default search action
Alessandro Barenghi
Person information
- affiliation: Polytechnic University of Milan, Italy
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j28]Francesco Antognazza, Alessandro Barenghi, Gerardo Pelosi, Ruggero Susella:
Performance and Efficiency Exploration of Hardware Polynomial Multipliers for Post-Quantum Lattice-Based Cryptosystems. SN Comput. Sci. 5(2): 212 (2024) - [c76]Simone Perriello, Alessandro Barenghi, Gerardo Pelosi:
Quantum Circuit Design for the Lee-Brickell Based Information Set Decoding. ACNS Workshops (2) 2024: 8-28 - [c75]Francesco Antognazza, Alessandro Barenghi, Gerardo Pelosi, Ruggero Susella:
A Versatile and Unified HQC Hardware Accelerator. ACNS Workshops (2) 2024: 214-219 - [c74]Simone Orlando, Alessandro Barenghi, Gerardo Pelosi:
Investigating the Health State of X.509 Digital Certificates. CSR 2024: 222-227 - [c73]Giacomo Lancellotti, Simone Perriello, Alessandro Barenghi, Gerardo Pelosi:
Design of a Quantum Walk Circuit to Solve the Subset-Sum Problem. DAC 2024: 298:1-298:6 - [c72]Francesco Antognazza, Alessandro Barenghi, Gerardo Pelosi, Ruggero Susella:
A High Efficiency Hardware Design for the Post-Quantum KEM HQC. HOST 2024: 431-441 - [c71]Alessandro Annechini, Alessandro Barenghi, Gerardo Pelosi:
Bit-Flipping Decoder Failure Rate Estimation for (v, w)-Regular Codes. ISIT 2024: 3374-3379 - [i14]Alessandro Annechini, Alessandro Barenghi, Gerardo Pelosi:
Bit-flipping Decoder Failure Rate Estimation for (v, w)-regular Codes. CoRR abs/2401.16919 (2024) - 2023
- [j27]Alessandro Barenghi, Jean-François Biasse, Edoardo Persichetti, Paolo Santini:
On the computational hardness of the code equivalence problem in cryptography. Adv. Math. Commun. 17(1): 23-55 (2023) - [c70]Francesco Antognazza, Alessandro Barenghi, Gerardo Pelosi, Ruggero Susella:
A Flexible ASIC-Oriented Design for a Full NTRU Accelerator. ASP-DAC 2023: 591-597 - [c69]Isabella Piacentini, Alessandro Barenghi, Gerardo Pelosi:
A Non Profiled and Profiled Side Channel Attack Countermeasure through Computation Interleaving. DSD 2023: 718-725 - [c68]Alessandro Barenghi, Gerardo Pelosi:
Fault Attacks Friendliness of Post-quantum Cryptosystems. FDTC 2023: 1 - [c67]Francesco Antognazza, Alessandro Barenghi, Gerardo Pelosi, Ruggero Susella:
An Efficient Unified Architecture for Polynomial Multiplications in Lattice-Based Cryptoschemes. ICISSP 2023: 81-88 - [c66]Alessandro Barenghi, Paolo Cremonesi, Gerardo Pelosi:
Quantum Computing Research Lines in the Italian Center for Supercomputing. SAMOS 2023: 423-434 - 2022
- [j26]Alessandro Barenghi, Gioele Falcetti, Gerardo Pelosi:
Locating Side Channel Leakage in Time through Matched Filters. Cryptogr. 6(2): 26 (2022) - [j25]Nicholas Mainardi, Alessandro Barenghi, Gerardo Pelosi:
Privacy-aware Character Pattern Matching over Outsourced Encrypted Data. DTRAP 3(1): 7:1-7:38 (2022) - [j24]Alessandro Barenghi, Jean-François Biasse, Tran Ngo, Edoardo Persichetti, Paolo Santini:
Advanced signature functionalities from the code equivalence problem. Int. J. Comput. Math. Comput. Syst. Theory 7(2): 112-128 (2022) - [j23]Alessandro Barenghi, Diego Carrera, Silvia Mella, Andrea Pace, Gerardo Pelosi, Ruggero Susella:
Profiled side channel attacks against the RSA cryptosystem using neural networks. J. Inf. Secur. Appl. 66: 103122 (2022) - [i13]Alessandro Barenghi, Jean-François Biasse, Tran Ngo, Edoardo Persichetti, Paolo Santini:
Advanced Signature Functionalities from the Code Equivalence Problem. IACR Cryptol. ePrint Arch. 2022: 710 (2022) - [i12]Alessandro Barenghi, Jean-François Biasse, Edoardo Persichetti, Paolo Santini:
On the Computational Hardness of the Code Equivalence Problem in Cryptography. IACR Cryptol. ePrint Arch. 2022: 967 (2022) - 2021
- [j22]Francesco Antognazza, Alessandro Barenghi, Gerardo Pelosi:
Metis: An Integrated Morphing Engine CPU to Protect Against Side Channel Attacks. IEEE Access 9: 69210-69225 (2021) - [j21]Alessandro Barenghi, Luca Breveglieri, Niccolò Izzo, Gerardo Pelosi:
Exploring Cortex-M Microarchitectural Side Channel Information Leakage. IEEE Access 9: 156507-156527 (2021) - [c65]Marco Baldi, Alessandro Barenghi, Franco Chiaraluce, Gerardo Pelosi, Paolo Santini:
Performance Bounds for QC-MDPC Codes Decoders. CBCrypto 2021: 95-122 - [c64]Alessandro Barenghi, Diego Carrera, Silvia Mella, Andrea Pace, Gerardo Pelosi, Ruggero Susella:
Profiled Attacks Against the Elliptic Curve Scalar Point Multiplication Using Neural Networks. NSS 2021: 238-257 - [c63]Alessandro Barenghi, Jean-François Biasse, Edoardo Persichetti, Paolo Santini:
LESS-FM: Fine-Tuning Signatures from the Code Equivalence Problem. PQCrypto 2021: 23-43 - [c62]Simone Perriello, Alessandro Barenghi, Gerardo Pelosi:
A Complete Quantum Circuit to Solve the Information Set Decoding Problem. QCE 2021: 366-377 - [c61]Maurizio Atzori, Alessandro Barenghi, Sara Comai, Mariagrazia Fugini, Diego Marcia, Gerardo Pelosi, Manuela Sanguinetti, Vincenzo Scotti:
Improving Work Life Conditions via Portable Knowledge-Driven Recommender System (Discussion Paper). SEBD 2021: 498-505 - [c60]Simone Perriello, Alessandro Barenghi, Gerardo Pelosi:
A Quantum Circuit to Speed-Up the Cryptanalysis of Code-Based Cryptosystems. SecureComm (2) 2021: 458-474 - [i11]Alessandro Barenghi, Jean-François Biasse, Edoardo Persichetti, Paolo Santini:
LESS-FM: Fine-tuning Signatures from a Code-based Cryptographic Group Action. IACR Cryptol. ePrint Arch. 2021: 396 (2021) - [i10]Marco Baldi, Alessandro Barenghi, Franco Chiaraluce, Gerardo Pelosi, Paolo Santini:
Performance bounds for QC-MDPC codes decoders. IACR Cryptol. ePrint Arch. 2021: 1557 (2021) - 2020
- [j20]Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi:
Compiler-Based Techniques to Secure Cryptographic Embedded Software Against Side-Channel Attacks. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39(8): 1550-1554 (2020) - [j19]Alessandro Barenghi, William Fornaciari, Gerardo Pelosi, Davide Zoni:
Scramble Suit: A Profile Differentiation Countermeasure to Prevent Template Attacks. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39(9): 1778-1791 (2020) - [c59]Nicholas Mainardi, Davide Sampietro, Alessandro Barenghi, Gerardo Pelosi:
Efficient Oblivious Substring Search via Architectural Support. ACSAC 2020: 526-541 - [c58]Alessandro Barenghi, Gerardo Pelosi:
Constant weight strings in constant time: a building block for code-based post-quantum cryptosystems. CF 2020: 132-141 - [c57]Alessandro Barenghi, Gerardo Pelosi:
A comprehensive analysis of constant-time polynomial inversion for post-quantum cryptosystems. CF 2020: 269-276 - [c56]Alessandro Barenghi, Matteo Brevi, William Fornaciari, Gerardo Pelosi, Davide Zoni:
Integrating Side Channel Security in the FPGA Hardware Design Flow. COSADE 2020: 275-290 - [c55]Marco Baldi, Alessandro Barenghi, Franco Chiaraluce, Gerardo Pelosi, Paolo Santini:
Analysis of In-Place Randomized Bit-Flipping Decoders for the Design of LDPC and MDPC Code-Based Cryptosystems. ICETE (Selected Papers) 2020: 151-174 - [c54]Marco Baldi, Alessandro Barenghi, Franco Chiaraluce, Gerardo Pelosi, Paolo Santini:
A Failure Rate Model of Bit-flipping Decoders for QC-LDPC and QC-MDPC Code-based Cryptosystems. ICETE (2) 2020: 238-249 - [c53]Rosa Maria Resende de Almeida, Adriana Grau Aberturas, Yolanda Bueno Aguado, Maurizio Atzori, Alessandro Barenghi, Gianluca Borghini, Carlos Alberto Catalina Ortega, Sara Comai, Raquel Losada Durán, Mariagrazia Fugini, Hatice Gunes, Basam Musleh Lancis, Gerardo Pelosi, Vincenzo Ronca, Licia Sbattella, Roberto Tedesco, Tian Xu:
Decision Support Systems to Promote Health and Well-Being of People During Their Working Age: The Case of the WorkingAge EU Project. SAMOS 2020: 336-347 - [d1]Marco Baldi, Alessandro Barenghi, Franco Chiaraluce, Gerardo Pelosi, Paolo Santini:
Dataset related to Analysis of Decoding Failures of LDPC and MDPC Codes in Out-of-Place Bit Flipping Decoding. Zenodo, 2020 - [i9]Nicholas Mainardi, Alessandro Barenghi, Gerardo Pelosi:
Plaintext Recovery Attacks against Linearly Decryptable Fully Homomorphic Encryption Schemes. IACR Cryptol. ePrint Arch. 2020: 264 (2020)
2010 – 2019
- 2019
- [j18]Marco Baldi, Alessandro Barenghi, Franco Chiaraluce, Gerardo Pelosi, Paolo Santini:
A Finite Regime Analysis of Information Set Decoding Algorithms. Algorithms 12(10): 209 (2019) - [j17]Nicholas Mainardi, Alessandro Barenghi, Gerardo Pelosi:
Plaintext recovery attacks against linearly decryptable fully homomorphic encryption schemes. Comput. Secur. 87 (2019) - [c52]Nicholas Mainardi, Alessandro Barenghi, Gerardo Pelosi:
Privacy preserving substring search protocol with polylogarithmic communication cost. ACSAC 2019: 297-312 - [c51]Marco Baldi, Alessandro Barenghi, Franco Chiaraluce, Gerardo Pelosi, Paolo Santini:
LEDAcrypt: QC-LDPC Code-Based Cryptosystems with Bounded Decryption Failure Rate. CBC 2019: 11-43 - [c50]Niccolò Izzo, Alessandro Barenghi, Luca Breveglieri, Gerardo Pelosi, Paolo Amato:
A secure and authenticated host-to-memory communication interface. CF 2019: 386-391 - [c49]Alessandro Barenghi, William Fornaciari, Andrea Galimberti, Gerardo Pelosi, Davide Zoni:
Evaluating the Trade-offs in the Hardware Design of the LEDAcrypt Encryption Functions. ICECS 2019: 739-742 - [i8]Paolo Santini, Alessandro Barenghi, Gerardo Pelosi, Marco Baldi, Franco Chiaraluce:
A Code-specific Conservative Model for the Failure Rate of Bit-flipping Decoding of LDPC Codes with Cryptographic Applications. CoRR abs/1912.05182 (2019) - [i7]Paolo Santini, Alessandro Barenghi, Gerardo Pelosi, Marco Baldi, Franco Chiaraluce:
A Code-specific Conservative Model for the Failure Rate of Bit-flipping Decoding of LDPC Codes with Cryptographic Applications. IACR Cryptol. ePrint Arch. 2019: 1441 (2019) - 2018
- [j16]Alessandro Barenghi, Nicholas Mainardi, Gerardo Pelosi:
Systematic parsing of X.509: Eradicating security issues with a parse tree. J. Comput. Secur. 26(6): 817-849 (2018) - [j15]Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, Michele Scandale:
Reactive side-channel countermeasures: Applicability and quantitative security evaluation. Microprocess. Microsystems 62: 50-60 (2018) - [j14]Davide Zoni, Alessandro Barenghi, Gerardo Pelosi, William Fornaciari:
A Comprehensive Side-Channel Information Leakage Analysis of an In-Order RISC CPU Microarchitecture. ACM Trans. Design Autom. Electr. Syst. 23(5): 57:1-57:30 (2018) - [c48]Alessandro Barenghi, Gerardo Pelosi:
Side-channel security of superscalar CPUs: evaluating the impact of micro-architectural features. DAC 2018: 120:1-120:6 - [c47]Alessandro Barenghi, Nicholas Mainardi, Gerardo Pelosi:
Comparison-Based Attacks Against Noise-Free Fully Homomorphic Encryption Schemes. ICICS 2018: 177-191 - [c46]Alessandro Barenghi, Michele Madaschi, Nicholas Mainardi, Gerardo Pelosi:
OpenCL HLS Based Design of FPGA Accelerators for Cryptographic Primitives. HPCS 2018: 634-641 - [c45]Alessandro Barenghi, Luca Breveglieri, Niccolò Izzo, Gerardo Pelosi:
Software-only Reverse Engineering of Physical DRAM Mappings for Rowhammer Attacks. IVSW 2018: 19-24 - [c44]Marco Baldi, Alessandro Barenghi, Franco Chiaraluce, Gerardo Pelosi, Paolo Santini:
LEDAkem: A Post-quantum Key Encapsulation Mechanism Based on QC-LDPC Codes. PQCrypto 2018: 3-24 - [e4]John Goodacre, Mikel Luján, Giovanni Agosta, Alessandro Barenghi, Israel Koren, Gerardo Pelosi:
Proceedings of the Fifth Workshop on Cryptography and Security in Computing Systems, CS2 2018, Manchester, United Kingdom, January 24, 2018. ACM 2018, ISBN 978-1-4503-6374-7 [contents] - [i6]Marco Baldi, Alessandro Barenghi, Franco Chiaraluce, Gerardo Pelosi, Paolo Santini:
LEDAkem: a post-quantum key encapsulation mechanism based on QC-LDPC codes. CoRR abs/1801.08867 (2018) - [i5]Marco Baldi, Alessandro Barenghi, Franco Chiaraluce, Gerardo Pelosi, Joachim Rosenthal, Paolo Santini, Davide Schipani:
Design and Implementation of a Digital Signature Scheme Based on Low-density Generator Matrix Codes. CoRR abs/1807.06127 (2018) - [i4]Alessandro Barenghi, Nicholas Mainardi, Gerardo Pelosi:
Systematic Parsing of X.509: Eradicating Security Issues with a Parse Tree. CoRR abs/1812.04959 (2018) - 2017
- [j13]Ariel Oleksiak, Michal Kierzynka, Wojciech Piatek, Giovanni Agosta, Alessandro Barenghi, Carlo Brandolese, William Fornaciari, Gerardo Pelosi, Mariano Cecowski, Robert Plestenjak, Justin Cinkelj, Mario Porrmann, Jens Hagemeyer, René Griessl, Jan Lachmair, Meysam Peykanu, Lennart Tigges, Micha vor dem Berge, Wolfgang Christmann, Stefan Krupop, Alexandre Carbon, Loïc Cudennec, Thierry Goubier, Jean-Marc Philippe, Sven Rosinger, Daniel Schlitt, Christian Pieper, Chris Adeniyi-Jones, Javier Setoain, Luca Ceva, Udo Janssen:
M2DC - Modular Microserver DataCentre with heterogeneous hardware. Microprocess. Microsystems 52: 117-130 (2017) - [c43]Alessandro Barenghi, Nicholas Mainardi, Gerardo Pelosi:
A Security Audit of the OpenPGP Format. ISPAN-FCST-ISCC 2017: 336-343 - [c42]Alessandro Barenghi, Gerardo Pelosi:
An Enhanced Dataflow Analysis to Automatically Tailor Side Channel Attack Countermeasures to Software Block Ciphers. ITASEC 2017: 8-18 - [e3]Mats Brorsson, Zhonghai Lu, Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi:
Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2017, Stockholm, Sweden, January 24, 2017. ACM 2017, ISBN 978-1-4503-4869-0 [contents] - 2016
- [j12]Alessandro Barenghi, Michele Beretta, Alessandro Di Federico, Gerardo Pelosi:
A privacy-preserving encrypted OSN with stateless server interaction: The Snake design. Comput. Secur. 63: 67-84 (2016) - [j11]Alessandro Barenghi, Guido Marco Bertoni, Luca Breveglieri, Gerardo Pelosi, Stefano Sanfilippo, Ruggero Susella:
A Fault-Based Secret Key Retrieval Method for ECDSA: Analysis and Countermeasure. ACM J. Emerg. Technol. Comput. Syst. 13(1): 8:1-8:26 (2016) - [c41]Andrea Continella, Alessandro Guagnelli, Giovanni Zingaro, Giulio De Pasquale, Alessandro Barenghi, Stefano Zanero, Federico Maggi:
ShieldFS: a self-healing, ransomware-aware filesystem. ACSAC 2016: 336-347 - [c40]Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi:
Automated instantiation of side-channel attacks countermeasures for software cipher implementations. Conf. Computing Frontiers 2016: 455-460 - [c39]Giovanni Agosta, Alessandro Barenghi, Carlo Brandolese, William Fornaciari, Gerardo Pelosi, Stefano Delucchi, Massimo Massa, Maurizio Mongelli, Enrico Ferrari, Leonardo Napoletani, Luciano Bozzi, Carlo Tieri, Dajana Cassioli, Luigi Pomante:
V2I Cooperation for Traffic Management with SafeCop. DSD 2016: 621-627 - [c38]Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, Michele Scandale:
Encasing block ciphers to foil key recovery attempts via side channel. ICCAD 2016: 96 - [c37]Alessandro Barenghi, Gerardo Pelosi:
A Note on Fault Attacks Against Deterministic Signature Schemes. IWSEC 2016: 182-192 - [c36]Alessio Agneessens, Francesco Buemi, Stefano Delucchi, Massimo Massa, Giovanni Agosta, Alessandro Barenghi, Carlo Brandolese, William Fornaciari, Gerardo Pelosi, Enrico Ferrari, Dajana Cassioli, Luigi Pomante, Leonardo Napoletani, Luciano Bozzi, Carlo Tieri, Maurizio Mongelli:
Safe cooperative CPS: A V2I traffic management scenario in the SafeCOP project. SAMOS 2016: 320-327 - [e2]Martin Palkovic, Giovanni Agosta, Alessandro Barenghi, Israel Koren, Gerardo Pelosi:
Proceedings of the Third Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC, Prague, Czech Republic, January 20, 2016. ACM 2016, ISBN 978-1-4503-4065-6 [contents] - 2015
- [j10]Giovanni Agosta, Alessandro Barenghi, Alessandro Di Federico, Gerardo Pelosi:
OpenCL performance portability for general-purpose computation on graphics processor units: an exploration on cryptographic primitives. Concurr. Comput. Pract. Exp. 27(14): 3633-3660 (2015) - [j9]Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, Michele Scandale:
Trace-based schedulability analysis to enhance passive side-channel attack resilience of embedded software. Inf. Process. Lett. 115(2): 292-297 (2015) - [j8]Alessandro Barenghi, Stefano Crespi-Reghizzi, Dino Mandrioli, Federica Panella, Matteo Pradella:
Parallel parsing made practical. Sci. Comput. Program. 112: 195-226 (2015) - [j7]Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, Michele Scandale:
The MEET Approach: Securing Cryptographic Embedded Software Against Side Channel Attacks. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 34(8): 1320-1333 (2015) - [c35]Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, Michele Scandale:
Information leakage chaff: feeding red herrings to side channel attackers. DAC 2015: 33:1-33:6 - [c34]Alessandro Barenghi, Alessandro Di Federico, Gerardo Pelosi, Stefano Sanfilippo:
Challenging the Trustworthiness of PGP: Is the Web-of-Trust Tear-Proof? ESORICS (1) 2015: 429-446 - [c33]Giovanni Agosta, Alessio Antonini, Alessandro Barenghi, Dario Galeri, Gerardo Pelosi:
Cyber-security analysis and evaluation for smart home management solutions. ICCST 2015: 1-6 - [e1]Andy D. Pimentel, Stephan Wong, Gerardo Pelosi, Israel Koren, Giovanni Agosta, Alessandro Barenghi:
Proceedings of the Second Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2015, Amsterdam, Netherlands, January 19-21, 2015. ACM 2015, ISBN 978-1-4503-3187-6 [contents] - 2014
- [j6]Giovanni Agosta, Alessandro Barenghi, Massimo Maggi, Gerardo Pelosi:
Design space extension for secure implementation of block ciphers. IET Comput. Digit. Tech. 8(6): 256-263 (2014) - [j5]Alessandro Barenghi, Cédric Hocquet, David Bol, François-Xavier Standaert, Francesco Regazzoni, Israel Koren:
A Combined Design-Time/Test-Time Study of the Vulnerability of Sub-Threshold Devices to Low Voltage Fault Attacks. IEEE Trans. Emerg. Top. Comput. 2(2): 107-118 (2014) - [c32]Alessandro Barenghi, Stefano Crespi-Reghizzi, Dino Mandrioli, Federica Panella, Matteo Pradella:
The PAPAGENO Parallel-Parser Generator. CC 2014: 192-196 - [c31]Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, Michele Scandale:
A Multiple Equivalent Execution Trace Approach to Secure Cryptographic Embedded Software. DAC 2014: 210:1-210:6 - [c30]Alessandro Barenghi, Michele Beretta, Alessandro Di Federico, Gerardo Pelosi:
Snake: An End-to-End Encrypted Online Social Network. HPCC/CSS/ICESS 2014: 763-770 - [c29]Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, Michele Scandale:
Towards Transparently Tackling Functionality and Performance Issues across Different OpenCL Platforms. CANDAR 2014: 130-136 - [c28]Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi:
Securing software cryptographic primitives for embedded systems against side channel attacks. ICCST 2014: 1-6 - [c27]Alessio Antonini, Alessandro Barenghi, Gerardo Pelosi, Saman A. Zonouz:
Security challenges in building automation and SCADA. ICCST 2014: 1-6 - [c26]Alessandro Barenghi, Gerardo Pelosi:
On the Security of Partially Masked Software Implementations. SECRYPT 2014: 492-499 - [c25]Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, Michele Scandale:
Differential Fault Analysis for Block Ciphers: an Automated Conservative Analysis. SIN 2014: 137 - [i3]Alessandro Barenghi, Gerardo Pelosi, Francesco Regazzoni:
Simulation-Time Security Margin Assessment against Power-Based Side Channel Attacks. IACR Cryptol. ePrint Arch. 2014: 307 (2014) - 2013
- [j4]Alessandro Barenghi, Gerardo Pelosi, Federico Terraneo:
Secure and efficient design of software block cipher implementations on microcontrollers. Int. J. Grid Util. Comput. 4(2/3): 110-118 (2013) - [j3]Alessandro Barenghi, Stefano Crespi-Reghizzi, Dino Mandrioli, Matteo Pradella:
Parallel parsing of operator precedence grammars. Inf. Process. Lett. 113(7): 245-249 (2013) - [j2]Alessandro Barenghi, Guido Marco Bertoni, Luca Breveglieri, Gerardo Pelosi:
A fault induction technique based on voltage underfeeding with application to attacks against AES and RSA. J. Syst. Softw. 86(7): 1864-1878 (2013) - [c24]Giovanni Agosta, Alessandro Barenghi, Massimo Maggi, Gerardo Pelosi:
Compiler-based side channel vulnerability analysis and optimized countermeasures application. DAC 2013: 81:1-81:6 - [c23]Alessandro Barenghi, Gerardo Pelosi, Fabio Pozzi:
Drop-In Control Flow Hijacking Prevention through Dynamic Library Interception. ITNG 2013: 640-647 - [c22]Alessio Antonini, Alessandro Barenghi, Gerardo Pelosi:
Security Analysis of Building Automation Networks - Threat Model and Viable Mitigation Techniques. NordSec 2013: 199-214 - [c21]Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, Michele Scandale:
Enhancing Passive Side-Channel Attack Resilience through Schedulability Analysis of Data-Dependency Graphs. NSS 2013: 692-698 - 2012
- [j1]Alessandro Barenghi, Luca Breveglieri, Israel Koren, David Naccache:
Fault Injection Attacks on Cryptographic Devices: Theory, Practice, and Countermeasures. Proc. IEEE 100(11): 3056-3076 (2012) - [c20]Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi:
Exploiting Bit-level Parallelism in GPGPUs: a Case Study on KeeLoq Exhaustive Search Attacks. ARCS Workshops 2012: 385-396 - [c19]Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi:
A code morphing methodology to automate power analysis countermeasures. DAC 2012: 77-82 - [c18]Giovanni Agosta, Alessandro Barenghi, Antonio Parata, Gerardo Pelosi:
Automated Security Analysis of Dynamic Web Applications through Symbolic Code Execution. ITNG 2012: 189-194 - [c17]Alessandro Barenghi, Ermes Viviani, Stefano Crespi-Reghizzi, Dino Mandrioli, Matteo Pradella:
PAPAGENO: A Parallel Parser Generator for Operator Precedence Grammars. SLE 2012: 264-274 - [p2]Alessandro Barenghi, Elena Trichina:
Fault Attacks on Stream Ciphers. Fault Analysis in Cryptography 2012: 239-255 - [p1]Alessandro Barenghi, Guido Marco Bertoni, Luca Breveglieri, Mauro Pellicioli, Gerardo Pelosi:
Injection Technologies for Fault Attacks on Microprocessors. Fault Analysis in Cryptography 2012: 275-293 - 2011
- [b1]Alessandro Barenghi:
Developments in side channel attacks to digital cryptographic devices. Polytechnic University of Milan, Italy, 2011 - [c16]Amir Moradi, Alessandro Barenghi, Timo Kasper, Christof Paar:
On the vulnerability of FPGA bitstream encryption against power analysis attacks: extracting keys from xilinx Virtex-II FPGAs. CCS 2011: 111-124 - [c15]Alessandro Barenghi, Gerardo Pelosi:
Security and Privacy in Smart Grid Infrastructures. DEXA Workshops 2011: 102-108 - [c14]Alessandro Barenghi, Guido Bertoni, Fabrizio De Santis, Filippo Melzani:
On the Efficiency of Design Time Evaluation of the Resistance to Power Attacks. DSD 2011: 777-785 - [c13]Alessandro Barenghi, Guido Bertoni, Andrea Palomba, Ruggero Susella:
A novel fault attack against ECDSA. HOST 2011: 161-166 - [c12]Alessandro Barenghi, Cédric Hocquet, David Bol, François-Xavier Standaert, Francesco Regazzoni, Israel Koren:
Exploring the Feasibility of Low Cost Fault Injection Attacks on Sub-threshold Devices through an Example of a 65nm AES Implementation. RFIDSec 2011: 48-60 - [c11]Alessandro Barenghi, Guido Marco Bertoni, Luca Breveglieri, Gerardo Pelosi, Andrea Palomba:
Fault attack to the elliptic curve digital signature algorithm with multiple bit faults. SIN 2011: 63-72 - [c10]Alessandro Barenghi, Gerardo Pelosi, Yannick Teglia:
Information Leakage Discovery Techniques to Enhance Secure Chip Design. WISTP 2011: 128-143 - [i2]Amir Moradi, Alessandro Barenghi, Timo Kasper, Christof Paar:
On the Vulnerability of FPGA Bitstream Encryption against Power Analysis Attacks - Extracting Keys from Xilinx Virtex-II FPGAs. IACR Cryptol. ePrint Arch. 2011: 390 (2011) - 2010
- [c9]Alessandro Barenghi, Guido Marco Bertoni, Luca Breveglieri, Mauro Pellicioli, Gerardo Pelosi:
Fault attack on AES with single-bit induced faults. IAS 2010: 167-172 - [c8]Alessandro Barenghi, Luca Breveglieri, Israel Koren, Gerardo Pelosi, Francesco Regazzoni:
Countermeasures against fault attacks on software implemented AES: effectiveness and cost. WESS 2010: 7 - [c7]Alessandro Barenghi, Guido Bertoni, Luca Breveglieri, Mauro Pellicioli, Gerardo Pelosi:
Low Voltage Fault Attacks to AES. HOST 2010: 7-12 - [c6]Giovanni Agosta, Alessandro Barenghi, Fabrizio De Santis, Gerardo Pelosi:
Record Setting Software Implementation of DES Using CUDA. ITNG 2010: 748-755 - [c5]Alessandro Barenghi, Gerardo Pelosi, Yannick Teglia:
Improving first order differential power attacks through digital signal processing. SIN 2010: 124-133 - [i1]Alessandro Barenghi, Guido Bertoni, Luca Breveglieri, Mauro Pellicioli, Gerardo Pelosi:
Low Voltage Fault Attacks to AES and RSA on General Purpose Processors. IACR Cryptol. ePrint Arch. 2010: 130 (2010)
2000 – 2009
- 2009
- [c4]Alessandro Barenghi, Guido Bertoni, Emanuele Parrinello, Gerardo Pelosi:
Low Voltage Fault Attacks on the RSA Cryptosystem. FDTC 2009: 23-31 - [c3]Andrea Di Biagio, Alessandro Barenghi, Giovanni Agosta, Gerardo Pelosi:
Design of a parallel AES for graphics hardware using the CUDA framework. IPDPS 2009: 1-8 - [c2]Giovanni Agosta, Alessandro Barenghi, Fabrizio De Santis, Andrea Di Biagio, Gerardo Pelosi:
Fast Disk Encryption through GPGPU Acceleration. PDCAT 2009: 102-109 - 2008
- [c1]Alessandro Barenghi, Guido Bertoni, Luca Breveglieri, Gerardo Pelosi:
A FPGA Coprocessor for the Cryptographic Tate Pairing over Fp. ITNG 2008: 112-119
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 21:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint