Publications


Refereed International Journals (31)

Editorial Contributions (6)

Refereed Book Contributions (12)

Refereed International Conferences (83)

European Patents with International Extensions (10 Granted)

Invited Papers (Peer-reviewed) (11)

Peer-reviewed Posters with Interactive Presentation (8)


Erdős Number: 2 (Gerardo Pelosi -- Israel Koren -- Paul Erdős)


Google Scholar Profile

Publication list from DBLP

Scopus Author Profile, (Author ID: 16643986100)
Elsevier - SciVerse Scopus bibliographic database

ORCID Author Profile (ORC ID: 0000-0002-3812-5429)
Open Researcher and Contributor ID registry service

ACM Author Profile, (Author ID: 81331501606)
Association for Computing Machinery - Digital Library

Springer Link - Author Profile

Mendeley Profile, (Scopus Author ID: 16643986100)
Elsevier Mendeley Web program for managing and sharing research papers,
discovering research data and collaborating online.

WoK Author Profile, (ResearcherID: I-4538-2013)
Clarivate Analytics - Web of Science- Researcher ID profile.
Formely, Thomson Reuters - Institute for Scientific Information (ISI) - Web of Knowledge.

WoS Author Profile, (ResearcherID: I-4538-2013)
Clarivate Analytics - Publons researcher profile - Web of Science

Semantic Scholar

Microsoft Academic Search Engine

Profilo autore Redalyc (Redalyc Author id: 34880)
Redalyc Scientific Information System Network of Scientific Journals of Latin America and the Caribbean, Spain and Portugal

ResearchGate Author Profile
Research Social Network

KUDOS author profile (KUDOS id: 45704)
KUDOS Greater Research Impact service

ArnetMiner Author Profile (Author ID: 806698)
Academic Researcher Social Network Search (Irregular updates)

Academia.edu Profile
Social Networking Website for Academics


Awards


Best Paper Award (SECRYPT 2020)
Marco Baldi, Alessandro Barenghi, Franco Chiaraluce, {\bf Gerardo Pelosi}, and Paolo Santini.
A Failure Rate Model of Bit-flipping Decoders for QC-LDPC and QC-MDPC Code-based Cryptosystems'. 17th International Joint Conference on e-Business and Telecommunications (ICETE), held remotely (due to covid-19 pandemic) on July 8 - 10, 2020.

2018 Hardware and Embedded Security ''Top Picks'' paper Award.
The paper “A Code Morphing Methodology to Automate Power Analysis Countermeasures,” appeared in Proc. of the 49th Design Automation Conference (DAC 2012), ACM, 2012, has been awarded for the most significant papers based on novelty and long-term impact from IEEE/ACM conferences and journals in the broad area of Hardware and Embedded Security during the six-year period: 2012-2017.
Presentations to the 2018 Top Picks in Hardware and Embedded Security Workshop, co-located with IEEE/ACM ICCAD 2018 Conference, San Diego, CA, USA on November 8th, 2018, were selected from papers appeared in leading hardware and embedded security conferences and journals including but not limited to DAC, DATE, ICCAD, HOST, CHES, ETS, VTS, ITC, IEEE S&P, Euro S&P, Usenix Security, ASIA CCS, NDSS, ISCA, MICRO, ASPLOS, HPCA, ACSAC and ACM CCS during the six-year period: 2012-2017.

HiPEAC Paper Award (2018)
European Network of Excellence on High Performance and Embedded Architecture and Compilation
Alessandro Barenghi and Gerardo Pelosi, Side-channel security of superscalar CPUs: Evaluating the Impact of Microarchitectural Features, in Proceedings of the 55th Design Automation Conference (DAC 2018). ACM 2018, 6 pages (ISBN: 978-1-4503-5700-5/18/06).

HiPEAC Paper Award (2015)
European Network of Excellence on High Performance and Embedded Architecture and Compilation
Gerardo Pelosi, Giovanni Agosta, Alessandro Barenghi, Michele Scandale, nformation Leakage Chaff: Feeding Red Herrings to Side Channel Attackers, in Proceedings of the 52nd Design Automation Conference (DAC 2015). ACM 2015, pp. 33:1-33:6 (ISBN: 978-1-4503-3520-1/15/06).

Best Paper Award (SIN 2014)
Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi and Michele Scandale, Differential Fault Analysis for Block Ciphers: an Automated Conservative Analysis, In Proceedinds of the Int.l Conf. on Security of Information and Networks (SIN '14). ACM 2014, pp. 171:1-171:8, (ISBN: 978-1-4503-3033-6/14/09)

HiPEAC Paper Award (2014)
European Network of Excellence on High Performance and Embedded Architecture and Compilation
Gerardo Pelosi, Giovanni Agosta, Alessandro Barenghi, Michele Scandale, A Multiple Equivalent Execution Trace Approach to Secure Cryptographic Embedded Software, in Proceedings of the 51st Design Automation Conference (DAC 2014). ACM 2014, pp.210:1-210:6 (ISBN: 978-1-4503-2730-5).

HiPEAC Paper Award (2013)
European Network of Excellence on High Performance and Embedded Architecture and Compilation
Gerardo Pelosi, Giovanni Agosta, Alessandro Barenghi, Massimo Maggi, Compiler-based Side Channel Vulnerability Analysis and Optimized Countermeasures Application, in Proceedings of the 50th Design Automation Conference (DAC 2013). ACM 2013, pp. 81:1-81:6 (ISBN: 978-1-4503-2071-9).

HiPEAC Paper Award (2012)
European Network of Excellence on High Performance and Embedded Architecture and Compilation
Gerardo Pelosi, Giovanni Agosta and Alessandro Barenghi, A Code Morphing Methodology to Automate Power Analysis Countermeasures, in Proceedings of the 49th Design Automation Conference (DAC 2012).
ACM 2012 , pp. 77-82, (ISBN 978-1-4503-1199-1).


Disclaimer

The material on this website is provided to ensure timely dissemination of scholarly and technical work on a non-commercial basis. Copyright and all rights therein are retained by the authors or by other copyright holders.
Papers where the copyright is not held by the authors are distributed here as “author's versions” in compliance with the respective copyright transfer agreement of the current copyright holder. It is understood that all persons copying this material will adhere to the terms and constraints invoked by each author's or publisher's copyright.
The copyright laws of most countries have “fair-use” clauses, which explicitly permit personal use of copyrighted material for teaching or research purposes. However, reprinting or republication of this material for commercial purposes requires a permission from the corresponding copyright holder (ACM, IEEE, Elsevier, EDAA, IFIP, Springer-Verlag, SciTePress, IACR, IOS Press, IGI Global, Inderscience Publishers, Academy Publisher).

Please note that the publisher is not always identical to the copyright holder. Refer to the copyright note of each publication for the copyright holder and details on the permitted usage of the “author's copies” provided on this page.

Material published by ACM can also be obtained from the ACM Digital Library
Material published by IEEE can also be obtained from IEEE Xplore
Material published by Elsevier can also be obtained from ScienceDirect
Material published by Springer-Verlag can also be obtained from SpringerLink
Material published by SciTePress can also be obtained from SciTePress DL
Material published by IOS Press can also be obtained from the IOS Press website
Material published by InderScience Publishers can also be obtained from the InderScience website
Material published by Academy Publisher can also be obtained from the Academy Publisher website
Material published by IGI Global publishing company can also be obtained from the IGI Global website

International Association for Cryptologic Research (IACR) IACR CryptoDB
European Design and Automation Association (EDAA) EDAA website
International Federation for Information Processing (IFIP) IFIP website


