Publications


Refereed International Journals (20)

Editorial Contributions (6)

Refereed Book Contributions (10)

Refereed International Conferences (63)

European Patents with International Extensions (10 Granted)

Invited Papers (Peer-reviewed) (6)

Peer-reviewed Posters with Interactive Presentation (7)

Theses and Technical Reports (9)


Erdős Number: 2 (Gerardo Pelosi -- Israel Koren -- Paul Erdős)


Google Scholar Profile

Publication list from DBLP (incomplete)

ACM Author Profile, (Author ID: 81331501606)
Association for Computing Machinery - Digital Library

Scopus Author Profile, (Author ID: 16643986100)
Elsevier - SciVerse Scopus bibliographic database

Mendeley Profile, (Scopus Author ID: 16643986100)
Elsevier Mendeley Web program for managing and sharing research papers,
discovering research data and collaborating online.

WoK Author Profile, (ResearcherID: I-4538-2013)
Clarivate Analytics - Web of Science- Researcher ID profile.
Formely, Thomson Reuters - Institute for Scientific Information (ISI) - Web of Knowledge.

WoS Author Profile, (ResearcherID: I-4538-2013)
Clarivate Analytics - Publons researcher profile - Web of Science

ORCID Author Profile (ORC ID: 0000-0002-3812-5429)
Open Researcher and Contributor ID registry service

Springer Link - Author Profile

KUDOS author profile (KUDOS id: 45704)
KUDOS Greater Research Impact service

Microsoft Academic Search Engine

ArnetMiner Author Profile (Author ID: 806698)
Academic Researcher Social Network Search (Irregular updates)

ResearchGate Author Profile
Research Social Network

Academia.edu Profile
Social Networking Website for Academics


Awards


2018 Hardware and Embedded Security Top Picks paper Award.
The paper “A Code Morphing Methodology to Automate Power Analysis Countermeasures,” appeared in Proc. of the 49th Design Automation Conference (DAC 2012), ACM, 2012, has been awarded for the most significant papers based on novelty and long-term impact from IEEE/ACM conferences and journals in the broad area of Hardware and Embedded Security during the six-year period: 2012-2017.
Presentations to the 2018 Top Picks in Hardware and Embedded Security Workshop, co-located with IEEE/ACM ICCAD 2018 Conference, San Diego, CA, USA on November 8th, 2018, were selected from papers appeared in leading hardware and embedded security conferences and journals including but not limited to DAC, DATE, ICCAD, HOST, CHES, ETS, VTS, ITC, IEEE S&P, Euro S&P, Usenix Security, ASIA CCS, NDSS, ISCA, MICRO, ASPLOS, HPCA, ACSAC and ACM CCS during the six-year period: 2012-2017.

HiPEAC Paper Award (2018)
European Network of Excellence on High Performance and Embedded Architecture and Compilation
Alessandro Barenghi and Gerardo Pelosi, Side-channel security of superscalar CPUs: Evaluating the Impact of Microarchitectural Features, in Proceedings of the 55th Design Automation Conference (DAC 2018). ACM 2018, 6 pages (ISBN: 978-1-4503-5700-5/18/06).

HiPEAC Paper Award (2015)
European Network of Excellence on High Performance and Embedded Architecture and Compilation
Gerardo Pelosi, Giovanni Agosta, Alessandro Barenghi, Michele Scandale, nformation Leakage Chaff: Feeding Red Herrings to Side Channel Attackers, in Proceedings of the 52nd Design Automation Conference (DAC 2015). ACM 2015, pp. 33:1-33:6 (ISBN: 978-1-4503-3520-1/15/06).

Best Paper Award (SIN 2014)
Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi and Michele Scandale, Differential Fault Analysis for Block Ciphers: an Automated Conservative Analysis, In Proceedinds of the Int.l Conf. on Security of Information and Networks (SIN '14). ACM 2014, pp. 171:1-171:8, (ISBN: 978-1-4503-3033-6/14/09)

HiPEAC Paper Award (2014)
European Network of Excellence on High Performance and Embedded Architecture and Compilation
Gerardo Pelosi, Giovanni Agosta, Alessandro Barenghi, Michele Scandale, A Multiple Equivalent Execution Trace Approach to Secure Cryptographic Embedded Software, in Proceedings of the 51st Design Automation Conference (DAC 2014). ACM 2014, pp.210:1-210:6 (ISBN: 978-1-4503-2730-5).

HiPEAC Paper Award (2013)
European Network of Excellence on High Performance and Embedded Architecture and Compilation
Gerardo Pelosi, Giovanni Agosta, Alessandro Barenghi, Massimo Maggi, Compiler-based Side Channel Vulnerability Analysis and Optimized Countermeasures Application, in Proceedings of the 50th Design Automation Conference (DAC 2013). ACM 2013, pp. 81:1-81:6 (ISBN: 978-1-4503-2071-9).

HiPEAC Paper Award (2012)
European Network of Excellence on High Performance and Embedded Architecture and Compilation
Gerardo Pelosi, Giovanni Agosta and Alessandro Barenghi, A Code Morphing Methodology to Automate Power Analysis Countermeasures, in Proceedings of the 49th Design Automation Conference (DAC 2012).
ACM 2012 , pp. 77-82, (ISBN 978-1-4503-1199-1).


Disclaimer

The material on this website is provided to ensure timely dissemination of scholarly and technical work on a non-commercial basis. Copyright and all rights therein are retained by the authors or by other copyright holders.
Papers where the copyright is not held by the authors are distributed here as “author's versions” in compliance with the respective copyright transfer agreement of the current copyright holder. It is understood that all persons copying this material will adhere to the terms and constraints invoked by each author's or publisher's copyright.
The copyright laws of most countries have “fair-use” clauses, which explicitly permit personal use of copyrighted material for teaching or research purposes. However, reprinting or republication of this material for commercial purposes requires a permission from the corresponding copyright holder (ACM, IEEE, Elsevier, EDAA, IFIP, Springer-Verlag, SciTePress, IACR, IOS Press, IGI Global, Inderscience Publishers, Academy Publisher).

Please note that the publisher is not always identical to the copyright holder. Refer to the copyright note of each publication for the copyright holder and details on the permitted usage of the “author's copies” provided on this page.

Material published by ACM can also be obtained from the ACM Digital Library
Material published by IEEE can also be obtained from IEEE Xplore
Material published by Elsevier can also be obtained from ScienceDirect
Material published by Springer-Verlag can also be obtained from SpringerLink
Material published by SciTePress can also be obtained from SciTePress DL
Material published by IOS Press can also be obtained from the IOS Press website
Material published by InderScience Publishers can also be obtained from the InderScience website
Material published by Academy Publisher can also be obtained from the Academy Publisher website
Material published by IGI Global publishing company can also be obtained from the IGI Global website

International Association for Cryptologic Research (IACR) IACR CryptoDB
European Design and Automation Association (EDAA) EDAA website
International Federation for Information Processing (IFIP) IFIP website


