.1109/ISPAN-FCST-ISCC.2017.35},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/ispan/BarenghiMP17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itasec/BarenghiP17,
author = {Alessandro Barenghi and
Gerardo Pelosi},
editor = {Alessandro Armando and
Roberto Baldoni and
Riccardo Focardi},
title = {An Enhanced Dataflow Analysis to Automatically Tailor Side Channel
Attack Countermeasures to Software Block Ciphers},
booktitle = {Proceedings of the First Italian Conference on Cybersecurity (ITASEC17),
Venice, Italy, January 17-20, 2017},
series = {{CEUR} Workshop Proceedings},
volume = {1816},
pages = {8--18},
publisher = {CEUR-WS.org},
year = {2017},
url = {https://ceur-ws.org/Vol-1816/paper-02.pdf},
timestamp = {Fri, 10 Mar 2023 16:22:11 +0100},
biburl = {https://dblp.org/rec/conf/itasec/BarenghiP17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/hipeac/2017cs,
editor = {Mats Brorsson and
Zhonghai Lu and
Giovanni Agosta and
Alessandro Barenghi and
Gerardo Pelosi},
title = {Proceedings of the Fourth Workshop on Cryptography and Security in
Computing Systems, CS2@HiPEAC 2017, Stockholm, Sweden, January 24,
2017},
publisher = {{ACM}},
year = {2017},
url = {https://doi.org/10.1145/3031836},
doi = {10.1145/3031836},
isbn = {978-1-4503-4869-0},
timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/hipeac/2017cs.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BarenghiBFP16,
author = {Alessandro Barenghi and
Michele Beretta and
Alessandro Di Federico and
Gerardo Pelosi},
title = {A privacy-preserving encrypted {OSN} with stateless server interaction:
The Snake design},
journal = {Comput. Secur.},
volume = {63},
pages = {67--84},
year = {2016},
url = {https://doi.org/10.1016/j.cose.2016.09.005},
doi = {10.1016/J.COSE.2016.09.005},
timestamp = {Thu, 20 Feb 2020 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/compsec/BarenghiBFP16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jetc/BarenghiBBPSS16,
author = {Alessandro Barenghi and
Guido Marco Bertoni and
Luca Breveglieri and
Gerardo Pelosi and
Stefano Sanfilippo and
Ruggero Susella},
title = {A Fault-Based Secret Key Retrieval Method for {ECDSA:} Analysis and
Countermeasure},
journal = {{ACM} J. Emerg. Technol. Comput. Syst.},
volume = {13},
number = {1},
pages = {8:1--8:26},
year = {2016},
url = {https://doi.org/10.1145/2767132},
doi = {10.1145/2767132},
timestamp = {Tue, 29 Dec 2020 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/jetc/BarenghiBBPSS16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ContinellaGZPBZ16,
author = {Andrea Continella and
Alessandro Guagnelli and
Giovanni Zingaro and
Giulio De Pasquale and
Alessandro Barenghi and
Stefano Zanero and
Federico Maggi},
editor = {Stephen Schwab and
William K. Robertson and
Davide Balzarotti},
title = {ShieldFS: a self-healing, ransomware-aware filesystem},
booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
{ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
pages = {336--347},
publisher = {{ACM}},
year = {2016},
url = {http://dl.acm.org/citation.cfm?id=2991110},
timestamp = {Tue, 06 Nov 2018 16:59:24 +0100},
biburl = {https://dblp.org/rec/conf/acsac/ContinellaGZPBZ16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cd/AgostaBP16,
author = {Giovanni Agosta and
Alessandro Barenghi and
Gerardo Pelosi},
editor = {Gianluca Palermo and
John Feo},
title = {Automated instantiation of side-channel attacks countermeasures for
software cipher implementations},
booktitle = {Proceedings of the {ACM} International Conference on Computing Frontiers,
CF'16, Como, Italy, May 16-19, 2016},
pages = {455--460},
publisher = {{ACM}},
year = {2016},
url = {https://doi.org/10.1145/2903150.2911707},
doi = {10.1145/2903150.2911707},
timestamp = {Wed, 25 Sep 2019 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/cd/AgostaBP16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsd/AgostaBBFPDMMFN16,
author = {Giovanni Agosta and
Alessandro Barenghi and
Carlo Brandolese and
William Fornaciari and
Gerardo Pelosi and
Stefano Delucchi and
Massimo Massa and
Maurizio Mongelli and
Enrico Ferrari and
Leonardo Napoletani and
Luciano Bozzi and
Carlo Tieri and
Dajana Cassioli and
Luigi Pomante},
editor = {Paris Kitsos},
title = {{V2I} Cooperation for Traffic Management with SafeCop},
booktitle = {2016 Euromicro Conference on Digital System Design, {DSD} 2016, Limassol,
Cyprus, August 31 - September 2, 2016},
pages = {621--627},
publisher = {{IEEE} Computer Society},
year = {2016},
url = {https://doi.org/10.1109/DSD.2016.18},
doi = {10.1109/DSD.2016.18},
timestamp = {Mon, 05 Feb 2024 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/dsd/AgostaBBFPDMMFN16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccad/AgostaBPS16,
author = {Giovanni Agosta and
Alessandro Barenghi and
Gerardo Pelosi and
Michele Scandale},
editor = {Frank Liu},
title = {Encasing block ciphers to foil key recovery attempts via side channel},
booktitle = {Proceedings of the 35th International Conference on Computer-Aided
Design, {ICCAD} 2016, Austin, TX, USA, November 7-10, 2016},
