Gerardo Pelosi

According to our database1, Gerardo Pelosi authored at least 94 papers between 2006 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Accelerating Automotive Analytics: The M2DC Appliance Approach.
Proceedings of the Embedded Computer Systems: Architectures, Modeling, and Simulation, 2019

A secure and authenticated host-to-memory communication interface.
Proceedings of the 16th ACM International Conference on Computing Frontiers, 2019

LEDAcrypt: QC-LDPC Code-Based Cryptosystems with Bounded Decryption Failure Rate.
Proceedings of the Code-Based Cryptography - 7th International Workshop, 2019

2018
A Comprehensive Side-Channel Information Leakage Analysis of an In-Order RISC CPU Microarchitecture.
ACM Trans. Design Autom. Electr. Syst., 2018

Three-Server Swapping for Access Confidentiality.
IEEE Trans. Cloud Computing, 2018

Reactive side-channel countermeasures: Applicability and quantitative security evaluation.
Microprocessors and Microsystems - Embedded Hardware Design, 2018

Enforcing authorizations while protecting access confidentiality.
Journal of Computer Security, 2018

Systematic parsing of X.509: Eradicating security issues with a parse tree.
Journal of Computer Security, 2018

Systematic Parsing of X.509: Eradicating Security Issues with a Parse Tree.
CoRR, 2018

Design and Implementation of a Digital Signature Scheme Based on Low-density Generator Matrix Codes.
CoRR, 2018

LEDAkem: a post-quantum key encapsulation mechanism based on QC-LDPC codes.
CoRR, 2018

LEDAkem: A Post-quantum Key Encapsulation Mechanism Based on QC-LDPC Codes.
Proceedings of the Post-Quantum Cryptography - 9th International Conference, 2018

Software-only Reverse Engineering of Physical DRAM Mappings for Rowhammer Attacks.
Proceedings of the 3rd IEEE International Verification and Security Workshop, 2018

OpenCL HLS Based Design of FPGA Accelerators for Cryptographic Primitives.
Proceedings of the 2018 International Conference on High Performance Computing & Simulation, 2018

Comparison-Based Attacks Against Noise-Free Fully Homomorphic Encryption Schemes.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

Side-channel security of superscalar CPUs: evaluating the impact of micro-architectural features.
Proceedings of the 55th Annual Design Automation Conference, 2018

Access Privacy in the Cloud.
Proceedings of the From Database to Cyber Security, 2018

2017
M2DC - Modular Microserver DataCentre with heterogeneous hardware.
Microprocessors and Microsystems - Embedded Hardware Design, 2017

An Enhanced Dataflow Analysis to Automatically Tailor Side Channel Attack Countermeasures to Software Block Ciphers.
Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), 2017

A Security Audit of the OpenPGP Format.
Proceedings of the 14th International Symposium on Pervasive Systems, 2017

2016
A Fault-Based Secret Key Retrieval Method for ECDSA: Analysis and Countermeasure.
JETC, 2016

A privacy-preserving encrypted OSN with stateless server interaction: The Snake design.
Computers & Security, 2016


Safe cooperative CPS: A V2I traffic management scenario in the SafeCOP project.
Proceedings of the International Conference on Embedded Computer Systems: Architectures, 2016

A Note on Fault Attacks Against Deterministic Signature Schemes.
Proceedings of the Advances in Information and Computer Security, 2016

Encasing block ciphers to foil key recovery attempts via side channel.
Proceedings of the 35th International Conference on Computer-Aided Design, 2016


V2I Cooperation for Traffic Management with SafeCop.
Proceedings of the 2016 Euromicro Conference on Digital System Design, 2016

Access Control for the Shuffle Index.
Proceedings of the Data and Applications Security and Privacy XXX, 2016

A Dynamic Tree-Based Data Structure for Access Privacy in the Cloud.
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science, 2016

Automated instantiation of side-channel attacks countermeasures for software cipher implementations.
Proceedings of the ACM International Conference on Computing Frontiers, CF'16, 2016