Refereed International Journals

[JR.20]
Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, and Michele Scandale. Reactive Side-channel Countermeasures: Applicability and Quantitative Security Evaluation. Microprocessors and Microsystems Journal (MicPro), Volume 62 (October 2018), pages 50-60. ISSN: 0141-9331 (Print). (doi:10.1016/j.micpro.2018.07.001) [Available on line July 29th, 2018 -- share link ]
[JR.19]
Davide Zoni, Alessandro Barenghi, Gerardo Pelosi, and William Fornaciari. A Comprehensive Side Channel Information Leakage Analysis of an In-order RISC CPU Microarchitecture. Transactions on Design Automation of Electronic Systems (TODAES), vol. 23, issue 5, Article 57 (August 2018).
ISSN: 1084-4309 (Print), 1557-7309 (Online). (doi:10.1145/3212719)
[JR.18]
Alessandro Barenghi, Nicholas Mainardi, and Gerardo Pelosi. Systematic Parsing of X.509: Eradicating Security Issues with a Parse Tree. Journal of Computer Security, 26(6):817-849, October 30th, 2018. ISSN: 0926-227X (Print), 1875-8924 (Online). (doi:10.3233/JCS-171110)
[JR.17]
Sabrina De Capitani Di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, and Pierangela Samarati. Enforcing Authorizations while Protecting Access Confidentiality. Journal of Computer Security, 26(2):143–175, January 2018. ISSN: 0926-227X (Print), 1875-8924 (Online). (doi:10.3233/JCS-171004)
[JR.16]
A. Oleksiaka, M. Kierzynkaa, G. Agosta, A. Barenghi, C. Brandolese, W. Fornaciari, Gerardo Pelosi, and et. al. M2DC – Modular Microserver DataCentre with Heterogeneous Hardware. Microprocessors and Microsystems Journal (MicPro), 52:117–130, July 2017. ISSN: 0141-9331 (Print). (doi:10.1016/j.micpro.2017.05.019)
[JR.15]
Alessandro Barenghi, Michele Beretta, Alessandro Di Federico, and Gerardo Pelosi. A privacy-preserving encrypted OSN with stateless server interaction: the Snake design. Computers & Security Journal (CoSe). Volume 63, pages 67-84, November 2016. ISSN: 0167-4048 (Print). (DOI:10.1016/j.cose.2016.09.005)
[JR.14]
Alessandro Barenghi, Guido M.Bertoni, Luca Breveglieri, Gerardo Pelosi, Stefano Sanfilippo, and Ruggero Susella. A Fault-based Secret Key Retrieval Method for ECDSA: Analysis and Countermeasure. ACM Journal on Emerging Technologies in Computing Systems (JETC), 13(1):1–26, April 2016.
ISSN: 1550-4832 (Print) 1550-4840 (Online). (DOI: 10.1145/2767132)
[JR.13]
Sabrina De Capitani Di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, and Pierangela Samarati. Three-server Swapping for Access Confidentiality. IEEE Transactions on Cloud Computing (TCC), 6(2):492–505, June 2018. ISSN: 2168-7161 (Print). (DOI:10.1109/TCC.2015.2449993)
[JR.12]
Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, and Michele Scandale. The MEET Approach: Securing Cryptographic Embedded Software against Side Channel Attacks. IEEE Transaction on Computer-Aided Design of Integrated Circuits and Systems (TCAD), 34(8):1320-1333, August 2015. IEEE. ISSN: 0278-0070 (Print).
(DOI: 10.1109/TCAD.2015.2430320)
[JR.11]
Sabrina De Capitani Di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, and Pierangela Samarati. Shuffle Index: Efficient and Private Access to Outsourced Data. ACM Transactions on Storage (TOS), 11(4):1–54, October 2015. ISSN: 1553-3077/2015 (Print). (DOI: 10.1145/2747878)
[JR.10]
Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, and Michele Scandale. Trace-based Schedulability Analysis to Enhance Passive Side-Channel Attack Resilience of Embedded Software. Information Processing Letters, 115(2):292–297, February 2015. Elsevier. ISSN: 0020-0190 (Print). (DOI: 10.1016/j.ipl.2014.09.030)
[JR.9]
Giovanni Agosta, Alessandro Barenghi, Massimo Maggi, and Gerardo Pelosi. Design Space Extension for Secure Implementation of Block Ciphers. IET Computers & Digital Techniques – Special issue: Hardware Security, Vol. 8, Issue 6, November 2014, pp. 256–263, 2014. ISSN: 1751-8601 (Print), 1751-861X (Online).
(DOI: 10.1049/iet-cdt.2014.0037)
[JR.8]
Giovanni Agosta, Alessandro Barenghi, Alessandro Di Federico, and Gerardo Pelosi. OpenCL Performance Portability for General-purpose Computation on Graphics Processor Units: an Exploration on Cryptographic Primitives. Concurrency and Computation: Practice and Experience, 27(14):3633-3360, September 2015 (Published Online 29 Aug. 2014). ISSN: 1532-0626 (Print), 1532-0634 (Online). (DOI:10.1002/cpe.3358)
[JR.7]
Alessandro Barenghi, Gerardo Pelosi, and Federico Terraneo. Secure and Efficient Design of Block Cipher Implementations on Microcontrollers. International Journal of Grid and Utility Computing, 4(2/3):110–118, September 2013. ISSN: 1741-847X (Print), 1741-8488 (Online). (DOI: 10.1504/IJGUC.2013.056246)
[JR.6]
Alessandro Barenghi, Guido M. Bertoni, Luca Breveglieri, and Gerardo Pelosi. A Fault Induction Technique Based on Voltage Underfeeding with Application to Attacks against AES and RSA. Journal of Systems and Software, 86(7):1864–1878, July 2013. ISSN: 0164-1212. (DOI: 10.1016/j.jss.2013. 02.021)
[JR.5]
Sabrina De Capitani Di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, and Pierangela Samarati. Supporting Concurrency and Multiple Indexes in Private Access to Outsourced Data. Journal of Computer Security, 21(3):425–461, July 2013. ISSN: 0926-227X (Print), 1875-8924 (Online). (DOI: 10.3233/JCS-130468)
[JR.4]
Giovanni Agosta, Francesco Bruschi, Gerardo Pelosi, and Donatella Sciuto. A Transform-Parametric Approach to Boolean Matching. IEEE Trans. on CAD of Integrated Circuits and Systems, 28(6):805–817, June 2009.
ISSN: 0278-0070. (DOI: 10.1109/TCAD.2009.2016547)
[JR.3]
Guido Bertoni, Luca Breveglieri, Liqun Chen, Pasqualina Fragneto, Keith A. Harrison, and Gerardo Pelosi. A Pairing SW Implementation for Smart-Cards. Journal of Systems and Software, 81(7):1240–1247, July 2008.
ISSN: 0164-1212. (DOI: 10.1016/j.jss.2007.09.022)
[JR.2]
Guido M. Bertoni, Luca Breveglieri, Pasqualina Fragneto, and Gerardo Pelosi. Parallel Hardware Architectures for the Cryptographic Tate Pairing. International Journal of Network Security, 7(1):31–37, July 2008. ISSN: 1816-353X (Print), 1816-3548 (Online).
[JR.1]
Giovanni Agosta, Luca Breveglieri, Gerardo Pelosi, and Martino Sykora. Programming Highly Parallel Reconfigurable Architectures for Symmetric and Asymmetric Cryptographic Applications. Journal of Computers, 2(9):50–59, September 2007. ISSN: 1796-203X. (DOI: 10.4304/jcp.2.9.50-59 )

Editorial Contributions

[EC.6]
Giovanni Agosta, Alessandro Barenghi, Israel Koren, Gerardo Pelosi (Editors). Proceedings of the 6th HiPEAC Workshop on Cryptography and Security in Computing Systems (CS2 '19), Valencia, Spain. January 21th, 2019. ACM New York, NY, USA. 2018. ISBN: 978-1-4503-xxxx-x.
[EC.5]
Giovanni Agosta, Alessandro Barenghi, Israel Koren, Gerardo Pelosi (Editors). Proceedings of the 5th HiPEAC Workshop on Cryptography and Security in Computing Systems (CS2 '18), Manchester, United Kingdom, January 22-24, 2018. ACM New York, NY, USA. 2018. ISBN: 978-1-4503-6374-7.
[EC.4]
Gerardo Pelosi, Giovanni Agosta, Alessandro Barenghi (Editors). Proceedings of the 4th HiPEAC Workshop on Cryptography and Security in Computing Systems (CS2 '17). Stockholm, Sweden, 24th January 2016. ACM New York, NY, USA. 2017. ISBN: 978-1-4503-4869-0.
[EC.3]
Gerardo Pelosi, Israel Koren, Giovanni Agosta, Alessandro Barenghi (Editors). Proceedings of the 3rd HiPEAC Workshop on Cryptography and Security in Computing Systems (CS2 '16). Prague, Czech Republic, 20th January 2016. ACM New York, NY, USA. 2016.
ISBN: 978-1-4503-4065-6.
[EC.2]
Gerardo Pelosi, Israel Koren, Giovanni Agosta, Alessandro Barenghi (Editors). Proceedings of the 2nd HiPEAC Workshop on Cryptography and Security in Computing Systems (CS2 '15). Amsterdam, The Netherlands, 19th January 2015. ACM New York, NY, USA. 2015.
ISBN: 978-1-4503-3187-6.
[EC.1]
Israel Koren and Gerardo Pelosi (Editors). Proceedings of the HiPEAC Workshop on Cryptography and Security in Computing Systems (CS2 '14). Vienna, Austria, January 20, 2014. ACM New York, NY, USA. 2014.
ISBN 978-1-4503-2484-7.

