Search filters

List of works by Gerardo Pelosi

A Comprehensive Side-Channel Information Leakage Analysis of an In-Order RISC CPU Microarchitecture

A Dynamic Tree-Based Data Structure for Access Privacy in the Cloud

A FPGA Coprocessor for the Cryptographic Tate Pairing over Fp

A Fault-Based Secret Key Retrieval Method for ECDSA

A Finite Regime Analysis of Information Set Decoding Algorithms

scientific article published in October 2019

A Multiple Equivalent Execution Trace Approach to Secure Cryptographic Embedded Software

A Note on Fault Attacks Against Deterministic Signature Schemes (Short Paper)

article

A Novel Regular Format for X.509 Digital Certificates

A Security Audit of the OpenPGP Format

A Transform-Parametric Approach to Boolean Matching

A Unified Approach to Canonical Form-based Boolean Matching

A code morphing methodology to automate power analysis countermeasures

A fault induction technique based on voltage underfeeding with application to attacks against AES and RSA

A pairing SW implementation for Smart-Cards

A privacy-preserving encrypted OSN with stateless server interaction: The Snake design

Access Control for the Shuffle Index

Analysis of In-Place Randomized Bit-Flipping Decoders for the Design of LDPC and MDPC Code-Based Cryptosystems

scientific article published in 2021

Automated Security Analysis of Dynamic Web Applications through Symbolic Code Execution

Automated instantiation of side-channel attacks countermeasures for software cipher implementations

Challenging the Trustworthiness of PGP: Is the Web-of-Trust Tear-Proof?

article by Alessandro Barenghi et al published 2015 in Lecture Notes in Computer Science

Compiler-Based Techniques to Secure Cryptographic Embedded Software Against Side-Channel Attacks

scientific article published in 2020

Compiler-based side channel vulnerability analysis and optimized countermeasures application

article

Computational intelligence techniques to detect toxic gas presence

article

Computer Security Anchors in Smart Grids: The Smart Metering Scenario and Challenges

Countermeasures Against Branch Target Buffer Attacks

Countermeasures against fault attacks on software implemented AES

article

Cyber-security analysis and evaluation for smart home management solutions

Data centres for IoT applications: The M2DC approach (Invited paper)

article

Design Time Engineering of Side Channel Resistant Cipher Implementations

Design of a parallel AES for graphics hardware using the CUDA framework

Design space extension for secure implementation of block ciphers

Differential Fault Analysis for Block Ciphers

Distributed Shuffling for Preserving Access Confidentiality

Drop-In Control Flow Hijacking Prevention through Dynamic Library Interception

Efficient and Private Access to Outsourced Data

scholarly article published June 2011

Encasing block ciphers to foil key recovery attempts via side channel

Encryption-Based Policy Enforcement for Cloud Storage

Enforcing authorizations while protecting access confidentiality1

Enhancing Passive Side-Channel Attack Resilience through Schedulability Analysis of Data-Dependency Graphs

article

Fast Disk Encryption through GPGPU Acceleration

Fault Sensitivity Analysis at Design Time

Fault attack on AES with single-bit induced faults

Fault attack to the elliptic curve digital signature algorithm with multiple bit faults

article

Improving first order differential power attacks through digital signal processing

Improving the Efficiency of Quantum Circuits for Information Set Decoding

scientific article published on 06 July 2023

Information Leakage Discovery Techniques to Enhance Secure Chip Design

Information leakage chaff

Injection Technologies for Fault Attacks on Microprocessors

LEDAkem: A Post-quantum Key Encapsulation Mechanism Based on QC-LDPC Codes

Locating Side Channel Leakage in Time through Matched Filters

scientific article published in 2022

Low Voltage Fault Attacks on the RSA Cryptosystem

article published in 2009

Low voltage fault attacks to AES

M2DC – Modular Microserver DataCentre with heterogeneous hardware

M2DC—A Novel Heterogeneous Hyperscale Microserver Platform

On Task Assignment in Data Intensive Scalable Computing

OpenCL performance portability for general-purpose computation on graphics processor units: an exploration on cryptographic primitives

Parallel Hardware Architectures for the Cryptographic Tate Pairing

Plaintext recovery attacks against linearly decryptable fully homomorphic encryption schemes

scientific article published in 2019

Preserving confidentiality of security policies in data outsourcing

Privacy-aware character pattern matching over outsourced encrypted data

scientific article published in 2021

Programming Highly Parallel Reconfigurable Architectures for Public-Key Cryptographic Applications

Programming Highly Parallel Reconfigurable Architectures for Symmetric and Asymmetric Cryptographic Applications

Protecting Access Confidentiality with Data Distribution and Swapping

Reactive side-channel countermeasures: Applicability and quantitative security evaluation

Record Setting Software Implementation of DES Using CUDA

article

SMaC

Safe cooperative CPS: A V2I traffic management scenario in the SafeCOP project

Secure and efficient design of software block cipher implementations on microcontrollers

Securing software cryptographic primitives for embedded systems against side channel attacks

Security Analysis of Building Automation Networks

Security Integration in Medical Device Design: Extension of an Automated Bio-Medical Engineering Design Methodology

scholarly article published April 2014

Security and Privacy in Smart Grid Infrastructures

Security challenges in building automation and SCADA

Selective Exchange of Confidential Data in the Outsourcing Scenario

Shuffle Index

Side-channel security of superscalar CPUs

Side-channel security of superscalar CPUs : Evaluating the Impact of Micro-architectural Features

scholarly article published June 2018

Smart metering in power grids: Application scenarios and security

article

Snake: An End-to-End Encrypted Online Social Network

Supporting Concurrency in Private Data Outsourcing

article

Supporting concurrency and multiple indexes in private access to outsourced data1

Symmetric Key Encryption Acceleration on Heterogeneous Many-Core Architectures

Systematic parsing of X.509: Eradicating security issues with a parse tree

The M2DC Project: Modular Microserver DataCentre

The MEET Approach: Securing Cryptographic Embedded Software Against Side Channel Attacks

Three-Server Swapping for Access Confidentiality

Towards Transparently Tackling Functionality and Performance Issues across Different OpenCL Platforms

Trace-based schedulability analysis to enhance passive side-channel attack resilience of embedded software

scholarly article by Giovanni Agosta et al published February 2015 in Information Processing Letters

V2I Cooperation for Traffic Management with SafeCop