Publications
Awards
Best Paper Award (SECRYPT 2020)
Marco Baldi, Alessandro Barenghi, Franco Chiaraluce, {\bf Gerardo Pelosi},
and Paolo Santini.
A Failure Rate Model of Bit-flipping Decoders for QC-LDPC and QC-MDPC Code-based Cryptosystems'. 17th International Joint Conference on e-Business and Telecommunications (ICETE), held remotely (due to covid-19 pandemic) on July 8 - 10, 2020.
2018 Hardware and Embedded Security ''Top Picks'' paper Award.
The paper “A Code Morphing Methodology to Automate Power Analysis Countermeasures,” appeared in Proc. of the 49th Design Automation Conference (DAC 2012), ACM, 2012, has been awarded for the most significant papers based on novelty and long-term impact from IEEE/ACM conferences and journals in the broad area of Hardware and Embedded Security during the six-year period: 2012-2017.
Presentations to the 2018 Top Picks in Hardware and Embedded Security Workshop, co-located
with IEEE/ACM ICCAD 2018 Conference, San Diego, CA, USA on November 8th, 2018, were selected from papers appeared in leading hardware and embedded security conferences and
journals including but not limited to DAC, DATE, ICCAD, HOST, CHES, ETS, VTS, ITC, IEEE
S&P, Euro S&P, Usenix Security, ASIA CCS, NDSS, ISCA, MICRO, ASPLOS, HPCA, ACSAC
and ACM CCS during the six-year period: 2012-2017.
HiPEAC Paper Award (2018)
European Network of Excellence on High Performance and Embedded Architecture and Compilation
Alessandro Barenghi and Gerardo Pelosi, Side-channel security of superscalar CPUs: Evaluating the Impact of Microarchitectural Features, in Proceedings of the 55th Design Automation Conference (DAC 2018). ACM 2018, 6 pages (ISBN: 978-1-4503-5700-5/18/06).
HiPEAC Paper Award (2015)
European Network of Excellence on High Performance and Embedded Architecture and Compilation
Gerardo Pelosi, Giovanni Agosta, Alessandro Barenghi, Michele Scandale, nformation Leakage Chaff: Feeding Red Herrings to Side Channel Attackers, in Proceedings of the 52nd Design Automation Conference (DAC 2015). ACM 2015, pp. 33:1-33:6 (ISBN: 978-1-4503-3520-1/15/06).
Best Paper Award (SIN 2014)
Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi and Michele Scandale,
Differential Fault Analysis for Block Ciphers: an Automated Conservative Analysis,
In Proceedinds of the Int.l Conf. on Security of Information and Networks (SIN '14). ACM 2014,
pp. 171:1-171:8, (ISBN: 978-1-4503-3033-6/14/09)
HiPEAC Paper Award (2014)
European Network of Excellence on High Performance and Embedded Architecture and Compilation
Gerardo Pelosi, Giovanni Agosta, Alessandro Barenghi, Michele Scandale, A Multiple Equivalent Execution Trace Approach to Secure Cryptographic Embedded Software, in Proceedings of the 51st Design Automation Conference (DAC 2014). ACM 2014, pp.210:1-210:6 (ISBN: 978-1-4503-2730-5).
HiPEAC Paper Award (2013)
European Network of Excellence on High Performance and Embedded Architecture and Compilation
Gerardo Pelosi, Giovanni Agosta, Alessandro Barenghi, Massimo Maggi, Compiler-based Side Channel Vulnerability Analysis and Optimized Countermeasures Application, in Proceedings of the 50th Design Automation Conference (DAC 2013). ACM 2013, pp. 81:1-81:6 (ISBN: 978-1-4503-2071-9).
HiPEAC Paper Award (2012)
European Network of Excellence on High Performance and Embedded Architecture and Compilation
Gerardo Pelosi, Giovanni Agosta and Alessandro Barenghi, A Code Morphing Methodology to Automate Power Analysis Countermeasures, in Proceedings of the 49th Design Automation Conference (DAC 2012).
ACM 2012 , pp. 77-82, (ISBN 978-1-4503-1199-1).
Disclaimer
The material on this website is provided to ensure timely dissemination of scholarly and technical work on a non-commercial basis. Copyright and all rights therein are retained by the authors or by other copyright holders.
Papers where the copyright is not held by the authors are distributed here as “author's versions” in compliance with the respective copyright transfer agreement of the current copyright holder. It is understood that all persons copying this material will adhere to the terms and constraints invoked by each author's or publisher's copyright.
The copyright laws of most countries have “fair-use” clauses, which explicitly permit personal use of copyrighted material for teaching or research purposes. However, reprinting or republication of this material for commercial purposes requires a permission from the corresponding copyright holder (ACM, IEEE, Elsevier, EDAA, IFIP, Springer-Verlag, SciTePress, IACR, IOS Press, IGI Global, Inderscience Publishers, Academy Publisher).
Please note that the publisher is not always identical to the copyright holder. Refer to the copyright note of each publication for the copyright holder and details on the permitted usage of the “author's copies” provided on this page.
Material published by ACM can also be obtained from the ACM Digital Library
Material published by IEEE can also be obtained from IEEE Xplore
Material published by Elsevier can also be obtained from ScienceDirect
Material published by Springer-Verlag can also be obtained from SpringerLink
Material published by SciTePress can also be obtained from SciTePress DL
Material published by IOS Press can also be obtained from the IOS Press website
Material published by InderScience Publishers can also be obtained from the InderScience website
Material published by Academy Publisher can also be obtained from the Academy Publisher website
Material published by IGI Global publishing company can also be obtained from the IGI Global website
International Association for Cryptologic Research (IACR) IACR CryptoDB
European Design and Automation Association (EDAA) EDAA website
International Federation for Information Processing (IFIP) IFIP website
Refereed International Journals
- [JR.31]
- Francesco Antognazza, Alessandro Barenghi, and Gerardo Pelosi, and Ruggero Susella.
Performance and Efficiency Exploration of Hardware Polynomial Multipliers for Post-Quantum Lattice-based Cryptosystems.
Springer Nature (SN) Computer Science Journal, 5(212), January 2024.
ISSN:2662-995X, EISSN:2661-8907.
(doi:10.1007/s42979-023-02547-w)
- [JR.30]
- Simone
Perriello, Alessandro Barenghi, and Gerardo
Pelosi. Improving the Efficiency of Quantum
Circuits for Information Set Decoding. ACM Transactions on Quantum Computing (TQC), 4(4), December 2023. ISSN:2643-6809, EISSN:2643-6817.
(doi:10.1145/3607256)
- [JR.29]
- Alessandro Barenghi, Gioele Falcetti, and Gerardo Pelosi. Locating Side Channel Leakage in Time through Matched Filters. Cryptography, 6(2), May 2022. ISSN 2410-387X.(doi:10.3390/cryptography6020026)
- [JR.28]
- Alessandro Barenghi, Diego
Carrera, Silvia Mella, Andrea Pace, Gerardo Pelosi, and Ruggero Susella.
Profiled Side Channel Attacks against the RSA Cryptosystem using Neural Networks. Journal of Information Security and Applications (JISA), 66, May 2022. ISSN: 2214-2134. E-ISSN: 2214-2126.
(doi:10.1016/j.jisa.2022.103122)
- [JR.27]
- Nicholas Mainardi, Alessandro
Barenghi, and Gerardo Pelosi. Privacy-aware Character Pattern Matching over Outsourced Encrypted Data. Digital Threats: Research and Practice (DTRAP), 3(1):1–38,
March 2022. ISSN: 2692-1626. EISSN: 2576-5337.
(doi:10.1145/3462333)
- [JR.26]
- Alessandro Barenghi,
Luca Oddone Breveglieri, Niccolò Izzo, and Gerardo Pelosi.
Exploring Cortex-M
Microarchitectural Side Channel Information Leakage. IEEE Access, 9:156507–156527, November 2021. Print ISSN: 2169-3536. Online ISSN: 2169-3536.
(doi:10.1109/ACCESS.2021.3124761)
- [JR.25]
- Francesco Antognazza, Alessandro Barenghi, and Gerardo Pelosi. Metis: An Integrated Morphing Engine CPU to Protect Against Side Channel Attacks. IEEE Access, 9:69210–69225, May 2021.
Electronic ISSN: 2169-3536. (doi:10.1109/ACCESS.2021.3077977)
- [JR.24]
- Alessandro Barenghi, William Fornaciari, Gerardo Pelosi, and Davide Zoni. Scramble Suit: A Profile Differentiation Countermeasure to Prevent Template Attacks. IEEE Transaction on Computer-Aided Design of Integrated Circuits and Systems (TCAD), 39(9):1778-1791, September 2020. ISSN: 0278-0070 (Print), 1937-4151 (Online). (DOI:10.1109/TCAD.2019.2926389)
- [JR.23]
- Giovanni Agosta, Alessandro Barenghi, and Gerardo Pelosi. Compiler-based Techniques to Secure Cryptographic Embedded Software against Side Channel Attacks. IEEE Transaction on Computer-Aided Design of Integrated Circuits and Systems (TCAD), 39(8):1550–1554, August 2020. ISSN: 0278-0070 (Print), 1937-4151 (Online). (doi:10.1109/TCAD.2019.2912924)
- [JR.22]
- Nicholas Mainardi, Alessandro Barenghi, and Gerardo Pelosi. Plaintext Recovery Attacks against Linearly Decryptable Fully Homomorphic Encryption Schemes.
Computers & Security Journal (CoSe), Volume 87, 17 pages, November 2019. ISSN: 0167-4048 (Print). (doi:10.1016/j.cose.2019.101587)
- [JR.21]
- Marco Baldi, Alessandro Barenghi, Franco Chiaraluce, Gerardo Pelosi, and Paolo Santini. A Finite Regime Analysis of Information Set Decoding Algorithms. Algorithms journal. Special Issue "Coding Theory and Its Application", G. Liva, A. Graell i Amat, A. Wachter-Zeh (editors). Open Access.,
Vol. 12, issue 10, 209, pages 1-35, October 2019. ISSN: 1999-4893 (Print). (doi: 10.3390/a12100209)
- [JR.20]
- Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, and Michele Scandale. Reactive Side-channel Countermeasures: Applicability and Quantitative Security Evaluation. Microprocessors and Microsystems Journal (MicPro), Volume 62 (October 2018), pages 50-60. ISSN: 0141-9331 (Print). (doi:10.1016/j.micpro.2018.07.001) [Available on line July 29th, 2018 -- share link ]
- [JR.19]
- Davide Zoni, Alessandro Barenghi, Gerardo Pelosi, and William Fornaciari. A Comprehensive Side Channel Information Leakage Analysis of an In-order RISC CPU Microarchitecture. Transactions on Design Automation of Electronic Systems (TODAES), vol. 23, issue 5, Article 57 (August 2018).
ISSN: 1084-4309 (Print), 1557-7309 (Online). (doi:10.1145/3212719)
- [JR.18]
- Alessandro Barenghi, Nicholas Mainardi, and Gerardo Pelosi. Systematic Parsing of X.509: Eradicating Security Issues with a Parse Tree. Journal of Computer Security, 26(6):817-849, October 30th, 2018. ISSN: 0926-227X (Print), 1875-8924 (Online).
( doi:10.3233/JCS-171110)
author camera ready copy
- [JR.17]
- Sabrina De Capitani Di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, and Pierangela Samarati.
Enforcing Authorizations while Protecting Access Confidentiality. Journal of Computer Security, 26(2):143–175, January 2018.
ISSN: 0926-227X (Print), 1875-8924 (Online). (doi:10.3233/JCS-171004)
- [JR.16]
- A. Oleksiaka, M. Kierzynkaa,
G. Agosta, A. Barenghi, C. Brandolese, W. Fornaciari, Gerardo Pelosi, and et. al. M2DC – Modular
Microserver DataCentre with Heterogeneous Hardware. Microprocessors and Microsystems Journal (MicPro), 52:117–130, July 2017. ISSN: 0141-9331 (Print).
(doi:10.1016/j.micpro.2017.05.019)
- [JR.15]
- Alessandro Barenghi, Michele Beretta, Alessandro Di Federico, and Gerardo Pelosi. A privacy-preserving encrypted OSN with stateless server interaction: the Snake design. Computers & Security Journal (CoSe). Volume 63, pages 67-84, November 2016. ISSN: 0167-4048 (Print). (DOI:10.1016/j.cose.2016.09.005)
- [JR.14]
- Alessandro Barenghi, Guido M.Bertoni, Luca Breveglieri, Gerardo Pelosi, Stefano Sanfilippo, and Ruggero Susella. A Fault-based Secret Key Retrieval Method for ECDSA: Analysis and Countermeasure. ACM Journal on Emerging Technologies in Computing Systems (JETC), 13(1):1–26, April 2016.