Refereed Book Contributions

[IB.10]
Ariel Oleksiak, Michal Kierzynka, Wojciech Piatek, Micha vor dem Berge, Wolfgang Christmann, Stefan Krupop, Mario Porrmann, Jens Hagemeyer, René Griessl, Meysam Peykanu, Lennart Tigges, Sven Rosinger, Daniel Schlitt, Christian Pieper, Udo Janssen, Holm Rauchfuss, Giovanni Agosta, Alessandro Barenghi, Carlo Brandolese, William Fornaciari, Gerardo Pelosi, Joao Pita Costa, Mariano Cecowski, Robert Plestenjak, Justin Cinkelj, Loïc Cudennec, Thierry Goubier, Jean-Marc Philippe, Chris Adeniyi-Jones, Javier Setoain, and Luca Ceva. M2DC - A Novel Heterogeneous Hyperscale Microserver Platform. In Christoforos Kachris, Babak Falsafi, and Dimitrios Soudris, editors, Hardware Accelerators in Data Centers, pages 109–128. Springer, Cham, 2019 (First online: 22 August 2018). ISBN: 978-3-319-92791-6 (Print) 978-3-319-92792-3 (Online).
(doi:10.1007/978-3-319-92792-3_6)
[IB.9]
Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, and Pierangela Samarati. Access Privacy in the Cloud. In Indrakshi Ray, Indrajit Ray, and Pierangela Samarati, editors, From Database to Cyber Security, Lecture Notes in Computer Science, vol. 11170. Also part of the Security and Cryptology book sub series., pages 186–205. Springer International Publishing, Switzerland, November 2018. ISBN: 978-3-030-04833-4 (Print); 978-3-030-04834-1 (Online). Series Print ISSN 0302-9743. Series Online ISSN 1611-3349. (doi:10.1007/978-3-030-04834-1_10)
[IB.8]
Alessandro Barenghi, Luca Breveglieri, Mariagrazia Fugini, and Gerardo Pelosi. Computer Security Anchors in Smart Grids: The Smart Metering Scenario and Challenges. In Bernard Candaele, Dimitrios Soudris, and Iraklis Anagnostopoulos, editors, Trusted Computing for Embedded Systems, pages 47–59. Springer International Publishing, Switzerland, January 2015. ISBN: 978-3-319-09419-9 (Print) 978-3-319-09420-5 (Online).
(DOI: 101007/978-3-319-09420-5_3)
[IB.7]
Alessandro Barenghi, Luca Breveglieri, Andrea Palomba, and Gerardo Pelosi. Fault Sensitivity Analysis at Design Time. In Bernard Candaele, Dimitrios Soudris, and Iraklis Anagnostopoulos, editors, Trusted Computing for Embedded Systems, pages 175–186. Springer International Publishing, Switzerland, January 2015.
ISBN: 978-3-319-09419-9 (Print) 978-3-319-09420-5 (Online). (DOI: 101007/978-3-319-09420-5_9)
[IB.6]
Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, and Michele Scandale. Symmetric Key Encryption Acceleration on Heterogeneous Many- Core Architectures. In Saiful Azad and Al-Sakib Khan Pathan, editors, Practical Cryptography: Algorithms and Implementations using C++, pages 251–297. CRC Press, Taylor & Francis Group, Boca Raton, Florida, USA, December 2014. ISBN: 978-1-4-822-28892 (Print)
( URL: http://www.crcpress.com/product/isbn/9781482228892# )
[IB.5]
Alessandro Barenghi, Luca Breveglieri, Fabrizio De Santis, Filippo Melzani, Andrea Palomba, and Gerardo Pelosi. Design Time Engineering of Side Channel Resistant Cipher Implementations. In Atilla Elçi, Josef Pieprzyk, Alexander G. Chefranov, Mehmet A. Orgun, Huaxiong Wang, and Rajan Shankaran, editors, Theory and Practice of Cryptography Solutions for Secure Information Systems, Advances in Information Security, Privacy, and Ethics (AISPE), pages 133–157. IGI Global, Hershey, PA, USA, February 2013. ISBN: 978-1-466-64030-6 (Print), 978-1-466-64031-3 (Online). (DOI:10.4018/978-1- 4666-4030-6.ch006)
[IB.4]
Alessandro Barenghi, Guido M. Bertoni, Luca Breveglieri, Mauro Pelliccioli, and Gerardo Pelosi. Injection Technologies for Fault Attacks on Microprocessors. In Marc Joye and Michael Tunstall, editors, Fault Analysis in Cryptography, Information Security and Cryptography, pages 275–293. Springer, Berlin, Heidelberg, November 2012. ISBN: 978-3-642-29655-0 (Print), 978-3-642-29656-7 (Online), ISSN: 1619-7100.
(DOI:10.1007/978-3-642- 29656-7_16)
[IB.3]
Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, and Pierangela Samarati. Selective Exchange of Confidential Data in the Outsourcing Scenario. In Jan Camenisch, Simone Fischer-Hübner, and Kai Rannenberg, editors, Privacy and Identity Management for Life, pages 181–198. Springer, Berlin, Heidelberg, October 2011. ISBN: 978-3-642-20316-9 (Print), 978-3-642-20317-6 (Online). (DOI:10.1007/978-3-642- 20317-6)
[IB.2]
Gerardo Pelosi. Secure Audit Logs. In Henk C. A. van Tilborg and Sushil Jajodia, editors, Encyclopedia of Cryptography and Security (2nd Ed.), pages 1097–1099. Springer, New York, NY, USA, January 2011. ISBN: 978-1-4419-5905-8 (Print), 978-1-4419-5906-5 (Online), 978-1-4419-5907-2 (Bundle).
(DOI:10.1007/978-1-4419- 5906-5)
[IB.1]
Gerardo Pelosi. Secure Index. In Henk C. A. van Tilborg and Sushil Jajodia, editors, Encyclopedia of Cryptography and Security (2nd Ed.), pages 1116–1119. Springer, New York, NY, USA, January 2011. ISBN: 978-1-4419-5905-8 (Print), 978-1-4419-5906-5 (Online), 978-1-4419-5907-2 (Bundle). (DOI:10.1007/978-1-4419- 5906-5)