Refereed International Journals

[JR.31]
Francesco Antognazza, Alessandro Barenghi, and Gerardo Pelosi, and Ruggero Susella. Performance and Efficiency Exploration of Hardware Polynomial Multipliers for Post-Quantum Lattice-based Cryptosystems. Springer Nature (SN) Computer Science Journal, 5(212), January 2024. ISSN:2662-995X, EISSN:2661-8907. (doi:10.1007/s42979-023-02547-w)
[JR.30]
Simone Perriello, Alessandro Barenghi, and Gerardo Pelosi. Improving the Efficiency of Quantum Circuits for Information Set Decoding. ACM Transactions on Quantum Computing (TQC), 4(4), December 2023. ISSN:2643-6809, EISSN:2643-6817. (doi:10.1145/3607256)
[JR.29]
Alessandro Barenghi, Gioele Falcetti, and Gerardo Pelosi. Locating Side Channel Leakage in Time through Matched Filters. Cryptography, 6(2), May 2022. ISSN 2410-387X.(doi:10.3390/cryptography6020026)
[JR.28]
Alessandro Barenghi, Diego Carrera, Silvia Mella, Andrea Pace, Gerardo Pelosi, and Ruggero Susella. Profiled Side Channel Attacks against the RSA Cryptosystem using Neural Networks. Journal of Information Security and Applications (JISA), 66, May 2022. ISSN: 2214-2134. E-ISSN: 2214-2126. (doi:10.1016/j.jisa.2022.103122)
[JR.27]
Nicholas Mainardi, Alessandro Barenghi, and Gerardo Pelosi. Privacy-aware Character Pattern Matching over Outsourced Encrypted Data. Digital Threats: Research and Practice (DTRAP), 3(1):1–38, March 2022. ISSN: 2692-1626. EISSN: 2576-5337. (doi:10.1145/3462333)
[JR.26]
Alessandro Barenghi, Luca Oddone Breveglieri, Niccolò Izzo, and Gerardo Pelosi. Exploring Cortex-M Microarchitectural Side Channel Information Leakage. IEEE Access, 9:156507–156527, November 2021. Print ISSN: 2169-3536. Online ISSN: 2169-3536. (doi:10.1109/ACCESS.2021.3124761)
[JR.25]
Francesco Antognazza, Alessandro Barenghi, and Gerardo Pelosi. Metis: An Integrated Morphing Engine CPU to Protect Against Side Channel Attacks. IEEE Access, 9:69210–69225, May 2021. Electronic ISSN: 2169-3536. (doi:10.1109/ACCESS.2021.3077977)
[JR.24]
Alessandro Barenghi, William Fornaciari, Gerardo Pelosi, and Davide Zoni. Scramble Suit: A Profile Differentiation Countermeasure to Prevent Template Attacks. IEEE Transaction on Computer-Aided Design of Integrated Circuits and Systems (TCAD), 39(9):1778-1791, September 2020. ISSN: 0278-0070 (Print), 1937-4151 (Online). (DOI:10.1109/TCAD.2019.2926389)
[JR.23]
Giovanni Agosta, Alessandro Barenghi, and Gerardo Pelosi. Compiler-based Techniques to Secure Cryptographic Embedded Software against Side Channel Attacks. IEEE Transaction on Computer-Aided Design of Integrated Circuits and Systems (TCAD), 39(8):1550–1554, August 2020. ISSN: 0278-0070 (Print), 1937-4151 (Online). (doi:10.1109/TCAD.2019.2912924)
[JR.22]
Nicholas Mainardi, Alessandro Barenghi, and Gerardo Pelosi. Plaintext Recovery Attacks against Linearly Decryptable Fully Homomorphic Encryption Schemes. Computers & Security Journal (CoSe), Volume 87, 17 pages, November 2019. ISSN: 0167-4048 (Print). (doi:10.1016/j.cose.2019.101587)
[JR.21]
Marco Baldi, Alessandro Barenghi, Franco Chiaraluce, Gerardo Pelosi, and Paolo Santini. A Finite Regime Analysis of Information Set Decoding Algorithms. Algorithms journal. Special Issue "Coding Theory and Its Application", G. Liva, A. Graell i Amat, A. Wachter-Zeh (editors). Open Access., Vol. 12, issue 10, 209, pages 1-35, October 2019. ISSN: 1999-4893 (Print). (doi: 10.3390/a12100209)
[JR.20]
Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, and Michele Scandale. Reactive Side-channel Countermeasures: Applicability and Quantitative Security Evaluation. Microprocessors and Microsystems Journal (MicPro), Volume 62 (October 2018), pages 50-60. ISSN: 0141-9331 (Print). (doi:10.1016/j.micpro.2018.07.001) [Available on line July 29th, 2018 -- share link ]
[JR.19]
Davide Zoni, Alessandro Barenghi, Gerardo Pelosi, and William Fornaciari. A Comprehensive Side Channel Information Leakage Analysis of an In-order RISC CPU Microarchitecture. Transactions on Design Automation of Electronic Systems (TODAES), vol. 23, issue 5, Article 57 (August 2018).
ISSN: 1084-4309 (Print), 1557-7309 (Online). (doi:10.1145/3212719)
[JR.18]
Alessandro Barenghi, Nicholas Mainardi, and Gerardo Pelosi. Systematic Parsing of X.509: Eradicating Security Issues with a Parse Tree. Journal of Computer Security, 26(6):817-849, October 30th, 2018. ISSN: 0926-227X (Print), 1875-8924 (Online). ( doi:10.3233/JCS-171110) author camera ready copy
[JR.17]
Sabrina De Capitani Di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, and Pierangela Samarati. Enforcing Authorizations while Protecting Access Confidentiality. Journal of Computer Security, 26(2):143–175, January 2018. ISSN: 0926-227X (Print), 1875-8924 (Online). (doi:10.3233/JCS-171004)
[JR.16]
A. Oleksiaka, M. Kierzynkaa, G. Agosta, A. Barenghi, C. Brandolese, W. Fornaciari, Gerardo Pelosi, and et. al. M2DC – Modular Microserver DataCentre with Heterogeneous Hardware. Microprocessors and Microsystems Journal (MicPro), 52:117–130, July 2017. ISSN: 0141-9331 (Print). (doi:10.1016/j.micpro.2017.05.019)
[JR.15]
Alessandro Barenghi, Michele Beretta, Alessandro Di Federico, and Gerardo Pelosi. A privacy-preserving encrypted OSN with stateless server interaction: the Snake design. Computers & Security Journal (CoSe). Volume 63, pages 67-84, November 2016. ISSN: 0167-4048 (Print). (DOI:10.1016/j.cose.2016.09.005)
[JR.14]
Alessandro Barenghi, Guido M.Bertoni, Luca Breveglieri, Gerardo Pelosi, Stefano Sanfilippo, and Ruggero Susella. A Fault-based Secret Key Retrieval Method for ECDSA: Analysis and Countermeasure. ACM Journal on Emerging Technologies in Computing Systems (JETC), 13(1):1–26, April 2016.
ISSN: 1550-4832 (Print) 1550-4840 (Online). (DOI: 10.1145/2767132)
[JR.13]
Sabrina De Capitani Di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, and Pierangela Samarati. Three-server Swapping for Access Confidentiality. IEEE Transactions on Cloud Computing (TCC), 6(2):492–505, June 2018. ISSN: 2168-7161 (Print). (DOI:10.1109/TCC.2015.2449993)
[JR.12]
Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, and Michele Scandale. The MEET Approach: Securing Cryptographic Embedded Software against Side Channel Attacks. IEEE Transaction on Computer-Aided Design of Integrated Circuits and Systems (TCAD), 34(8):1320-1333, August 2015. IEEE. ISSN: 0278-0070 (Print).
(DOI: 10.1109/TCAD.2015.2430320)
[JR.11]
Sabrina De Capitani Di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, and Pierangela Samarati. Shuffle Index: Efficient and Private Access to Outsourced Data. ACM Transactions on Storage (TOS), 11(4):1–54, October 2015. ISSN: 1553-3077/2015 (Print). (DOI: 10.1145/2747878)
[JR.10]
Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, and Michele Scandale. Trace-based Schedulability Analysis to Enhance Passive Side-Channel Attack Resilience of Embedded Software. Information Processing Letters, 115(2):292–297, February 2015. Elsevier. ISSN: 0020-0190 (Print). (DOI: 10.1016/j.ipl.2014.09.030)
[JR.9]
Giovanni Agosta, Alessandro Barenghi, Massimo Maggi, and Gerardo Pelosi. Design Space Extension for Secure Implementation of Block Ciphers. IET Computers & Digital Techniques – Special issue: Hardware Security, Vol. 8, Issue 6, November 2014, pp. 256–263, 2014. ISSN: 1751-8601 (Print), 1751-861X (Online).
(DOI: 10.1049/iet-cdt.2014.0037)
[JR.8]
Giovanni Agosta, Alessandro Barenghi, Alessandro Di Federico, and Gerardo Pelosi. OpenCL Performance Portability for General-purpose Computation on Graphics Processor Units: an Exploration on Cryptographic Primitives. Concurrency and Computation: Practice and Experience, 27(14):3633-3360, September 2015 (Published Online 29 Aug. 2014). ISSN: 1532-0626 (Print), 1532-0634 (Online). (DOI:10.1002/cpe.3358)
[JR.7]
Alessandro Barenghi, Gerardo Pelosi, and Federico Terraneo. Secure and Efficient Design of Block Cipher Implementations on Microcontrollers. International Journal of Grid and Utility Computing, 4(2/3):110–118, September 2013. ISSN: 1741-847X (Print), 1741-8488 (Online). (DOI: 10.1504/IJGUC.2013.056246)
[JR.6]
Alessandro Barenghi, Guido M. Bertoni, Luca Breveglieri, and Gerardo Pelosi. A Fault Induction Technique Based on Voltage Underfeeding with Application to Attacks against AES and RSA. Journal of Systems and Software, 86(7):1864–1878, July 2013. ISSN: 0164-1212. (DOI: 10.1016/j.jss.2013. 02.021)
[JR.5]
Sabrina De Capitani Di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, and Pierangela Samarati. Supporting Concurrency and Multiple Indexes in Private Access to Outsourced Data. Journal of Computer Security, 21(3):425–461, July 2013. ISSN: 0926-227X (Print), 1875-8924 (Online). (DOI: 10.3233/JCS-130468)
[JR.4]
Giovanni Agosta, Francesco Bruschi, Gerardo Pelosi, and Donatella Sciuto. A Transform-Parametric Approach to Boolean Matching. IEEE Trans. on CAD of Integrated Circuits and Systems, 28(6):805–817, June 2009.
ISSN: 0278-0070. (DOI: 10.1109/TCAD.2009.2016547)
[JR.3]
Guido Bertoni, Luca Breveglieri, Liqun Chen, Pasqualina Fragneto, Keith A. Harrison, and Gerardo Pelosi. A Pairing SW Implementation for Smart-Cards. Journal of Systems and Software, 81(7):1240–1247, July 2008.
ISSN: 0164-1212. (DOI: 10.1016/j.jss.2007.09.022)
[JR.2]
Guido M. Bertoni, Luca Breveglieri, Pasqualina Fragneto, and Gerardo Pelosi. Parallel Hardware Architectures for the Cryptographic Tate Pairing. International Journal of Network Security, 7(1):31–37, July 2008. ISSN: 1816-353X (Print), 1816-3548 (Online).
[JR.1]
Giovanni Agosta, Luca Breveglieri, Gerardo Pelosi, and Martino Sykora. Programming Highly Parallel Reconfigurable Architectures for Symmetric and Asymmetric Cryptographic Applications. Journal of Computers, 2(9):50–59, September 2007. ISSN: 1796-203X. (DOI: 10.4304/jcp.2.9.50-59 )

Editorial Contributions

[EC.6]
Giovanni Agosta, Alessandro Barenghi, Israel Koren, Gerardo Pelosi (Editors). Proceedings of the 6th HiPEAC Workshop on Cryptography and Security in Computing Systems (CS2 '19), Valencia, Spain. January 21th, 2019. ACM New York, NY, USA. 2018. ISBN: 978-1-4503-xxxx-x.
[EC.5]
Giovanni Agosta, Alessandro Barenghi, Israel Koren, Gerardo Pelosi (Editors). Proceedings of the 5th HiPEAC Workshop on Cryptography and Security in Computing Systems (CS2 '18), Manchester, United Kingdom, January 22-24, 2018. ACM New York, NY, USA. 2018. ISBN: 978-1-4503-6374-7.
[EC.4]
Gerardo Pelosi, Giovanni Agosta, Alessandro Barenghi (Editors). Proceedings of the 4th HiPEAC Workshop on Cryptography and Security in Computing Systems (CS2 '17). Stockholm, Sweden, 24th January 2016. ACM New York, NY, USA. 2017. ISBN: 978-1-4503-4869-0.
[EC.3]
Gerardo Pelosi, Israel Koren, Giovanni Agosta, Alessandro Barenghi (Editors). Proceedings of the 3rd HiPEAC Workshop on Cryptography and Security in Computing Systems (CS2 '16). Prague, Czech Republic, 20th January 2016. ACM New York, NY, USA. 2016.
ISBN: 978-1-4503-4065-6.
[EC.2]
Gerardo Pelosi, Israel Koren, Giovanni Agosta, Alessandro Barenghi (Editors). Proceedings of the 2nd HiPEAC Workshop on Cryptography and Security in Computing Systems (CS2 '15). Amsterdam, The Netherlands, 19th January 2015. ACM New York, NY, USA. 2015.
ISBN: 978-1-4503-3187-6.
[EC.1]
Israel Koren and Gerardo Pelosi (Editors). Proceedings of the HiPEAC Workshop on Cryptography and Security in Computing Systems (CS2 '14). Vienna, Austria, January 20, 2014. ACM New York, NY, USA. 2014.
ISBN 978-1-4503-2484-7.