ISSN: 1550-4832 (Print) 1550-4840 (Online). (DOI: 10.1145/2767132)
- [JR.13]
- Sabrina De Capitani Di Vimercati,
Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, and Pierangela Samarati. Three-server Swapping for Access Confidentiality. IEEE Transactions on Cloud Computing (TCC), 6(2):492–505, June 2018. ISSN: 2168-7161 (Print). (DOI:10.1109/TCC.2015.2449993)
- [JR.12]
-
Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, and Michele Scandale.
The MEET Approach: Securing
Cryptographic Embedded Software against Side Channel Attacks. IEEE Transaction on Computer-Aided Design of Integrated Circuits and Systems (TCAD), 34(8):1320-1333, August 2015. IEEE. ISSN: 0278-0070 (Print).
(DOI: 10.1109/TCAD.2015.2430320)
- [JR.11]
- Sabrina De Capitani Di Vimercati,
Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, and Pierangela Samarati.
Shuffle Index: Efficient and Private Access to
Outsourced Data. ACM Transactions on Storage (TOS), 11(4):1–54, October 2015. ISSN: 1553-3077/2015 (Print). (DOI: 10.1145/2747878)
- [JR.10]
- Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, and Michele Scandale. Trace-based Schedulability Analysis to Enhance Passive Side-Channel Attack Resilience of Embedded Software. Information Processing Letters, 115(2):292–297, February 2015. Elsevier.
ISSN: 0020-0190 (Print). (DOI: 10.1016/j.ipl.2014.09.030)
- [JR.9]
- Giovanni Agosta, Alessandro Barenghi, Massimo Maggi, and Gerardo Pelosi. Design Space Extension for Secure Implementation of Block Ciphers. IET Computers & Digital Techniques – Special issue: Hardware Security, Vol. 8, Issue 6, November 2014, pp. 256–263, 2014. ISSN: 1751-8601 (Print), 1751-861X (Online).
(DOI: 10.1049/iet-cdt.2014.0037)
- [JR.8]
- Giovanni Agosta, Alessandro Barenghi, Alessandro Di Federico, and Gerardo Pelosi. OpenCL Performance Portability for General-purpose Computation on Graphics Processor Units: an Exploration on Cryptographic Primitives. Concurrency and Computation: Practice and Experience, 27(14):3633-3360, September 2015 (Published Online 29 Aug. 2014). ISSN: 1532-0626 (Print), 1532-0634 (Online). (DOI:10.1002/cpe.3358)
- [JR.7]
- Alessandro Barenghi, Gerardo Pelosi, and Federico Terraneo.
Secure and Efficient Design of Block Cipher Implementations
on Microcontrollers.
International Journal of Grid and Utility Computing,
4(2/3):110–118, September 2013. ISSN: 1741-847X (Print), 1741-8488 (Online).
(DOI: 10.1504/IJGUC.2013.056246)
- [JR.6]
- Alessandro Barenghi, Guido M. Bertoni, Luca Breveglieri,
and Gerardo Pelosi.
A Fault Induction Technique Based on Voltage Underfeeding with Application to
Attacks against AES and RSA.
Journal of Systems and Software, 86(7):1864–1878, July 2013.
ISSN: 0164-1212.
(DOI: 10.1016/j.jss.2013.
02.021)
- [JR.5]
- Sabrina De Capitani Di Vimercati, Sara Foresti, Stefano Paraboschi,
Gerardo Pelosi, and Pierangela Samarati.
Supporting
Concurrency and Multiple Indexes in Private Access to Outsourced Data.
Journal of Computer Security, 21(3):425–461, July 2013.
ISSN: 0926-227X (Print), 1875-8924 (Online).
(DOI: 10.3233/JCS-130468)
- [JR.4]
- Giovanni Agosta, Francesco Bruschi, Gerardo Pelosi,
and Donatella Sciuto.
A Transform-Parametric Approach to Boolean Matching.
IEEE Trans. on CAD of Integrated Circuits and Systems,
28(6):805–817, June 2009.
ISSN: 0278-0070.
(DOI:
10.1109/TCAD.2009.2016547)
- [JR.3]
- Guido Bertoni, Luca Breveglieri, Liqun Chen, Pasqualina Fragneto,
Keith A. Harrison, and Gerardo Pelosi.
A Pairing SW Implementation for Smart-Cards.
Journal of Systems and Software, 81(7):1240–1247, July 2008.
ISSN: 0164-1212.
(DOI:
10.1016/j.jss.2007.09.022)
- [JR.2]
- Guido M. Bertoni, Luca Breveglieri, Pasqualina Fragneto,
and Gerardo Pelosi.
Parallel Hardware Architectures for the Cryptographic Tate Pairing.
International Journal of Network Security, 7(1):31–37, July 2008.
ISSN: 1816-353X (Print), 1816-3548 (Online).
- [JR.1]
- Giovanni Agosta, Luca Breveglieri, Gerardo Pelosi,
and Martino Sykora.
Programming Highly Parallel
Reconfigurable Architectures for Symmetric and Asymmetric Cryptographic
Applications.
Journal of Computers, 2(9):50–59, September 2007.
ISSN: 1796-203X.
(DOI: 10.4304/jcp.2.9.50-59
)
Editorial Contributions
[EC.6] Giovanni Agosta, Alessandro Barenghi, Israel Koren, Gerardo Pelosi (Editors). Proceedings of the 6th HiPEAC Workshop on Cryptography and Security in Computing Systems (CS2 '19), Valencia, Spain. January 21th, 2019. ACM New York, NY, USA. 2018. ISBN: 978-1-4503-xxxx-x.
[EC.5] Giovanni Agosta, Alessandro Barenghi, Israel Koren, Gerardo Pelosi (Editors). Proceedings of the 5th HiPEAC Workshop on Cryptography and Security in Computing Systems (CS2 '18), Manchester, United Kingdom, January 22-24, 2018. ACM New York, NY, USA. 2018. ISBN: 978-1-4503-6374-7.
[EC.4] Gerardo Pelosi, Giovanni Agosta, Alessandro Barenghi (Editors). Proceedings of the 4th HiPEAC Workshop on Cryptography and Security in Computing Systems (CS2 '17). Stockholm, Sweden, 24th January 2016. ACM New York, NY, USA. 2017. ISBN: 978-1-4503-4869-0.
[EC.3] Gerardo Pelosi, Israel Koren, Giovanni Agosta, Alessandro Barenghi (Editors). Proceedings of the 3rd HiPEAC Workshop on Cryptography and Security in Computing Systems (CS2 '16). Prague, Czech Republic, 20th January 2016. ACM New York, NY, USA. 2016.
ISBN: 978-1-4503-4065-6.
[EC.2] Gerardo Pelosi, Israel Koren, Giovanni Agosta, Alessandro Barenghi (Editors). Proceedings of the 2nd HiPEAC Workshop on Cryptography and Security in Computing Systems (CS2 '15). Amsterdam, The Netherlands, 19th
January 2015. ACM New York, NY, USA. 2015.
ISBN: 978-1-4503-3187-6.
[EC.1]Israel Koren and Gerardo Pelosi (Editors). Proceedings of the HiPEAC Workshop on Cryptography and Security in Computing Systems (CS2 '14). Vienna, Austria, January 20, 2014. ACM New York, NY, USA. 2014.
ISBN 978-1-4503-2484-7.
Refereed Book Contributions
[IB12]Marco Baldi, Alessandro
Barenghi, Franco Chiaraluce, Gerardo Pelosi,
and Paolo Santini. Analysis of In-Place
Randomized Bit-Flipping Decoders for the Design of LDPC and MDPC Code-based
Cryptosystems. In Mohammad S. Obaidat and Jalel Ben-Othman,
editors, In E-Business and Telecommunications - 17th International Conference, ICETE 2020, Online Event, July 8–10, 2020, Revised Selected Papers. Series: Communications in Computer and Information Science (CCIS), Volume 1484, 2021., volume 1484. Springer International Publishing, Switzerland, October 2021. Print ISBN: 978-3-030-90427-2, Online ISBN: 978-3-030-90428-9. Series Print ISSN: 1865-0929, Series Online ISSN: 1865-0937.
(doi:10.1007/978-3-030-90428-9_7)
[IB.11]Ariel Oleksiak, Michal Kierzynka, Wojciech Piatek, Micha vor dem Berge, Wolfgang Christmann, Stefan Krupop, Mario Porrmann, Jens Hagemeyer, René Griessl, Meysam Peykanu, Lennart Tigges, Sven Rosinger, Daniel Schlitt, Christian Pieper, Udo Janssen, Holm Rauchfuss, Giovanni Agosta, Alessandro Barenghi, Carlo Brandolese, William Fornaciari, Gerardo Pelosi, Joao Pita Costa, Mariano Cecowski, Robert Plestenjak, Justin Cinkelj, Loïc Cudennec, Thierry Goubier, Jean-Marc Philippe, Chris Adeniyi-Jones, Javier Setoain, and Luca Ceva. M2DC - A Novel Heterogeneous Hyperscale Microserver Platform.
In Christoforos Kachris, Babak Falsafi, and Dimitrios Soudris, editors, Hardware Accelerators in Data Centers, pages 109–128. Springer, Cham, 2019 (First online: 22 August 2018). ISBN: 978-3-319-92791-6 (Print) 978-3-319-92792-3 (Online).
(doi:10.1007/978-3-319-92792-3_6)
[IB.10]Sabrina De Capitani di Vimercati,
Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, and Pierangela Samarati.
Access Privacy in the Cloud.
In Indrakshi Ray, Indrajit Ray, and Pierangela Samarati, editors, From Database to Cyber
Security, Lecture Notes in Computer Science, vol. 11170. Also part of the Security and Cryptology book sub series., pages 186–205. Springer International Publishing, Switzerland, November 2018. ISBN: 978-3-030-04833-4 (Print); 978-3-030-04834-1 (Online). Series Print ISSN 0302-9743. Series Online ISSN 1611-3349. (doi:10.1007/978-3-030-04834-1_10)
[IB.9]Giovanni Agosta, Alessandro Barenghi, Tomasz Ciesielczyk, Rahul Dutta, William Fornaciari, Thierry Goubier, Jens Hagemeyer, Lars Kosmann, Nicholas Mainardi, Ariel Oleksiak, Gerardo Pelosi, Wojciech Piatek, Christian Pieper, Mario Porrmann, Daniel Schlitt, and Michele Zanella. The
M2DC Approach towards Resource-efficient Computing. In Alessandra Bagnato, Ricardo Couceiro, Juliana Monteiro, Dijana Petrovska-Delacrétaz, Arminda Lopes, and Élvio Gouveia, editors, Opportunities and Challenges for European Projects, pages 150–176. ScitePress, January 2017. ISBN: 978-989-758-361-2. (doi:10.5220/000886260150017)
[IB.8]Alessandro Barenghi, Luca Breveglieri, Mariagrazia Fugini, and Gerardo Pelosi. Computer Security Anchors in Smart Grids: The Smart Metering Scenario and Challenges. In Bernard Candaele, Dimitrios Soudris, and Iraklis Anagnostopoulos, editors, Trusted Computing for Embedded Systems, pages 47–59. Springer International Publishing, Switzerland, January 2015. ISBN: 978-3-319-09419-9 (Print) 978-3-319-09420-5 (Online).
(DOI: 101007/978-3-319-09420-5_3)
[IB.7]Alessandro Barenghi, Luca Breveglieri, Andrea Palomba, and Gerardo Pelosi. Fault Sensitivity Analysis at Design Time. In Bernard Candaele, Dimitrios Soudris, and Iraklis Anagnostopoulos, editors, Trusted Computing for Embedded Systems, pages 175–186. Springer International Publishing, Switzerland, January 2015.
ISBN: 978-3-319-09419-9 (Print) 978-3-319-09420-5 (Online). (DOI: 101007/978-3-319-09420-5_9)
[IB.6]Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, and Michele Scandale. Symmetric Key Encryption Acceleration on Heterogeneous Many- Core Architectures. In Saiful Azad and Al-Sakib Khan Pathan, editors, Practical Cryptography: Algorithms and Implementations using C++, pages 251–297. CRC Press, Taylor & Francis Group, Boca Raton, Florida, USA, December 2014. ISBN: 978-1-4-822-28892 (Print)
( URL: http://www.crcpress.com/product/isbn/9781482228892# )
[IB.5]Alessandro Barenghi, Luca
Breveglieri, Fabrizio De Santis, Filippo
Melzani, Andrea Palomba, and Gerardo Pelosi.
Design Time
Engineering of Side Channel Resistant Cipher Implementations.
In Atilla Elçi, Josef Pieprzyk,
Alexander G. Chefranov, Mehmet A. Orgun,
Huaxiong Wang, and Rajan Shankaran, editors,
Theory and Practice of Cryptography Solutions for Secure Information
Systems, Advances in Information Security, Privacy, and Ethics
(AISPE), pages 133–157. IGI Global, Hershey, PA, USA, February 2013.
ISBN: 978-1-466-64030-6 (Print), 978-1-466-64031-3 (Online).
(DOI:10.4018/978-1-
4666-4030-6.ch006)
[IB.4]Alessandro Barenghi,
Guido M.