pages = {96},
publisher = {{ACM}},
year = {2016},
url = {https://doi.org/10.1145/2966986.2967033},
doi = {10.1145/2966986.2967033},
timestamp = {Fri, 23 Jun 2023 22:29:48 +0200},
biburl = {https://dblp.org/rec/conf/iccad/AgostaBPS16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/BarenghiP16,
author = {Alessandro Barenghi and
Gerardo Pelosi},
editor = {Kazuto Ogawa and
Katsunari Yoshioka},
title = {A Note on Fault Attacks Against Deterministic Signature Schemes},
booktitle = {Advances in Information and Computer Security - 11th International
Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14,
2016, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {9836},
pages = {182--192},
publisher = {Springer},
year = {2016},
url = {https://doi.org/10.1007/978-3-319-44524-3\_11},
doi = {10.1007/978-3-319-44524-3\_11},
timestamp = {Wed, 25 Sep 2019 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/iwsec/BarenghiP16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/samos/AgneessensBDMAB16,
author = {Alessio Agneessens and
Francesco Buemi and
Stefano Delucchi and
Massimo Massa and
Giovanni Agosta and
Alessandro Barenghi and
Carlo Brandolese and
William Fornaciari and
Gerardo Pelosi and
Enrico Ferrari and
Dajana Cassioli and
Luigi Pomante and
Leonardo Napoletani and
Luciano Bozzi and
Carlo Tieri and
Maurizio Mongelli},
editor = {Walid A. Najjar and
Andreas Gerstlauer},
title = {Safe cooperative {CPS:} {A} {V2I} traffic management scenario in the
SafeCOP project},
booktitle = {International Conference on Embedded Computer Systems: Architectures,
Modeling and Simulation, {SAMOS} 2016, Agios Konstantinos, Samos Island,
Greece, July 17-21, 2016},
pages = {320--327},
publisher = {{IEEE}},
year = {2016},
url = {https://doi.org/10.1109/SAMOS.2016.7818365},
doi = {10.1109/SAMOS.2016.7818365},
timestamp = {Mon, 05 Feb 2024 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/samos/AgneessensBDMAB16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/hipeac/2016cs,
editor = {Martin Palkovic and
Giovanni Agosta and
Alessandro Barenghi and
Israel Koren and
Gerardo Pelosi},
title = {Proceedings of the Third Workshop on Cryptography and Security in
Computing Systems, CS2@HiPEAC, Prague, Czech Republic, January 20,
2016},
publisher = {{ACM}},
year = {2016},
url = {https://doi.org/10.1145/2858930},
doi = {10.1145/2858930},
isbn = {978-1-4503-4065-6},
timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/hipeac/2016cs.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/AgostaBFP15,
author = {Giovanni Agosta and
Alessandro Barenghi and
Alessandro Di Federico and
Gerardo Pelosi},
title = {OpenCL performance portability for general-purpose computation on
graphics processor units: an exploration on cryptographic primitives},
journal = {Concurr. Comput. Pract. Exp.},
volume = {27},
number = {14},
pages = {3633--3660},
year = {2015},
url = {https://doi.org/10.1002/cpe.3358},
doi = {10.1002/CPE.3358},
timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/concurrency/AgostaBFP15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/AgostaBPS15,
author = {Giovanni Agosta and
Alessandro Barenghi and
Gerardo Pelosi and
Michele Scandale},
title = {Trace-based schedulability analysis to enhance passive side-channel
attack resilience of embedded software},
journal = {Inf. Process. Lett.},
volume = {115},
number = {2},
pages = {292--297},
year = {2015},
url = {https://doi.org/10.1016/j.ipl.2014.09.030},
doi = {10.1016/J.IPL.2014.09.030},
timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/ipl/AgostaBPS15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scp/BarenghiCMPP15,
author = {Alessandro Barenghi and
Stefano Crespi{-}Reghizzi and
Dino Mandrioli and
Federica Panella and
Matteo Pradella},
title = {Parallel parsing made practical},
journal = {Sci. Comput. Program.},
volume = {112},
pages = {195--226},
year = {2015},
url = {https://doi.org/10.1016/j.scico.2015.09.002},
doi = {10.1016/J.SCICO.2015.09.002},
timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/scp/BarenghiCMPP15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcad/AgostaBPS15,
author = {Giovanni Agosta and
Alessandro Barenghi and
Gerardo Pelosi and
Michele Scandale},
title = {The {MEET} Approach: Securing Cryptographic Embedded Software Against
Side Channel Attacks},
journal = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.},
volume = {34},
number = {8},
pages = {1320--1333},
year = {2015},
url = {https://doi.org/10.1109/TCAD.2015.2430320},
doi = {10.1109/TCAD.2015.2430320},
timestamp = {Thu, 24 Sep 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/tcad/AgostaBPS15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dac/AgostaBPS15,
author = {Giovanni Agosta and
Alessandro Barenghi and
Gerardo Pelosi and
Michele Scandale},
title = {Information leakage chaff: feeding red herrings to side channel attackers},
booktitle = {Proceedings of the 52nd Annual Design Automation Conference, San Francisco,
CA, USA, June 7-11, 2015},
pages = {33:1--33:6},
publisher = {{ACM}},