Refereed International Conferences

[IC.63]
Alessandro Barenghi, Nicholas Mainardi, and Gerardo Pelosi. Comparison-based Attacks against Noise-free Fully Homomorphic Encryption Schemes. In David Naccache, Shouhuai Xu, Sihan Qing, Pierangela Samarati, Gregory Blanc and Rongxing Lu, editors, Proceedings of the 20th International Conference on Information and Communications Security, ICICS 2018, October 29-31, 2018. Lille, France, volume 11149 of Lecture Notes in Computer Science, pages 117--191, Springer, Cham 2018. ISBN: 978-3-030-01949-5 (Print), 978-3-030-01950-1 (Online). Copyright: Springer Nature Switzerland AG 2018. Also part of the Security and Cryptology book sub series. Series Print ISSN: 0302-9743. Series Online ISSN: 1611-3349 (doi:10.1007/978-3-030-01950-1_11)
[IC.62]
Alessandro Barenghi, Luca Breveglieri, Niccolò Izzo, and Gerardo Pelosi. Software-only Reverse Engineering of Physical DRAM Mappings for Rowhammer Attacks. In Magdy S. Abadir, Ilia Polian, Sohrab Aftabjahani, and Yier Jin, editors, Proccedings of the 2018 IEEE 3rd International Verification and Security Workshop (IVSW), July 2-4, 2018, Platja d’Aro, Costa Brava, Spain, pages 19–24, New York, NY, USA, October 2018. IEEE. ISBN: 978-1-5386-6544-2. Print on Demand(PoD) ISBN: 978-1-5386-6545-9. Part Number: CFP18G73-ART. (doi:10.1109/IVSW.2018.8494868)
[IC.61]
Alessandro Barenghi, Michele Madaschi, Nicholas Mainardi, and Gerardo Pelosi. OpenCL HLS Based Design of FPGA Accelerators for Cryptographic Primitives. In Stephen Jarvis, Bahman Javadi, and Song Guo, editors, Proceedings of the International Conference on High Performance Computing & Simulation (HPCS 2018), July 16-20, 2018. Orléans, France., pages 634-641, New York, NY, USA, July 2018. IEEE 2018.
ISBN: 978-1-5386-7878-7. (doi: 10.1109/HPCS.2018.00105)
[IC.60]
Alessandro Barenghi and Gerardo Pelosi. Side-channel security of superscalar CPUs: Evaluating the Impact of Microarchitectural Features. In Sharon Hu, Rob Aitken, and Anand Raghunathan, editors, Proceedings of the 55th Annual Design Automation Conference, DAC '18, San Francisco, CA, USA, June 24–28, 2018, pages 1-6, New York, NY, USA, June 2018. ACM. ISBN: 978-1-4503-5700-5/18/06. (doi:10.1145/3195970.3196112)
[IC.59]
Marco Baldi, Alessandro Barenghi, Franco Chiaraluce, Gerardo Pelosi, and Paolo Santini. LEDAkem: a post-quantum key encapsulation mechanism based on QC-LDPC codes. In Tanja Lange and Rainer Steinwandt, editors, Proceedings of The Ninth International Conference on Post-Quantum Cryptography (PQCrypto 2018), Fort Lauderdale, Florida, April 9-11, 2018, volume 10786 of Lecture Notes in Computer Science, also part of the Security and Cryptology subseries, pages 1-22. Springer International Publishing AG, part of Springer Nature, April 2018. Print ISBN 978-3-319-79062-6, Series Print ISSN 0302-9743. Series Online ISSN 1611-3349 (doi:10.1007/978-3-319-79063-3_1)
[IC.58]
Alessandro Barenghi, Gerardo Pelosi, and Nicholas Mainardi. A Security Audit of the OpenPGP Format. In Richard Hill, Indrajit Ray, Xiaofei Liao, Zhen Liu, Stephen Jarvis, Lei Liu, Bahman Javadi, and Song Guo, editors, Proceedings of the 11th International Conference on Frontier of Computer Science and Technology (FCST-2017), Exeter, England, UK, 21-23 June 2017, pages 336-343, New York, NY, USA, June 2017. IEEE Computer Society. ISBN: 978-1-5386-0840-1.ISSN: 2375-527X. (doi:10.1109/ISPAN-FCST-ISCC.2017.35)
[IC.57]
Alessandro Barenghi, Nicholas Mainardi, and Gerardo Pelosi. A Novel Regular Format for X.509 Digital Certificates. In Shahram Latifi, editor, Proceedings of the 14th International Conference on Information Technology: New Generations (ITNG 2017), April 10-12, 2017, Las Vegas, Nevada, USA, volume 558 of Advances in Intelligent Systems and Computing, pages 135–141. Springer International Publishing, April 2017. ISBN 978-3-319-54977-4 (Print), ISBN 978-3-319-54978-1 (eBook), series ISSN 2194-5357, ISSN 2194-5365 (electronic). (doi:10.1007/978-3-319-54978-1_18)
[IC.56]
Alessandro Barenghi and Gerardo Pelosi. An Enhanced Dataflow Analysis to Automatically Tailor Side Channel Attack Countermeasures to Software Block Ciphers. In Alessandro Armando, Roberto Baldoni, and Riccardo Focardi, editors, Proceedings of the Italian Conference on Cyber Security (ITA-SEC 2017), 17-20 January 2017, Venice, Italy. CEUR Workshop Proceedings, Vol-1816, pages 8–18, ISSN 1613-0073.
(http://ceur-ws.org/Vol-1816)
[IC.55]
Sabrina De Capitani Di Vimercati, Sara Foresti, Riccardo Moretti, Stefano Paraboschi, Gerardo Pelosi, and Pierangela Samarati. A dynamic tree-based data structure for access privacy. In Grégoire Danoy and Sathish Gopalakrishnan, editors, Proceedings of the 8th IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2016), 12-15 December 2016, Luxembourg City, Grand Duchy of Luxembourg, pages 187:1-187:8, New York, NY, USA, January 2017. IEEE. ISBN: 978-1-5090-1446-0 (Print on Demand), 978-1-5090-1445-3 (Electronic). ISSN: 2330-2186 (Electronic). (doi:10.1109/CloudCom.2016.0068)
[IC.54]
Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, and Michele Scandale. Encasing Block Ciphers to Foil Key Recovery Attempts via Side Channel. In Frank Liu, editor, Proceedings of the IEEE/ACM International Conference on Computer-Aided Design, ICCAD 2016, Austin, TX, USA, November 7–10, 2016, article No. 96, New York, NY, USA, November 2016. ACM. ISBN: 978-1-4503-4466-1/16/11. (doi:10.1145/2966986.2967033)
[IC.53]
Alessandro Barenghi and Gerardo Pelosi. A Note on Fault Attacks against Deterministic Signature Schemes. In Kazuto Ogawa and Katsunari Yoshioka, editors, Proceedings of the 11th International Workshop on Security - Advances in Information and Computer Security (IWSEC 2016), Akihabara-Ochanomizu District, Tokyo, Japan, September 12–14, 2016, volume 9836 of Lecture Notes in Computer Science, pages 182–192. Springer International Publishing, September 2016. ISBN: 978-3–319-44523-6 (Print) 978-3-319-44524-3 (Online), ISSN: 0302-9743. (doi:10.1007/978-3-319-44524-3_11)
[IC.52]
Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, and Pierangela Samarati. Access Control for the Shuffle Index. In Silvio Ranise and Vipin Swarup, editors, 30th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2016), Trento, Italy, July 18-21, 2016, volume 9766 of Lecture Notes in Computer Science, pages 130-147. Springer International Publishing, July 2016. ISBN: 978-3-319-41482-9 (Print) 978-3-319-41483-6 (Online). Series ISSN: 0302-9743 (doi:10.1007/978-3-319-41483-6_10)
[IC.51]
Giovanni Agosta, Alessandro Barenghi, Carlo Brandolese, William Fornaciari, and Gerardo Pelosi et. al.
V2I Cooperation for Traffic Management with SafeCOP. In George A. Papadopoulos, Paris Kitsos, and Odysseas Koufopavlou, editors, 19th Euromicro Conference on Digital System Design, August 31 - September 2, 2016. Limassol, Cyprus, pages 621-628, Los Alamitos, CA, USA, September 2016. IEEE Computer Society.
ISBN: 978-1-5090-2817-7/16 (Print). (doi:10.1109/DSD.2016.18)
[IC.50]
Giovanni Agosta, Alessandro Barenghi, and Gerardo Pelosi. Automated Instantiation of Side-Channel Attacks Countermeasures for Software Cipher Implementations. In Gianluca Palermo, John Feo, editors, Proceedings of the 13th ACM International Conference on Computing Frontiers, (CF'16), Como, Italy, May 16-19, 2016, pages 455–460, New York, NY, USA, May 2016. ACM. ISBN: 978-1-4503-4128-8/16/05 (Print).
(DOI: 10.1145/2903150.2911707)
[IC.49]
Giovanni Agosta, Alessio Antonini, Alessandro Barenghi, Dario Galeri, and Gerardo Pelosi. Cyber-Security Analysis and Evaluation for Smart Home Management Solutions. In Jing Yang Jou, Yen Hsyang Chu, Yin-Yi Lin, and Yen-Wen Chen, editors Proceedings of the 49th IEEE International Conference on Security Technology (ICCST 2015), Taipei, Taiwan, R.O.C., 21–24 September, 2015, pages 1–6, Piscataway, NJ, USA, September 2015. January 2016 IEEE. ISBN: 978-147998691-0 (Print). ISSN: 10716572.
(DOI: 10.1109/CCST.2015.7389663 )
[IC.48]
Alessandro Barenghi, Alessandro Di Federico, Gerardo Pelosi, and Stefano Sanflippo. Challenging the Trustworthiness of PGP: Is the Web-of-Trust Tear-proof? In Pernul G. and Peter Y. A. Ryan and Edgar Weipp, editors, Computer Security - ESORICS 2015 - Part I, Proceedings of the 20th European Symposium on Research in Computer Security, Vienna, Austria, September 23–25, 2015, volume 9326 of Lecture Notes in Computer Science, pages 1–18, Switzerland, September 2015. . Springer International Publishing. ISBN: 978-3-319-24173-9 (Print) 978-3-319-24174-6 (Online), ISSN: 0302-9743. (DOI: 10.1007/978-3-319-24174-6_22)
[IC.47]
Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, and Michele Scandale. Information Leakage Chaff: Feeding Red Herrings to Side Channel Attackers. In Sharon Hu and Rob Aitken (editors), Proceedings of the 52th Annual Design Automation Conference, DAC’15, San Francisco, CA, USA, June 7-11, 2015, pages 33:1-33:6, New York, NY, USA, June 2015. ACM. ISBN: 978-1-4503-3520-1/15. (DOI: 10.1145/2744769.2744859)
[IC.46]
Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, and Pierangela Samarati. Protecting Access Confidentiality with Data Distribution and Swapping. In Xindong Wu, Hai Jin, Manish Parashar, and Laurence T. Yang, editors, Proceedings of the 2014 IEEE International Conference on Big Data and Cloud Computing (BdCloud), Sydney, Australia - December 3-5, 2014, pages 167-174, Piscataway, NJ, USA, December 2014. IEEE Computer Society. ISBN-13: 978-1-4799-6719-3 (Print). (DOI: 10.1109/BDCloud.2014.59)
[IC.45]
Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, and Michele Scandale. Towards Transparently Tackling Functionality and Performance Issues Across Different OpenCL Platforms. In Shuichi Ichikawa and Tomoaki Tsumura, editors, Proceedings of the International Symposium on Computing and Networking – Across Practical Development and Theoretical Research - (CANDAR 2014) Mt. Fuji, Shizuoka, Japan - December 10-12, 2014, pages 130--136, Piscataway, NJ, USA, December 2014. IEEE. ISBN: 978-1-4799-4152-0/14.
(DOI: 10.1109/CANDAR.2014.53)
[IC.44]
Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, and Michele Scandale. Differential Fault Analysis for Block Ciphers: an Automated Conservative Analysis. In Ron Poet, Atilla Elçi, Manoj Singh Gaur, Mehmet A. Orgun, and Oleg B. Makarevich, editors, Proceedings of the 7th International Conference on Security of Information and Networks, SIN '14, Glasgow, Scotland UK, September, 9-11 2014, pages 171:1-171:8, New York, NY, USA, September 2014. ACM. ISBN: 978-1-4503-3033-6/14/09. (DOI: 10.1145/2659651.2659709)
Best Paper Award
[IC.43]
Alessandro Barenghi and Gerardo Pelosi. On the Security of Partially Masked Software Implementations. In Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati, editors, SECRYPT 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28–30 August, 2014, pages 492--499. SciTePress, August 2014. ISBN 978-989-758-045-1 (Print).
(DOI: http://dx.doi.org/10.5220/0005120504920499)
[IC.42]
Govanni Agosta, Alessandro Barenghi, and Gerardo Pelosi. Securing Software Cryptographic Primitives for Embedded Systems against Side Channel Attacks. In Fabio Garza, Gordon Thomas, and Daniel A. Pritchard, editors, Proceedings of the 48th IEEE International Conference on Security Technology (ICCST 2014), Rome, Italy, 13–16 October, 2014, pages 382–387, Piscataway, NJ, USA, October 2014. IEEE. ISBN: 978-1-4799-3530-7 (Print). (DOI:10.1109/CCST.2014.6987032)
[IC.41]
Alessio Antonini, Alessandro Barenghi, Gerardo Pelosi, and Saman Zonouz. Security Challenges in Building Automation and SCADA. In Fabio Garza, Gordon Thomas, and Daniel A. Pritchard, editors, Proceedings of the 48th IEEE International Conference on Security Technology (ICCST 2014), Rome, Italy, 13–16 October, 2014, pages 176–181, Piscataway, NJ, USA, October 2014. IEEE. ISBN: 978-1-4799-3530-7 (Print). (DOI:10.1109/CCST.2014.6986996)
[IC.40]
Alessandro Barenghi, Michele Beretta, Alessandro Di Federico, and Gerardo Pelosi. Snake: an End-to-End Encrypted Online Social Network. In Julien Bourgeois and Frédéric Magoulès, editors, Proceedings of the 6th International Symposium on Cyberspace Safety and Security (CSS 2014), Paris, France, 20–22 August, 2014, pages 775-782, Piscataway, NJ, USA, August 2014. IEEE Computer Society. ISBN: 978-1-4799-6123-8/14 (Print).
(DOI: 10.1109/HPCC.2014.128)
[IC.39]
Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, and Michele Scandale. A Multiple Equivalent Execution Trace Approach to Secure Cryptographic Embedded Software. In Soha Hassoun, Charles Alpert, and Sharon Hu, editors, Proceedings of the 51th Annual Design Automation Conference, DAC '14, San Francisco, CA, USA, June 1–5, 2014, pages 1–6, New York, NY, USA, May 2014. ACM. ISBN: 978-1-4503-2730 (Print). (DOI:10.1145/2593069.2593073)
[IC.38]
Giovanni Agosta, Gerardo Pelosi, and Ettore Speziale. On Task Assignment in Data Intensive Scalable Computing. In N. Desai and W. Cirne, editors, Proceedings of the 17th Workshop on Job Scheduling Strategies for Parallel Processing, JSSPP 2013, Boston, Massachusetts, USA, 24 May 2013, volume 8429 of Lecture Notes in Computer Science, pages 1–20, Berlin, Heidelberg, May 2014. Springer-Verlag. ISBN: 978-3-662-43779-7_8 (Print). (DOI:10.1007/978-3-662-43779-7_8)
[IC.37]
Iyad Al Khatib, Gerardo Pelosi, Giovanni Agosta, and Heikki Teriö. Security Integration in Medical Device Design: Extension of an Automated Bio-medical Engineering Design Methodology. In Shahram Latifi, editor, Proceedings of the 11th International Conference on Information Technology: New Generations, ITNG 2014, Las Vegas, Nevada, USA, 7–9 April, 2014, pages 416–423, Washington, DC, USA, April 2014. IEEE Computer Society. ISBN: 978-1-4799-3187-3 (Print). (DOI:10.1109/ITNG.2014.3)
[IC.36]
Alessio Antonini, Alessandro Barenghi, and Gerardo Pelosi. Security Analysis of Building Automation Networks: Threat Model and Viable Mitigation Techniques. In Hanne Riis Nielson and Dieter Gollmann, editors, Secure IT Systems - Proceedings of the 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18–21, 2013, volume 8208 of Lecture Notes in Computer Science, pages 199–214, Berlin, Heidelberg, October 2013. Springer Berlin Heidelberg. ISBN: 978-3-642-41487-9 (Print) 978-3-642-41488-6 (Online), ISSN: 0302-9743. (DOI:10.1007/978-3-642-41488-6_14)
[IC.35]
Sabrina De Capitani Di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, and Pierangela Samarati. Distributed Shuffling for Preserving Access Confidentiality. In Jason Crampton, Sushil Jajodia, and Keith Mayes, editors, Computer Security - ESORICS 2013 - Proceedings of the 18th European Symposium on Research in Computer Security, Egham, UK, September 9–13, 2013, volume 8134 of Lecture Notes in Computer Science, pages 628–645, Berlin, Heidelberg, September 2013. Springer-Verlag. ISBN: 978-3-642-40202-9 (Print) 978-3-642-40203-6 (Online), ISSN: 0302-9743. (DOI:10.1007/978-3-642-40203-6_35)
[IC.34]
Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, and Michele Scandale. Enhancing Passive Side-Channel Attack Resilience through Schedulability Analysis of Data-Dependency Graphs. In Javier Lopez, Xinyi Huang, and Ravi Sandhu, editors, Network and System Security. Proceedings of the 7th International Conference, NSS 2013, Madrid, Spain, June 3–4, 2013, volume 7873 of Lecture Notes in Computer Science, pages 692–698, Berlin, Heidelberg, June 2013. Springer. ISBN: 978-3-642-38630-5 (Print), 978-3-642-38631-2 (Online), ISSN: 0302-9743. (DOI:10.1007/978-3-642-38631-2_58)
[IC.33]
Giovanni Agosta, Alessandro Barenghi, Massimo Maggi, and Gerardo Pelosi. Compiler-Based Side Channel Vulnerability Analysis and Optimized Countermeasures Application. In Yervant Zorian, Donatella Sciuto, and Charles Alpert, editors, Proceedings of the 50th Annual Design Automation Conference, DAC '13, Austin, TX, USA, May 29–June 7, 2013, pages 81:1–81:6, New York, NY, USA, May 2013. ACM. ISBN: 978-1-4503-2071-9. (DOI:10.1145/2463209.2488833)
[IC.32]
Alessandro Barenghi, Gerardo Pelosi, and Fabio Pozzi. Drop-In Control Flow Hijacking Prevention through Dynamic Library Interception. In Shahram Latifi, editor, Proceedings of the 10th International Conference on Information Technology: New Generations, ITNG 2013, Las Vegas, Nevada, USA, 15–17 April, 2013, pages 640–647, Washington, DC, USA, April 2013. IEEE Computer Society. ISBN: 978-0-7695-4967-5 (Print). (DOI:10.1109/ITNG.2013.99)
[IC.31]
Alessandro Barenghi, Gerardo Pelosi, and Francesco Regazzoni. Simulation-Time Security Margin Assessment against Power-Based Side Channel Attacks. In Dimitrios Serpanos and Marilyn Wolf, editors, Proceedings of the 7th Workshop on Embedded Systems Security (WESS 2012), A Workshop of the Embedded Systems Week (ESWEEK 2012), October 11, 2012, Tampere, Finland, 2012, pages xxx–xxx, New York, NY, USA, October 2012. ACM. ISBN: 978-1-4503-1286-8/12/10. (DOI:)
[IC.30]
Alessandro Barenghi, Luca Breveglieri, Mariagrazia Fugini, and Gerardo Pelosi. Smart Meters and Home Gateway Scenarios. In Americo Cicchetti and Cecilia Rossignoli, editors, Proceedings of itAIS 2012 – IX Conference of the Italian Chapter of AIS Organization change and Information Systems: Working and Living Together in New Ways – Universitá Cattolica del Sacro Cuore, Rome Campus (Italy), September 28th and 29th, 2012, Roma (RM), September 2012. ITHUM Srl. ISBN: 978-88-6685-085-4.
[IC.29]
Giovanni Agosta, Alessandro Barenghi, and Gerardo Pelosi. A Code Morphing Methodology to Automate Power Analysis Countermeasures. In Patrick Groeneveld, Donatella Sciuto, and Soha Hassoun, editors, The 49th Annual Design Automation Conference 2012, DAC '12, San Francisco, CA, USA, June 3–7, 2012, pages 77–82, New York, NY, USA, June 2012. ACM. ISBN: 978-1-4503-1199-1. (DOI:10.1145/2228360.2228376)
[IC.28]
Giovanni Agosta, Alessandro Barenghi, Antonio Parata, and Gerardo Pelosi. Automated Security Analysis of Dynamic Web Applications through Symbolic Code Execution. In Shahram Latifi, editor, Proceedings of the Ninth International Conference on Information Technology: New Generations, ITNG 2012, Las Vegas, Nevada, USA, 16–18 April, 2012, pages 189–194, Washington, DC, USA, April 2012. IEEE Computer Society. ISBN: 978-1-4673-0798-7 (Print). (DOI:10.1109/ITNG.2012.167)
[IC.27]
Giovanni Agosta, Alessandro Barenghi, and Gerardo Pelosi. Exploiting Bit-level Parallelism in GPGPUs: a Case Study on KeeLoq Exhaustive Search Attacks. In Gero Mühl, Jan Richling, and Andreas Herkersdorf, editors, ARCS Workshops, Proceedings of the 3rd Workshop on Parallel Programming and Run-Time Management Techniques for Many-Core Architectures, PARMA '12, Munich, Germany, 28–29 February, 2012, volume 200 of Lecture Notes in Informatics (LNI), pages 385–396, Bonn, Germany, February 2012. Gesellschaft für Informatik (GI). ISBN: 978-1-4673-1913-3 (Print), 978-3-88579-294-9 (Online), ISSN: 1617-5468.
[IC.26]
Alessandro Barenghi, Guido M. Bertoni, Luca Breveglieri, Maria Grazia Fugini, and Gerardo Pelosi. Smart Metering in Power Grids: Application Scenarios and Security. In Syed Islam, editor, Proceedings of the IEEE PES Innovative Smart Grid Technology Conference (IEEE PES ISGT2011 Asia), November 13–16, 2011, Perth, Australia, pages 1–8, Piscataway, NJ, USA, November 2011. IEEE. ISBN: 978-1-4577-0873-2 (Print), 978-1-4577-0874-9 (Online), 978-1-4577-0875-6/11. (DOI:10.1109/ISGT-Asia.2011.6167108)
[IC.25]
Alessandro Barenghi, Guido Marco Bertoni, Luca Breveglieri, Gerardo Pelosi, and Andrea Palomba. Fault Attack to the Elliptic Curve Digital Signature Algorithm with Multiple Bit Faults. In Mehmet A. Orgun, Atilla Elçi, Oleg B. Makarevich, Sorin A. Huss, Josef Pieprzyk, Lyudmila K. Babenko, Alexander G. Chefranov, and Rajan Shankaran, editors, Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14–19, 2011, pages 63–72, New York, NY, USA, November 2011. ACM. ISBN: 978-1-4503-1020-8. (DOI:10.1145/2070425.2070438)
[IC.24]
Sabrina De Capitani Di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, and Pierangela Samarati. Supporting Concurrency in Private Data Outsourcing. In Vijay Atluri and Claudia Díaz, editors, Computer Security - ESORICS 2011 - Proceedings of the 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12–14, 2011, volume 6879 of Lecture Notes in Computer Science, pages 648–664, Berlin, Heidelberg, September 2011. Springer-Verlag. ISBN: 978-3-642-23821-5 (Print), 978-3-642-23822-2 (Online), ISSN: 0302-9743 (Print), 1611-3349 (Online). (DOI:10.1007/978-3-642-23822-2_35)
[IC.23]