Refereed Book Contributions

[IB12]
Marco Baldi, Alessandro Barenghi, Franco Chiaraluce, Gerardo Pelosi, and Paolo Santini. Analysis of In-Place Randomized Bit-Flipping Decoders for the Design of LDPC and MDPC Code-based Cryptosystems. In Mohammad S. Obaidat and Jalel Ben-Othman, editors, In E-Business and Telecommunications - 17th International Conference, ICETE 2020, Online Event, July 8–10, 2020, Revised Selected Papers. Series: Communications in Computer and Information Science (CCIS), Volume 1484, 2021., volume 1484. Springer International Publishing, Switzerland, October 2021. Print ISBN: 978-3-030-90427-2, Online ISBN: 978-3-030-90428-9. Series Print ISSN: 1865-0929, Series Online ISSN: 1865-0937. (doi:10.1007/978-3-030-90428-9_7)
[IB.11]
Ariel Oleksiak, Michal Kierzynka, Wojciech Piatek, Micha vor dem Berge, Wolfgang Christmann, Stefan Krupop, Mario Porrmann, Jens Hagemeyer, René Griessl, Meysam Peykanu, Lennart Tigges, Sven Rosinger, Daniel Schlitt, Christian Pieper, Udo Janssen, Holm Rauchfuss, Giovanni Agosta, Alessandro Barenghi, Carlo Brandolese, William Fornaciari, Gerardo Pelosi, Joao Pita Costa, Mariano Cecowski, Robert Plestenjak, Justin Cinkelj, Loïc Cudennec, Thierry Goubier, Jean-Marc Philippe, Chris Adeniyi-Jones, Javier Setoain, and Luca Ceva. M2DC - A Novel Heterogeneous Hyperscale Microserver Platform. In Christoforos Kachris, Babak Falsafi, and Dimitrios Soudris, editors, Hardware Accelerators in Data Centers, pages 109–128. Springer, Cham, 2019 (First online: 22 August 2018). ISBN: 978-3-319-92791-6 (Print) 978-3-319-92792-3 (Online).
(doi:10.1007/978-3-319-92792-3_6)
[IB.10]
Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, and Pierangela Samarati. Access Privacy in the Cloud. In Indrakshi Ray, Indrajit Ray, and Pierangela Samarati, editors, From Database to Cyber Security, Lecture Notes in Computer Science, vol. 11170. Also part of the Security and Cryptology book sub series., pages 186–205. Springer International Publishing, Switzerland, November 2018. ISBN: 978-3-030-04833-4 (Print); 978-3-030-04834-1 (Online). Series Print ISSN 0302-9743. Series Online ISSN 1611-3349. (doi:10.1007/978-3-030-04834-1_10)
[IB.9]
Giovanni Agosta, Alessandro Barenghi, Tomasz Ciesielczyk, Rahul Dutta, William Fornaciari, Thierry Goubier, Jens Hagemeyer, Lars Kosmann, Nicholas Mainardi, Ariel Oleksiak, Gerardo Pelosi, Wojciech Piatek, Christian Pieper, Mario Porrmann, Daniel Schlitt, and Michele Zanella. The M2DC Approach towards Resource-efficient Computing. In Alessandra Bagnato, Ricardo Couceiro, Juliana Monteiro, Dijana Petrovska-Delacrétaz, Arminda Lopes, and Élvio Gouveia, editors, Opportunities and Challenges for European Projects, pages 150–176. ScitePress, January 2017. ISBN: 978-989-758-361-2. (doi:10.5220/000886260150017)
[IB.8]
Alessandro Barenghi, Luca Breveglieri, Mariagrazia Fugini, and Gerardo Pelosi. Computer Security Anchors in Smart Grids: The Smart Metering Scenario and Challenges. In Bernard Candaele, Dimitrios Soudris, and Iraklis Anagnostopoulos, editors, Trusted Computing for Embedded Systems, pages 47–59. Springer International Publishing, Switzerland, January 2015. ISBN: 978-3-319-09419-9 (Print) 978-3-319-09420-5 (Online).
(DOI: 101007/978-3-319-09420-5_3)
[IB.7]
Alessandro Barenghi, Luca Breveglieri, Andrea Palomba, and Gerardo Pelosi. Fault Sensitivity Analysis at Design Time. In Bernard Candaele, Dimitrios Soudris, and Iraklis Anagnostopoulos, editors, Trusted Computing for Embedded Systems, pages 175–186. Springer International Publishing, Switzerland, January 2015.
ISBN: 978-3-319-09419-9 (Print) 978-3-319-09420-5 (Online). (DOI: 101007/978-3-319-09420-5_9)
[IB.6]
Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, and Michele Scandale. Symmetric Key Encryption Acceleration on Heterogeneous Many- Core Architectures. In Saiful Azad and Al-Sakib Khan Pathan, editors, Practical Cryptography: Algorithms and Implementations using C++, pages 251–297. CRC Press, Taylor & Francis Group, Boca Raton, Florida, USA, December 2014. ISBN: 978-1-4-822-28892 (Print)
( URL: http://www.crcpress.com/product/isbn/9781482228892# )
[IB.5]
Alessandro Barenghi, Luca Breveglieri, Fabrizio De Santis, Filippo Melzani, Andrea Palomba, and Gerardo Pelosi. Design Time Engineering of Side Channel Resistant Cipher Implementations. In Atilla Elçi, Josef Pieprzyk, Alexander G. Chefranov, Mehmet A. Orgun, Huaxiong Wang, and Rajan Shankaran, editors, Theory and Practice of Cryptography Solutions for Secure Information Systems, Advances in Information Security, Privacy, and Ethics (AISPE), pages 133–157. IGI Global, Hershey, PA, USA, February 2013. ISBN: 978-1-466-64030-6 (Print), 978-1-466-64031-3 (Online). (DOI:10.4018/978-1- 4666-4030-6.ch006)
[IB.4]
Alessandro Barenghi, Guido M. Bertoni, Luca Breveglieri, Mauro Pelliccioli, and Gerardo Pelosi. Injection Technologies for Fault Attacks on Microprocessors. In Marc Joye and Michael Tunstall, editors, Fault Analysis in Cryptography, Information Security and Cryptography, pages 275–293. Springer, Berlin, Heidelberg, November 2012. ISBN: 978-3-642-29655-0 (Print), 978-3-642-29656-7 (Online), ISSN: 1619-7100.
(DOI:10.1007/978-3-642- 29656-7_16)
[IB.3]
Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, and Pierangela Samarati. Selective Exchange of Confidential Data in the Outsourcing Scenario. In Jan Camenisch, Simone Fischer-Hübner, and Kai Rannenberg, editors, Privacy and Identity Management for Life, pages 181–198. Springer, Berlin, Heidelberg, October 2011. ISBN: 978-3-642-20316-9 (Print), 978-3-642-20317-6 (Online). (DOI:10.1007/978-3-642- 20317-6)
[IB.2]
Gerardo Pelosi. Secure Audit Logs. In Henk C. A. van Tilborg and Sushil Jajodia, editors, Encyclopedia of Cryptography and Security (2nd Ed.), pages 1097–1099. Springer, New York, NY, USA, January 2011. ISBN: 978-1-4419-5905-8 (Print), 978-1-4419-5906-5 (Online), 978-1-4419-5907-2 (Bundle).
(DOI:10.1007/978-1-4419- 5906-5)
[IB.1]
Gerardo Pelosi. Secure Index. In Henk C. A. van Tilborg and Sushil Jajodia, editors, Encyclopedia of Cryptography and Security (2nd Ed.), pages 1116–1119. Springer, New York, NY, USA, January 2011. ISBN: 978-1-4419-5905-8 (Print), 978-1-4419-5906-5 (Online), 978-1-4419-5907-2 (Bundle). (DOI:10.1007/978-1-4419- 5906-5)