Bertoni, Luca Breveglieri, Mauro Pelliccioli,
and Gerardo Pelosi.
Injection Technologies
for Fault Attacks on Microprocessors.
In Marc Joye and Michael Tunstall, editors,
Fault Analysis in Cryptography, Information Security and
Cryptography, pages 275–293. Springer, Berlin, Heidelberg, November 2012.
ISBN: 978-3-642-29655-0 (Print), 978-3-642-29656-7 (Online), ISSN: 1619-7100.
(DOI:10.1007/978-3-642-
29656-7_16)
[IB.3]Sabrina De Capitani
di Vimercati,
Sara Foresti, Stefano Paraboschi,
Gerardo Pelosi, and Pierangela Samarati.
Selective Exchange of
Confidential Data in the Outsourcing Scenario.
In Jan Camenisch, Simone Fischer-Hübner, and
Kai Rannenberg, editors, Privacy and Identity
Management for Life, pages 181–198. Springer, Berlin, Heidelberg,
October 2011.
ISBN: 978-3-642-20316-9 (Print), 978-3-642-20317-6 (Online).
(DOI:10.1007/978-3-642-
20317-6)
[IB.2]
Gerardo Pelosi.
Secure Audit Logs. In Henk C. A. van Tilborg and Sushil Jajodia, editors, Encyclopedia of Cryptography and Security (2nd Ed.), pages 1097–1099. Springer, New York, NY, USA, January 2011. ISBN: 978-1-4419-5905-8 (Print), 978-1-4419-5906-5 (Online), 978-1-4419-5907-2
(Bundle).
(DOI:10.1007/978-1-4419-
5906-5)
[IB.1]
Gerardo Pelosi. Secure Index.
In Henk C. A. van Tilborg and Sushil Jajodia, editors, Encyclopedia of Cryptography and Security (2nd Ed.), pages 1116–1119. Springer, New York, NY, USA, January 2011.
ISBN: 978-1-4419-5905-8 (Print), 978-1-4419-5906-5 (Online), 978-1-4419-5907-2
(Bundle). (DOI:10.1007/978-1-4419-
5906-5)
Refereed International Conferences
[IC.92]Roberto Capoferri, Alessandro
Barenghi, Luca Breveglieri, Niccoló Izzo,
and Gerardo Pelosi.
A Comparison of Deep
Learning Approaches for Power-based Side-channel Attacks.
In Leonardo Horn Iwaya Leonardo A. Martucci, Liina Kamm and
Tobias Pulls, editors, Secure IT Systems - Proceedings
of the 29th Nordic Conference, NordSec 2024, Karlstad, Sweden, November 6-7,
2024, volume xxxx of Lecture Notes in Computer
Science, pages 100–115. Springer Cham, November 2024.
Softcover ISBN: 978-3-031-xxYYY-z. eBook ISBN: 978-3-031-xxYYY-z. Series ISSN:
0302-9743. Series E-ISSN: 1611-3349. [to appear].
(doi:10.1007/978-3-031-xxYYY-z)
[IC.91]Giacomo Lancellotti, Giovanni
Agosta, Alessandro Barenghi, and Gerardo
Pelosi.
Optimizing Quantum Circuit
Synthesis with Dominator Analysis.
In Christian Pilato, Benjamin Carrion Schaefer, Sara Vinco, editors, Proceedings of the 42nd IEEE International Conference on Computer
Design, ICCD 2024, Milan, Italy, November 18–20, 2024. IEEE,
November 2024.
ISBN: 979-8-3503-xxyy-z [to appear].
(doi:10.1145/3649329.3657337)
[IC.90]Isabella Piacentini,
Alessandro Barenghi, Gerardo Pelosi, and
Ruggero Susella.
An Unprofiled Single Trace
Side-channel Attack for Asymmetric Cryptosystems.
In Roberto Di Pietro Saed Alrabaee, Mousa Al-kfairy and
Houbing Song, editors, Proceedings of the 18th
International Conference on Network and System Security (NSS), Abu Dhabi,
UAE, November 20-22, 2024., volume xxxx of Lecture Notes in
Computer Science, pages 10–15. Springer Cham, November 2024.
Softcover ISBN: 978-3-031-xxYYY-z. eBook ISBN: 978-3-031-xxYYY-z. Series ISSN:
0302-9743. Series E-ISSN: 1611-3349. [to appear].
(doi:10.1007/978-3-031-xxYYY-z)
[IC.89]Marco Venere, Alessandro
Barenghi, and Gerardo Pelosi.
A Quantum Method to Match
Multi-output Boolean Functions Using Simon's Solver.
In Christian Pilato, Benjamin Carrion Schaefer, Sara Vinco (editors) Proceedings of the 42nd IEEE International Conference on Computer
Design, ICCD 2024, Milan, Italy, November 18–20, 2024. IEEE,
November 2024.
ISBN: 979-8-3503-xxyy-z [to appear].
(doi:10.1145/3649329.3657337)
[IC.88]Simone Orlando, Alessandro
Barenghi, and Gerardo Pelosi.
Investigating the Health
State of X.509 Digital Certificates.
In Emanuele Bellini, Stavros Shiaeles, Nicholas Kolokotronis and
Paul Haskell-Dowland, editors, Proceedings of the 2024
IEEE International Symposium on Information Theory (ISIT 2024), July 7–12,
Athens, Greece. Springer-Verlag, September 2024.
Electronic ISBN: 979-8-3503-xxYY-Z. Print on Demand(PoD)
ISBN:979-8-3503-8285-3. Electronic ISSN: 2157-8117. Print on Demand(PoD)
ISSN: 2157-8095 [to appear].
(doi:10.1109/CSRxxYYY.2024)
[IC.87]Simone Perriello, Alessandro
Barenghi, and Gerardo Pelosi.
A Quantum Circuit to
Execute a Key-Recovery Attack Against the DES and 3DES Block Ciphers.
In Candace Culhane, Hausi Müller, Greg Byrd, Yuri Alexeev, Sarah Sheldon, editors, Proceedings of the IEEE International Conference on Quantum Computing
and Engineering, QCE 2024, Montréal, Québec, Canada, September 15-20,
2024.), New York, NY, USA, September 2024. IEEE.
Electronic ISBN: 979-8-3503-xxyy-z. Print on Demand(PoD)
ISBN:979-8-3503-xxyy-z. [to appear].
(doi:10.1109/QCExxYYY.2024.YYYzz)
[IC.86]Alessandro Annechini,
Alessandro Barenghi, and Gerardo Pelosi.
Bit-flipping Decoder
Failure Rate Estimation for (v,w)-regular Codes.
In Cristina Fragouli Urbashi Mitra, Leandros Tassiulas and
Ioannis Kontoyiannis, editors, Proceedings of the 2024
IEEE International Symposium on Information Theory (ISIT 2024), July 7–12,
Athens, Greece. Springer-Verlag, July 2024.
Electronic ISBN:979-8-3503-8284-6. Print on Demand(PoD) ISBN:979-8-3503-8285-3.
Electronic ISSN: 2157-8117. Print on Demand(PoD) ISSN: 2157-8095.
(doi:10.1109/ISIT57864.2024.10619629)
[IC.85]Alessandro Barenghi and
Gerardo Pelosi.
Quantum Computing Research
Lines in the Italian Center for Supercomputing.
In Christian Pilato Luigi Carro, Francesco Regazzoni, editor,
Proceedings of the 24nd International Conference on Embedded Computer
Systems: Architectures, Modeling, and Simulation - SAMOS 2024, Samos, Greece,
June 29 - July 4, 2024., volume xxYYY of Lecture Notes in
Computer Science (LNCS), pages 1–16. Springer-Verlag, July 2024.
ISBN: 978-3-031-xxYYY-Z (Print). Series Print ISSN: 0302-9743. Series Online
ISSN: 1611-3349. [to appear].
(doi:10.1007/978-3-031-xxYYY-Z)
[IC.84]Giacomo Lancellotti, Simone
Perriello, Alessandro Barenghi, and Gerardo
Pelosi.
Design of a Quantum Walk
Circuit to Solve the Subset-Sum Problem.
In Sharon Hu, Rob Aitken and Anand Raghunathan, editors, Proceedings of the 61st Annual Design Automation Conference, DAC'24,
San Francisco, CA, USA, June 23–27, 2024. ACM, June 2024.
ISBN: 979-8-4007-0601-1/24/06.
(doi:10.1145/3649329.3657337)
[IC.83]Francesco Antognazza,
Alessandro Barenghi, Gerardo Pelosi, and
Ruggero Susella.
A High Efficiency
Hardware Design for the Post-Quantum KEM HQC.
In Ankur Srivastava, Mark Tehranipoor, Ioannis Savidis, Farimah Farahmandi, Naghmeh Karimi, Ujjwal Guin, editors, IEEE International Symposium on Hardware Oriented Security and Trust,
HOST 2024, Washington DC, USA, May 6–9, 2024, pages 431–441. IEEE,
May 2024.
ISBN: 979-8-3503-7394-3.
(doi:10.1109/host55342.2024.10545409)
[IC.82]Francesco Antognazza,
Alessandro Barenghi, Gerardo Pelosi, and
Ruggero Susella.
A Versatile and Unified
HQC Hardware Accelerator.
In Martin Andreoni, editor, Applied Cryptography and
Network Security Workshops. ACNS 2024 Satellite Workshops, AIBlock, AIHWS,
AIoTS, SCI, AAC, SiMLA, LLE, and CIMSS, Abu Dhabi, United Arab Emirates,
March 5–8, 2024, Proceedings, Part II., volume 14586–14587 of
Lecture Notes in Computer Science (LNCS), pages 1–16.
Springer, March 2024.
ISBN 978-3-031-61488-0. e-ISBN 978-3-031-61489-7. Series ISSN 0302-9743. Series
E-ISSN 1611-3349.
(doi:10.1007/978-3-031–XXYYY-Z)
[IC.81]Simone Perriello, Alessandro
Barenghi, and Gerardo Pelosi.
Quantum Circuit Design for
the Lee-Brickell based Information Set Decoding.
In Martin Andreoni, editor, Applied Cryptography and
Network Security Workshops. ACNS 2024 Satellite Workshops, AIBlock, AIHWS,
AIoTS, SCI, AAC, SiMLA, LLE, and CIMSS, Abu Dhabi, United Arab Emirates,
March 5–8, 2024, Proceedings, Part II., volume 14586–14587 of
Lecture Notes in Computer Science (LNCS), pages 1–16.
Springer, March 2024.
ISBN 978-3-031-61488-0. e-ISBN 978-3-031-61489-7. Series ISSN 0302-9743. Series
E-ISSN 1611-3349.
(doi:10.1007/978-3-031–XXYYY-Z)
[IC.80]Alessandro Barenghi, Paolo
Cremonesi, and Gerardo Pelosi.
Quantum Computing
Research Lines in the Italian Center for Supercomputing.
In Cristina Silvano, Christian Pilato, and
Marc Reichenbach, editors, Proceedings of the 22nd
International Conference on Embedded Computer Systems: Architectures,
Modeling, and Simulation - SAMOS 2023, Samos, Greece, July 2-7, 2023,
volume 14385 of Lecture Notes in Computer Science (LNCS),
pages 1–16. Springer-Verlag, November 2023.
ISBN: 978-3-031-46076-0 (Print). Series Print ISSN:
0302-9743. Series Online ISSN: 1611-3349.
(doi:10.1007/978-3-031-46077-7_28)
[IC.79]Isabella Piacentini,
Alessandro Barenghi, and Gerardo Pelosi.
A Non Profiled and
Profiled Side Channel Attack Countermeasure through Computation
Interleaving.
In Proceedings of the 26th Euromicro Conference on Digital System
Design, DSD 2023, Durres, Albania, September 6–8, 2023, pages
718–725. IEEE, September 2023.
ISBN: 979-8-3503-4419-6, ISSN: 2771-2508.
(doi:10.1109/DSD60849.2023.00103)
[IC.78]Francesco Antognazza,
Alessandro Barenghi, Gerardo Pelosi, and Ruggero Susella.
An Efficient Unified Architecture for Polynomial Multiplications in Lattice-Based Cryptoschemes. In Proceedings of the 9th International Conference on Information Systems Security and Privacy, ICISSP 2023, Lisbon, Portugal, February 22-24, 2023. SciTePress, February 2023. ISBN: 978-989-758-624-8 ISSN: 2184-4356.
(doi:10.5220/0011654200003405)
[IC.77]Francesco Antognazza, Alessandro Barenghi, Gerardo Pelosi, and Ruggero Susella. A Flexible ASIC-oriented Design for a Full NTRU Accelerator. In Proceedings of the 28th Asia and South Pacific Design Automation Conference (ASPDAC '23), January 16–19, 2023, Tokyo, Japan. ACM, January 2023. ISBN: 978-1-4503-9783-4/23/01.
(doi:10.1145/3566097.3567916)
[IC.76]Marco Baldi, Alessandro
Barenghi, Franco Chiaraluce, Gerardo Pelosi, and Paolo Santini.