Alessandro Barenghi and Gerardo Pelosi. Security and Privacy in Smart Grid Infrastructures. In Franck Morvan, A Min Tjoa, and Roland R. Wagner, editors, DEXA '11 Proceedings of the 2011 22nd International Workshop on Database and Expert Systems Applications, Toulouse, France, August 29–September 2, 2011, pages 102–108, Washington, DC, USA, August 2011. IEEE Computer Society. ISBN: 978-1-4577-0982-1 (Print), 978-0-7695-4486-1 (Online), ISSN: 1529-4188. (DOI:10.1109/DEXA.2011.74)
[IC.22]
Alessandro Barenghi, Gerardo Pelosi, and Yannick Teglia. Information Leakage Discovery Techniques to Enhance Secure Chip Design. In Claudio Agostino Ardagna and Jianying Zhou, editors, Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication - Proceedings of the 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1–3, 2011, volume 6633 of Lecture Notes in Computer Science, pages 128–143, Berlin, Heidelberg, June 2011. Springer-Verlag. ISBN: 978-3-642-21039-6 (Print), 978-3-642-21040-2 (Online). (DOI:10.1007/978-3-642-21040-2_9)
[IC.21]
Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, and Pierangela Samarati. Efficient and Private Access to Outsourced Data. In Proceedings of the 2011 31st International Conference on Distributed Computing Systems, ICDCS 2011, Minneapolis, MN, USA, June 20–24, 2011, pages 710–719, Washington, DC, USA, June 2011. IEEE Computer Society. ISBN: 978-1-61284-384-1 (Print), 978-0-7695-4364-2 (Online), ISSN: 1063-6927. (DOI:10.1109/ICDCS.2011.37)
[IC.20]
Alessandro Barenghi, Luca Breveglieri, Israel Koren, Gerardo Pelosi, and Francesco Regazzoni. Countermeasures against Fault Attacks on Software Implemented AES: Effectiveness and Cost. In ESWeek '10 Sixth Embedded Systems Week. Proceedings of the 5th Workshop on Embedded Systems Security. WESS' 10, Scottsdale, AZ, USA. October 28, 2010, pages 7:1–7:10, New York, NY, USA, October 2010. ACM. ISBN: 978-1-4503-0078-0. (DOI:10.1145/1873548.1873555)
[IC.19]
Alessandro Barenghi, Gerardo Pelosi, and Yannick Teglia. Improving First Order Differential Power Attacks through Digital Signal Processing. In Oleg B. Makarevich, Atilla Elçi, Mehmet A. Orgun, Sorin A. Huss, Ludmila K. Babenko, Alexander G. Chefranov, and Vijay Varadharajan, editors, Proceedings of the 3rd International Conference on Security of Information and Networks, SIN 2010, Rostov-on-Don, Russian Federation, September 7–11, 2010, pages 124–133, New York, NY, USA, September 2010. ACM. ISBN: 978-1-4503-0234-0. (DOI:10.1145/1854099.1854126)
[IC.18]
Alessandro Barenghi, Guido Marco Bertoni, Luca Breveglieri, Mauro Pellicioli, and Gerardo Pelosi. Fault Attack on AES with Single-Bit Induced Faults. In Proceedings of the Sixth International Conference on Information Assurance and Security, IAS 2010, Atlanta, GA, USA, August 23–25, 2010, pages 167–172. IEEE, August 2010. ISBN: 978-1-4244-7407-3 (Print). (DOI:10.1109/ISIAS.2010.5604061)
[IC.17]
Alessandro Barenghi, Guido Bertoni, Luca Breveglieri, Mauro Pellicioli, and Gerardo Pelosi. Low Voltage Fault Attacks to AES. In Jim Plusquellic and Ken Mai, editors, HOST 2010, Proceedings of the 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 13–14 June 2010, Anaheim Convention Center, CA, USA, pages 7–12, Los Alamitos, CA, USA, June 2010. IEEE Computer Society. ISBN: 978-1-4244-7811-8 (Print), 978-1-4244-7810-1 (Online). (DOI:10.1109/HST.2010.5513121)
[IC.16]
Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Gerardo Pelosi, and Pierangela Samarati. Encryption-Based Policy Enforcement for Cloud Storage. In David H. C. Du and Michel Raynal, editors, 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 21–25 June 2010, Genova, Italy, pages 42–51, Washington, DC, USA, June 2010. IEEE Computer Society. ISBN: 978-1-4244-7471-4 (Print), 978-0-7695-4079-5 (Online), ISSN: 1545-0678. (DOI:10.1109/ICDCSW.2010.35)
[IC.15]
Giovanni Agosta, Alessandro Barenghi, Fabrizio De Santis, and Gerardo Pelosi. Record Setting Software Implementation of DES Using CUDA. In Shahram Latifi, editor, Proceeding of the Seventh International Conference on Information Technology: New Generations, ITNG 2010, Las Vegas, Nevada, USA, 12–14 April 2010, pages 748–755, Los Alamitos, CA, USA, April 2010. IEEE Computer Society. ISBN: 978-0-7695-3984-3 (Print). (DOI:10.1109/ITNG.2010.43)
[IC.14]
Gerardo Pelosi and Giuseppe Psaila. SMaC: Spatial Map Caching Technique for Mobile Devices. In Sung Y. Shin, Sascha Ossowski, Michael Schumacher, Mathew J. Palakal, and Chih-Cheng Hung, editors, Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), Sierre, Switzerland, March 22–26, 2010, pages 1829–1830, New York, NY, USA, March 2010. ACM. ISBN: 978-1-60558-639-7. (DOI:10.1145/1774088.1774476)
[IC.13]
Giovanni Agosta, Alessandro Barenghi, Fabrizio De Santis, Andrea Di Biagio, and Gerardo Pelosi. Fast Disk Encryption through GPGPU Acceleration. In Proceedings of the 2009 International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2009, Higashi Hiroshima, Japan, December 8–11 2009, pages 102–109, Los Alamitos, CA, USA, December 2009. IEEE Computer Society. ISBN: 978-0-7695-3914-0. (DOI:10.1109/PDCAT.2009.72)
[IC.12]
Alessandro Barenghi, Guido Bertoni, Emanuele Parrinello, and Gerardo Pelosi. Low Voltage Fault Attacks on the RSA Cryptosystem. In Luca Breveglieri, Israel Koren, David Naccache, Elisabeth Oswald, and Jean-Pierre Seifert, editors, Proceeding of the Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2009, Lausanne, Switzerland, September 6, 2009, pages 23–31, Washington, DC, USA, September 2009. IEEE Computer Society. ISBN: 978-1-4244-4972-9 (Print), 978-0-7695-3824-2 (Online). (DOI:10.1109/FDTC.2009.30)
[IC.11]
Andrea Di Biagio, Alessandro Barenghi, Giovanni Agosta, and Gerardo Pelosi. Design of a Parallel AES for Graphics Hardware Using the CUDA Framework. In Proceedings of the 23rd IEEE International Symposium on Parallel and Distributed Processing, IPDPS 2009, Rome, Italy, May 23–29, 2009, pages 1–8, Washington, DC, USA, May 2009. IEEE Computer Society. ISBN: 978-1-4244-3751-1 (Print), 978-1-4244-3750-4 (Online), ISSN: 1530-2075. (DOI:10.1109/IPDPS.2009.5161242)
[IC.10]
Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Gerardo Pelosi, and Pierangela Samarati. Preserving Confidentiality of Security Policies in Data Outsourcing. In Vijay Atluri and Marianne Winslett, editors, Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, WPES 2008, Alexandria, VA, USA, October 27, 2008, pages 75–84, New York, NY, USA, October 2008. ACM. ISBN: 978-1-60558-289-4. (DOI:10.1145/1456403.1456417)
[IC.9]
Alessandro Barenghi, Guido Bertoni, Luca Breveglieri, and Gerardo Pelosi. A FPGA Coprocessor for the Cryptographic Tate Pairing over Fp. In Shahram Latifi, editor, Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 7–8 April 2008, Las Vegas, Nevada, USA, pages 112–119, Washington, DC, USA, April 2008. IEEE Computer Society. ISBN: 978-0-7695-3099-4. (DOI:10.1109/ITNG.2008.260)
[IC.8]
Giovanni Agosta and Gerardo Pelosi. A Domain Specific Language for Cryptography. In Proceedings of the Forum on Specification and Design Languages, FDL 2007, September 18–20, 2007, Barcelona, Spain, Proceedings, pages 159–164. Electronic Chips & Systems Design Initiative (ECSI), September 2007. ISSN: 1636-9874.
[IC.7]
Giovanni Agosta, Luca Breveglieri, Gerardo Pelosi, and Israel Koren. Countermeasures against Branch Target Buffer Attacks. In Luca Breveglieri, Shay Gueron, Israel Koren, David Naccache, and Jean-Pierre Seifert, editors, Proceedings of the Fourth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2007, FDTC 2007: Vienna, Austria, 10 September 2007, pages 75–79, Washington, DC, USA, September 2007. IEEE Computer Society. ISBN: 978-0-7695-2982-0 (Print), 0-7695-2982-8 (Online). (DOI:10.1109/FDTC.2007.4318987)
[IC.6]
Giovanni Agosta, Francesco Bruschi, Gerardo Pelosi, and Donatella Sciuto. A Unified Approach to Canonical Form-based Boolean Matching. In Steven P. Levitan, editor, Proceedings of the 44th Design Automation Conference, DAC 2007, San Diego, CA, USA, June 4–8, 2007, pages 841–846, New York, NY, USA, June 2007. ACM. ISBN: 978-1-59593-627-1, ISSN: 0738-100X. (DOI:10.1145/1278480.1278689)
[IC.5]
Giovanni Agosta, Luca Breveglieri, Gerardo Pelosi, and Martino Sykora. Programming Highly Parallel Reconfigurable Architectures for Public-Key Cryptographic Applications. In Shahram Latifi, editor, Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2-4 April 2007, Las Vegas, NV, USA, pages 3–10, Washington, DC, USA, April 2007. IEEE Computer Society. ISBN: 0-7695-2776-0 (Print), 978-0-7695-2776-5 (Online). (DOI:10.1109/ITNG.2007.160)
[IC.4]
Guido M. Bertoni, Luca Breveglieri, Liqun Chen, Pasqualina Fragneto, Keith A. Harrison, and Gerardo Pelosi. A Pairing SW Implementation for Smart-Cards. In Proceedings of the Fourth Irish Conference on the Mathematical Foundations of Computer Science and Information Technology, (MFCSIT'06), Cork, Ireland, 1–5, August 2006, pages 267–271. National University of Ireland Press, August 2006. ISBN: 0-9552229-3-1 (Print).
[IC.3]
Cesare Alippi, Gerardo Pelosi, and Manuel Roveri. Computational Intelligence Techniques to Detect Toxic Gas Presence. In Fernando Lopez Pefna and Enrique H. Ruspini, editors, CIMSA 2006. Proceedings of 2006 IEEE International Conference on Computational Intelligence for Measurement Systems and Applications, July 12–14, La Coruna, Spain, 2006, pages 40–44, Piscataway, NJ, USA, July 2006. IEEE. ISBN: 1-4244-0244-1 (Print), 1-4244-0245-X (Online). (DOI:10.1109/CIMSA.2006.250745)
[IC.2]
Guido Bertoni, Luca Breveglieri, Pasqualina Fragneto, and Gerardo Pelosi. Parallel Hardware Architectures for the Cryptographic Tate Pairing. In Shahram Latifi, editor, Proceedings of the Third International Conference on Information Technology: New Generations (ITNG 2006), 10–12 April 2006, Las Vegas, NV, USA, pages 186–191, Washington, DC, USA, April 2006. IEEE Computer Society. ISBN: 0-7695-2497-4 (Print). (DOI:10.1109/ITNG.2006.107)
[IC.1]
Guido Bertoni, Luca Breveglieri, Pasqualina Fragneto, Gerardo Pelosi, and Luigi Sportiello. Software Implementation of Tate pairing over GF(2m). In Georges G. E. Gielen, editor, Proceedings of the Conference on Design, Automation and Test in Europe: Designers' Forum, DATE 2006, Munich, Germany, March 6–10, 2006, pages 7–11, Leuven, Belgium, March 2006. European Design and Automation Association (EDAA). ISBN: 3-9810801-0-6, ISSN: 478061. (DOI:10.1145/1131355.1131358)