year = {2015},
url = {https://doi.org/10.1145/2744769.2744859},
doi = {10.1145/2744769.2744859},
timestamp = {Wed, 25 Sep 2019 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/dac/AgostaBPS15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BarenghiFPS15,
author = {Alessandro Barenghi and
Alessandro Di Federico and
Gerardo Pelosi and
Stefano Sanfilippo},
editor = {G{\"{u}}nther Pernul and
Peter Y. A. Ryan and
Edgar R. Weippl},
title = {Challenging the Trustworthiness of {PGP:} Is the Web-of-Trust Tear-Proof?},
booktitle = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research
in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings,
Part {I}},
series = {Lecture Notes in Computer Science},
volume = {9326},
pages = {429--446},
publisher = {Springer},
year = {2015},
url = {https://doi.org/10.1007/978-3-319-24174-6\_22},
doi = {10.1007/978-3-319-24174-6\_22},
timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/esorics/BarenghiFPS15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccst/AgostaABGP15,
author = {Giovanni Agosta and
Alessio Antonini and
Alessandro Barenghi and
Dario Galeri and
Gerardo Pelosi},
title = {Cyber-security analysis and evaluation for smart home management solutions},
booktitle = {International Carnahan Conference on Security Technology, {ICCST}
2015, Taipei, Taiwan, September 21-24, 2015},
pages = {1--6},
publisher = {{IEEE}},
year = {2015},
url = {https://doi.org/10.1109/CCST.2015.7389663},
doi = {10.1109/CCST.2015.7389663},
timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/iccst/AgostaABGP15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/hipeac/2015cs,
editor = {Andy D. Pimentel and
Stephan Wong and
Gerardo Pelosi and
Israel Koren and
Giovanni Agosta and
Alessandro Barenghi},
title = {Proceedings of the Second Workshop on Cryptography and Security in
Computing Systems, CS2@HiPEAC 2015, Amsterdam, Netherlands, January
19-21, 2015},
publisher = {{ACM}},
year = {2015},
url = {http://dl.acm.org/citation.cfm?id=2694805},
isbn = {978-1-4503-3187-6},
timestamp = {Sun, 25 Jan 2015 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/hipeac/2015cs.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-cdt/AgostaBMP14,
author = {Giovanni Agosta and
Alessandro Barenghi and
Massimo Maggi and
Gerardo Pelosi},
title = {Design space extension for secure implementation of block ciphers},
journal = {{IET} Comput. Digit. Tech.},
volume = {8},
number = {6},
pages = {256--263},
year = {2014},
url = {https://doi.org/10.1049/iet-cdt.2014.0037},
doi = {10.1049/IET-CDT.2014.0037},
timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iet-cdt/AgostaBMP14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tetc/BarenghiHBSRK14,
author = {Alessandro Barenghi and
C{\'{e}}dric Hocquet and
David Bol and
Fran{\c{c}}ois{-}Xavier Standaert and
Francesco Regazzoni and
Israel Koren},
title = {A Combined Design-Time/Test-Time Study of the Vulnerability of Sub-Threshold
Devices to Low Voltage Fault Attacks},
journal = {{IEEE} Trans. Emerg. Top. Comput.},
volume = {2},
number = {2},
pages = {107--118},
year = {2014},
url = {https://doi.org/10.1109/TETC.2014.2316509},
doi = {10.1109/TETC.2014.2316509},
timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/tetc/BarenghiHBSRK14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cc/BarenghiCMPP14,
author = {Alessandro Barenghi and
Stefano Crespi{-}Reghizzi and
Dino Mandrioli and
Federica Panella and
Matteo Pradella},
editor = {Albert Cohen},
title = {The {PAPAGENO} Parallel-Parser Generator},
booktitle = {Compiler Construction - 23rd International Conference, {CC} 2014,
Held as Part of the European Joint Conferences on Theory and Practice
of Software, {ETAPS} 2014, Grenoble, France, April 5-13, 2014. Proceedings},
series = {Lecture Notes in Computer Science},
volume = {8409},
pages = {192--196},
publisher = {Springer},
year = {2014},
url = {https://doi.org/10.1007/978-3-642-54807-9\_11},
doi = {10.1007/978-3-642-54807-9\_11},
timestamp = {Tue, 29 Dec 2020 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/cc/BarenghiCMPP14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dac/AgostaBPS14,
author = {Giovanni Agosta and
Alessandro Barenghi and
Gerardo Pelosi and
Michele Scandale},
title = {A Multiple Equivalent Execution Trace Approach to Secure Cryptographic
Embedded Software},
booktitle = {The 51st Annual Design Automation Conference 2014, {DAC} '14, San
Francisco, CA, USA, June 1-5, 2014},
pages = {210:1--210:6},
publisher = {{ACM}},
year = {2014},
url = {https://doi.org/10.1145/2593069.2593073},
doi = {10.1145/2593069.2593073},
timestamp = {Wed, 25 Sep 2019 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/dac/AgostaBPS14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpcc/BarenghiBFP14,
author = {Alessandro Barenghi and
Michele Beretta and
Alessandro Di Federico and
Gerardo Pelosi},
title = {Snake: An End-to-End Encrypted Online Social Network},
booktitle = {2014 {IEEE} International Conference on High Performance Computing
and Communications, 6th {IEEE} International Symposium on Cyberspace