Performance bounds for QC-MDPC codes decoders. In Antonia Wachter-Zeh, Hannes Bartz, and Gialuigi Riva, editors, Proceedings of the International Workshop on Code-Based Cryptography (CBCrypto 2021), Munich, Germany, June 21–22, 2021, Revised Selected Papers, volume 13150 of Lecture Notes in Computer Science (LNCS), pages 95–122. Springer, March 2022. ISBN: 978-3-030-98364-2 (Print). 978-3-030-98365-9 (Online). Series Print ISSN: 0302-9743. Series Online ISSN: 1611-3349. (doi:10.1007/978-3-030-98365-9_6)
[IC.75]Alessandro Barenghi, Diego
Carrera, Silvia Mella, Andrea Pace, Gerardo Pelosi, and Ruggero Susella.
Profiled Attacks against the Elliptic Curve Scalar Point Multiplication. In Min Yang, Chao Chen, and Yang Liu, editors, Proceedings Part II of the 17th EAI International Conference on Security and Privacy in Communication Networks - SecureComm 2021, Virtual event, September 6-9, 2021, volume 13041 of Lecture Notes in Computer Science (LNCS), pages 238–257. Springer, October 2021.
ISBN: 978-3-030-92707-3 (Print) 978-3-030-92708-0 (Online), Series ISSN 0302-9743, Series E-ISSN 1611-3349.(doi:10.1007/978-3-030-92708-0_15)
[IC.74]Simone Perriello, Alessandro Barenghi, and Gerardo Pelosi. A Complete Quantum Circuit to Solve the Information Set Decoding Problem.
In Proceedings of the IEEE International Conference on Quantum Computing and Engineering, QCE 2021, Broomfield, CO, USA, October 18-22, 2021 (Fully virtual event), New York, NY, USA, October 2021. IEEE. Electronic ISBN:978-1-6654-1691-7. Print on Demand(PoD) ISBN:978-1-6654-1692-4. (doi:10.1109/QCE52317.2021.00056)
[IC.73]Simone Perriello, Alessandro
Barenghi, and Gerardo Pelosi. A Quantum Circuit to Speed-up the Cryptanalysis of Code-based Cryptosystems.
In Joaquin Garcia-Alfaro, Radha Poovendran, Hervé Debar, and Moti Yung, editors,
Proceedings Part II of the 17th EAI International Conference on Security and Privacy in Communication Networks - SecureComm 2021, Virtual event, September 6-9, 2021, volume 399 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST), pages 458–474. Springer, September 2021.
Print ISBN: 978-3-030-90021-2. eBook ISBN: 978-3-030-90022-9. Series ISSN:
1867-8211. (doi:10.1007/978-3-030-90022-9_25)
[IC.72]Alessandro Barenghi, Matteo
Brevi, William Fornaciari, Gerardo Pelosi, and Davide Zoni. Integrating Side Channel
Security in the FPGA Hardware Design Flow. In Guido Bertoni and Francesco Regazzoni,
editors, Proceedings of the 11th International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE) 2020, Lugano, Switzerland, April 1–3, 2020. Revised Selected Papers, volume 12244 of Lecture Notes in Computer Science, pages 275–290. Springer, April 2021. ISBN 978-3-030-68772-4 (Print) 978-3-030-68773-1 (Online) Series Print ISSN: 0302-9743. Series Online ISSN: 1611-3349.
(doi:10.1007/978-3-030-68773-1)
[IC.71]Nicholas Mainardi, Davide
Sampietro, Alessandro Barenghi, and Gerardo Pelosi. Efficient Oblivious Substring Search via Architectural Support. In Kevin Butler, Danfeng (Daphne) Yao, and Heng Yin, editors, Proceedings of the 36th Annual Computer Security Applications Conference (ACSAC 2020), Austin, Texas, USA. December 07-11, 2020, New York, NY, USA, December 2020. ACM. ISBN (Print): 978-1-4503-8858-0/20/12.
(DOI: 10.1145/3427228.3427296).
[IC.70]Marco
Baldi, Alessandro Barenghi, Franco Chiaraluce, Gerardo Pelosi, and Paolo Santini. A failure rate model of bit-flipping decoders for qc-ldpc and qc-mdpc code-based cryptosystems. In S. De Vimercati and P. Samarati, editors, Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, ICETE 2020 - Volume 2: SECRYPT, Lieusaint - Paris, France, July 8-10, 2020, pages 238-249, Avenida de S. Francisco Xavier, Lote 7 Cv. C, 2900-616 Setúbal, Portugal, July 2020. SciTePress. ISBN: 978-989-758-446-6.
(DOI: 10.5220/0009891702380249) Best paper Award
[IC.69]Alessandro Barenghi and Gerardo Pelosi. A comprehensive analysis of constant time polynomial inversion for post-quantum cryptosystems. In M. Palesi, G. Palermo, C. Graves, and E. Arima, editors, Proceedings of the 17th ACM International Conference on Computing Frontiers (CF'20), Catania, Sicily, Italy, May 11 - 13, 2020, pages 1-8, New York, NY, USA, May 2020. ACM.
ISBN: 978-1-4503-7956-4/20/05. (doi:10.1145/3387902.3397224)
[IC.68]Alessandro Barenghi and Gerardo Pelosi. Constant weight strings in constant time: a building block for code-based post-quantum cryptosystems. In M. Palesi, G. Palermo, C. Graves, and E. Arima, editors, Proceedings of the 17th ACM International Conference on Computing Frontiers (CF'20), Catania, Sicily, Italy, May 11 - 13, 2020, pages 1-8, New York, NY, USA, May 2020. ACM. ISBN: 978-1-4503-7956-4/20/05. The related software implementation is permanently available at https://doi.org/10.5281/zenodo.3747545 and received the ACM Artifact Evaluated badges: Functional, Reusable, Available and Result Reproduced.
(doi:10.1145/3387902.3392630)
[IC.67]Nicholas Mainardi, Alessandro Barenghi, and Gerardo Pelosi.
Privacy Preserving Substring Search Protocol with Polylogarithmic Communication Cost. In David Balenson, Guofei Gu, and Danfeng (Daphne) Yao, editors, Proceedings of the the 35th Annual Computer Security Applications Conference (ACSAC 2019), San Juan, Puerto Rico, USA. December 9-13, 2019. New York, NY, USA, December 2019. ACM.
ISBN (Print): 978-1-4503-7628-0/19/12. (DOI:10.1145/3359789.3359842)
The related software implementation is permanently available at
DOI:10.5281/zenodo.3384814 and received the ACM Artifact Evaluated badge at the reusable level.
[IC.66]Alessandro Barenghi, William Fornaciari, Andrea Galimberti, Gerardo Pelosi, and Davide Zoni. Evaluating the trade-offs in the hardware design of the LEDAcrypt encryption functions. In Danilo De Marchi, Teresa Serrano Gotarredona,and Roland Thewes, editors, Proceedings of the 26th IEEE International Conference on Electronics, Circuits and Systems, ICECS 2019, Genova, Italy, November 27-29, 2019., New York, NY, USA, November 2019. IEEE. ISBN (Print on Demand): 978-1-7281-0996-1. ISBN: 978-1-7281-0997-8 (doi:10.1109/ICECS46596.2019.8964882)
[IC.65]Marco Baldi, Alessandro Barenghi, Franco Chiaraluce, Gerardo Pelosi, and Paolo Santini. LEDAcrypt: QC-LDPC code-based cryptosystems with bounded decryption failure rate. In Marco Baldi, Edoardo Persichetti, and Paolo Santini, editors, Proceedings of the 7th Code-Based Cryptography Workshop (CBC 2019), Darmstadt, Germany. May 18-19, 2019, volume 11666 of Lecture Notes in Computer Science, pages 11–43. Springer-Verlag, May 2019. ISBN (Print): 978-3-030-25921-1. ISBN (Online): 978-3-030-25922-8. Series Print ISSN: 0302-9743. Series Online ISSN: 1611-3349. (doi:10.1007/978-3-030-25922-8_2)
[IC.64]Niccolò Izzo, Alessandro Barenghi, Luca Breveglieri, Gerardo Pelosi, and Paolo Amato. A Secure and Authenticated
Host to Memory Communication Interface. In Francesca Palumbo, Michela Becchi, Martin Schulz, and Kento Sato, editors, Proceedings of the 16th ACM International Conference on Computing Frontiers (CF'19), Alghero, Sardinia, Italy, April 30 - May 2, 2019, pages 1–6, New York, NY, USA, May 2019. ACM. ISBN: 978-1-4503-6685-4/19/05 (Print). (doi:10.1145/3310273.3323401)
[IC.63]Alessandro Barenghi, Nicholas Mainardi, and Gerardo Pelosi. Comparison-based Attacks against Noise-free Fully Homomorphic Encryption Schemes. In David Naccache, Shouhuai Xu, Sihan Qing, Pierangela Samarati, Gregory Blanc and Rongxing Lu, editors, Proceedings of the 20th International Conference on Information and Communications Security, ICICS 2018, October 29-31, 2018. Lille, France, volume 11149 of Lecture Notes in Computer Science, pages 117--191, Springer, Cham 2018.
ISBN: 978-3-030-01949-5 (Print), 978-3-030-01950-1 (Online).
Copyright: Springer Nature Switzerland AG 2018.
Also part of the Security and Cryptology book sub series. Series Print ISSN: 0302-9743. Series Online ISSN: 1611-3349 (doi:10.1007/978-3-030-01950-1_11)
[IC.62]Alessandro Barenghi, Luca Breveglieri, Niccolò Izzo, and Gerardo Pelosi. Software-only Reverse Engineering of Physical DRAM Mappings for Rowhammer Attacks.
In Magdy S. Abadir, Ilia Polian, Sohrab Aftabjahani, and Yier Jin, editors, Proccedings of the 2018 IEEE 3rd International Verification and Security Workshop (IVSW), July 2-4, 2018, Platja d’Aro, Costa Brava, Spain, pages 19–24, New York, NY, USA, October 2018. IEEE.
ISBN: 978-1-5386-6544-2. Print on Demand(PoD) ISBN: 978-1-5386-6545-9. Part Number: CFP18G73-ART. (doi:10.1109/IVSW.2018.8494868)
[IC.61]Alessandro Barenghi, Michele Madaschi, Nicholas Mainardi, and Gerardo Pelosi. OpenCL HLS Based Design of FPGA Accelerators for Cryptographic Primitives. In Stephen Jarvis, Bahman Javadi, and Song Guo, editors, Proceedings of the International Conference on High Performance Computing & Simulation (HPCS 2018), July 16-20, 2018. Orléans, France., pages 634-641, New York, NY, USA, July 2018. IEEE 2018.
ISBN: 978-1-5386-7878-7. (doi: 10.1109/HPCS.2018.00105)
[IC.60]
Alessandro Barenghi and
Gerardo Pelosi.
Side-channel security of superscalar CPUs: Evaluating the Impact of Microarchitectural Features. In Sharon Hu, Rob Aitken, and Anand Raghunathan, editors, <cite>Proceedings of the 55th Annual Design Automation Conference, DAC '18, San Francisco, CA, USA, June 24–28, 2018, pages 1-6, New York, NY, USA, June 2018. ACM. ISBN: 978-1-4503-5700-5/18/06.(
doi:10.1145/3195970.3196112)
[IC.59]Marco Baldi, Alessandro
Barenghi, Franco Chiaraluce, Gerardo Pelosi, and Paolo Santini.
LEDAkem: a post-quantum key encapsulation mechanism based on QC-LDPC codes. In Tanja Lange and Rainer Steinwandt, editors, Proceedings of The Ninth International Conference on Post-Quantum Cryptography (PQCrypto 2018), Fort Lauderdale, Florida, April 9-11, 2018, volume 10786 of Lecture Notes in Computer Science, also part of the Security and Cryptology subseries, pages 1-22. Springer International Publishing AG, part of Springer Nature, April 2018. Print ISBN 978-3-319-79062-6, Series Print ISSN 0302-9743. Series Online ISSN 1611-3349 (doi:10.1007/978-3-319-79063-3_1)
[IC.58]Alessandro Barenghi, Gerardo Pelosi, and Nicholas Mainardi. A Security Audit of the OpenPGP Format. In Richard Hill, Indrajit Ray, Xiaofei Liao, Zhen Liu, Stephen Jarvis, Lei Liu, Bahman Javadi, and Song Guo, editors, Proceedings of the 11th International Conference on Frontier of Computer Science and Technology (FCST-2017), Exeter, England, UK, 21-23 June 2017, pages 336-343, New York, NY, USA, June 2017. IEEE Computer Society. ISBN: 978-1-5386-0840-1.ISSN: 2375-527X. (doi:10.1109/ISPAN-FCST-ISCC.2017.35)
[IC.57]Alessandro Barenghi, Nicholas Mainardi, and Gerardo Pelosi. A Novel Regular Format for X.509 Digital Certificates. In Shahram Latifi, editor, Proceedings of the 14th International Conference on Information Technology: New Generations (ITNG 2017), April 10-12, 2017, Las Vegas, Nevada, USA, volume 558 of Advances in Intelligent Systems and Computing, pages 135–141. Springer International Publishing, April 2017. ISBN 978-3-319-54977-4 (Print), ISBN 978-3-319-54978-1 (eBook), series ISSN 2194-5357, ISSN 2194-5365 (electronic). (doi:10.1007/978-3-319-54978-1_18)
[IC.56]Alessandro Barenghi and
Gerardo Pelosi. An Enhanced Dataflow Analysis to Automatically Tailor Side Channel Attack Countermeasures to Software Block Ciphers.