European Patents with International Extensions

European Patent Office (EPO): http://www.epo.org/
United States Patent and Trademark Office (USPTO): http://www.uspto.gov/

In collaboration with the Advanced System Technology Division of STMicroelectronics, Agrate (IT) and the HP Laboratories, Bristol (UK), concerning the design of secure devices and either the definition or the optimization of cryptographic application-specific protocols.

[PT.10]
Guido Marco Bertoni, Pasqualina Fragneto, Gerardo Pelosi, Keith Harrison, and Liqun Chen. Method of Processing Information to be Confidentially Transmitted. Granted Patent: US 8381267 B2, February 2013. Proprietor(s): STMicroelectronics Srl. Prior publication data: US 2007260664 A1 – 2007-11-08. Priority date: 2005-10-11.
[PT.9]
Liqun Chen, Keith Harrison, Guido Marco Bertoni, Pasqualina Fragneto, and Gerardo Pelosi. Authentication Method. Granted Patent US 8352736 B2, January 2013. Proprietor(s): STMicroelectronics Srl (IT), Hewlett-Packard Development Company, L.P. (US). Prior publication data: US 2007180241 A1 – 2007-08-02. Priority date: 2004-12-23.
[PT.8]
Roberto Valerio Sannino, Fabio Sozzani, Guido Marco Bertoni, Gerardo Pelosi, and Pasqualina Fragneto. Message Deciphering Method, System and Article. Granted Patent: US 8223970 B2, July 2012. Proprietor(s): STMicroelectronics Srl (IT). Prior publication data: US 2011058672 A1 – 2011-03-10. (Previously granted as US 7925010 B2 on 2011-04-12 with prior publication data: US 2005169464 A1 – 2005-08-04) Priority date: 2003-12-24.
[PT.7]
Guido Marco Bertoni, Pasqualina Fragneto, Andrew Marsh, Gerardo Pelosi, and Moris Ravasio. Computation of a Multiplication Operation with an Electronic Circuit and Method. Granted Patent: US 8117251 B2, February 2012. Proprietor(s): STMicroelectronics Srl (IT). Prior publication data: US 2007260664 A1 – 2007-11-08. Priority date: 2006-04-11.
[PT.6]
Guido Marco Bertoni, Pasqualina Fragneto, Andrew Marsh, Gerardo Pelosi, and Moris Ravasio. Computation of a Modular Multiplication with an Electronic Circuit. Granted Patent: EP 1845442 B1, November 2011. Proprietor(s): STMicroelectronics Srl (IT), STMicroelectronics Limited (UK) Prior publication data: EP 1845442 B1 – 2007-10-17. Priority date: 2006-04-11.
[PT.5]
Keith Alexander Harrison, Liqun Chen, Guido Marco Bertoni, Pasqualina Fragneto, and Gerardo Pelosi. Use of Bilinear Mappings in Cryptographic Applications. Granted Patent: US 7929691 B2, April 2011. Proprietor(s): Hewlett-Packard Development Company, L.P. (US). Prior publication data: US 2008016346 A1 – 2008-01-17. Priority date: 2004-12-23.
[PT.4]
Fabio Sozzani, Roberto Valerio Sannino, Guido Marco Bertoni, Gerardo Pelosi, and Pasqualina Fragneto. Method for Establishing a Communication between Two Devices. Granted Patent: US 7716483 B2, May 2010. Proprietor(s): STMicroelectronics Srl (IT). Prior publication data: US 2005125670 A1 – 2005-06-09. Priority date: 2003-09-29.
[PT.3]
Fabio Sozzani, Roberto Valerio Sannino, Guido Marco Bertoni, Gerardo Pelosi, and Pasqualina Fragneto. Method for Establishing an Encrypted Communication by Means of Keys. Granted Patent: US 7620186 B2, November 2009. Proprietor(s): STMicroelectronics Srl (IT). Prior publication data: US 2005102507 A1 – 2005-05-12. Priority date: 2003-09-29.
[PT.2]
Keith Alexander Harrison, Liqun Chen, Guido Marco Bertoni, Pasqualina Fragneto, and Gerardo Pelosi. Improvements in the Use of Bilinear Mappings in Cryptographic Applications. Granted Patent: EP 1675300 B1, October 2008. Proprietor(s): Hewlett-Packard Development Company, L.P. (US), STMicroelectronics Srl (IT). Prior publication data: EP 1675300 A1 – 2006-06-28. Priority date: 2004-12-23.
[PT.1]
Roberto Valerio Sannino, Fabio Sozzani, Guido Marco Bertoni, Gerardo Pelosi, and Pasqualina Fragneto. A Message Deciphering Method. Granted Patent: EP 1548976 B1, August 2007. Proprietor(s): STMicroelectronics Srl (IT). Prior publication data: EP 1548976 (A1) – 2005-06-29. Priority date: 2003-12-24.

Invited Papers (Peer-reviewed)