Refereed International Conferences

[IC.83]
Francesco Antognazza, Alessandro Barenghi, Gerardo Pelosi, and Ruggero Susella. A High Efficiency Hardware Design for the Post-Quantum KEM HQC. In IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2024, Washington DC, USA, May 6–9, 2024, pages xxx–yyy. IEEE, May 2024. ISBN: 979-8-3503-xxxx-y. (doi:10.1109/HOSTyyxxx.2024)
[IC.82]
Francesco Antognazza, Alessandro Barenghi, Gerardo Pelosi, and Ruggero Susella. POSTER: A Versatile and Unified HQC Hardware Accelerator. In Lejla Batina and Christina Pöpper, editors, Proceedings of the 22nd International Conference on Applied Cryptography and Network Security (ACNS 2024), Abu Dhabi, UAE, March 5-8, 2024, volume xxYYY of Lecture Notes in Computer Science (LNCS), pages 1–16. Springer, March 2024. ISBN: 10.1007/978-3-031–XXYYY-Z (Print). 10.1007/978-3-031–XXYYY-Z (Online). Series Print ISSN: 0302-9743. Series Online ISSN: 1611-3349. (doi:10.1007/978-3-031–XXYYY-Z)
[IC.81]
Simone Perriello, Alessandro Barenghi, and Gerardo Pelosi. Quantum Circuit Design for the Lee-Brickell based Information Set Decoding. In ACNS Workshop on Advances in Asymmetric Cryptanalysis (AAC) - In Proceedings of the 22nd International Conference on Applied Cryptography and Network Security Workshops - ACNS 2024 Satellite Workshops, AAC, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, LLE, SCI, SiMLA, Abu Dhabi, UAE, March 5-8, 2024, volume xxYYY of Lecture Notes in Computer Science (LNCS), pages 1–16. Springer, March 2024. ISBN: 10.1007/978-3-031–XXYYY-Z (Print). 10.1007/978-3-031–XXYYY-Z (Online). Series Print ISSN: 0302-9743. Series Online ISSN: 1611-3349. (doi:10.1007/978-3-031–XXYYY-Z)
[IC.80]
Alessandro Barenghi, Paolo Cremonesi, and Gerardo Pelosi. Quantum Computing Research Lines in the Italian Center for Supercomputing. In Cristina Silvano, Christian Pilato, and Marc Reichenbach, editors, Proceedings of the 22nd International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation - SAMOS 2023, Samos, Greece, July 2-7, 2023, volume 14385 of Lecture Notes in Computer Science (LNCS), pages 1–16. Springer-Verlag, November 2023. ISBN: 978-3-031-46076-0 (Print). Series Print ISSN: 0302-9743. Series Online ISSN: 1611-3349. (doi:10.1007/978-3-031-46077-7_28)
[IC.79]
Isabella Piacentini, Alessandro Barenghi, and Gerardo Pelosi. A Non Profiled and Profiled Side Channel Attack Countermeasure through Computation Interleaving. In Proceedings of the 26th Euromicro Conference on Digital System Design, DSD 2023, Durres, Albania, September 6–8, 2023, pages 718–725. IEEE, September 2023. ISBN: 979-8-3503-4419-6, ISSN: 2771-2508. (doi:10.1109/DSD60849.2023.00103)
[IC.78]
Francesco Antognazza, Alessandro Barenghi, Gerardo Pelosi, and Ruggero Susella. An Efficient Unified Architecture for Polynomial Multiplications in Lattice-Based Cryptoschemes. In Proceedings of the 9th International Conference on Information Systems Security and Privacy, ICISSP 2023, Lisbon, Portugal, February 22-24, 2023. SciTePress, February 2023. ISBN: 978-989-758-624-8 ISSN: 2184-4356. (doi:10.5220/0011654200003405)
[IC.77]
Francesco Antognazza, Alessandro Barenghi, Gerardo Pelosi, and Ruggero Susella. A Flexible ASIC-oriented Design for a Full NTRU Accelerator. In Proceedings of the 28th Asia and South Pacific Design Automation Conference (ASPDAC '23), January 16–19, 2023, Tokyo, Japan. ACM, January 2023. ISBN: 978-1-4503-9783-4/23/01. (doi:10.1145/3566097.3567916)
[IC.76]
Marco Baldi, Alessandro Barenghi, Franco Chiaraluce, Gerardo Pelosi, and Paolo Santini. Performance bounds for QC-MDPC codes decoders. In Antonia Wachter-Zeh, Hannes Bartz, and Gialuigi Riva, editors, Proceedings of the International Workshop on Code-Based Cryptography (CBCrypto 2021), Munich, Germany, June 21–22, 2021, Revised Selected Papers, volume 13150 of Lecture Notes in Computer Science (LNCS), pages 95–122. Springer, March 2022. ISBN: 978-3-030-98364-2 (Print). 978-3-030-98365-9 (Online). Series Print ISSN: 0302-9743. Series Online ISSN: 1611-3349. (doi:10.1007/978-3-030-98365-9_6)
[IC.75]
Alessandro Barenghi, Diego Carrera, Silvia Mella, Andrea Pace, Gerardo Pelosi, and Ruggero Susella. Profiled Attacks against the Elliptic Curve Scalar Point Multiplication. In Min Yang, Chao Chen, and Yang Liu, editors, Proceedings Part II of the 17th EAI International Conference on Security and Privacy in Communication Networks - SecureComm 2021, Virtual event, September 6-9, 2021, volume 13041 of Lecture Notes in Computer Science (LNCS), pages 238–257. Springer, October 2021. ISBN: 978-3-030-92707-3 (Print) 978-3-030-92708-0 (Online), Series ISSN 0302-9743, Series E-ISSN 1611-3349.(doi:10.1007/978-3-030-92708-0_15)
[IC.74]
Simone Perriello, Alessandro Barenghi, and Gerardo Pelosi. A Complete Quantum Circuit to Solve the Information Set Decoding Problem. In Proceedings of the IEEE International Conference on Quantum Computing and Engineering, QCE 2021, Broomfield, CO, USA, October 18-22, 2021 (Fully virtual event), New York, NY, USA, October 2021. IEEE. Electronic ISBN:978-1-6654-1691-7. Print on Demand(PoD) ISBN:978-1-6654-1692-4. (doi:10.1109/QCE52317.2021.00056)
[IC.73]
Simone Perriello, Alessandro Barenghi, and Gerardo Pelosi. A Quantum Circuit to Speed-up the Cryptanalysis of Code-based Cryptosystems. In Joaquin Garcia-Alfaro, Radha Poovendran, Hervé Debar, and Moti Yung, editors, Proceedings Part II of the 17th EAI International Conference on Security and Privacy in Communication Networks - SecureComm 2021, Virtual event, September 6-9, 2021, volume 399 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST), pages 458–474. Springer, September 2021. Print ISBN: 978-3-030-90021-2. eBook ISBN: 978-3-030-90022-9. Series ISSN: 1867-8211. (doi:10.1007/978-3-030-90022-9_25)
[IC.72]
Alessandro Barenghi, Matteo Brevi, William Fornaciari, Gerardo Pelosi, and Davide Zoni. Integrating Side Channel Security in the FPGA Hardware Design Flow. In Guido Bertoni and Francesco Regazzoni, editors, Proceedings of the 11th International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE) 2020, Lugano, Switzerland, April 1–3, 2020. Revised Selected Papers, volume 12244 of Lecture Notes in Computer Science, pages 275–290. Springer, April 2021. ISBN 978-3-030-68772-4 (Print) 978-3-030-68773-1 (Online) Series Print ISSN: 0302-9743. Series Online ISSN: 1611-3349. (doi:10.1007/978-3-030-68773-1)
[IC.71]
Nicholas Mainardi, Davide Sampietro, Alessandro Barenghi, and Gerardo Pelosi. Efficient Oblivious Substring Search via Architectural Support. In Kevin Butler, Danfeng (Daphne) Yao, and Heng Yin, editors, Proceedings of the 36th Annual Computer Security Applications Conference (ACSAC 2020), Austin, Texas, USA. December 07-11, 2020, New York, NY, USA, December 2020. ACM. ISBN (Print): 978-1-4503-8858-0/20/12.
(DOI: 10.1145/3427228.3427296).
[IC.70]
Marco Baldi, Alessandro Barenghi, Franco Chiaraluce, Gerardo Pelosi, and Paolo Santini. A failure rate model of bit-flipping decoders for qc-ldpc and qc-mdpc code-based cryptosystems. In S. De Vimercati and P. Samarati, editors, Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, ICETE 2020 - Volume 2: SECRYPT, Lieusaint - Paris, France, July 8-10, 2020, pages 238-249, Avenida de S. Francisco Xavier, Lote 7 Cv. C, 2900-616 Setúbal, Portugal, July 2020. SciTePress. ISBN: 978-989-758-446-6.
(DOI: 10.5220/0009891702380249) Best paper Award
[IC.69]
Alessandro Barenghi and Gerardo Pelosi. A comprehensive analysis of constant time polynomial inversion for post-quantum cryptosystems. In M. Palesi, G. Palermo, C. Graves, and E. Arima, editors, Proceedings of the 17th ACM International Conference on Computing Frontiers (CF'20), Catania, Sicily, Italy, May 11 - 13, 2020, pages 1-8, New York, NY, USA, May 2020. ACM. ISBN: 978-1-4503-7956-4/20/05. (doi:10.1145/3387902.3397224)
[IC.68]
Alessandro Barenghi and Gerardo Pelosi. Constant weight strings in constant time: a building block for code-based post-quantum cryptosystems. In M. Palesi, G. Palermo, C. Graves, and E. Arima, editors, Proceedings of the 17th ACM International Conference on Computing Frontiers (CF'20), Catania, Sicily, Italy, May 11 - 13, 2020, pages 1-8, New York, NY, USA, May 2020. ACM. ISBN: 978-1-4503-7956-4/20/05. The related software implementation is permanently available at https://doi.org/10.5281/zenodo.3747545 and received the ACM Artifact Evaluated badges: Functional, Reusable, Available and Result Reproduced. (doi:10.1145/3387902.3392630)
[IC.67]
Nicholas Mainardi, Alessandro Barenghi, and Gerardo Pelosi. Privacy Preserving Substring Search Protocol with Polylogarithmic Communication Cost. In David Balenson, Guofei Gu, and Danfeng (Daphne) Yao, editors, Proceedings of the the 35th Annual Computer Security Applications Conference (ACSAC 2019), San Juan, Puerto Rico, USA. December 9-13, 2019. New York, NY, USA, December 2019. ACM.
ISBN (Print): 978-1-4503-7628-0/19/12. (DOI:10.1145/3359789.3359842)
The related software implementation is permanently available at DOI:10.5281/zenodo.3384814 and received the ACM Artifact Evaluated badge at the reusable level.
[IC.66]
Alessandro Barenghi, William Fornaciari, Andrea Galimberti, Gerardo Pelosi, and Davide Zoni. Evaluating the trade-offs in the hardware design of the LEDAcrypt encryption functions. In Danilo De Marchi, Teresa Serrano Gotarredona,and Roland Thewes, editors, Proceedings of the 26th IEEE International Conference on Electronics, Circuits and Systems, ICECS 2019, Genova, Italy, November 27-29, 2019., New York, NY, USA, November 2019. IEEE. ISBN (Print on Demand): 978-1-7281-0996-1. ISBN: 978-1-7281-0997-8 (doi:10.1109/ICECS46596.2019.8964882)
[IC.65]
Marco Baldi, Alessandro Barenghi, Franco Chiaraluce, Gerardo Pelosi, and Paolo Santini. LEDAcrypt: QC-LDPC code-based cryptosystems with bounded decryption failure rate. In Marco Baldi, Edoardo Persichetti, and Paolo Santini, editors, Proceedings of the 7th Code-Based Cryptography Workshop (CBC 2019), Darmstadt, Germany. May 18-19, 2019, volume 11666 of Lecture Notes in Computer Science, pages 11–43. Springer-Verlag, May 2019. ISBN (Print): 978-3-030-25921-1. ISBN (Online): 978-3-030-25922-8. Series Print ISSN: 0302-9743. Series Online ISSN: 1611-3349. (doi:10.1007/978-3-030-25922-8_2)
[IC.64]
Niccolò Izzo, Alessandro Barenghi, Luca Breveglieri, Gerardo Pelosi, and Paolo Amato. A Secure and Authenticated Host to Memory Communication Interface. In Francesca Palumbo, Michela Becchi, Martin Schulz, and Kento Sato, editors, Proceedings of the 16th ACM International Conference on Computing Frontiers (CF'19), Alghero, Sardinia, Italy, April 30 - May 2, 2019, pages 1–6, New York, NY, USA, May 2019. ACM. ISBN: 978-1-4503-6685-4/19/05 (Print). (doi:10.1145/3310273.3323401)
[IC.63]
Alessandro Barenghi, Nicholas Mainardi, and Gerardo Pelosi. Comparison-based Attacks against Noise-free Fully Homomorphic Encryption Schemes. In David Naccache, Shouhuai Xu, Sihan Qing, Pierangela Samarati, Gregory Blanc and Rongxing Lu, editors, Proceedings of the 20th International Conference on Information and Communications Security, ICICS 2018, October 29-31, 2018. Lille, France, volume 11149 of Lecture Notes in Computer Science, pages 117--191, Springer, Cham 2018. ISBN: 978-3-030-01949-5 (Print), 978-3-030-01950-1 (Online). Copyright: Springer Nature Switzerland AG 2018. Also part of the Security and Cryptology book sub series. Series Print ISSN: 0302-9743. Series Online ISSN: 1611-3349 (doi:10.1007/978-3-030-01950-1_11)
[IC.62]
Alessandro Barenghi, Luca Breveglieri, Niccolò Izzo, and Gerardo Pelosi. Software-only Reverse Engineering of Physical DRAM Mappings for Rowhammer Attacks. In Magdy S. Abadir, Ilia Polian, Sohrab Aftabjahani, and Yier Jin, editors, Proccedings of the 2018 IEEE 3rd International Verification and Security Workshop (IVSW), July 2-4, 2018, Platja d’Aro, Costa Brava, Spain, pages 19–24, New York, NY, USA, October 2018. IEEE. ISBN: 978-1-5386-6544-2. Print on Demand(PoD) ISBN: 978-1-5386-6545-9. Part Number: CFP18G73-ART. (doi:10.1109/IVSW.2018.8494868)
[IC.61]
Alessandro Barenghi, Michele Madaschi, Nicholas Mainardi, and Gerardo Pelosi. OpenCL HLS Based Design of FPGA Accelerators for Cryptographic Primitives. In Stephen Jarvis, Bahman Javadi, and Song Guo, editors, Proceedings of the International Conference on High Performance Computing & Simulation (HPCS 2018), July 16-20, 2018. Orléans, France., pages 634-641, New York, NY, USA, July 2018. IEEE 2018.
ISBN: 978-1-5386-7878-7. (doi: 10.1109/HPCS.2018.00105)
[IC.60]
[IC.59]
Marco Baldi, Alessandro Barenghi, Franco Chiaraluce, Gerardo Pelosi, and Paolo Santini. LEDAkem: a post-quantum key encapsulation mechanism based on QC-LDPC codes. In Tanja Lange and Rainer Steinwandt, editors, Proceedings of The Ninth International Conference on Post-Quantum Cryptography (PQCrypto 2018), Fort Lauderdale, Florida, April 9-11, 2018, volume 10786 of Lecture Notes in Computer Science, also part of the Security and Cryptology subseries, pages 1-22. Springer International Publishing AG, part of Springer Nature, April 2018. Print ISBN 978-3-319-79062-6, Series Print ISSN 0302-9743. Series Online ISSN 1611-3349 (doi:10.1007/978-3-319-79063-3_1)
[IC.58]
Alessandro Barenghi, Gerardo Pelosi, and Nicholas Mainardi. A Security Audit of the OpenPGP Format. In Richard Hill, Indrajit Ray, Xiaofei Liao, Zhen Liu, Stephen Jarvis, Lei Liu, Bahman Javadi, and Song Guo, editors, Proceedings of the 11th International Conference on Frontier of Computer Science and Technology (FCST-2017), Exeter, England, UK, 21-23 June 2017, pages 336-343, New York, NY, USA, June 2017. IEEE Computer Society. ISBN: 978-1-5386-0840-1.ISSN: 2375-527X. (doi:10.1109/ISPAN-FCST-ISCC.2017.35)
[IC.57]