In Alessandro Armando, Roberto Baldoni, and Riccardo Focardi, editors, Proceedings of the Italian Conference on Cyber Security (ITA-SEC 2017), 17-20 January 2017, Venice, Italy. CEUR Workshop Proceedings, Vol-1816, pages 8–18, ISSN 1613-0073.
(http://ceur-ws.org/Vol-1816)
[IC.55]Sabrina De Capitani Di Vimercati, Sara Foresti, Riccardo Moretti, Stefano Paraboschi, Gerardo Pelosi, and Pierangela Samarati. A dynamic tree-based data structure for access privacy.
In Grégoire Danoy and Sathish Gopalakrishnan, editors, Proceedings of the 8th IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2016), 12-15 December 2016, Luxembourg City, Grand Duchy of Luxembourg, pages 187:1-187:8, New York, NY, USA, January 2017. IEEE. ISBN: 978-1-5090-1446-0 (Print on Demand), 978-1-5090-1445-3 (Electronic). ISSN: 2330-2186 (Electronic).
(doi:10.1109/CloudCom.2016.0068)
[IC.54]Giovanni Agosta, Alessandro
Barenghi, Gerardo Pelosi, and Michele Scandale. Encasing Block Ciphers to Foil Key Recovery Attempts via Side Channel.
In Frank Liu, editor, Proceedings of the IEEE/ACM International Conference on Computer-Aided Design, ICCAD 2016, Austin, TX, USA, November 7–10, 2016, article No. 96, New York, NY, USA, November 2016. ACM. ISBN: 978-1-4503-4466-1/16/11. (doi:10.1145/2966986.2967033)
[IC.53]Alessandro Barenghi and Gerardo Pelosi. A Note on Fault Attacks against
Deterministic Signature Schemes. In Kazuto Ogawa and Katsunari Yoshioka, editors,
Proceedings of the 11th International Workshop on Security - Advances in Information and Computer Security (IWSEC 2016), Akihabara-Ochanomizu District, Tokyo, Japan, September 12–14, 2016, volume 9836 of Lecture Notes in Computer Science, pages 182–192. Springer International Publishing, September 2016. ISBN: 978-3–319-44523-6 (Print) 978-3-319-44524-3 (Online), ISSN: 0302-9743. (doi:10.1007/978-3-319-44524-3_11)
[IC.52]Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, and Pierangela Samarati.
Access Control for the Shuffle Index. In Silvio Ranise and Vipin Swarup, editors, 30th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2016), Trento, Italy, July 18-21, 2016, volume 9766 of Lecture Notes in Computer Science, pages 130-147. Springer International Publishing, July 2016. ISBN: 978-3-319-41482-9 (Print) 978-3-319-41483-6 (Online). Series ISSN: 0302-9743
(doi:10.1007/978-3-319-41483-6_10)
[IC.51]Giovanni Agosta, Alessandro Barenghi, Carlo Brandolese, William Fornaciari, and Gerardo Pelosi et. al.
V2I Cooperation for Traffic Management with SafeCOP. In George A. Papadopoulos, Paris Kitsos, and Odysseas Koufopavlou, editors, 19th Euromicro Conference on Digital System Design, August 31 - September 2, 2016. Limassol, Cyprus, pages 621-628, Los Alamitos, CA, USA, September 2016. IEEE Computer Society.
ISBN: 978-1-5090-2817-7/16 (Print). (doi:10.1109/DSD.2016.18)
[IC.50]Giovanni Agosta, Alessandro Barenghi, and Gerardo Pelosi. Automated Instantiation of Side-Channel Attacks Countermeasures for Software Cipher Implementations. In Gianluca Palermo, John Feo, editors, Proceedings of the 13th ACM International Conference on Computing Frontiers, (CF'16), Como, Italy, May 16-19, 2016, pages 455–460, New York, NY, USA, May 2016. ACM. ISBN: 978-1-4503-4128-8/16/05 (Print).
(DOI: 10.1145/2903150.2911707)
[IC.49]Giovanni Agosta, Alessio Antonini, Alessandro Barenghi, Dario Galeri, and Gerardo Pelosi. Cyber-Security Analysis and Evaluation for Smart Home Management Solutions. In Jing Yang Jou, Yen Hsyang Chu, Yin-Yi Lin, and Yen-Wen Chen, editors Proceedings of the 49th IEEE International Conference on Security Technology (ICCST 2015), Taipei, Taiwan, R.O.C., 21–24 September, 2015, pages 1–6, Piscataway, NJ, USA, September 2015. January 2016 IEEE. ISBN: 978-147998691-0 (Print). ISSN: 10716572.
(DOI: 10.1109/CCST.2015.7389663 )
[IC.48]Alessandro Barenghi,
Alessandro Di Federico, Gerardo Pelosi, and
Stefano Sanflippo. Challenging the Trustworthiness of PGP: Is the Web-of-Trust Tear-proof? In Pernul G. and Peter Y. A. Ryan and Edgar Weipp, editors, Computer Security - ESORICS 2015 - Part I, Proceedings of the 20th European Symposium on Research in Computer Security, Vienna, Austria, September 23–25, 2015, volume 9326 of Lecture Notes in Computer Science, pages 1–18, Switzerland, September 2015. . Springer International Publishing. ISBN: 978-3-319-24173-9 (Print) 978-3-319-24174-6 (Online), ISSN: 0302-9743. (DOI: 10.1007/978-3-319-24174-6_22)
[IC.47]Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, and Michele Scandale. Information Leakage Chaff: Feeding Red Herrings to Side Channel Attackers. In Sharon Hu and Rob Aitken (editors), Proceedings of the 52th Annual Design Automation Conference, DAC’15, San Francisco, CA, USA, June 7-11, 2015, pages 33:1-33:6, New York, NY, USA, June 2015. ACM. ISBN: 978-1-4503-3520-1/15. (DOI: 10.1145/2744769.2744859)
[IC.46]Sabrina De Capitani di Vimercati,
Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, and Pierangela Samarati.
Protecting Access Confidentiality with Data
Distribution and Swapping. In Xindong Wu, Hai Jin, Manish Parashar, and Laurence T. Yang, editors, Proceedings of the 2014 IEEE International Conference on Big Data and Cloud Computing (BdCloud), Sydney, Australia - December 3-5, 2014, pages 167-174,
Piscataway, NJ, USA, December 2014. IEEE Computer Society. ISBN-13: 978-1-4799-6719-3 (Print). (DOI: 10.1109/BDCloud.2014.59)
[IC.45]Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, and Michele Scandale. Towards Transparently Tackling Functionality and Performance Issues Across Different OpenCL Platforms. In Shuichi Ichikawa and Tomoaki Tsumura, editors, Proceedings of the International Symposium on Computing and Networking – Across Practical Development and Theoretical Research - (CANDAR 2014) Mt. Fuji, Shizuoka, Japan - December 10-12, 2014, pages 130--136, Piscataway, NJ, USA, December 2014. IEEE.
ISBN: 978-1-4799-4152-0/14.
(DOI: 10.1109/CANDAR.2014.53)
[IC.44]Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, and Michele Scandale. Differential Fault Analysis for Block Ciphers: an Automated Conservative Analysis. In Ron Poet, Atilla Elçi, Manoj Singh Gaur, Mehmet A. Orgun, and Oleg B. Makarevich, editors, Proceedings of the 7th International Conference on Security of Information and Networks, SIN '14, Glasgow, Scotland UK, September, 9-11 2014, pages 171:1-171:8, New York, NY, USA, September 2014. ACM. ISBN: 978-1-4503-3033-6/14/09. (DOI: 10.1145/2659651.2659709)
Best Paper Award
[IC.43]Alessandro Barenghi and
Gerardo Pelosi. On the Security of Partially Masked Software Implementations. In Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati, editors, SECRYPT 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28–30 August, 2014, pages 492--499. SciTePress, August 2014. ISBN 978-989-758-045-1 (Print).
(DOI: http://dx.doi.org/10.5220/0005120504920499)
[IC.42]Govanni Agosta, Alessandro
Barenghi, and Gerardo Pelosi.
Securing
Software Cryptographic Primitives for Embedded Systems against Side Channel
Attacks.
In Fabio Garza, Gordon Thomas, and
Daniel A. Pritchard, editors, Proceedings of the 48th
IEEE International Conference on Security Technology (ICCST 2014), Rome,
Italy, 13–16 October, 2014, pages 382–387, Piscataway, NJ, USA,
October 2014. IEEE.
ISBN: 978-1-4799-3530-7 (Print).
(DOI:10.1109/CCST.2014.6987032)
[IC.41]Alessio Antonini, Alessandro
Barenghi, Gerardo Pelosi, and Saman Zonouz.
Security
Challenges in Building Automation and SCADA.
In Fabio Garza, Gordon Thomas, and
Daniel A. Pritchard, editors, Proceedings of the 48th
IEEE International Conference on Security Technology (ICCST 2014), Rome,
Italy, 13–16 October, 2014, pages 176–181, Piscataway, NJ, USA,
October 2014. IEEE.
ISBN: 978-1-4799-3530-7 (Print).
(DOI:10.1109/CCST.2014.6986996)
[IC.40]Alessandro Barenghi, Michele
Beretta, Alessandro Di Federico, and Gerardo Pelosi. Snake: an End-to-End Encrypted
Online Social Network. In Julien Bourgeois and Frédéric Magoulès,
editors, Proceedings of the 6th International Symposium on Cyberspace
Safety and Security (CSS 2014), Paris, France, 20–22 August, 2014,
pages 775-782, Piscataway, NJ, USA, August 2014. IEEE Computer Society. ISBN:
978-1-4799-6123-8/14 (Print).
(DOI: 10.1109/HPCC.2014.128)
[IC.39]Giovanni Agosta, Alessandro
Barenghi, Gerardo Pelosi, and Michele
Scandale.
A Multiple Equivalent
Execution Trace Approach to Secure Cryptographic Embedded Software.
In Soha Hassoun, Charles Alpert, and
Sharon Hu, editors, Proceedings of the 51th Annual
Design Automation Conference, DAC '14, San Francisco, CA, USA, June 1–5,
2014, pages 1–6, New York, NY, USA, May 2014. ACM.
ISBN: 978-1-4503-2730 (Print).
(DOI:10.1145/2593069.2593073)
[IC.38]Giovanni Agosta, Gerardo
Pelosi, and Ettore Speziale.
On Task
Assignment in Data Intensive Scalable Computing.
In N. Desai and W. Cirne, editors,
Proceedings of the 17th Workshop on Job Scheduling Strategies for
Parallel Processing, JSSPP 2013, Boston, Massachusetts, USA, 24 May
2013, volume 8429 of Lecture Notes in Computer Science,
pages 1–20, Berlin, Heidelberg, May 2014. Springer-Verlag.
ISBN: 978-3-662-43779-7_8 (Print).
(DOI:10.1007/978-3-662-43779-7_8)
[IC.37]Iyad Al Khatib, Gerardo
Pelosi, Giovanni Agosta, and Heikki Teriö.
Security Integration in
Medical Device Design: Extension of an Automated Bio-medical Engineering
Design Methodology.
In Shahram Latifi, editor, Proceedings of the 11th
International Conference on Information Technology: New Generations, ITNG
2014, Las Vegas, Nevada, USA, 7–9 April, 2014, pages 416–423,
Washington, DC, USA, April 2014. IEEE Computer Society.
ISBN: 978-1-4799-3187-3 (Print).
(DOI:10.1109/ITNG.2014.3)
[IC.36]Alessio Antonini, Alessandro
Barenghi, and Gerardo Pelosi.
Security Analysis of Building
Automation Networks: Threat Model and Viable Mitigation Techniques.
In Hanne Riis Nielson and Dieter Gollmann,
editors, Secure IT Systems - Proceedings of the 18th Nordic
Conference, NordSec 2013, Ilulissat, Greenland, October 18–21, 2013,
volume 8208 of Lecture Notes in Computer Science, pages
199–214, Berlin, Heidelberg, October 2013. Springer Berlin Heidelberg.
ISBN: 978-3-642-41487-9 (Print) 978-3-642-41488-6 (Online), ISSN: 0302-9743.
(DOI:10.1007/978-3-642-41488-6_14)
[IC.35]Sabrina De Capitani Di Vimercati,
Sara Foresti, Stefano Paraboschi,
Gerardo Pelosi, and Pierangela Samarati.
Distributed Shuffling for
Preserving Access Confidentiality.
In Jason Crampton, Sushil Jajodia, and
Keith Mayes, editors, Computer Security - ESORICS 2013
- Proceedings of the 18th European Symposium on Research in Computer
Security, Egham, UK, September 9–13, 2013, volume 8134 of
Lecture Notes in Computer Science, pages 628–645, Berlin,
Heidelberg, September 2013. Springer-Verlag.
ISBN: 978-3-642-40202-9 (Print) 978-3-642-40203-6 (Online), ISSN: 0302-9743.
(DOI:10.1007/978-3-642-40203-6_35)
[IC.34]Giovanni Agosta, Alessandro
Barenghi, Gerardo Pelosi, and Michele
Scandale.
Enhancing Passive
Side-Channel Attack Resilience through Schedulability Analysis of
Data-Dependency Graphs.
In Javier Lopez, Xinyi Huang, and
Ravi Sandhu, editors, Network and System Security.
Proceedings of the 7th International Conference, NSS 2013, Madrid, Spain,
June 3–4, 2013, volume 7873 of Lecture Notes in Computer
Science, pages 692–698, Berlin, Heidelberg, June 2013. Springer.
ISBN: 978-3-642-38630-5 (Print), 978-3-642-38631-2 (Online), ISSN: 0302-9743.
(DOI:10.1007/978-3-642-38631-2_58)
[IC.33]Giovanni Agosta, Alessandro
Barenghi, Massimo Maggi, and Gerardo Pelosi.
Compiler-Based Side
Channel Vulnerability Analysis and Optimized Countermeasures
Application.
In Yervant Zorian, Donatella Sciuto, and
Charles Alpert, editors, Proceedings of the 50th Annual
Design Automation Conference, DAC '13, Austin, TX, USA, May 29–June 7,
2013, pages 81:1–81:6, New York, NY, USA, May 2013. ACM.
ISBN: 978-1-4503-2071-9.
(DOI:10.1145/2463209.2488833)
[IC.32]Alessandro Barenghi, Gerardo
Pelosi, and Fabio Pozzi.
Drop-In Control Flow
Hijacking Prevention through Dynamic Library Interception.
In Shahram Latifi, editor, Proceedings of the 10th
International Conference on Information Technology: New Generations, ITNG
2013, Las Vegas, Nevada, USA, 15–17 April, 2013, pages 640–647,
Washington, DC, USA, April 2013. IEEE Computer Society.
ISBN: 978-0-7695-4967-5 (Print).
(DOI:10.1109/ITNG.2013.99)
[IC.31]Alessandro Barenghi, Gerardo
Pelosi, and Francesco Regazzoni.
Simulation-Time
Security Margin Assessment against Power-Based Side Channel Attacks.
In Dimitrios Serpanos and Marilyn Wolf, editors,
Proceedings of the 7th Workshop on Embedded Systems Security (WESS
2012), A Workshop of the Embedded Systems Week (ESWEEK 2012), October 11,
2012, Tampere, Finland, 2012, pages xxx–xxx, New York, NY, USA,
October 2012. ACM.
ISBN: 978-1-4503-1286-8/12/10.
(DOI:)
[IC.30]Alessandro Barenghi, Luca
Breveglieri, Mariagrazia Fugini, and Gerardo
Pelosi.
Smart Meters and Home Gateway
Scenarios.
In Americo Cicchetti and Cecilia Rossignoli,
editors, Proceedings of itAIS 2012 – IX Conference of the Italian
Chapter of AIS Organization change and Information Systems: Working and
Living Together in New Ways – Universitá Cattolica del Sacro Cuore, Rome
Campus (Italy), September 28th and 29th, 2012, Roma (RM), September
2012. ITHUM Srl.
ISBN: 978-88-6685-085-4.
[IC.29]Giovanni Agosta, Alessandro
Barenghi, and Gerardo Pelosi.
A Code Morphing
Methodology to Automate Power Analysis Countermeasures.
In Patrick Groeneveld, Donatella Sciuto, and
Soha Hassoun, editors, The 49th Annual Design
Automation Conference 2012, DAC '12, San Francisco, CA, USA, June 3–7,
2012, pages 77–82, New York, NY, USA, June 2012. ACM.
ISBN: 978-1-4503-1199-1.
(DOI:10.1145/2228360.2228376)
[IC.28]Giovanni Agosta, Alessandro
Barenghi, Antonio Parata, and Gerardo Pelosi.
Automated
Security Analysis of Dynamic Web Applications through Symbolic Code
Execution.
In Shahram Latifi, editor, Proceedings of the Ninth
International Conference on Information Technology: New Generations, ITNG
2012, Las Vegas, Nevada, USA, 16–18 April, 2012, pages 189–194,
Washington, DC, USA, April 2012. IEEE Computer Society.
ISBN: 978-1-4673-0798-7 (Print).
(DOI:10.1109/ITNG.2012.167)
[IC.27]Giovanni Agosta, Alessandro
Barenghi, and Gerardo Pelosi.
Exploiting
Bit-level Parallelism in GPGPUs: a Case Study on KeeLoq Exhaustive Search
Attacks.
In Gero Mühl, Jan Richling, and
Andreas Herkersdorf, editors, ARCS Workshops,
Proceedings of the 3rd Workshop on Parallel Programming and Run-Time
Management Techniques for Many-Core Architectures, PARMA '12, Munich,
Germany, 28–29 February, 2012, volume 200 of Lecture Notes in
Informatics (LNI), pages 385–396, Bonn, Germany, February 2012.
Gesellschaft für Informatik (GI).
ISBN: 978-1-4673-1913-3 (Print), 978-3-88579-294-9 (Online), ISSN:
1617-5468.
[IC.26]Alessandro Barenghi, Guido M.
Bertoni, Luca Breveglieri, Maria Grazia
Fugini, and Gerardo Pelosi.
Smart Metering in
Power Grids: Application Scenarios and Security.
In Syed Islam, editor, Proceedings of the IEEE PES
Innovative Smart Grid Technology Conference (IEEE PES ISGT2011 Asia),
November 13–16, 2011, Perth, Australia, pages 1–8, Piscataway, NJ,
USA, November 2011. IEEE.
ISBN: 978-1-4577-0873-2 (Print), 978-1-4577-0874-9 (Online),
978-1-4577-0875-6/11.
(DOI:10.1109/ISGT-Asia.2011.6167108)
[IC.25]Alessandro Barenghi,
Guido Marco Bertoni, Luca Breveglieri,
Gerardo Pelosi, and Andrea Palomba.
Fault Attack to the
Elliptic Curve Digital Signature Algorithm with Multiple Bit Faults.
In Mehmet A. Orgun, Atilla Elçi,
Oleg B. Makarevich, Sorin A. Huss,
Josef Pieprzyk, Lyudmila K. Babenko,
Alexander G. Chefranov, and Rajan Shankaran,
editors, Proceedings of the 4th International Conference on Security
of Information and Networks, SIN 2011, Sydney, NSW, Australia, November
14–19, 2011, pages 63–72, New York, NY, USA, November 2011. ACM.
ISBN: 978-1-4503-1020-8.
(DOI:10.1145/2070425.2070438)
[IC.24]Sabrina De Capitani Di Vimercati,
Sara Foresti, Stefano Paraboschi,
Gerardo Pelosi, and Pierangela Samarati.
Supporting
Concurrency in Private Data Outsourcing.
In Vijay Atluri and Claudia Díaz, editors,
Computer Security - ESORICS 2011 - Proceedings of the 16th European
Symposium on Research in Computer Security, Leuven, Belgium, September
12–14, 2011, volume 6879 of Lecture Notes in Computer
Science, pages 648–664, Berlin, Heidelberg, September 2011.
Springer-Verlag.
ISBN: 978-3-642-23821-5 (Print), 978-3-642-23822-2 (Online), ISSN: 0302-9743
(Print), 1611-3349 (Online).
(DOI:10.1007/978-3-642-23822-2_35)
[IC.23]Alessandro Barenghi and
Gerardo Pelosi.
Security
and Privacy in Smart Grid Infrastructures.
In Franck Morvan, A Min Tjoa, and
Roland R. Wagner, editors, DEXA '11 Proceedings of the
2011 22nd International Workshop on Database and Expert Systems Applications,
Toulouse, France, August 29–September 2, 2011, pages 102–108,
Washington, DC, USA, August 2011. IEEE Computer Society.
ISBN: 978-1-4577-0982-1 (Print), 978-0-7695-4486-1 (Online), ISSN: 1529-4188.
(DOI:10.1109/DEXA.2011.74)
[IC.22]Alessandro Barenghi, Gerardo
Pelosi, and Yannick Teglia.
Information
Leakage Discovery Techniques to Enhance Secure Chip Design.
In Claudio Agostino Ardagna and Jianying Zhou,
editors, Information Security Theory and Practice. Security and
Privacy of Mobile Devices in Wireless Communication - Proceedings of the 5th
IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece,
June 1–3, 2011, volume 6633 of Lecture Notes in Computer
Science, pages 128–143, Berlin, Heidelberg, June 2011.
Springer-Verlag.
ISBN: 978-3-642-21039-6 (Print), 978-3-642-21040-2 (Online).
(DOI:10.1007/978-3-642-21040-2_9)
[IC.21]Sabrina De Capitani di Vimercati,
Sara Foresti, Stefano Paraboschi,
Gerardo Pelosi, and Pierangela Samarati.
Efficient and Private Access
to Outsourced Data.
In Proceedings of the 2011 31st International Conference on Distributed
Computing Systems, ICDCS 2011, Minneapolis, MN, USA, June 20–24,
2011, pages 710–719, Washington, DC, USA, June 2011. IEEE Computer
Society.
ISBN: 978-1-61284-384-1 (Print), 978-0-7695-4364-2 (Online), ISSN: 1063-6927.
(DOI:10.1109/ICDCS.2011.37)
[IC.20]Alessandro Barenghi, Luca
Breveglieri, Israel Koren, Gerardo Pelosi, and
Francesco Regazzoni.
Countermeasures against
Fault Attacks on Software Implemented AES: Effectiveness and Cost.
In ESWeek '10 Sixth Embedded Systems Week. Proceedings of the 5th
Workshop on Embedded Systems Security. WESS' 10, Scottsdale, AZ, USA. October
28, 2010, pages 7:1–7:10, New York, NY, USA, October 2010. ACM.
ISBN: 978-1-4503-0078-0.
(DOI:10.1145/1873548.1873555)
[IC.19]Alessandro Barenghi, Gerardo
Pelosi, and Yannick Teglia.
Improving First Order
Differential Power Attacks through Digital Signal Processing.
In Oleg B. Makarevich, Atilla Elçi,
Mehmet A. Orgun, Sorin A. Huss,
Ludmila K. Babenko, Alexander G. Chefranov, and
Vijay Varadharajan, editors, Proceedings of the 3rd
International Conference on Security of Information and Networks, SIN 2010,
Rostov-on-Don, Russian Federation, September 7–11, 2010, pages
124–133, New York, NY, USA, September 2010. ACM.
ISBN: 978-1-4503-0234-0.
(DOI:10.1145/1854099.1854126)
[IC.18]Alessandro Barenghi,
Guido Marco Bertoni, Luca Breveglieri,
Mauro Pellicioli, and Gerardo Pelosi.
Fault
Attack on AES with Single-Bit Induced Faults.
In Proceedings of the Sixth International Conference on Information
Assurance and Security, IAS 2010, Atlanta, GA, USA, August 23–25,
2010, pages 167–172. IEEE, August 2010.
ISBN: 978-1-4244-7407-3 (Print).
(DOI:10.1109/ISIAS.2010.5604061)
[IC.17]Alessandro Barenghi, Guido
Bertoni, Luca Breveglieri, Mauro Pellicioli,
and Gerardo Pelosi.
Low Voltage Fault Attacks
to AES.
In Jim Plusquellic and Ken Mai, editors,
HOST 2010, Proceedings of the 2010 IEEE International Symposium on
Hardware-Oriented Security and Trust (HOST), 13–14 June 2010, Anaheim
Convention Center, CA, USA, pages 7–12, Los Alamitos, CA, USA, June
2010. IEEE Computer Society.
ISBN: 978-1-4244-7811-8 (Print), 978-1-4244-7810-1 (Online).
(DOI:10.1109/HST.2010.5513121)
[IC.16]Sabrina De Capitani di Vimercati,
Sara Foresti, Sushil Jajodia,
Stefano Paraboschi, Gerardo Pelosi, and
Pierangela Samarati.
Encryption-Based Policy
Enforcement for Cloud Storage.
In David H. C. Du and Michel Raynal, editors,
30th IEEE International Conference on Distributed Computing Systems
Workshops (ICDCS 2010 Workshops), 21–25 June 2010, Genova, Italy,
pages 42–51, Washington, DC, USA, June 2010. IEEE Computer Society.
ISBN: 978-1-4244-7471-4 (Print), 978-0-7695-4079-5 (Online), ISSN: 1545-0678.
