Gerardo Pelosi
Orcid: 0000-0002-3812-5429
According to our database1,
Gerardo Pelosi
authored at least 127 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Performance and Efficiency Exploration of Hardware Polynomial Multipliers for Post-Quantum Lattice-Based Cryptosystems.
SN Comput. Sci., 2024
Proceedings of the IEEE International Symposium on Information Theory, 2024
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2024
Proceedings of the 61st ACM/IEEE Design Automation Conference, 2024
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024
Proceedings of the Applied Cryptography and Network Security Workshops, 2024
Proceedings of the Applied Cryptography and Network Security Workshops, 2024
2023
Proceedings of the Embedded Computer Systems: Architectures, Modeling, and Simulation, 2023
An Efficient Unified Architecture for Polynomial Multiplications in Lattice-Based Cryptoschemes.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023
Proceedings of the Workshop on Fault Detection and Tolerance in Cryptography, 2023
A Non Profiled and Profiled Side Channel Attack Countermeasure through Computation Interleaving.
Proceedings of the 26th Euromicro Conference on Digital System Design, 2023
Proceedings of the 28th Asia and South Pacific Design Automation Conference, 2023
2022
J. Inf. Secur. Appl., 2022
2021
IEEE Access, 2021
IEEE Access, 2021
Proceedings of the Security and Privacy in Communication Networks, 2021
Improving Work Life Conditions via Portable Knowledge-Driven Recommender System (Discussion Paper).
Proceedings of the 29th Italian Symposium on Advanced Database Systems, 2021
Proceedings of the IEEE International Conference on Quantum Computing and Engineering, 2021
Profiled Attacks Against the Elliptic Curve Scalar Point Multiplication Using Neural Networks.
Proceedings of the Network and System Security - 15th International Conference, 2021
2020
Dataset related to Analysis of Decoding Failures of LDPC and MDPC Codes in Out-of-Place Bit Flipping Decoding.
Dataset, October, 2020
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2020
Compiler-Based Techniques to Secure Cryptographic Embedded Software Against Side-Channel Attacks.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2020
Decision Support Systems to Promote Health and Well-Being of People During Their Working Age: The Case of the WorkingAge EU Project.
Proceedings of the Embedded Computer Systems: Architectures, Modeling, and Simulation, 2020
Analysis of In-Place Randomized Bit-Flipping Decoders for the Design of LDPC and MDPC Code-Based Cryptosystems.
Proceedings of the E-Business and Telecommunications, 2020
A Failure Rate Model of Bit-flipping Decoders for QC-LDPC and QC-MDPC Code-based Cryptosystems.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2020
A comprehensive analysis of constant-time polynomial inversion for post-quantum cryptosystems.
Proceedings of the 17th ACM International Conference on Computing Frontiers, 2020
Constant weight strings in constant time: a building block for code-based post-quantum cryptosystems.
Proceedings of the 17th ACM International Conference on Computing Frontiers, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
A Code-specific Conservative Model for the Failure Rate of Bit-flipping Decoding of LDPC Codes with Cryptographic Applications.
IACR Cryptol. ePrint Arch., 2019
Plaintext recovery attacks against linearly decryptable fully homomorphic encryption schemes.
Comput. Secur., 2019
Proceedings of the Embedded Computer Systems: Architectures, Modeling, and Simulation, 2019
Evaluating the Trade-offs in the Hardware Design of the LEDAcrypt Encryption Functions.
Proceedings of the 26th IEEE International Conference on Electronics, Circuits and Systems, 2019
Proceedings of the 16th ACM International Conference on Computing Frontiers, 2019
Proceedings of the Code-Based Cryptography - 7th International Workshop, 2019
Privacy preserving substring search protocol with polylogarithmic communication cost.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
A Comprehensive Side-Channel Information Leakage Analysis of an In-Order RISC CPU Microarchitecture.
ACM Trans. Design Autom. Electr. Syst., 2018
Reactive side-channel countermeasures: Applicability and quantitative security evaluation.
Microprocess. Microsystems, 2018
J. Comput. Secur., 2018
J. Comput. Secur., 2018
Design and Implementation of a Digital Signature Scheme Based on Low-density Generator Matrix Codes.
CoRR, 2018
Proceedings of the Post-Quantum Cryptography - 9th International Conference, 2018
Proceedings of the 3rd IEEE International Verification and Security Workshop, 2018
Proceedings of the 2018 International Conference on High Performance Computing & Simulation, 2018
Proceedings of the Information and Communications Security - 20th International Conference, 2018
Side-channel security of superscalar CPUs: evaluating the impact of micro-architectural features.
Proceedings of the 55th Annual Design Automation Conference, 2018
Proceedings of the From Database to Cyber Security, 2018
2017
Microprocess. Microsystems, 2017
An Enhanced Dataflow Analysis to Automatically Tailor Side Channel Attack Countermeasures to Software Block Ciphers.
Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), 2017
Proceedings of the 14th International Symposium on Pervasive Systems, 2017
2016
ACM J. Emerg. Technol. Comput. Syst., 2016
A privacy-preserving encrypted OSN with stateless server interaction: The Snake design.