Alessandro Barenghi, Nicholas Mainardi, and Gerardo Pelosi. A Novel Regular Format for X.509 Digital Certificates. In Shahram Latifi, editor, Proceedings of the 14th International Conference on Information Technology: New Generations (ITNG 2017), April 10-12, 2017, Las Vegas, Nevada, USA, volume 558 of Advances in Intelligent Systems and Computing, pages 135–141. Springer International Publishing, April 2017. ISBN 978-3-319-54977-4 (Print), ISBN 978-3-319-54978-1 (eBook), series ISSN 2194-5357, ISSN 2194-5365 (electronic). (doi:10.1007/978-3-319-54978-1_18)
[IC.56]
Alessandro Barenghi and Gerardo Pelosi. An Enhanced Dataflow Analysis to Automatically Tailor Side Channel Attack Countermeasures to Software Block Ciphers. In Alessandro Armando, Roberto Baldoni, and Riccardo Focardi, editors, Proceedings of the Italian Conference on Cyber Security (ITA-SEC 2017), 17-20 January 2017, Venice, Italy. CEUR Workshop Proceedings, Vol-1816, pages 8–18, ISSN 1613-0073.
(http://ceur-ws.org/Vol-1816)
[IC.55]
Sabrina De Capitani Di Vimercati, Sara Foresti, Riccardo Moretti, Stefano Paraboschi, Gerardo Pelosi, and Pierangela Samarati. A dynamic tree-based data structure for access privacy. In Grégoire Danoy and Sathish Gopalakrishnan, editors, Proceedings of the 8th IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2016), 12-15 December 2016, Luxembourg City, Grand Duchy of Luxembourg, pages 187:1-187:8, New York, NY, USA, January 2017. IEEE. ISBN: 978-1-5090-1446-0 (Print on Demand), 978-1-5090-1445-3 (Electronic). ISSN: 2330-2186 (Electronic). (doi:10.1109/CloudCom.2016.0068)
[IC.54]
Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, and Michele Scandale. Encasing Block Ciphers to Foil Key Recovery Attempts via Side Channel. In Frank Liu, editor, Proceedings of the IEEE/ACM International Conference on Computer-Aided Design, ICCAD 2016, Austin, TX, USA, November 7–10, 2016, article No. 96, New York, NY, USA, November 2016. ACM. ISBN: 978-1-4503-4466-1/16/11. (doi:10.1145/2966986.2967033)
[IC.53]
Alessandro Barenghi and Gerardo Pelosi. A Note on Fault Attacks against Deterministic Signature Schemes. In Kazuto Ogawa and Katsunari Yoshioka, editors, Proceedings of the 11th International Workshop on Security - Advances in Information and Computer Security (IWSEC 2016), Akihabara-Ochanomizu District, Tokyo, Japan, September 12–14, 2016, volume 9836 of Lecture Notes in Computer Science, pages 182–192. Springer International Publishing, September 2016. ISBN: 978-3–319-44523-6 (Print) 978-3-319-44524-3 (Online), ISSN: 0302-9743. (doi:10.1007/978-3-319-44524-3_11)
[IC.52]
Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, and Pierangela Samarati. Access Control for the Shuffle Index. In Silvio Ranise and Vipin Swarup, editors, 30th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2016), Trento, Italy, July 18-21, 2016, volume 9766 of Lecture Notes in Computer Science, pages 130-147. Springer International Publishing, July 2016. ISBN: 978-3-319-41482-9 (Print) 978-3-319-41483-6 (Online). Series ISSN: 0302-9743 (doi:10.1007/978-3-319-41483-6_10)
[IC.51]
Giovanni Agosta, Alessandro Barenghi, Carlo Brandolese, William Fornaciari, and Gerardo Pelosi et. al.
V2I Cooperation for Traffic Management with SafeCOP. In George A. Papadopoulos, Paris Kitsos, and Odysseas Koufopavlou, editors, 19th Euromicro Conference on Digital System Design, August 31 - September 2, 2016. Limassol, Cyprus, pages 621-628, Los Alamitos, CA, USA, September 2016. IEEE Computer Society.
ISBN: 978-1-5090-2817-7/16 (Print). (doi:10.1109/DSD.2016.18)
[IC.50]
Giovanni Agosta, Alessandro Barenghi, and Gerardo Pelosi. Automated Instantiation of Side-Channel Attacks Countermeasures for Software Cipher Implementations. In Gianluca Palermo, John Feo, editors, Proceedings of the 13th ACM International Conference on Computing Frontiers, (CF'16), Como, Italy, May 16-19, 2016, pages 455–460, New York, NY, USA, May 2016. ACM. ISBN: 978-1-4503-4128-8/16/05 (Print).
(DOI: 10.1145/2903150.2911707)
[IC.49]
Giovanni Agosta, Alessio Antonini, Alessandro Barenghi, Dario Galeri, and Gerardo Pelosi. Cyber-Security Analysis and Evaluation for Smart Home Management Solutions. In Jing Yang Jou, Yen Hsyang Chu, Yin-Yi Lin, and Yen-Wen Chen, editors Proceedings of the 49th IEEE International Conference on Security Technology (ICCST 2015), Taipei, Taiwan, R.O.C., 21–24 September, 2015, pages 1–6, Piscataway, NJ, USA, September 2015. January 2016 IEEE. ISBN: 978-147998691-0 (Print). ISSN: 10716572.
(DOI: 10.1109/CCST.2015.7389663 )
[IC.48]
Alessandro Barenghi, Alessandro Di Federico, Gerardo Pelosi, and Stefano Sanflippo. Challenging the Trustworthiness of PGP: Is the Web-of-Trust Tear-proof? In Pernul G. and Peter Y. A. Ryan and Edgar Weipp, editors, Computer Security - ESORICS 2015 - Part I, Proceedings of the 20th European Symposium on Research in Computer Security, Vienna, Austria, September 23–25, 2015, volume 9326 of Lecture Notes in Computer Science, pages 1–18, Switzerland, September 2015. . Springer International Publishing. ISBN: 978-3-319-24173-9 (Print) 978-3-319-24174-6 (Online), ISSN: 0302-9743. (DOI: 10.1007/978-3-319-24174-6_22)
[IC.47]
Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, and Michele Scandale. Information Leakage Chaff: Feeding Red Herrings to Side Channel Attackers. In Sharon Hu and Rob Aitken (editors), Proceedings of the 52th Annual Design Automation Conference, DAC’15, San Francisco, CA, USA, June 7-11, 2015, pages 33:1-33:6, New York, NY, USA, June 2015. ACM. ISBN: 978-1-4503-3520-1/15. (DOI: 10.1145/2744769.2744859)
[IC.46]
Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, and Pierangela Samarati. Protecting Access Confidentiality with Data Distribution and Swapping. In Xindong Wu, Hai Jin, Manish Parashar, and Laurence T. Yang, editors, Proceedings of the 2014 IEEE International Conference on Big Data and Cloud Computing (BdCloud), Sydney, Australia - December 3-5, 2014, pages 167-174, Piscataway, NJ, USA, December 2014. IEEE Computer Society. ISBN-13: 978-1-4799-6719-3 (Print). (DOI: 10.1109/BDCloud.2014.59)
[IC.45]
Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, and Michele Scandale. Towards Transparently Tackling Functionality and Performance Issues Across Different OpenCL Platforms. In Shuichi Ichikawa and Tomoaki Tsumura, editors, Proceedings of the International Symposium on Computing and Networking – Across Practical Development and Theoretical Research - (CANDAR 2014) Mt. Fuji, Shizuoka, Japan - December 10-12, 2014, pages 130--136, Piscataway, NJ, USA, December 2014. IEEE. ISBN: 978-1-4799-4152-0/14.
(DOI: 10.1109/CANDAR.2014.53)
[IC.44]
Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, and Michele Scandale. Differential Fault Analysis for Block Ciphers: an Automated Conservative Analysis. In Ron Poet, Atilla Elçi, Manoj Singh Gaur, Mehmet A. Orgun, and Oleg B. Makarevich, editors, Proceedings of the 7th International Conference on Security of Information and Networks, SIN '14, Glasgow, Scotland UK, September, 9-11 2014, pages 171:1-171:8, New York, NY, USA, September 2014. ACM. ISBN: 978-1-4503-3033-6/14/09. (DOI: 10.1145/2659651.2659709)
Best Paper Award
[IC.43]
Alessandro Barenghi and Gerardo Pelosi. On the Security of Partially Masked Software Implementations. In Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati, editors, SECRYPT 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28–30 August, 2014, pages 492--499. SciTePress, August 2014. ISBN 978-989-758-045-1 (Print).
(DOI: http://dx.doi.org/10.5220/0005120504920499)
[IC.42]
Govanni Agosta, Alessandro Barenghi, and Gerardo Pelosi. Securing Software Cryptographic Primitives for Embedded Systems against Side Channel Attacks. In Fabio Garza, Gordon Thomas, and Daniel A. Pritchard, editors, Proceedings of the 48th IEEE International Conference on Security Technology (ICCST 2014), Rome, Italy, 13–16 October, 2014, pages 382–387, Piscataway, NJ, USA, October 2014. IEEE. ISBN: 978-1-4799-3530-7 (Print). (DOI:10.1109/CCST.2014.6987032)
[IC.41]
Alessio Antonini, Alessandro Barenghi, Gerardo Pelosi, and Saman Zonouz. Security Challenges in Building Automation and SCADA. In Fabio Garza, Gordon Thomas, and Daniel A. Pritchard, editors, Proceedings of the 48th IEEE International Conference on Security Technology (ICCST 2014), Rome, Italy, 13–16 October, 2014, pages 176–181, Piscataway, NJ, USA, October 2014. IEEE. ISBN: 978-1-4799-3530-7 (Print). (DOI:10.1109/CCST.2014.6986996)
[IC.40]
Alessandro Barenghi, Michele Beretta, Alessandro Di Federico, and Gerardo Pelosi. Snake: an End-to-End Encrypted Online Social Network. In Julien Bourgeois and Frédéric Magoulès, editors, Proceedings of the 6th International Symposium on Cyberspace Safety and Security (CSS 2014), Paris, France, 20–22 August, 2014, pages 775-782, Piscataway, NJ, USA, August 2014. IEEE Computer Society. ISBN: 978-1-4799-6123-8/14 (Print).
(DOI: 10.1109/HPCC.2014.128)
[IC.39]
Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, and Michele Scandale. A Multiple Equivalent Execution Trace Approach to Secure Cryptographic Embedded Software. In Soha Hassoun, Charles Alpert, and Sharon Hu, editors, Proceedings of the 51th Annual Design Automation Conference, DAC '14, San Francisco, CA, USA, June 1–5, 2014, pages 1–6, New York, NY, USA, May 2014. ACM. ISBN: 978-1-4503-2730 (Print). (DOI:10.1145/2593069.2593073)
[IC.38]
Giovanni Agosta, Gerardo Pelosi, and Ettore Speziale. On Task Assignment in Data Intensive Scalable Computing. In N. Desai and W. Cirne, editors, Proceedings of the 17th Workshop on Job Scheduling Strategies for Parallel Processing, JSSPP 2013, Boston, Massachusetts, USA, 24 May 2013, volume 8429 of Lecture Notes in Computer Science, pages 1–20, Berlin, Heidelberg, May 2014. Springer-Verlag. ISBN: 978-3-662-43779-7_8 (Print). (DOI:10.1007/978-3-662-43779-7_8)
[IC.37]
Iyad Al Khatib, Gerardo Pelosi, Giovanni Agosta, and Heikki Teriö. Security Integration in Medical Device Design: Extension of an Automated Bio-medical Engineering Design Methodology. In Shahram Latifi, editor, Proceedings of the 11th International Conference on Information Technology: New Generations, ITNG 2014, Las Vegas, Nevada, USA, 7–9 April, 2014, pages 416–423, Washington, DC, USA, April 2014. IEEE Computer Society. ISBN: 978-1-4799-3187-3 (Print). (DOI:10.1109/ITNG.2014.3)
[IC.36]
Alessio Antonini, Alessandro Barenghi, and Gerardo Pelosi. Security Analysis of Building Automation Networks: Threat Model and Viable Mitigation Techniques. In Hanne Riis Nielson and Dieter Gollmann, editors, Secure IT Systems - Proceedings of the 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18–21, 2013, volume 8208 of Lecture Notes in Computer Science, pages 199–214, Berlin, Heidelberg, October 2013. Springer Berlin Heidelberg. ISBN: 978-3-642-41487-9 (Print) 978-3-642-41488-6 (Online), ISSN: 0302-9743. (DOI:10.1007/978-3-642-41488-6_14)
[IC.35]
Sabrina De Capitani Di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, and Pierangela Samarati. Distributed Shuffling for Preserving Access Confidentiality. In Jason Crampton, Sushil Jajodia, and Keith Mayes, editors, Computer Security - ESORICS 2013 - Proceedings of the 18th European Symposium on Research in Computer Security, Egham, UK, September 9–13, 2013, volume 8134 of Lecture Notes in Computer Science, pages 628–645, Berlin, Heidelberg, September 2013. Springer-Verlag. ISBN: 978-3-642-40202-9 (Print) 978-3-642-40203-6 (Online), ISSN: 0302-9743. (DOI:10.1007/978-3-642-40203-6_35)
[IC.34]
Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, and Michele Scandale. Enhancing Passive Side-Channel Attack Resilience through Schedulability Analysis of Data-Dependency Graphs. In Javier Lopez, Xinyi Huang, and Ravi Sandhu, editors, Network and System Security. Proceedings of the 7th International Conference, NSS 2013, Madrid, Spain, June 3–4, 2013, volume 7873 of Lecture Notes in Computer Science, pages 692–698, Berlin, Heidelberg, June 2013. Springer. ISBN: 978-3-642-38630-5 (Print), 978-3-642-38631-2 (Online), ISSN: 0302-9743. (DOI:10.1007/978-3-642-38631-2_58)
[IC.33]
Giovanni Agosta, Alessandro Barenghi, Massimo Maggi, and Gerardo Pelosi. Compiler-Based Side Channel Vulnerability Analysis and Optimized Countermeasures Application. In Yervant Zorian, Donatella Sciuto, and Charles Alpert, editors, Proceedings of the 50th Annual Design Automation Conference, DAC '13, Austin, TX, USA, May 29–June 7, 2013, pages 81:1–81:6, New York, NY, USA, May 2013. ACM. ISBN: 978-1-4503-2071-9. (DOI:10.1145/2463209.2488833)
[IC.32]
Alessandro Barenghi, Gerardo Pelosi, and Fabio Pozzi. Drop-In Control Flow Hijacking Prevention through Dynamic Library Interception. In Shahram Latifi, editor, Proceedings of the 10th International Conference on Information Technology: New Generations, ITNG 2013, Las Vegas, Nevada, USA, 15–17 April, 2013, pages 640–647, Washington, DC, USA, April 2013. IEEE Computer Society. ISBN: 978-0-7695-4967-5 (Print). (DOI:10.1109/ITNG.2013.99)
[IC.31]
Alessandro Barenghi, Gerardo Pelosi, and Francesco Regazzoni. Simulation-Time Security Margin Assessment against Power-Based Side Channel Attacks. In Dimitrios Serpanos and Marilyn Wolf, editors, Proceedings of the 7th Workshop on Embedded Systems Security (WESS 2012), A Workshop of the Embedded Systems Week (ESWEEK 2012), October 11, 2012, Tampere, Finland, 2012, pages xxx–xxx, New York, NY, USA, October 2012. ACM. ISBN: 978-1-4503-1286-8/12/10. (DOI:)
[IC.30]
Alessandro Barenghi, Luca Breveglieri, Mariagrazia Fugini, and Gerardo Pelosi. Smart Meters and Home Gateway Scenarios. In Americo Cicchetti and Cecilia Rossignoli, editors, Proceedings of itAIS 2012 – IX Conference of the Italian Chapter of AIS Organization change and Information Systems: Working and Living Together in New Ways – Universitá Cattolica del Sacro Cuore, Rome Campus (Italy), September 28th and 29th, 2012, Roma (RM), September 2012. ITHUM Srl. ISBN: 978-88-6685-085-4.