Safety and Security, 11th {IEEE} International Conference on Embedded
Software and Systems, {HPCC/CSS/ICESS} 2014, Paris, France, August
20-22, 2014},
pages = {763--770},
publisher = {{IEEE}},
year = {2014},
url = {https://doi.org/10.1109/HPCC.2014.128},
doi = {10.1109/HPCC.2014.128},
timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/hpcc/BarenghiBFP14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic-nc/AgostaBPS14,
author = {Giovanni Agosta and
Alessandro Barenghi and
Gerardo Pelosi and
Michele Scandale},
title = {Towards Transparently Tackling Functionality and Performance Issues
across Different OpenCL Platforms},
booktitle = {Second International Symposium on Computing and Networking, {CANDAR}
2014, Shizuoka, Japan, December 10-12, 2014},
pages = {130--136},
publisher = {{IEEE} Computer Society},
year = {2014},
url = {https://doi.org/10.1109/CANDAR.2014.53},
doi = {10.1109/CANDAR.2014.53},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/ic-nc/AgostaBPS14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccst/AgostaBP14,
author = {Giovanni Agosta and
Alessandro Barenghi and
Gerardo Pelosi},
title = {Securing software cryptographic primitives for embedded systems against
side channel attacks},
booktitle = {International Carnahan Conference on Security Technology, {ICCST}
2014, Rome, Italy, October 13-16, 2014},
pages = {1--6},
publisher = {{IEEE}},
year = {2014},
url = {https://doi.org/10.1109/CCST.2014.6987032},
doi = {10.1109/CCST.2014.6987032},
timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
biburl = {https://dblp.org/rec/conf/iccst/AgostaBP14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccst/AntoniniBPZ14,
author = {Alessio Antonini and
Alessandro Barenghi and
Gerardo Pelosi and
Saman A. Zonouz},
title = {Security challenges in building automation and {SCADA}},
booktitle = {International Carnahan Conference on Security Technology, {ICCST}
2014, Rome, Italy, October 13-16, 2014},
pages = {1--6},
publisher = {{IEEE}},
year = {2014},
url = {https://doi.org/10.1109/CCST.2014.6986996},
doi = {10.1109/CCST.2014.6986996},
timestamp = {Wed, 25 Sep 2019 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/iccst/AntoniniBPZ14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BarenghiP14,
author = {Alessandro Barenghi and
Gerardo Pelosi},
editor = {Mohammad S. Obaidat and
Andreas Holzinger and
Pierangela Samarati},
title = {On the Security of Partially Masked Software Implementations},
booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
pages = {492--499},
publisher = {SciTePress},
year = {2014},
url = {https://doi.org/10.5220/0005120504920499},
doi = {10.5220/0005120504920499},
timestamp = {Wed, 11 Aug 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/secrypt/BarenghiP14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/AgostaBPS14,
author = {Giovanni Agosta and
Alessandro Barenghi and
Gerardo Pelosi and
Michele Scandale},
editor = {Ron Poet and
Muttukrishnan Rajarajan},
title = {Differential Fault Analysis for Block Ciphers: an Automated Conservative
Analysis},
booktitle = {Proceedings of the 7th International Conference on Security of Information
and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
pages = {137},
publisher = {{ACM}},
year = {2014},
url = {https://doi.org/10.1145/2659651.2659709},
doi = {10.1145/2659651.2659709},
timestamp = {Wed, 25 Sep 2019 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/sin/AgostaBPS14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarenghiPR14,
author = {Alessandro Barenghi and
Gerardo Pelosi and
Francesco Regazzoni},
title = {Simulation-Time Security Margin Assessment against Power-Based Side
Channel Attacks},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {307},
year = {2014},
url = {http://eprint.iacr.org/2014/307},
timestamp = {Mon, 11 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/BarenghiPR14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijguc/BarenghiPT13,
author = {Alessandro Barenghi and
Gerardo Pelosi and
Federico Terraneo},
title = {Secure and efficient design of software block cipher implementations
on microcontrollers},
journal = {Int. J. Grid Util. Comput.},
volume = {4},
number = {2/3},
pages = {110--118},
year = {2013},
url = {https://doi.org/10.1504/IJGUC.2013.056246},
doi = {10.1504/IJGUC.2013.056246},
timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/ijguc/BarenghiPT13.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/BarenghiCMP13,
author = {Alessandro Barenghi and
Stefano Crespi{-}Reghizzi and
Dino Mandrioli and
Matteo Pradella},
title = {Parallel parsing of operator precedence grammars},
journal = {Inf. Process. Lett.},
volume = {113},
number = {7},
pages = {245--249},
year = {2013},
url = {https://doi.org/10.1016/j.ipl.2013.01.008},
doi = {10.1016/J.IPL.2013.01.008},
timestamp = {Tue, 29 Dec 2020 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/ipl/BarenghiCMP13.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/BarenghiBBP13,
author = {Alessandro Barenghi and