(DOI:10.1109/ICDCSW.2010.35)
[IC.15]Giovanni Agosta, Alessandro
Barenghi, Fabrizio De Santis, and Gerardo
Pelosi.
Record
Setting Software Implementation of DES Using CUDA.
In Shahram Latifi, editor, Proceeding of the Seventh
International Conference on Information Technology: New Generations, ITNG
2010, Las Vegas, Nevada, USA, 12–14 April 2010, pages 748–755, Los
Alamitos, CA, USA, April 2010. IEEE Computer Society.
ISBN: 978-0-7695-3984-3 (Print).
(DOI:10.1109/ITNG.2010.43)
[IC.14]Gerardo Pelosi and Giuseppe
Psaila.
SMaC: Spatial Map Caching
Technique for Mobile Devices.
In Sung Y. Shin, Sascha Ossowski,
Michael Schumacher, Mathew J. Palakal, and
Chih-Cheng Hung, editors, Proceedings of the 2010 ACM
Symposium on Applied Computing (SAC), Sierre, Switzerland, March 22–26,
2010, pages 1829–1830, New York, NY, USA, March 2010. ACM.
ISBN: 978-1-60558-639-7.
(DOI:10.1145/1774088.1774476)
[IC.13]Giovanni Agosta, Alessandro
Barenghi, Fabrizio De Santis, Andrea Di
Biagio, and Gerardo Pelosi.
Fast Disk
Encryption through GPGPU Acceleration.
In Proceedings of the 2009 International Conference on Parallel and
Distributed Computing, Applications and Technologies, PDCAT 2009, Higashi
Hiroshima, Japan, December 8–11 2009, pages 102–109, Los Alamitos,
CA, USA, December 2009. IEEE Computer Society.
ISBN: 978-0-7695-3914-0.
(DOI:10.1109/PDCAT.2009.72)
[IC.12]Alessandro Barenghi, Guido
Bertoni, Emanuele Parrinello, and Gerardo
Pelosi.
Low Voltage Fault Attacks on
the RSA Cryptosystem.
In Luca Breveglieri, Israel Koren,
David Naccache, Elisabeth Oswald, and
Jean-Pierre Seifert, editors, Proceeding of the Sixth
International Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC
2009, Lausanne, Switzerland, September 6, 2009, pages 23–31,
Washington, DC, USA, September 2009. IEEE Computer Society.
ISBN: 978-1-4244-4972-9 (Print), 978-0-7695-3824-2 (Online).
(DOI:10.1109/FDTC.2009.30)
[IC.11]Andrea Di Biagio, Alessandro
Barenghi, Giovanni Agosta, and Gerardo Pelosi.
Design of a Parallel
AES for Graphics Hardware Using the CUDA Framework.
In Proceedings of the 23rd IEEE International Symposium on Parallel and
Distributed Processing, IPDPS 2009, Rome, Italy, May 23–29, 2009,
pages 1–8, Washington, DC, USA, May 2009. IEEE Computer Society.
ISBN: 978-1-4244-3751-1 (Print), 978-1-4244-3750-4 (Online), ISSN: 1530-2075.
(DOI:10.1109/IPDPS.2009.5161242)
[IC.10]Sabrina De Capitani di Vimercati,
Sara Foresti, Sushil Jajodia,
Stefano Paraboschi, Gerardo Pelosi, and
Pierangela Samarati.
Preserving
Confidentiality of Security Policies in Data Outsourcing.
In Vijay Atluri and Marianne Winslett, editors,
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic
Society, WPES 2008, Alexandria, VA, USA, October 27, 2008, pages
75–84, New York, NY, USA, October 2008. ACM.
ISBN: 978-1-60558-289-4.
(DOI:10.1145/1456403.1456417)
[IC.9]Alessandro Barenghi, Guido
Bertoni, Luca Breveglieri, and Gerardo Pelosi.
A FPGA
Coprocessor for the Cryptographic Tate Pairing over Fp.
In Shahram Latifi, editor, Proceedings of the Fifth
International Conference on Information Technology: New Generations (ITNG
2008), 7–8 April 2008, Las Vegas, Nevada, USA, pages 112–119,
Washington, DC, USA, April 2008. IEEE Computer Society.
ISBN: 978-0-7695-3099-4.
(DOI:10.1109/ITNG.2008.260)
[IC.8]Giovanni Agosta and Gerardo
Pelosi.
A Domain Specific Language for
Cryptography.
In Proceedings of the Forum on Specification and Design Languages, FDL
2007, September 18–20, 2007, Barcelona, Spain, Proceedings, pages
159–164. Electronic Chips & Systems Design Initiative (ECSI), September
2007.
ISSN: 1636-9874.
[IC.7]Giovanni Agosta, Luca
Breveglieri, Gerardo Pelosi, and Israel Koren.
Countermeasures against
Branch Target Buffer Attacks.
In Luca Breveglieri, Shay Gueron,
Israel Koren, David Naccache, and
Jean-Pierre Seifert, editors, Proceedings of the Fourth
International Workshop on Fault Diagnosis and Tolerance in Cryptography,
2007, FDTC 2007: Vienna, Austria, 10 September 2007, pages 75–79,
Washington, DC, USA, September 2007. IEEE Computer Society.
ISBN: 978-0-7695-2982-0 (Print), 0-7695-2982-8 (Online).
(DOI:10.1109/FDTC.2007.4318987)
[IC.6]Giovanni Agosta, Francesco
Bruschi, Gerardo Pelosi, and Donatella Sciuto.
A Unified Approach to
Canonical Form-based Boolean Matching.
In Steven P. Levitan, editor, Proceedings of the 44th
Design Automation Conference, DAC 2007, San Diego, CA, USA, June 4–8,
2007, pages 841–846, New York, NY, USA, June 2007. ACM.
ISBN: 978-1-59593-627-1, ISSN: 0738-100X.
(DOI:10.1145/1278480.1278689)
[IC.5]Giovanni Agosta, Luca
Breveglieri, Gerardo Pelosi, and Martino
Sykora.
Programming
Highly Parallel Reconfigurable Architectures for Public-Key Cryptographic
Applications.
In Shahram Latifi, editor, Proceedings of the Fourth
International Conference on Information Technology: New Generations (ITNG
2007), 2-4 April 2007, Las Vegas, NV, USA, pages 3–10, Washington,
DC, USA, April 2007. IEEE Computer Society.
ISBN: 0-7695-2776-0 (Print), 978-0-7695-2776-5 (Online).
(DOI:10.1109/ITNG.2007.160)
[IC.4]Guido M. Bertoni, Luca
Breveglieri, Liqun Chen, Pasqualina Fragneto,
Keith A. Harrison, and Gerardo Pelosi.
A Pairing SW Implementation for Smart-Cards.
In Proceedings of the Fourth Irish Conference on the Mathematical
Foundations of Computer Science and Information Technology, (MFCSIT'06),
Cork, Ireland, 1–5, August 2006, pages 267–271. National University
of Ireland Press, August 2006.
ISBN: 0-9552229-3-1 (Print).
[IC.3]Cesare Alippi, Gerardo
Pelosi, and Manuel Roveri.
Computational
Intelligence Techniques to Detect Toxic Gas Presence.
In Fernando Lopez Pefna and Enrique H. Ruspini,
editors, CIMSA 2006. Proceedings of 2006 IEEE International Conference
on Computational Intelligence for Measurement Systems and Applications, July
12–14, La Coruna, Spain, 2006, pages 40–44, Piscataway, NJ, USA,
July 2006. IEEE.
ISBN: 1-4244-0244-1 (Print), 1-4244-0245-X (Online).
(DOI:10.1109/CIMSA.2006.250745)
[IC.2]Guido Bertoni, Luca
Breveglieri, Pasqualina Fragneto, and Gerardo
Pelosi.
Parallel
Hardware Architectures for the Cryptographic Tate Pairing.
In Shahram Latifi, editor, Proceedings of the Third
International Conference on Information Technology: New Generations (ITNG
2006), 10–12 April 2006, Las Vegas, NV, USA, pages 186–191,
Washington, DC, USA, April 2006. IEEE Computer Society.
ISBN: 0-7695-2497-4 (Print).
(DOI:10.1109/ITNG.2006.107)
[IC.1]Guido Bertoni, Luca
Breveglieri, Pasqualina Fragneto, Gerardo
Pelosi, and Luigi Sportiello.
Software Implementation
of Tate pairing over GF(2m).
In Georges G. E. Gielen, editor, Proceedings of the
Conference on Design, Automation and Test in Europe: Designers' Forum, DATE
2006, Munich, Germany, March 6–10, 2006, pages 7–11, Leuven,
Belgium, March 2006. European Design and Automation Association (EDAA).
ISBN: 3-9810801-0-6, ISSN: 478061.
(DOI:10.1145/1131355.1131358)
European Patents with International Extensions
European Patent Office (EPO): http://www.epo.org/
United States Patent and Trademark Office (USPTO): http://www.uspto.gov/
In collaboration with the Advanced System Technology Division of STMicroelectronics,
Agrate (IT) and the HP Laboratories, Bristol (UK), concerning the design of secure devices and either the definition or the optimization of cryptographic application-specific protocols.
- [PT.10]
- Guido Marco Bertoni,
Pasqualina Fragneto, Gerardo Pelosi,
Keith Harrison, and Liqun Chen.
Method of Processing Information to be
Confidentially Transmitted.
Granted Patent: US 8381267 B2, February 2013.
Proprietor(s): STMicroelectronics Srl. Prior publication data: US 2007260664 A1
– 2007-11-08. Priority date: 2005-10-11.
- [PT.9]
- Liqun
Chen, Keith Harrison, Guido Marco Bertoni,
Pasqualina Fragneto, and Gerardo Pelosi.
Authentication Method.
Granted Patent US 8352736 B2, January 2013.
Proprietor(s): STMicroelectronics Srl (IT), Hewlett-Packard Development
Company, L.P. (US). Prior publication data: US 2007180241 A1 – 2007-08-02.
Priority date: 2004-12-23.
- [PT.8]
- Roberto Valerio Sannino, Fabio
Sozzani, Guido Marco Bertoni, Gerardo Pelosi,
and Pasqualina Fragneto.
Message Deciphering Method, System and
Article.
Granted Patent: US 8223970 B2, July 2012.
Proprietor(s): STMicroelectronics Srl (IT). Prior publication data: US
2011058672 A1 – 2011-03-10. (Previously granted as US 7925010 B2 on
2011-04-12 with prior publication data: US 2005169464 A1 – 2005-08-04)
Priority date: 2003-12-24.
- [PT.7]
- Guido Marco Bertoni,
Pasqualina Fragneto, Andrew Marsh,
Gerardo Pelosi, and Moris Ravasio.
Computation of a Multiplication Operation with an
Electronic Circuit and Method.
Granted Patent: US 8117251 B2, February 2012.
Proprietor(s): STMicroelectronics Srl (IT). Prior publication data: US
2007260664 A1 – 2007-11-08. Priority date: 2006-04-11.
- [PT.6]
- Guido Marco Bertoni,
Pasqualina Fragneto, Andrew Marsh,
Gerardo Pelosi, and Moris Ravasio.
Computation of a Modular Multiplication with an
Electronic Circuit.
Granted Patent: EP 1845442 B1, November 2011.
Proprietor(s): STMicroelectronics Srl (IT), STMicroelectronics Limited (UK)
Prior publication data: EP 1845442 B1 – 2007-10-17. Priority date:
2006-04-11.
- [PT.5]
- Keith Alexander Harrison,
Liqun Chen, Guido Marco Bertoni,
Pasqualina Fragneto, and Gerardo Pelosi.
Use of Bilinear Mappings in Cryptographic
Applications.
Granted Patent: US 7929691 B2, April 2011.
Proprietor(s): Hewlett-Packard Development Company, L.P. (US). Prior
publication data: US 2008016346 A1 – 2008-01-17. Priority date:
2004-12-23.
- [PT.4]
- Fabio Sozzani, Roberto Valerio
Sannino, Guido Marco Bertoni, Gerardo Pelosi,
and Pasqualina Fragneto.
Method for Establishing a Communication between
Two Devices.
Granted Patent: US 7716483 B2, May 2010.
Proprietor(s): STMicroelectronics Srl (IT). Prior publication data: US
2005125670 A1 – 2005-06-09. Priority date: 2003-09-29.
- [PT.3]
- Fabio Sozzani, Roberto Valerio
Sannino, Guido Marco Bertoni, Gerardo Pelosi,
and Pasqualina Fragneto.
Method for Establishing an Encrypted
Communication by Means of Keys.
Granted Patent: US 7620186 B2, November 2009.
Proprietor(s): STMicroelectronics Srl (IT). Prior publication data: US
2005102507 A1 – 2005-05-12. Priority date: 2003-09-29.
- [PT.2]
- Keith Alexander Harrison,
Liqun Chen, Guido Marco Bertoni,
Pasqualina Fragneto, and Gerardo Pelosi.
Improvements in the Use of Bilinear Mappings in
Cryptographic Applications.