[IP.6]
Alessio Agneessens, Francesco Buemi, Stefano Delucchi, Massimo Massa, Giovanni Agosta, Alessandro Barenghi, Carlo Brandolese, William Fornaciari, Gerardo Pelosi, Enrico Ferrari, Dajana Cassioli, Luigi Pomante, Leonardo Napoletani, Luciano Bozzi, Carlo Tieri, and Maurizio Mongelli. Safe Cooperative CPS: A V2I Traffic Management scenario in the SafeCOP project. In Andreas Gerstlauer and Walid Najjar, editors, Proceedings of the 2016 IEEE International Conference on Embedded Computer Systems: Architectures, MOdeling, and Simulation (IC-SAMOS 2016), Special Session on European Projects on heterogeneous microservers and parallel embedded computing, July 18-21, 2016. Samos, Greece, pages 320–327. IEEE, July 2017. ISBN: 978-1-5090-3077-4 (Print on Demand - PoD), 978-1-5090-3076-7 (Electronic). IEEE Catalog Number: CFP1652A-ART. (doi:10.1109/SAMOS.2016.7818365)
[IP.5]
Ariel Oleksiak, Michal Kierzynka, Giovanni Agosta, Carlo Brandolese, William Fornaciari, Gerardo Pelosi, Micha Vor Dem Berge, Wolfgang Christmann, Stefan Krupop, Mariano Cecowski, Robert Plestenjak, Justin v  Cinkelj, Mario Porrmann, Jens Hagemeyer, René Griessl, Meysam Peykanu, Lennart Tigges, Loïc Cudennec, Thierry Goubier, Jean-Marc Philippe, Sven Rosinger, Daniel Schlitt, Christian Pieper, Chris Adeniyi-Jones, Udo Janssen, and Luca Ceva. Data Centres for IoT applications: the M2DC Approach. In Andreas Gerstlauer and Walid Najjar, editors, Proceedings of the 2016 IEEE International Conference on Embedded Computer Systems: Architectures, MOdeling, and Simulation (IC-SAMOS 2016), Special Session on European Projects on heterogeneous microservers and parallel embedded computing, July 18-21, 2016. Samos, Greece, pages 293–299. IEEE, July 2017. ISBN: 978-1-5090-3077-4 (Print on Demand – PoD), 978-1-5090-3076-7 (Electronic). IEEE Catalog Number: CFP1652A-ART. (doi:10.1109/SAMOS.2016.7818361)
[IP.4]
Ariel Oleksiak, Michal Kierzynka, Wojciech Piatek, Micha Vor Dem Berge, Wolfgang Christmann, Stefan Krupop, Mario Porrmann, Jens Hagemeyer, René Griessl, Meysam Peykanu, Lennart Tigges, Sven Rosinger, Daniel Schlitt, Christian Pieper, Udo Janssen, Giovanni Agosta, Carlo Brandolese, William Fornaciari, Gerardo Pelosi, Mariano Cecowski, Robert Plestenjak, Justin v  Cinkelj, Loïc Cudennec, Thierry Goubier, Jean-Marc Philippe, Chris Adeniyi-Jones, Luca Ceva, and Holm Rauchfuss. M2DC - Modular Microserver DataCentre with Heterogeneous Hardware. In Energy-efficient Servers for Cloud and Edge Computing 2017 Workshop (ENeSCE 2017), January 23, 2017, Stockholm, Sweden, co-located with HiPEAC 2017 [without formal proceedings], pages 1–8, January 2017.
[IP.3]
Ariel Oleksiak, Michal Kierzynka, Giovanni Agosta, Carlo Brandolese, William Fornaciari, Gerardo Pelosi, Micha Vor Dem Berge, Wolfgang Christmann, Stefan Krupop, Mariano Cecowski, Robert Plestenjak, Justin v  Cinkelj, Mario Porrmann, Jens Hagemeyer, René Griessl, Meysam Peykanu, Lennart Tigges, Loïc Ludennec, Thierry Goubier, Jean-Marc Philippe, Sven Rosinger, Daniel Schlitt, Christian Pieper, Chris Adeniyi-Jones and Udo Janssen. The M2DC Project: Modular Microserver DataCentre. In In Proceedings of the 19th Euromicro Conference on Digital System Design (DSD 2016), Special Session on European Projects in Digital Systems Design, August 31 - September 2, 2016. Limassol, Cyprus, pages 68–74. IEEE, July 2016. ISBN: 978-1-5090-2818-4 (Print), 978-1-5090-2817-7 (Online). (doi:10.1109/DSD.2016.76)
[IP.2]
Gerardo Pelosi. Engineering Cryptographic Solutions for Trustworthy Computing Systems. In Symposium on Computer Security and Critical Infrastructure, March 16-21, 2015, held at Universidad del Norte, Barranquilla, Colombia, during the 2015 Cátedra Europa International week [talk - without formal proceedings], March 2015.
[IP.1]
Gerardo Pelosi. Parallel Hardware for the Computation of Pairings. In Securing Cyberspace: Applications and Foundations of Cryptography and Computer Security, December 4-8, 2006, held at Institute for Pure and Applied Mathematics (IPAM) University of California, Los Angeles, CA, USA [talk – without formal proceedings], December 2006.

Peer-reviewed Posters with Interactive Presentation

[PO.7]
Alessandro Barenghi, William Fornaciari, Gerardo Pelosi and Davide Zoni. “Side-channel analysis of IoT CPUs: a microarchitectural perspective” , Third Annual ARM Research Summit, 17--19 September 2018, Robinson College, Cambridge, UK.
[Peer-reviewed project proposal evaluation with no formal proceedings. The primary agenda of the Summit is the discourse of ideas in varying degrees of maturity, and the advancement of research.]
[PO.6]
Ariel Oleksiak, Michal Kierzynka, ..., Gerardo Pelosi, et al. “M2DC – Modular Microserver Data Centre” , 32nd International Conference, ISC High Performance 2017, June 18–22, 2017, Frankfurt, Germany.
[Accepted as Peer-reviewed poster describing major results and innovations obtained by the M2DC EU project -- (No formal proceedings)]
[PO.5]
Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, and Michele Scandale. 2016. “Encasing Block Ciphers to Foil Key Recovery Attempts via Side Channel” , Work-in-Progress session at the 2016 Design Automation Conference (DAC’16), June 5--9, 2016, Austin, TX, USA.
[Accepted as Peer-reviewed poster with Interactive presentation (No Proceedings)]
[PO.4]
Giovanni Agosta, Alessandro Barenghi, Massimo Maggi, and Gerardo Pelosi. 2014. “Extending the Design Space for Secure Embedded System Design” , Work-in-Progress session at the 2014 Design Automation Conference (DAC’14), June 5, 2014, San Francisco, CA, USA.
[Accepted as Peer-reviewed poster with Interactive presentation (No Proceedings)]
[PO.3]
Gerardo Pelosi, Giovanni Agosta, and Iyad Al Khatib. 2014. “Automated Methodology Integrating Security and Privacy in the Design Process of Medical Devices”. Work-in-Progress session at the 2014 Design Automation Conference (DAC’14), June 5, 2014, San Francisco, CA, USA.
[Accepted as Peer-reviewed poster with Interactive presentation (No Proceedings)]
[PO.2]
Gerardo Pelosi, Giovanni Agosta, Alessandro~Barenghi, and Massimo~Maggi 2014. "Compiler-based Side Channel Analysis" . Workshop on Parallel Programming and Run-Time Management Techniques for Many-core Architectures and Design Tools and Architectures for Multicore Embedded Computing Platform -- PARMA-DITAM 2014 , January 20, 2014, Vienna, Austria. [Poster Submission Session].
[PO.1]
Gerardo Pelosi, ``GPGPU Acceleration of Cryptographic Applications ", IEEE/ACM Workshop on Designing for Embedded Parallel Computing Platforms: Architectures, Design Tools, and Applications. Design Automation and Test in Europe (DATE 2010), March 12, 2010, Dresden, Germany
[Invited talk and poster with Interactive presentation (No Proceedings)].

Theses and Technical Reports

[TR.9]
Marco Baldi, Alessandro Barenghi, Franco Chiaraluce, Gerardo Pelosi, Joachim Rosenthal, Paolo Santini, and Davide Schipani. Design and Implementation of a Digital Signature Scheme Based on Low-density Generator Matrix Codes. arXiv.org – Computer Science - Cryptography and Security. Technical report arXiv:1807.06127v1 [cs.CR], July 2018.
[TR.8]
Marco Baldi, Alessandro Barenghi, Franco Chiaraluce, Gerardo Pelosi, and Paolo Santini. LEDAkem: a post-quantum key encapsulation mechanism based on QC-LDPC codes. arXiv.org – Computer Science - Cryptography and Security. Technical report arXiv:1801.08867v1 [cs.CR], January 2018.
[TR.7]
Alessandro Barenghi, Gerardo Pelosi, and Francesco Regazzoni. Simulation-Time Security Margin Assessment against Power-Based Side Channel Attacks. IACR Cryptology ePrint Archive, Report 2014/307, April 2014.
[TR.6]
Alessandro Barenghi, Guido Bertoni, Luca Breveglieri, Mauro Pellicioli, and Gerardo Pelosi. Low Voltage Fault Attacks to AES and RSA on General Purpose Processors. IACR Cryptology ePrint Archive, Report 2010/130, March 2010.
[TR.5]
Gerardo Pelosi and Pierangela Samarati. Tools on Access Control Mechanisms. PrimeLife - Bringing Sustainable Privacy and Identity Management to Future Networks and Services. EU Framework Programme 7, ICT-2007.1.4 – ref. 216483, Report H2.4, September 2009.
[TR.4]
Gerardo Pelosi. Algorithms Architectures and Protocols for Public-Key Cryptographic Systems with Innovative and Complex Functionalities: The Case of IBE and Compact Discrete Logarithm Systems. PhD thesis, Politecnico di Milano, Milan, Italy, May 2007.
[TR.3]
Giovanni Agosta and Gerardo Pelosi. Countermeasures for the Simple Branch Prediction Analysis. IACR Cryptology ePrint Archive, Report 2006/482, December 2006.
[TR.2]
Gerardo Pelosi. Gas Sensor Array Response Analysis by Means of Computational Intelligence Techniques. Technical report, Politecnico di Milano, DEIB - Department of Computer Science and Engineering - Report 2006.17, Milan, Italy, January 2006.
[TR.1]
Gerardo Pelosi. Crittografia Basata su Curve Ellittiche in Aritmetica Modulare: Studio di Fattibilità, Ottimizzazione e Realizzazione Software per Smart Card. Master's thesis, (Laurea degree – M.Sc. Italian equivalent, 5 years – in Telecommunication Engineering) Politecnico di Milano, Milan, Italy, February 2003.