Guido Marco Bertoni and
Luca Breveglieri and
Gerardo Pelosi},
title = {A fault induction technique based on voltage underfeeding with application
to attacks against {AES} and {RSA}},
journal = {J. Syst. Softw.},
volume = {86},
number = {7},
pages = {1864--1878},
year = {2013},
url = {https://doi.org/10.1016/j.jss.2013.02.021},
doi = {10.1016/J.JSS.2013.02.021},
timestamp = {Tue, 29 Dec 2020 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/jss/BarenghiBBP13.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dac/AgostaBMP13,
author = {Giovanni Agosta and
Alessandro Barenghi and
Massimo Maggi and
Gerardo Pelosi},
title = {Compiler-based side channel vulnerability analysis and optimized countermeasures
application},
booktitle = {The 50th Annual Design Automation Conference 2013, {DAC} '13, Austin,
TX, USA, May 29 - June 07, 2013},
pages = {81:1--81:6},
publisher = {{ACM}},
year = {2013},
url = {https://doi.org/10.1145/2463209.2488833},
doi = {10.1145/2463209.2488833},
timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/dac/AgostaBMP13.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itng/BarenghiPP13,
author = {Alessandro Barenghi and
Gerardo Pelosi and
Fabio Pozzi},
editor = {Shahram Latifi},
title = {Drop-In Control Flow Hijacking Prevention through Dynamic Library
Interception},
booktitle = {Tenth International Conference on Information Technology: New Generations,
{ITNG} 2013, 15-17 April, 2013, Las Vegas, Nevada, {USA}},
pages = {640--647},
publisher = {{IEEE} Computer Society},
year = {2013},
url = {https://doi.org/10.1109/ITNG.2013.99},
doi = {10.1109/ITNG.2013.99},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/itng/BarenghiPP13.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/AntoniniBP13,
author = {Alessio Antonini and
Alessandro Barenghi and
Gerardo Pelosi},
editor = {Hanne Riis Nielson and
Dieter Gollmann},
title = {Security Analysis of Building Automation Networks - Threat Model and
Viable Mitigation Techniques},
booktitle = {Secure {IT} Systems - 18th Nordic Conference, NordSec 2013, Ilulissat,
Greenland, October 18-21, 2013, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {8208},
pages = {199--214},
publisher = {Springer},
year = {2013},
url = {https://doi.org/10.1007/978-3-642-41488-6\_14},
doi = {10.1007/978-3-642-41488-6\_14},
timestamp = {Wed, 25 Sep 2019 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/nordsec/AntoniniBP13.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/AgostaBPS13,
author = {Giovanni Agosta and
Alessandro Barenghi and
Gerardo Pelosi and
Michele Scandale},
editor = {Javier L{\'{o}}pez and
Xinyi Huang and
Ravi S. Sandhu},
title = {Enhancing Passive Side-Channel Attack Resilience through Schedulability
Analysis of Data-Dependency Graphs},
booktitle = {Network and System Security - 7th International Conference, {NSS}
2013, Madrid, Spain, June 3-4, 2013. Proceedings},
series = {Lecture Notes in Computer Science},
volume = {7873},
pages = {692--698},
publisher = {Springer},
year = {2013},
url = {https://doi.org/10.1007/978-3-642-38631-2\_58},
doi = {10.1007/978-3-642-38631-2\_58},
timestamp = {Tue, 20 Aug 2024 07:54:43 +0200},
biburl = {https://dblp.org/rec/conf/nss/AgostaBPS13.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pieee/BarenghiBKN12,
author = {Alessandro Barenghi and
Luca Breveglieri and
Israel Koren and
David Naccache},
title = {Fault Injection Attacks on Cryptographic Devices: Theory, Practice,
and Countermeasures},
journal = {Proc. {IEEE}},
volume = {100},
number = {11},
pages = {3056--3076},
year = {2012},
url = {https://doi.org/10.1109/JPROC.2012.2188769},
doi = {10.1109/JPROC.2012.2188769},
timestamp = {Fri, 02 Oct 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/pieee/BarenghiBKN12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/arcs/AgostaBP11,
author = {Giovanni Agosta and
Alessandro Barenghi and
Gerardo Pelosi},
editor = {Gero M{\"{u}}hl and
Jan Richling and
Andreas Herkersdorf},
title = {Exploiting Bit-level Parallelism in GPGPUs: a Case Study on KeeLoq
Exhaustive Search Attacks},
booktitle = {{ARCS} 2012 Workshops, 28. Februar - 2. M{\"{a}}rz 2012, M{\"{u}}nchen,
Germany},
series = {{LNI}},
volume = {{P-200}},
pages = {385--396},
publisher = {{GI}},
year = {2012},
url = {https://ieeexplore.ieee.org/document/6222213/},
timestamp = {Mon, 14 Oct 2024 17:07:54 +0200},
biburl = {https://dblp.org/rec/conf/arcs/AgostaBP11.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dac/AgostaBP12,
author = {Giovanni Agosta and
Alessandro Barenghi and
Gerardo Pelosi},
editor = {Patrick Groeneveld and
Donatella Sciuto and
Soha Hassoun},
title = {A code morphing methodology to automate power analysis countermeasures},
booktitle = {The 49th Annual Design Automation Conference 2012, {DAC} '12, San
Francisco, CA, USA, June 3-7, 2012},
pages = {77--82},
publisher = {{ACM}},
year = {2012},
url = {https://doi.org/10.1145/2228360.2228376},
doi = {10.1145/2228360.2228376},
timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/dac/AgostaBP12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itng/AgostaBPP12,