Granted Patent: EP 1675300 B1, October 2008.
Proprietor(s): Hewlett-Packard Development Company, L.P. (US),
STMicroelectronics Srl (IT). Prior publication data: EP 1675300 A1 –
2006-06-28. Priority date: 2004-12-23.
- [PT.1]
- Roberto Valerio Sannino, Fabio
Sozzani, Guido Marco Bertoni, Gerardo Pelosi,
and Pasqualina Fragneto.
A Message Deciphering Method.
Granted Patent: EP 1548976 B1, August 2007.
Proprietor(s): STMicroelectronics Srl (IT). Prior publication data: EP 1548976
(A1) – 2005-06-29. Priority date: 2003-12-24.
Invited Papers (Peer-reviewed)
[IP.11]Alessandro Barenghi and
Gerardo Pelosi.
Fault Attacks Friendliness of
Post-quantum Cryptosystems.
In Proceedings of the Twentieth Workshop on Fault Diagnosis and
Tolerance in Cryptography,Prague, Czech Republic, September 10,
2023.. IEEE Computer Society - CPS, February 2024.
ISBN: 978-1-xxxx-yyyy-x.
[IP.10]Maurizio Atzori, Alessandro
Barenghi, Sara Comai, Mariagrazia Fugini, Diego Marcia, Gerardo Pelosi,
Manuela Sanguinetti, and Vincenzo Scotti. Improving Work Life Conditions via Portable Knowledge-Driven Recommender System. In Sergio Greco, Maurizio Lenzerini, Elio Masciari, and Andrea Tagarelli, editors,
Proceedings of the 29th Italian Symposium on Advanced Database Systems, Pizzo Calabro, Vibo Valentia, Italy, September 5–9, 2021., volume 2994 of CEUR Workshop Proceedings. CEUR-WS.org, September 2021. ISSN: 1613-0073.
[IP.9]Rosa Maria Resende de Almeida, Adriana Grau Aberturas, Yolanda Bueno Aguado, Maurizio Atzori, Alessandro Barenghi, Gianluca Borghini, Carlos Alberto Catalina Ortega, Sara Comai, Raquel Losada Durán, Mariagrazia Fugini, Hatice Gunes, Andreas Basam Musleh, Gerardo Pelosi, Vincenzo Ronca, Licia Sbattella,
Roberto Tedesco, , and Tian Xu. Decision Support Systems to Promote Health and Well-being of People of Working Age: the Case
of the WorkingAge EU Project.
In A. Orailoglu, M. Jung, and M. Reichenbach, editors, Proceedings of the Embedded
Computer Systems: Architectures, Modeling, and Simulation - 20th International Conference, SAMOS 2020, Samos, Greece, July 5-9, 2020, volume 12471 of Lecture Notes in Computer Science (LNCS), pages 336–347. Springer, Cham, July 2020.
ISBN: 978-3-030-60938-2 (Print), 978-3-030-60939-9 (Online). (doi:10.1007/978-3-030-60939-9_24)
[IP.8]Mariagrazia Fugini, Alessandro Barenghi, Sara Comai,
Gerardo Pelosi, Roberto Tedesco, Marteyn van Gasteren, Carlos Alberto
Catalina, Estefanía Arribas Leal, Raquel Losada Durán, Rosa Maria Martins de Almeida,
Alexander Mertens, Vera Rick, Hatice Gunes, Tian Xu, Gianluca Borghini, Vincenzo Ronca, and Hesam Sagha. WorkingAge: Providing
Occupational Safety through Pervasive Sensing and Data Driven Behavior Modeling.
In Piero Baraldi, Francesco Di Maio, and Enrico Zio, editors, Proceedings of the 30th European
Safety and Reliability Conference and the 15th Probabilistic Safety Assessment and Management Conference. ESREL 2020. PSAM 15. June 21-26, 2020. Venice, Italy, pages 1–8. Research Publishing, Singapore, June 2020. ISBN 981-973-0000-00-0 (Print).
(doi:10.3850/981-973-0000-00-0)
[IP.7]Giovanni Agosta, Carlo Brandolese, William Fornaciari,
Nicholas Mainardi, Gerardo Pelosi, Federico Reghenzani, Michele Zanella, Gaetan Des Courchamps, Vincent Ducrot, Kevin Juilly, Sébastien Monot, and
Luca Ceva. Accelerating Automotive
Analytics: The M2DC Appliance Approach. In D. Pnevmatikatos, M. Pelcat, and
M. Jung, editors, Embedded Computer Systems: Architectures, Modeling, and Simulation. SAMOS 2019., volume 11733 of Lecture Notes in Computer Science, pages 455–469. Springer, Cham, August 2019. ISBN 978-3-030-27561-7 (Print), 978-3-030-27562-4 (Online). (doi:10.1007/978-3-030-27562-4_33)
[IP.6]Alessio Agneessens, Francesco Buemi, Stefano Delucchi,
Massimo Massa, Giovanni Agosta, Alessandro Barenghi, Carlo Brandolese, William Fornaciari, Gerardo Pelosi, Enrico Ferrari, Dajana Cassioli, Luigi Pomante, Leonardo Napoletani, Luciano Bozzi, Carlo Tieri, and Maurizio Mongelli. Safe Cooperative CPS: A
V2I Traffic Management scenario in the SafeCOP project. In Andreas Gerstlauer and Walid Najjar, editors, Proceedings of the 2016 IEEE International Conference on Embedded
Computer Systems: Architectures, MOdeling, and Simulation (IC-SAMOS 2016), Special Session on European Projects on heterogeneous microservers and parallel embedded computing, July 18-21, 2016. Samos, Greece, pages 320–327. IEEE, July 2017. ISBN: 978-1-5090-3077-4 (Print on Demand - PoD), 978-1-5090-3076-7 (Electronic). IEEE Catalog Number: CFP1652A-ART. (doi:10.1109/SAMOS.2016.7818365)
[IP.5]Ariel Oleksiak, Michal Kierzynka, Giovanni Agosta, Carlo Brandolese, William Fornaciari, Gerardo Pelosi, Micha Vor Dem Berge, Wolfgang Christmann, Stefan Krupop, Mariano Cecowski, Robert Plestenjak, Justin v Cinkelj, Mario Porrmann, Jens Hagemeyer, René Griessl, Meysam Peykanu, Lennart Tigges, Loïc Cudennec, Thierry Goubier, Jean-Marc Philippe, Sven Rosinger, Daniel Schlitt, Christian Pieper,
Chris Adeniyi-Jones, Udo Janssen, and Luca Ceva. Data Centres for IoT applications: the M2DC Approach. In Andreas Gerstlauer and Walid Najjar, editors, Proceedings of the 2016 IEEE International Conference on Embedded Computer Systems: Architectures, MOdeling, and Simulation (IC-SAMOS 2016), Special Session on European Projects on heterogeneous microservers and parallel embedded computing, July 18-21, 2016. Samos, Greece, pages
293–299. IEEE, July 2017. ISBN: 978-1-5090-3077-4 (Print on Demand – PoD), 978-1-5090-3076-7 (Electronic). IEEE Catalog Number: CFP1652A-ART. (doi:10.1109/SAMOS.2016.7818361)
[IP.4]Ariel Oleksiak, Michal Kierzynka, Wojciech Piatek, Micha Vor Dem Berge, Wolfgang Christmann, Stefan Krupop, Mario Porrmann, Jens Hagemeyer, René Griessl, Meysam Peykanu, Lennart Tigges, Sven Rosinger, Daniel Schlitt, Christian Pieper, Udo Janssen, Giovanni Agosta, Carlo Brandolese, William Fornaciari, Gerardo Pelosi, Mariano Cecowski, Robert Plestenjak, Justin v Cinkelj, Loïc Cudennec, Thierry Goubier, Jean-Marc Philippe, Chris Adeniyi-Jones, Luca Ceva, and Holm Rauchfuss. M2DC - Modular Microserver DataCentre with Heterogeneous Hardware. In Energy-efficient Servers for Cloud and Edge Computing 2017 Workshop (ENeSCE 2017), January 23, 2017, Stockholm, Sweden, co-located with HiPEAC 2017 [without formal proceedings], pages 1–8, January 2017.
[IP.3]Ariel Oleksiak, Michal Kierzynka, Giovanni Agosta, Carlo Brandolese, William Fornaciari, Gerardo Pelosi, Micha Vor Dem Berge, Wolfgang Christmann, Stefan Krupop, Mariano Cecowski, Robert Plestenjak, Justin v Cinkelj, Mario Porrmann, Jens Hagemeyer, René Griessl, Meysam Peykanu, Lennart Tigges, Loïc Ludennec, Thierry Goubier, Jean-Marc Philippe, Sven Rosinger, Daniel Schlitt, Christian Pieper, Chris Adeniyi-Jones and Udo Janssen. The M2DC Project: Modular Microserver DataCentre. In In Proceedings of the 19th Euromicro Conference on Digital System Design (DSD 2016), Special Session on European Projects in Digital Systems Design, August 31 - September 2, 2016. Limassol, Cyprus, pages
68–74. IEEE, July 2016. ISBN: 978-1-5090-2818-4 (Print), 978-1-5090-2817-7 (Online). (doi:10.1109/DSD.2016.76)
[IP.2]Gerardo Pelosi. Engineering Cryptographic Solutions for Trustworthy Computing Systems. In Symposium on Computer Security and Critical Infrastructure, March 16-21, 2015, held at Universidad del Norte, Barranquilla, Colombia, during the 2015 Cátedra Europa International week [talk - without formal proceedings], March 2015.
[IP.1]Gerardo Pelosi. Parallel Hardware for the Computation of Pairings. In Securing Cyberspace: Applications and Foundations of Cryptography and Computer Security, December 4-8, 2006, held at Institute for Pure and Applied Mathematics (IPAM) University of California, Los Angeles, CA, USA [talk – without formal proceedings], December 2006.
Peer-reviewed Posters with Interactive Presentation
[PO.8] Isabella Piacentini, Alessandro Barenghi, and Gerardo Pelosi. A Computation Interleaving Countermeasure against Profiled Side Channel Attacks” , Work-in-Progress session at the 60th Design Automation Conference (DAC'23), July 9--13, 2023, Moscone West, San Francisco, CA, USA.
[PO.7] Alessandro Barenghi, William Fornaciari, Gerardo Pelosi and Davide Zoni. “Side-channel analysis of IoT CPUs: a microarchitectural perspective” , Third Annual ARM Research Summit, 17--19 September 2018, Robinson College, Cambridge, UK.
[Peer-reviewed project proposal evaluation with no formal proceedings. The primary agenda of the Summit is the discourse of ideas in varying degrees of maturity, and the advancement of research.]
[PO.6] Ariel Oleksiak, Michal Kierzynka, ..., Gerardo Pelosi, et al. “M2DC – Modular Microserver Data Centre” , 32nd International Conference, ISC High Performance 2017, June 18–22, 2017, Frankfurt, Germany.
[Accepted as Peer-reviewed poster describing major results and innovations obtained by the M2DC EU project -- (No formal proceedings)]
[PO.5] Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, and Michele Scandale. 2016. “Encasing Block Ciphers to
Foil Key Recovery Attempts via Side Channel” , Work-in-Progress session at the 2016 Design Automation Conference (DAC’16), June 5--9, 2016, Austin, TX, USA.
[Accepted as Peer-reviewed poster with Interactive presentation (No Proceedings)]
[PO.4] Giovanni Agosta, Alessandro Barenghi, Massimo Maggi, and Gerardo Pelosi. 2014. “Extending the Design Space for Secure Embedded System Design” , Work-in-Progress session at the 2014 Design Automation Conference (DAC’14), June 5, 2014, San Francisco, CA, USA.
[Accepted as Peer-reviewed poster with Interactive presentation (No Proceedings)]
[PO.3] Gerardo Pelosi, Giovanni Agosta, and Iyad Al Khatib. 2014. “Automated Methodology Integrating Security and Privacy in the Design Process of Medical Devices”. Work-in-Progress session at the 2014 Design Automation Conference (DAC’14), June 5, 2014, San Francisco, CA, USA.
[Accepted as Peer-reviewed poster with Interactive presentation (No Proceedings)]
[PO.2] Gerardo Pelosi, Giovanni Agosta, Alessandro~Barenghi, and Massimo~Maggi 2014. "Compiler-based Side Channel Analysis" . Workshop on Parallel Programming and Run-Time Management Techniques for Many-core Architectures and Design Tools and Architectures for Multicore
Embedded Computing Platform -- PARMA-DITAM 2014 , January 20, 2014, Vienna, Austria. [Poster Submission Session].
[PO.1] Gerardo Pelosi, ``GPGPU Acceleration of Cryptographic Applications ", IEEE/ACM Workshop on Designing for Embedded Parallel Computing Platforms: Architectures, Design Tools, and Applications. Design Automation and Test in Europe (DATE 2010), March 12, 2010, Dresden, Germany
[Invited talk and poster with Interactive presentation (No Proceedings)].