[IC.29]
Giovanni Agosta, Alessandro Barenghi, and Gerardo Pelosi. A Code Morphing Methodology to Automate Power Analysis Countermeasures. In Patrick Groeneveld, Donatella Sciuto, and Soha Hassoun, editors, The 49th Annual Design Automation Conference 2012, DAC '12, San Francisco, CA, USA, June 3–7, 2012, pages 77–82, New York, NY, USA, June 2012. ACM. ISBN: 978-1-4503-1199-1. (DOI:10.1145/2228360.2228376)
[IC.28]
Giovanni Agosta, Alessandro Barenghi, Antonio Parata, and Gerardo Pelosi. Automated Security Analysis of Dynamic Web Applications through Symbolic Code Execution. In Shahram Latifi, editor, Proceedings of the Ninth International Conference on Information Technology: New Generations, ITNG 2012, Las Vegas, Nevada, USA, 16–18 April, 2012, pages 189–194, Washington, DC, USA, April 2012. IEEE Computer Society. ISBN: 978-1-4673-0798-7 (Print). (DOI:10.1109/ITNG.2012.167)
[IC.27]
Giovanni Agosta, Alessandro Barenghi, and Gerardo Pelosi. Exploiting Bit-level Parallelism in GPGPUs: a Case Study on KeeLoq Exhaustive Search Attacks. In Gero Mühl, Jan Richling, and Andreas Herkersdorf, editors, ARCS Workshops, Proceedings of the 3rd Workshop on Parallel Programming and Run-Time Management Techniques for Many-Core Architectures, PARMA '12, Munich, Germany, 28–29 February, 2012, volume 200 of Lecture Notes in Informatics (LNI), pages 385–396, Bonn, Germany, February 2012. Gesellschaft für Informatik (GI). ISBN: 978-1-4673-1913-3 (Print), 978-3-88579-294-9 (Online), ISSN: 1617-5468.
[IC.26]
Alessandro Barenghi, Guido M. Bertoni, Luca Breveglieri, Maria Grazia Fugini, and Gerardo Pelosi. Smart Metering in Power Grids: Application Scenarios and Security. In Syed Islam, editor, Proceedings of the IEEE PES Innovative Smart Grid Technology Conference (IEEE PES ISGT2011 Asia), November 13–16, 2011, Perth, Australia, pages 1–8, Piscataway, NJ, USA, November 2011. IEEE. ISBN: 978-1-4577-0873-2 (Print), 978-1-4577-0874-9 (Online), 978-1-4577-0875-6/11. (DOI:10.1109/ISGT-Asia.2011.6167108)
[IC.25]
Alessandro Barenghi, Guido Marco Bertoni, Luca Breveglieri, Gerardo Pelosi, and Andrea Palomba. Fault Attack to the Elliptic Curve Digital Signature Algorithm with Multiple Bit Faults. In Mehmet A. Orgun, Atilla Elçi, Oleg B. Makarevich, Sorin A. Huss, Josef Pieprzyk, Lyudmila K. Babenko, Alexander G. Chefranov, and Rajan Shankaran, editors, Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14–19, 2011, pages 63–72, New York, NY, USA, November 2011. ACM. ISBN: 978-1-4503-1020-8. (DOI:10.1145/2070425.2070438)
[IC.24]
Sabrina De Capitani Di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, and Pierangela Samarati. Supporting Concurrency in Private Data Outsourcing. In Vijay Atluri and Claudia Díaz, editors, Computer Security - ESORICS 2011 - Proceedings of the 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12–14, 2011, volume 6879 of Lecture Notes in Computer Science, pages 648–664, Berlin, Heidelberg, September 2011. Springer-Verlag. ISBN: 978-3-642-23821-5 (Print), 978-3-642-23822-2 (Online), ISSN: 0302-9743 (Print), 1611-3349 (Online). (DOI:10.1007/978-3-642-23822-2_35)
[IC.23]
Alessandro Barenghi and Gerardo Pelosi. Security and Privacy in Smart Grid Infrastructures. In Franck Morvan, A Min Tjoa, and Roland R. Wagner, editors, DEXA '11 Proceedings of the 2011 22nd International Workshop on Database and Expert Systems Applications, Toulouse, France, August 29–September 2, 2011, pages 102–108, Washington, DC, USA, August 2011. IEEE Computer Society. ISBN: 978-1-4577-0982-1 (Print), 978-0-7695-4486-1 (Online), ISSN: 1529-4188. (DOI:10.1109/DEXA.2011.74)
[IC.22]
Alessandro Barenghi, Gerardo Pelosi, and Yannick Teglia. Information Leakage Discovery Techniques to Enhance Secure Chip Design. In Claudio Agostino Ardagna and Jianying Zhou, editors, Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication - Proceedings of the 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1–3, 2011, volume 6633 of Lecture Notes in Computer Science, pages 128–143, Berlin, Heidelberg, June 2011. Springer-Verlag. ISBN: 978-3-642-21039-6 (Print), 978-3-642-21040-2 (Online). (DOI:10.1007/978-3-642-21040-2_9)
[IC.21]
Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, and Pierangela Samarati. Efficient and Private Access to Outsourced Data. In Proceedings of the 2011 31st International Conference on Distributed Computing Systems, ICDCS 2011, Minneapolis, MN, USA, June 20–24, 2011, pages 710–719, Washington, DC, USA, June 2011. IEEE Computer Society. ISBN: 978-1-61284-384-1 (Print), 978-0-7695-4364-2 (Online), ISSN: 1063-6927. (DOI:10.1109/ICDCS.2011.37)
[IC.20]
Alessandro Barenghi, Luca Breveglieri, Israel Koren, Gerardo Pelosi, and Francesco Regazzoni. Countermeasures against Fault Attacks on Software Implemented AES: Effectiveness and Cost. In ESWeek '10 Sixth Embedded Systems Week. Proceedings of the 5th Workshop on Embedded Systems Security. WESS' 10, Scottsdale, AZ, USA. October 28, 2010, pages 7:1–7:10, New York, NY, USA, October 2010. ACM. ISBN: 978-1-4503-0078-0. (DOI:10.1145/1873548.1873555)
[IC.19]
Alessandro Barenghi, Gerardo Pelosi, and Yannick Teglia. Improving First Order Differential Power Attacks through Digital Signal Processing. In Oleg B. Makarevich, Atilla Elçi, Mehmet A. Orgun, Sorin A. Huss, Ludmila K. Babenko, Alexander G. Chefranov, and Vijay Varadharajan, editors, Proceedings of the 3rd International Conference on Security of Information and Networks, SIN 2010, Rostov-on-Don, Russian Federation, September 7–11, 2010, pages 124–133, New York, NY, USA, September 2010. ACM. ISBN: 978-1-4503-0234-0. (DOI:10.1145/1854099.1854126)
[IC.18]
Alessandro Barenghi, Guido Marco Bertoni, Luca Breveglieri, Mauro Pellicioli, and Gerardo Pelosi. Fault Attack on AES with Single-Bit Induced Faults. In Proceedings of the Sixth International Conference on Information Assurance and Security, IAS 2010, Atlanta, GA, USA, August 23–25, 2010, pages 167–172. IEEE, August 2010. ISBN: 978-1-4244-7407-3 (Print). (DOI:10.1109/ISIAS.2010.5604061)
[IC.17]
Alessandro Barenghi, Guido Bertoni, Luca Breveglieri, Mauro Pellicioli, and Gerardo Pelosi. Low Voltage Fault Attacks to AES. In Jim Plusquellic and Ken Mai, editors, HOST 2010, Proceedings of the 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 13–14 June 2010, Anaheim Convention Center, CA, USA, pages 7–12, Los Alamitos, CA, USA, June 2010. IEEE Computer Society. ISBN: 978-1-4244-7811-8 (Print), 978-1-4244-7810-1 (Online). (DOI:10.1109/HST.2010.5513121)
[IC.16]
Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Gerardo Pelosi, and Pierangela Samarati. Encryption-Based Policy Enforcement for Cloud Storage. In David H. C. Du and Michel Raynal, editors, 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 21–25 June 2010, Genova, Italy, pages 42–51, Washington, DC, USA, June 2010. IEEE Computer Society. ISBN: 978-1-4244-7471-4 (Print), 978-0-7695-4079-5 (Online), ISSN: 1545-0678. (DOI:10.1109/ICDCSW.2010.35)
[IC.15]
Giovanni Agosta, Alessandro Barenghi, Fabrizio De Santis, and Gerardo Pelosi. Record Setting Software Implementation of DES Using CUDA. In Shahram Latifi, editor, Proceeding of the Seventh International Conference on Information Technology: New Generations, ITNG 2010, Las Vegas, Nevada, USA, 12–14 April 2010, pages 748–755, Los Alamitos, CA, USA, April 2010. IEEE Computer Society. ISBN: 978-0-7695-3984-3 (Print). (DOI:10.1109/ITNG.2010.43)
[IC.14]
Gerardo Pelosi and Giuseppe Psaila. SMaC: Spatial Map Caching Technique for Mobile Devices. In Sung Y. Shin, Sascha Ossowski, Michael Schumacher, Mathew J. Palakal, and Chih-Cheng Hung, editors, Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), Sierre, Switzerland, March 22–26, 2010, pages 1829–1830, New York, NY, USA, March 2010. ACM. ISBN: 978-1-60558-639-7. (DOI:10.1145/1774088.1774476)
[IC.13]
Giovanni Agosta, Alessandro Barenghi, Fabrizio De Santis, Andrea Di Biagio, and Gerardo Pelosi. Fast Disk Encryption through GPGPU Acceleration. In Proceedings of the 2009 International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2009, Higashi Hiroshima, Japan, December 8–11 2009, pages 102–109, Los Alamitos, CA, USA, December 2009. IEEE Computer Society. ISBN: 978-0-7695-3914-0. (DOI:10.1109/PDCAT.2009.72)
[IC.12]
Alessandro Barenghi, Guido Bertoni, Emanuele Parrinello, and Gerardo Pelosi. Low Voltage Fault Attacks on the RSA Cryptosystem. In Luca Breveglieri, Israel Koren, David Naccache, Elisabeth Oswald, and Jean-Pierre Seifert, editors, Proceeding of the Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2009, Lausanne, Switzerland, September 6, 2009, pages 23–31, Washington, DC, USA, September 2009. IEEE Computer Society. ISBN: 978-1-4244-4972-9 (Print), 978-0-7695-3824-2 (Online). (DOI:10.1109/FDTC.2009.30)
[IC.11]
Andrea Di Biagio, Alessandro Barenghi, Giovanni Agosta, and Gerardo Pelosi. Design of a Parallel AES for Graphics Hardware Using the CUDA Framework. In Proceedings of the 23rd IEEE International Symposium on Parallel and Distributed Processing, IPDPS 2009, Rome, Italy, May 23–29, 2009, pages 1–8, Washington, DC, USA, May 2009. IEEE Computer Society. ISBN: 978-1-4244-3751-1 (Print), 978-1-4244-3750-4 (Online), ISSN: 1530-2075. (DOI:10.1109/IPDPS.2009.5161242)
[IC.10]
Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Gerardo Pelosi, and Pierangela Samarati. Preserving Confidentiality of Security Policies in Data Outsourcing. In Vijay Atluri and Marianne Winslett, editors, Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, WPES 2008, Alexandria, VA, USA, October 27, 2008, pages 75–84, New York, NY, USA, October 2008. ACM. ISBN: 978-1-60558-289-4. (DOI:10.1145/1456403.1456417)
[IC.9]
Alessandro Barenghi, Guido Bertoni, Luca Breveglieri, and Gerardo Pelosi. A FPGA Coprocessor for the Cryptographic Tate Pairing over Fp. In Shahram Latifi, editor, Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 7–8 April 2008, Las Vegas, Nevada, USA, pages 112–119, Washington, DC, USA, April 2008. IEEE Computer Society. ISBN: 978-0-7695-3099-4. (DOI:10.1109/ITNG.2008.260)
[IC.8]
Giovanni Agosta and Gerardo Pelosi. A Domain Specific Language for Cryptography. In Proceedings of the Forum on Specification and Design Languages, FDL 2007, September 18–20, 2007, Barcelona, Spain, Proceedings, pages 159–164. Electronic Chips & Systems Design Initiative (ECSI), September 2007. ISSN: 1636-9874.
[IC.7]
Giovanni Agosta, Luca Breveglieri, Gerardo Pelosi, and Israel Koren. Countermeasures against Branch Target Buffer Attacks. In Luca Breveglieri, Shay Gueron, Israel Koren, David Naccache, and Jean-Pierre Seifert, editors, Proceedings of the Fourth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2007, FDTC 2007: Vienna, Austria, 10 September 2007, pages 75–79, Washington, DC, USA, September 2007. IEEE Computer Society. ISBN: 978-0-7695-2982-0 (Print), 0-7695-2982-8 (Online). (DOI:10.1109/FDTC.2007.4318987)
[IC.6]
Giovanni Agosta, Francesco Bruschi, Gerardo Pelosi, and Donatella Sciuto. A Unified Approach to Canonical Form-based Boolean Matching. In Steven P. Levitan, editor, Proceedings of the 44th Design Automation Conference, DAC 2007, San Diego, CA, USA, June 4–8, 2007, pages 841–846, New York, NY, USA, June 2007. ACM. ISBN: 978-1-59593-627-1, ISSN: 0738-100X. (DOI:10.1145/1278480.1278689)
[IC.5]
Giovanni Agosta, Luca Breveglieri, Gerardo Pelosi, and Martino Sykora. Programming Highly Parallel Reconfigurable Architectures for Public-Key Cryptographic Applications. In Shahram Latifi, editor, Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2-4 April 2007, Las Vegas, NV, USA, pages 3–10, Washington, DC, USA, April 2007. IEEE Computer Society. ISBN: 0-7695-2776-0 (Print), 978-0-7695-2776-5 (Online). (DOI:10.1109/ITNG.2007.160)
[IC.4]
Guido M. Bertoni, Luca Breveglieri, Liqun Chen, Pasqualina Fragneto, Keith A. Harrison, and Gerardo Pelosi. A Pairing SW Implementation for Smart-Cards. In Proceedings of the Fourth Irish Conference on the Mathematical Foundations of Computer Science and Information Technology, (MFCSIT'06), Cork, Ireland, 1–5, August 2006, pages 267–271. National University of Ireland Press, August 2006. ISBN: 0-9552229-3-1 (Print).
[IC.3]
Cesare Alippi, Gerardo Pelosi, and Manuel Roveri. Computational Intelligence Techniques to Detect Toxic Gas Presence. In Fernando Lopez Pefna and Enrique H. Ruspini, editors, CIMSA 2006. Proceedings of 2006 IEEE International Conference on Computational Intelligence for Measurement Systems and Applications, July 12–14, La Coruna, Spain, 2006, pages 40–44, Piscataway, NJ, USA, July 2006. IEEE. ISBN: 1-4244-0244-1 (Print), 1-4244-0245-X (Online). (DOI:10.1109/CIMSA.2006.250745)
[IC.2]
Guido Bertoni, Luca Breveglieri, Pasqualina Fragneto, and Gerardo Pelosi. Parallel Hardware Architectures for the Cryptographic Tate Pairing. In Shahram Latifi, editor, Proceedings of the Third International Conference on Information Technology: New Generations (ITNG 2006), 10–12 April 2006, Las Vegas, NV, USA, pages 186–191, Washington, DC, USA, April 2006. IEEE Computer Society. ISBN: 0-7695-2497-4 (Print). (DOI:10.1109/ITNG.2006.107)
[IC.1]
Guido Bertoni, Luca Breveglieri, Pasqualina Fragneto, Gerardo Pelosi, and Luigi Sportiello. Software Implementation of Tate pairing over GF(2m). In Georges G. E. Gielen, editor, Proceedings of the Conference on Design, Automation and Test in Europe: Designers' Forum, DATE 2006, Munich, Germany, March 6–10, 2006, pages 7–11, Leuven, Belgium, March 2006. European Design and Automation Association (EDAA). ISBN: 3-9810801-0-6, ISSN: 478061. (DOI:10.1145/1131355.1131358)