author = {Giovanni Agosta and
Alessandro Barenghi and
Antonio Parata and
Gerardo Pelosi},
editor = {Shahram Latifi},
title = {Automated Security Analysis of Dynamic Web Applications through Symbolic
Code Execution},
booktitle = {Ninth International Conference on Information Technology: New Generations,
{ITNG} 2012, Las Vegas, Nevada, USA, 16-18 April, 2012},
pages = {189--194},
publisher = {{IEEE} Computer Society},
year = {2012},
url = {https://doi.org/10.1109/ITNG.2012.167},
doi = {10.1109/ITNG.2012.167},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/itng/AgostaBPP12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sle/BarenghiVCMP12,
author = {Alessandro Barenghi and
Ermes Viviani and
Stefano Crespi{-}Reghizzi and
Dino Mandrioli and
Matteo Pradella},
editor = {Krzysztof Czarnecki and
G{\"{o}}rel Hedin},
title = {{PAPAGENO:} {A} Parallel Parser Generator for Operator Precedence
Grammars},
booktitle = {Software Language Engineering, 5th International Conference, {SLE}
2012, Dresden, Germany, September 26-28, 2012, Revised Selected Papers},
series = {Lecture Notes in Computer Science},
volume = {7745},
pages = {264--274},
publisher = {Springer},
year = {2012},
url = {https://doi.org/10.1007/978-3-642-36089-3\_15},
doi = {10.1007/978-3-642-36089-3\_15},
timestamp = {Fri, 30 Dec 2022 23:08:55 +0100},
biburl = {https://dblp.org/rec/conf/sle/BarenghiVCMP12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/BarenghiT12,
author = {Alessandro Barenghi and
Elena Trichina},
editor = {Marc Joye and
Michael Tunstall},
title = {Fault Attacks on Stream Ciphers},
booktitle = {Fault Analysis in Cryptography},
series = {Information Security and Cryptography},
pages = {239--255},
publisher = {Springer},
year = {2012},
url = {https://doi.org/10.1007/978-3-642-29656-7\_14},
doi = {10.1007/978-3-642-29656-7\_14},
timestamp = {Fri, 27 Mar 2020 08:31:50 +0100},
biburl = {https://dblp.org/rec/series/isc/BarenghiT12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/BarenghiBBPP12,
author = {Alessandro Barenghi and
Guido Marco Bertoni and
Luca Breveglieri and
Mauro Pellicioli and
Gerardo Pelosi},
editor = {Marc Joye and
Michael Tunstall},
title = {Injection Technologies for Fault Attacks on Microprocessors},
booktitle = {Fault Analysis in Cryptography},
series = {Information Security and Cryptography},
pages = {275--293},
publisher = {Springer},
year = {2012},
url = {https://doi.org/10.1007/978-3-642-29656-7\_16},
doi = {10.1007/978-3-642-29656-7\_16},
timestamp = {Tue, 29 Dec 2020 00:00:00 +0100},
biburl = {https://dblp.org/rec/series/isc/BarenghiBBPP12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/it/Barenghi11,
author = {Alessandro Barenghi},
title = {Developments in side channel attacks to digital cryptographic devices},
school = {Polytechnic University of Milan, Italy},
year = {2011},
url = {https://opac.bncf.firenze.sbn.it/bncf-prod/resource?uri=CFI0775078},
timestamp = {Wed, 29 Mar 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/phd/it/Barenghi11.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MoradiBKP11,
author = {Amir Moradi and
Alessandro Barenghi and
Timo Kasper and
Christof Paar},
editor = {Yan Chen and
George Danezis and
Vitaly Shmatikov},
title = {On the vulnerability of {FPGA} bitstream encryption against power
analysis attacks: extracting keys from xilinx Virtex-II FPGAs},
booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications
Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
pages = {111--124},
publisher = {{ACM}},
year = {2011},
url = {https://doi.org/10.1145/2046707.2046722},
doi = {10.1145/2046707.2046722},
timestamp = {Tue, 10 Nov 2020 19:56:39 +0100},
biburl = {https://dblp.org/rec/conf/ccs/MoradiBKP11.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexaw/BarenghiP11,
author = {Alessandro Barenghi and
Gerardo Pelosi},
editor = {Franck Morvan and
A Min Tjoa and
Roland R. Wagner},
title = {Security and Privacy in Smart Grid Infrastructures},
booktitle = {2011 Database and Expert Systems Applications, DEXA, International
Workshops, Toulouse, France, August 29 - Sept. 2, 2011},
pages = {102--108},
publisher = {{IEEE} Computer Society},
year = {2011},
url = {https://doi.org/10.1109/DEXA.2011.74},
doi = {10.1109/DEXA.2011.74},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/dexaw/BarenghiP11.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsd/BarenghiBSM11,
author = {Alessandro Barenghi and
Guido Bertoni and
Fabrizio De Santis and
Filippo Melzani},
title = {On the Efficiency of Design Time Evaluation of the Resistance to Power
Attacks},
booktitle = {14th Euromicro Conference on Digital System Design, Architectures,
Methods and Tools, {DSD} 2011, August 31 - September 2, 2011, Oulu,
Finland},
pages = {777--785},
publisher = {{IEEE} Computer Society},
year = {2011},
url = {https://doi.org/10.1109/DSD.2011.103},
doi = {10.1109/DSD.2011.103},
timestamp = {Thu, 23 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/dsd/BarenghiBSM11.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/BarenghiBPS11,