Comput. Secur., 2016
Proceedings of the International Conference on Embedded Computer Systems: Architectures, 2016
Proceedings of the International Conference on Embedded Computer Systems: Architectures, 2016
Proceedings of the Advances in Information and Computer Security, 2016
Proceedings of the 35th International Conference on Computer-Aided Design, 2016
Proceedings of the 2016 Euromicro Conference on Digital System Design, 2016
Proceedings of the 2016 Euromicro Conference on Digital System Design, 2016
Proceedings of the Data and Applications Security and Privacy XXX, 2016
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science, 2016
Automated instantiation of side-channel attacks countermeasures for software cipher implementations.
Proceedings of the ACM International Conference on Computing Frontiers, CF'16, 2016
2015
ACM Trans. Storage, 2015
The MEET Approach: Securing Cryptographic Embedded Software Against Side Channel Attacks.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2015
Trace-based schedulability analysis to enhance passive side-channel attack resilience of embedded software.
Inf. Process. Lett., 2015
OpenCL performance portability for general-purpose computation on graphics processor units: an exploration on cryptographic primitives.
Concurr. Comput. Pract. Exp., 2015
Proceedings of the International Carnahan Conference on Security Technology, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
Proceedings of the 52nd Annual Design Automation Conference, 2015
2014
IET Comput. Digit. Tech., 2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the 7th International Conference on Security of Information and Networks, 2014
Proceedings of the SECRYPT 2014, 2014
Security Integration in Medical Device Design: Extension of an Automated Bio-Medical Engineering Design Methodology.
Proceedings of the 11th International Conference on Information Technology: New Generations, 2014
Proceedings of the International Carnahan Conference on Security Technology, 2014
Securing software cryptographic primitives for embedded systems against side channel attacks.
Proceedings of the International Carnahan Conference on Security Technology, 2014
Towards Transparently Tackling Functionality and Performance Issues across Different OpenCL Platforms.
Proceedings of the Second International Symposium on Computing and Networking, 2014
Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications, 2014
A Multiple Equivalent Execution Trace Approach to Secure Cryptographic Embedded Software.
Proceedings of the 51st Annual Design Automation Conference 2014, 2014
Proceedings of the 2014 IEEE Fourth International Conference on Big Data and Cloud Computing, 2014
2013
A fault induction technique based on voltage underfeeding with application to attacks against AES and RSA.
J. Syst. Softw., 2013
J. Comput. Secur., 2013
Secure and efficient design of software block cipher implementations on microcontrollers.
Int. J. Grid Util. Comput., 2013
Enhancing Passive Side-Channel Attack Resilience through Schedulability Analysis of Data-Dependency Graphs.
Proceedings of the Network and System Security - 7th International Conference, 2013
Security Analysis of Building Automation Networks - Threat Model and Viable Mitigation Techniques.
Proceedings of the Secure IT Systems - 18th Nordic Conference, 2013
Proceedings of the Job Scheduling Strategies for Parallel Processing, 2013
Proceedings of the Tenth International Conference on Information Technology: New Generations, 2013
Proceedings of the Computer Security - ESORICS 2013, 2013
Compiler-based side channel vulnerability analysis and optimized countermeasures application.
Proceedings of the 50th Annual Design Automation Conference 2013, 2013
2012
Proceedings of the Fault Analysis in Cryptography, 2012
Automated Security Analysis of Dynamic Web Applications through Symbolic Code Execution.
Proceedings of the Ninth International Conference on Information Technology: New Generations, 2012
Proceedings of the 49th Annual Design Automation Conference 2012, 2012
Exploiting Bit-level Parallelism in GPGPUs: a Case Study on KeeLoq Exhaustive Search Attacks.
Proceedings of the ARCS 2012 Workshops, 28. Februar - 2. März 2012, München, Germany, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, 2011
Fault attack to the elliptic curve digital signature algorithm with multiple bit faults.
Proceedings of the 4th International Conference on Security of Information and Networks, 2011
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011
Proceedings of the Computer Security - ESORICS 2011, 2011
Proceedings of the 2011 Database and Expert Systems Applications, 2011
Proceedings of the Privacy and Identity Management for Life, 2011
2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the 3rd International Conference on Security of Information and Networks, 2010
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010
Proceedings of the Seventh International Conference on Information Technology: New Generations, 2010
Proceedings of the 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 2010
Countermeasures against fault attacks on software implemented AES: effectiveness and cost.
Proceedings of the 5th Workshop on Embedded Systems Security, 2010
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010
2009
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2009
Proceedings of the 2009 International Conference on Parallel and Distributed Computing, 2009
Proceedings of the 23rd IEEE International Symposium on Parallel and Distributed Processing, 2009
Proceedings of the Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2009
2008
Int. J. Netw. Secur., 2008
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, 2008
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008
2007
Programming Highly Parallel Reconfigurable Architectures for Symmetric and Asymmetric Cryptographic Applications.
J. Comput., 2007
Programming Highly Parallel Reconfigurable Architectures for Public-Key Cryptographic Applications.
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007
Proceedings of the Fourth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2007
Proceedings of the Forum on specification and Design Languages, 2007
Proceedings of the 44th Design Automation Conference, 2007
2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Conference on Design, Automation and Test in Europe: Designers' Forum, 2006