European Patents with International Extensions

European Patent Office (EPO): http://www.epo.org/
United States Patent and Trademark Office (USPTO): http://www.uspto.gov/

In collaboration with the Advanced System Technology Division of STMicroelectronics, Agrate (IT) and the HP Laboratories, Bristol (UK), concerning the design of secure devices and either the definition or the optimization of cryptographic application-specific protocols.

[PT.10]
Guido Marco Bertoni, Pasqualina Fragneto, Gerardo Pelosi, Keith Harrison, and Liqun Chen. Method of Processing Information to be Confidentially Transmitted. Granted Patent: US 8381267 B2, February 2013. Proprietor(s): STMicroelectronics Srl. Prior publication data: US 2007260664 A1 – 2007-11-08. Priority date: 2005-10-11.
[PT.9]
Liqun Chen, Keith Harrison, Guido Marco Bertoni, Pasqualina Fragneto, and Gerardo Pelosi. Authentication Method. Granted Patent US 8352736 B2, January 2013. Proprietor(s): STMicroelectronics Srl (IT), Hewlett-Packard Development Company, L.P. (US). Prior publication data: US 2007180241 A1 – 2007-08-02. Priority date: 2004-12-23.
[PT.8]
Roberto Valerio Sannino, Fabio Sozzani, Guido Marco Bertoni, Gerardo Pelosi, and Pasqualina Fragneto. Message Deciphering Method, System and Article. Granted Patent: US 8223970 B2, July 2012. Proprietor(s): STMicroelectronics Srl (IT). Prior publication data: US 2011058672 A1 – 2011-03-10. (Previously granted as US 7925010 B2 on 2011-04-12 with prior publication data: US 2005169464 A1 – 2005-08-04) Priority date: 2003-12-24.
[PT.7]
Guido Marco Bertoni, Pasqualina Fragneto, Andrew Marsh, Gerardo Pelosi, and Moris Ravasio. Computation of a Multiplication Operation with an Electronic Circuit and Method. Granted Patent: US 8117251 B2, February 2012. Proprietor(s): STMicroelectronics Srl (IT). Prior publication data: US 2007260664 A1 – 2007-11-08. Priority date: 2006-04-11.
[PT.6]
Guido Marco Bertoni, Pasqualina Fragneto, Andrew Marsh, Gerardo Pelosi, and Moris Ravasio. Computation of a Modular Multiplication with an Electronic Circuit. Granted Patent: EP 1845442 B1, November 2011. Proprietor(s): STMicroelectronics Srl (IT), STMicroelectronics Limited (UK) Prior publication data: EP 1845442 B1 – 2007-10-17. Priority date: 2006-04-11.
[PT.5]
Keith Alexander Harrison, Liqun Chen, Guido Marco Bertoni, Pasqualina Fragneto, and Gerardo Pelosi. Use of Bilinear Mappings in Cryptographic Applications. Granted Patent: US 7929691 B2, April 2011. Proprietor(s): Hewlett-Packard Development Company, L.P. (US). Prior publication data: US 2008016346 A1 – 2008-01-17. Priority date: 2004-12-23.
[PT.4]
Fabio Sozzani, Roberto Valerio Sannino, Guido Marco Bertoni, Gerardo Pelosi, and Pasqualina Fragneto. Method for Establishing a Communication between Two Devices. Granted Patent: US 7716483 B2, May 2010. Proprietor(s): STMicroelectronics Srl (IT). Prior publication data: US 2005125670 A1 – 2005-06-09. Priority date: 2003-09-29.
[PT.3]
Fabio Sozzani, Roberto Valerio Sannino, Guido Marco Bertoni, Gerardo Pelosi, and Pasqualina Fragneto. Method for Establishing an Encrypted Communication by Means of Keys. Granted Patent: US 7620186 B2, November 2009. Proprietor(s): STMicroelectronics Srl (IT). Prior publication data: US 2005102507 A1 – 2005-05-12. Priority date: 2003-09-29.
[PT.2]
Keith Alexander Harrison, Liqun Chen, Guido Marco Bertoni, Pasqualina Fragneto, and Gerardo Pelosi. Improvements in the Use of Bilinear Mappings in Cryptographic Applications. Granted Patent: EP 1675300 B1, October 2008. Proprietor(s): Hewlett-Packard Development Company, L.P. (US), STMicroelectronics Srl (IT). Prior publication data: EP 1675300 A1 – 2006-06-28. Priority date: 2004-12-23.
[PT.1]
Roberto Valerio Sannino, Fabio Sozzani, Guido Marco Bertoni, Gerardo Pelosi, and Pasqualina Fragneto. A Message Deciphering Method. Granted Patent: EP 1548976 B1, August 2007. Proprietor(s): STMicroelectronics Srl (IT). Prior publication data: EP 1548976 (A1) – 2005-06-29. Priority date: 2003-12-24.

Invited Papers (Peer-reviewed)

[IP.11]
Alessandro Barenghi and Gerardo Pelosi. Fault Attacks Friendliness of Post-quantum Cryptosystems. In Proceedings of the Twentieth Workshop on Fault Diagnosis and Tolerance in Cryptography,Prague, Czech Republic, September 10, 2023.. IEEE Computer Society - CPS, February 2024. ISBN: 978-1-xxxx-yyyy-x.
[IP.10]
Maurizio Atzori, Alessandro Barenghi, Sara Comai, Mariagrazia Fugini, Diego Marcia, Gerardo Pelosi, Manuela Sanguinetti, and Vincenzo Scotti. Improving Work Life Conditions via Portable Knowledge-Driven Recommender System. In Sergio Greco, Maurizio Lenzerini, Elio Masciari, and Andrea Tagarelli, editors, Proceedings of the 29th Italian Symposium on Advanced Database Systems, Pizzo Calabro, Vibo Valentia, Italy, September 5–9, 2021., volume 2994 of CEUR Workshop Proceedings. CEUR-WS.org, September 2021. ISSN: 1613-0073.
[IP.9]
Rosa Maria Resende de Almeida, Adriana Grau Aberturas, Yolanda Bueno Aguado, Maurizio Atzori, Alessandro Barenghi, Gianluca Borghini, Carlos Alberto Catalina Ortega, Sara Comai, Raquel Losada Durán, Mariagrazia Fugini, Hatice Gunes, Andreas Basam Musleh, Gerardo Pelosi, Vincenzo Ronca, Licia Sbattella, Roberto Tedesco, , and Tian Xu. Decision Support Systems to Promote Health and Well-being of People of Working Age: the Case of the WorkingAge EU Project. In A. Orailoglu, M. Jung, and M. Reichenbach, editors, Proceedings of the Embedded Computer Systems: Architectures, Modeling, and Simulation - 20th International Conference, SAMOS 2020, Samos, Greece, July 5-9, 2020, volume 12471 of Lecture Notes in Computer Science (LNCS), pages 336–347. Springer, Cham, July 2020. ISBN: 978-3-030-60938-2 (Print), 978-3-030-60939-9 (Online). (doi:10.1007/978-3-030-60939-9_24)
[IP.8]
Mariagrazia Fugini, Alessandro Barenghi, Sara Comai, Gerardo Pelosi, Roberto Tedesco, Marteyn van Gasteren, Carlos Alberto Catalina, Estefanía Arribas Leal, Raquel Losada Durán, Rosa Maria Martins de Almeida, Alexander Mertens, Vera Rick, Hatice Gunes, Tian Xu, Gianluca Borghini, Vincenzo Ronca, and Hesam Sagha. WorkingAge: Providing Occupational Safety through Pervasive Sensing and Data Driven Behavior Modeling. In Piero Baraldi, Francesco Di Maio, and Enrico Zio, editors, Proceedings of the 30th European Safety and Reliability Conference and the 15th Probabilistic Safety Assessment and Management Conference. ESREL 2020. PSAM 15. June 21-26, 2020. Venice, Italy, pages 1–8. Research Publishing, Singapore, June 2020. ISBN 981-973-0000-00-0 (Print). (doi:10.3850/981-973-0000-00-0)
[IP.7]
Giovanni Agosta, Carlo Brandolese, William Fornaciari, Nicholas Mainardi, Gerardo Pelosi, Federico Reghenzani, Michele Zanella, Gaetan Des Courchamps, Vincent Ducrot, Kevin Juilly, Sébastien Monot, and Luca Ceva. Accelerating Automotive Analytics: The M2DC Appliance Approach. In D. Pnevmatikatos, M. Pelcat, and M. Jung, editors, Embedded Computer Systems: Architectures, Modeling, and Simulation. SAMOS 2019., volume 11733 of Lecture Notes in Computer Science, pages 455–469. Springer, Cham, August 2019. ISBN 978-3-030-27561-7 (Print), 978-3-030-27562-4 (Online). (doi:10.1007/978-3-030-27562-4_33)
[IP.6]
Alessio Agneessens, Francesco Buemi, Stefano Delucchi, Massimo Massa, Giovanni Agosta, Alessandro Barenghi, Carlo Brandolese, William Fornaciari, Gerardo Pelosi, Enrico Ferrari, Dajana Cassioli, Luigi Pomante, Leonardo Napoletani, Luciano Bozzi, Carlo Tieri, and Maurizio Mongelli. Safe Cooperative CPS: A V2I Traffic Management scenario in the SafeCOP project. In Andreas Gerstlauer and Walid Najjar, editors, Proceedings of the 2016 IEEE International Conference on Embedded Computer Systems: Architectures, MOdeling, and Simulation (IC-SAMOS 2016), Special Session on European Projects on heterogeneous microservers and parallel embedded computing, July 18-21, 2016. Samos, Greece, pages 320–327. IEEE, July 2017. ISBN: 978-1-5090-3077-4 (Print on Demand - PoD), 978-1-5090-3076-7 (Electronic). IEEE Catalog Number: CFP1652A-ART. (doi:10.1109/SAMOS.2016.7818365)
[IP.5]
Ariel Oleksiak, Michal Kierzynka, Giovanni Agosta, Carlo Brandolese, William Fornaciari, Gerardo Pelosi, Micha Vor Dem Berge, Wolfgang Christmann, Stefan Krupop, Mariano Cecowski, Robert Plestenjak, Justin v  Cinkelj, Mario Porrmann, Jens Hagemeyer, René Griessl, Meysam Peykanu, Lennart Tigges, Loïc Cudennec, Thierry Goubier, Jean-Marc Philippe, Sven Rosinger, Daniel Schlitt, Christian Pieper, Chris Adeniyi-Jones, Udo Janssen, and Luca Ceva. Data Centres for IoT applications: the M2DC Approach. In Andreas Gerstlauer and Walid Najjar, editors, Proceedings of the 2016 IEEE International Conference on Embedded Computer Systems: Architectures, MOdeling, and Simulation (IC-SAMOS 2016), Special Session on European Projects on heterogeneous microservers and parallel embedded computing, July 18-21, 2016. Samos, Greece, pages 293–299. IEEE, July 2017. ISBN: 978-1-5090-3077-4 (Print on Demand – PoD), 978-1-5090-3076-7 (Electronic). IEEE Catalog Number: CFP1652A-ART. (doi:10.1109/SAMOS.2016.7818361)
[IP.4]
Ariel Oleksiak, Michal Kierzynka, Wojciech Piatek, Micha Vor Dem Berge, Wolfgang Christmann, Stefan Krupop, Mario Porrmann, Jens Hagemeyer, René Griessl, Meysam Peykanu, Lennart Tigges, Sven Rosinger, Daniel Schlitt, Christian Pieper, Udo Janssen, Giovanni Agosta, Carlo Brandolese, William Fornaciari, Gerardo Pelosi, Mariano Cecowski, Robert Plestenjak, Justin v  Cinkelj, Loïc Cudennec, Thierry Goubier, Jean-Marc Philippe, Chris Adeniyi-Jones, Luca Ceva, and Holm Rauchfuss. M2DC - Modular Microserver DataCentre with Heterogeneous Hardware. In Energy-efficient Servers for Cloud and Edge Computing 2017 Workshop (ENeSCE 2017), January 23, 2017, Stockholm, Sweden, co-located with HiPEAC 2017 [without formal proceedings], pages 1–8, January 2017.
[IP.3]
Ariel Oleksiak, Michal Kierzynka, Giovanni Agosta, Carlo Brandolese, William Fornaciari, Gerardo Pelosi, Micha Vor Dem Berge, Wolfgang Christmann, Stefan Krupop, Mariano Cecowski, Robert Plestenjak, Justin v  Cinkelj, Mario Porrmann, Jens Hagemeyer, René Griessl, Meysam Peykanu, Lennart Tigges, Loïc Ludennec, Thierry Goubier, Jean-Marc Philippe, Sven Rosinger, Daniel Schlitt, Christian Pieper, Chris Adeniyi-Jones and Udo Janssen. The M2DC Project: Modular Microserver DataCentre. In In Proceedings of the 19th Euromicro Conference on Digital System Design (DSD 2016), Special Session on European Projects in Digital Systems Design, August 31 - September 2, 2016. Limassol, Cyprus, pages 68–74. IEEE, July 2016. ISBN: 978-1-5090-2818-4 (Print), 978-1-5090-2817-7 (Online). (doi:10.1109/DSD.2016.76)
[IP.2]
Gerardo Pelosi. Engineering Cryptographic Solutions for Trustworthy Computing Systems. In Symposium on Computer Security and Critical Infrastructure, March 16-21, 2015, held at Universidad del Norte, Barranquilla, Colombia, during the 2015 Cátedra Europa International week [talk - without formal proceedings], March 2015.
[IP.1]
Gerardo Pelosi. Parallel Hardware for the Computation of Pairings. In Securing Cyberspace: Applications and Foundations of Cryptography and Computer Security, December 4-8, 2006, held at Institute for Pure and Applied Mathematics (IPAM) University of California, Los Angeles, CA, USA [talk – without formal proceedings], December 2006.

Peer-reviewed Posters with Interactive Presentation

[PO.8]
Isabella Piacentini, Alessandro Barenghi, and Gerardo Pelosi. A Computation Interleaving Countermeasure against Profiled Side Channel Attacks” , Work-in-Progress session at the 60th Design Automation Conference (DAC'23), July 9--13, 2023, Moscone West, San Francisco, CA, USA.
[PO.7]
Alessandro Barenghi, William Fornaciari, Gerardo Pelosi and Davide Zoni. “Side-channel analysis of IoT CPUs: a microarchitectural perspective” , Third Annual ARM Research Summit, 17--19 September 2018, Robinson College, Cambridge, UK.
[Peer-reviewed project proposal evaluation with no formal proceedings. The primary agenda of the Summit is the discourse of ideas in varying degrees of maturity, and the advancement of research.]
[PO.6]
Ariel Oleksiak, Michal Kierzynka, ..., Gerardo Pelosi, et al. “M2DC – Modular Microserver Data Centre” , 32nd International Conference, ISC High Performance 2017, June 18–22, 2017, Frankfurt, Germany.
[Accepted as Peer-reviewed poster describing major results and innovations obtained by the M2DC EU project -- (No formal proceedings)]
[PO.5]
Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, and Michele Scandale. 2016. “Encasing Block Ciphers to Foil Key Recovery Attempts via Side Channel” , Work-in-Progress session at the 2016 Design Automation Conference (DAC’16), June 5--9, 2016, Austin, TX, USA.
[Accepted as Peer-reviewed poster with Interactive presentation (No Proceedings)]
[PO.4]
Giovanni Agosta, Alessandro Barenghi, Massimo Maggi, and Gerardo Pelosi. 2014. “Extending the Design Space for Secure Embedded System Design” , Work-in-Progress session at the 2014 Design Automation Conference (DAC’14), June 5, 2014, San Francisco, CA, USA.
[Accepted as Peer-reviewed poster with Interactive presentation (No Proceedings)]
[PO.3]
Gerardo Pelosi, Giovanni Agosta, and Iyad Al Khatib. 2014. “Automated Methodology Integrating Security and Privacy in the Design Process of Medical Devices”. Work-in-Progress session at the 2014 Design Automation Conference (DAC’14), June 5, 2014, San Francisco, CA, USA.
[Accepted as Peer-reviewed poster with Interactive presentation (No Proceedings)]
[PO.2]
Gerardo Pelosi, Giovanni Agosta, Alessandro~Barenghi, and Massimo~Maggi 2014. "Compiler-based Side Channel Analysis" . Workshop on Parallel Programming and Run-Time Management Techniques for Many-core Architectures and Design Tools and Architectures for Multicore Embedded Computing Platform -- PARMA-DITAM 2014 , January 20, 2014, Vienna, Austria. [Poster Submission Session].
[PO.1]
Gerardo Pelosi, ``GPGPU Acceleration of Cryptographic Applications ", IEEE/ACM Workshop on Designing for Embedded Parallel Computing Platforms: Architectures, Design Tools, and Applications. Design Automation and Test in Europe (DATE 2010), March 12, 2010, Dresden, Germany
[Invited talk and poster with Interactive presentation (No Proceedings)].