author = {Alessandro Barenghi and
Guido Bertoni and
Andrea Palomba and
Ruggero Susella},
title = {A novel fault attack against {ECDSA}},
booktitle = {{HOST} 2011, Proceedings of the 2011 {IEEE} International Symposium
on Hardware-Oriented Security and Trust (HOST), 5-6 June 2011, San
Diego, California, {USA}},
pages = {161--166},
publisher = {{IEEE} Computer Society},
year = {2011},
url = {https://doi.org/10.1109/HST.2011.5955015},
doi = {10.1109/HST.2011.5955015},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/host/BarenghiBPS11.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfidsec/BarenghiHBSRK11,
author = {Alessandro Barenghi and
C{\'{e}}dric Hocquet and
David Bol and
Fran{\c{c}}ois{-}Xavier Standaert and
Francesco Regazzoni and
Israel Koren},
editor = {Ari Juels and
Christof Paar},
title = {Exploring the Feasibility of Low Cost Fault Injection Attacks on Sub-threshold
Devices through an Example of a 65nm {AES} Implementation},
booktitle = {{RFID.} Security and Privacy - 7th International Workshop, RFIDSec
2011, Amherst, USA, June 26-28, 2011, Revised Selected Papers},
series = {Lecture Notes in Computer Science},
volume = {7055},
pages = {48--60},
publisher = {Springer},
year = {2011},
url = {https://doi.org/10.1007/978-3-642-25286-0\_4},
doi = {10.1007/978-3-642-25286-0\_4},
timestamp = {Tue, 31 Mar 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/rfidsec/BarenghiHBSRK11.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/BarenghiBBPP11,
author = {Alessandro Barenghi and
Guido Marco Bertoni and
Luca Breveglieri and
Gerardo Pelosi and
Andrea Palomba},
editor = {Mehmet A. Orgun and
Atilla El{\c{c}}i and
Oleg B. Makarevich and
Sorin A. Huss and
Josef Pieprzyk and
Lyudmila K. Babenko and
Alexander G. Chefranov and
Rajan Shankaran},
title = {Fault attack to the elliptic curve digital signature algorithm with
multiple bit faults},
booktitle = {Proceedings of the 4th International Conference on Security of Information
and Networks, {SIN} 2011, Sydney, NSW, Australia, November 14-19,
2011},
pages = {63--72},
publisher = {{ACM}},
year = {2011},
url = {https://doi.org/10.1145/2070425.2070438},
doi = {10.1145/2070425.2070438},
timestamp = {Tue, 29 Dec 2020 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/sin/BarenghiBBPP11.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/BarenghiPT11,
author = {Alessandro Barenghi and
Gerardo Pelosi and
Yannick Teglia},
editor = {Claudio A. Ardagna and
Jianying Zhou},
title = {Information Leakage Discovery Techniques to Enhance Secure Chip Design},
booktitle = {Information Security Theory and Practice. Security and Privacy of
Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International
Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011.
Proceedings},
series = {Lecture Notes in Computer Science},
volume = {6633},
pages = {128--143},
publisher = {Springer},
year = {2011},
url = {https://doi.org/10.1007/978-3-642-21040-2\_9},
doi = {10.1007/978-3-642-21040-2\_9},
timestamp = {Mon, 21 Mar 2022 18:09:53 +0100},
biburl = {https://dblp.org/rec/conf/wistp/BarenghiPT11.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MoradiBKP11,
author = {Amir Moradi and
Alessandro Barenghi and
Timo Kasper and
Christof Paar},
title = {On the Vulnerability of {FPGA} Bitstream Encryption against Power
Analysis Attacks - Extracting Keys from Xilinx Virtex-II FPGAs},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {390},
year = {2011},
url = {http://eprint.iacr.org/2011/390},
timestamp = {Mon, 11 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/MoradiBKP11.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/BarenghiBBPP10,
author = {Alessandro Barenghi and
Guido Marco Bertoni and
Luca Breveglieri and
Mauro Pellicioli and
Gerardo Pelosi},
title = {Fault attack on {AES} with single-bit induced faults},
booktitle = {Sixth International Conference on Information Assurance and Security,
{IAS} 2010, Atlanta, GA, USA, August 23-25, 2010},
pages = {167--172},
publisher = {{IEEE}},
year = {2010},
url = {https://doi.org/10.1109/ISIAS.2010.5604061},
doi = {10.1109/ISIAS.2010.5604061},
timestamp = {Tue, 29 Dec 2020 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/IEEEias/BarenghiBBPP10.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cases/BarenghiBKPR10,
author = {Alessandro Barenghi and
Luca Breveglieri and
Israel Koren and
Gerardo Pelosi and
Francesco Regazzoni},
title = {Countermeasures against fault attacks on software implemented {AES:}
effectiveness and cost},
booktitle = {Proceedings of the 5th Workshop on Embedded Systems Security, {WESS}
2010, Scottsdale, AZ, USA, October 24, 2010},
pages = {7},
publisher = {{ACM}},
year = {2010},
url = {https://doi.org/10.1145/1873548.1873555},
doi = {10.1145/1873548.1873555},
timestamp = {Tue, 31 Mar 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/cases/BarenghiBKPR10.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/BarenghiBBPP10,
author = {Alessandro Barenghi and
Guido Bertoni and
Luca Breveglieri and
Mauro Pellicioli and
Gerardo Pelosi},
editor = {Jim Plusquellic and
Ken Mai},
title = {Low Voltage Fault Attacks to {AES}},
booktitle = {{HOST} 2010, Proceedings of the 2010 {IEEE} International Symposium
on Hardware-Oriented Security and Trust (HOST), 13-14 June 2010, Anaheim
Convention Center, California, {USA}},
pages = {7--12},
publisher = {{IEEE} Computer Society},
year = {2010},
url = {https://doi.org/10.1109/HST.2010.5513121},
doi = {10.1109/HST.2010.5513121},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/host/BarenghiBBPP10.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itng/AgostaBSP10,
author = {Giovanni Agosta and
Alessandro Barenghi and
Fabrizio De Santis and
Gerardo Pelosi},
editor = {Shahram Latifi},
title = {Record Setting Software Implementation of {DES} Using {CUDA}},
booktitle = {Seventh International Conference on Information Technology: New Generations,
{ITNG} 2010, Las Vegas, Nevada, USA, 12-14 April 2010},
pages = {748--755},
publisher = {{IEEE} Computer Society},
year = {2010},
url = {https://doi.org/10.1109/ITNG.2010.43},
doi = {10.1109/ITNG.2010.43},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/itng/AgostaBSP10.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/BarenghiPT10,
author = {Alessandro Barenghi and
Gerardo Pelosi and
Yannick Teglia},
editor = {Oleg B. Makarevich and
Atilla El{\c{c}}i and
Mehmet A. Orgun and
Sorin A. Huss and
Ludmila K. Babenko and
Alexander G. Chefranov and
Vijay Varadharajan},
title = {Improving first order differential power attacks through digital signal
processing},
booktitle = {Proceedings of the 3rd International Conference on Security of Information
and Networks, {SIN} 2010, Rostov-on-Don, Russian Federation, September
7-11, 2010},
pages = {124--133},
publisher = {{ACM}},
year = {2010},
url = {https://doi.org/10.1145/1854099.1854126},
doi = {10.1145/1854099.1854126},
timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/sin/BarenghiPT10.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarenghiBBPP10,
author = {Alessandro Barenghi and
Guido Bertoni and
Luca Breveglieri and
Mauro Pellicioli and
Gerardo Pelosi},
title = {Low Voltage Fault Attacks to {AES} and {RSA} on General Purpose Processors},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {130},
year = {2010},
url = {http://eprint.iacr.org/2010/130},
timestamp = {Mon, 11 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/BarenghiBBPP10.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/BarenghiBPP09,
author = {Alessandro Barenghi and
Guido Bertoni and
Emanuele Parrinello and
Gerardo Pelosi},
editor = {Luca Breveglieri and
Israel Koren and
David Naccache and
Elisabeth Oswald and
Jean{-}Pierre Seifert},
title = {Low Voltage Fault Attacks on the {RSA} Cryptosystem},
booktitle = {Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography,
{FDTC} 2009, Lausanne, Switzerland, 6 September 2009},
pages = {23--31},
publisher = {{IEEE} Computer Society},
year = {2009},
url = {https://doi.org/10.1109/FDTC.2009.30},
doi = {10.1109/FDTC.2009.30},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/fdtc/BarenghiBPP09.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipps/BiagioBAP09,
author = {Andrea Di Biagio and
Alessandro Barenghi and
Giovanni Agosta and
Gerardo Pelosi},
title = {Design of a parallel {AES} for graphics hardware using the {CUDA}
framework},
booktitle = {23rd {IEEE} International Symposium on Parallel and Distributed Processing,
{IPDPS} 2009, Rome, Italy, May 23-29, 2009},
pages = {1--8},
publisher = {{IEEE}},
year = {2009},
url = {https://doi.org/10.1109/IPDPS.2009.5161242},
doi = {10.1109/IPDPS.2009.5161242},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/ipps/BiagioBAP09.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdcat/AgostaBSBP09,
author = {Giovanni Agosta and
Alessandro Barenghi and
Fabrizio De Santis and
Andrea Di Biagio and
Gerardo Pelosi},
title = {Fast Disk Encryption through {GPGPU} Acceleration},
booktitle = {2009 International Conference on Parallel and Distributed Computing,
Applications and Technologies, {PDCAT} 2009, Higashi Hiroshima, Japan,
8-11 December 2009},
pages = {102--109},
publisher = {{IEEE} Computer Society},
year = {2009},
url = {https://doi.org/10.1109/PDCAT.2009.72},
doi = {10.1109/PDCAT.2009.72},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/pdcat/AgostaBSBP09.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itng/BarenghiBBP08,
author = {Alessandro Barenghi and
Guido Bertoni and
Luca Breveglieri and
Gerardo Pelosi},
editor = {Shahram Latifi},
title = {A {FPGA} Coprocessor for the Cryptographic Tate Pairing over Fp},
booktitle = {Fifth International Conference on Information Technology: New Generations
{(ITNG} 2008), 7-8 April 2008, Las Vegas, Nevada, {USA}},
pages = {112--119},
publisher = {{IEEE} Computer Society},
year = {2008},
url = {https://doi.org/10.1109/ITNG.2008.260},
doi = {10.1109/ITNG.2008.260},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/itng/BarenghiBBP08.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}