2015
Shuffle Index: Efficient and Private Access to Outsourced Data.
TOS, 2015

The MEET Approach: Securing Cryptographic Embedded Software Against Side Channel Attacks.
IEEE Trans. on CAD of Integrated Circuits and Systems, 2015

Trace-based schedulability analysis to enhance passive side-channel attack resilience of embedded software.
Inf. Process. Lett., 2015

OpenCL performance portability for general-purpose computation on graphics processor units: an exploration on cryptographic primitives.
Concurrency and Computation: Practice and Experience, 2015

Cyber-security analysis and evaluation for smart home management solutions.
Proceedings of the International Carnahan Conference on Security Technology, 2015

Challenging the Trustworthiness of PGP: Is the Web-of-Trust Tear-Proof?
Proceedings of the Computer Security - ESORICS 2015, 2015

Information leakage chaff: feeding red herrings to side channel attackers.
Proceedings of the 52nd Annual Design Automation Conference, 2015

2014
Design space extension for secure implementation of block ciphers.
IET Computers & Digital Techniques, 2014

Simulation-Time Security Margin Assessment against Power-Based Side Channel Attacks.
IACR Cryptology ePrint Archive, 2014

Differential Fault Analysis for Block Ciphers: an Automated Conservative Analysis.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

On the Security of Partially Masked Software Implementations.
Proceedings of the SECRYPT 2014, 2014

Security Integration in Medical Device Design: Extension of an Automated Bio-Medical Engineering Design Methodology.
Proceedings of the 11th International Conference on Information Technology: New Generations, 2014

Security challenges in building automation and SCADA.
Proceedings of the International Carnahan Conference on Security Technology, 2014

Securing software cryptographic primitives for embedded systems against side channel attacks.
Proceedings of the International Carnahan Conference on Security Technology, 2014

Towards Transparently Tackling Functionality and Performance Issues across Different OpenCL Platforms.
Proceedings of the Second International Symposium on Computing and Networking, 2014

Snake: An End-to-End Encrypted Online Social Network.
Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications, 2014

A Multiple Equivalent Execution Trace Approach to Secure Cryptographic Embedded Software.
Proceedings of the 51st Annual Design Automation Conference 2014, 2014

Protecting Access Confidentiality with Data Distribution and Swapping.
Proceedings of the 2014 IEEE Fourth International Conference on Big Data and Cloud Computing, 2014

2013
A fault induction technique based on voltage underfeeding with application to attacks against AES and RSA.
Journal of Systems and Software, 2013

Supporting concurrency and multiple indexes in private access to outsourced data.
Journal of Computer Security, 2013

Secure and efficient design of software block cipher implementations on microcontrollers.
IJGUC, 2013

Enhancing Passive Side-Channel Attack Resilience through Schedulability Analysis of Data-Dependency Graphs.
Proceedings of the Network and System Security - 7th International Conference, 2013

Security Analysis of Building Automation Networks - Threat Model and Viable Mitigation Techniques.
Proceedings of the Secure IT Systems - 18th Nordic Conference, 2013

On Task Assignment in Data Intensive Scalable Computing.
Proceedings of the Job Scheduling Strategies for Parallel Processing, 2013

Drop-In Control Flow Hijacking Prevention through Dynamic Library Interception.
Proceedings of the Tenth International Conference on Information Technology: New Generations, 2013

Distributed Shuffling for Preserving Access Confidentiality.
Proceedings of the Computer Security - ESORICS 2013, 2013

Compiler-based side channel vulnerability analysis and optimized countermeasures application.
Proceedings of the 50th Annual Design Automation Conference 2013, 2013

2012
Injection Technologies for Fault Attacks on Microprocessors.
Proceedings of the Fault Analysis in Cryptography, 2012

Automated Security Analysis of Dynamic Web Applications through Symbolic Code Execution.
Proceedings of the Ninth International Conference on Information Technology: New Generations, 2012

A code morphing methodology to automate power analysis countermeasures.
Proceedings of the 49th Annual Design Automation Conference 2012, 2012

Exploiting Bit-level Parallelism in GPGPUs: a Case Study on KeeLoq Exhaustive Search Attacks.
Proceedings of the ARCS 2012 Workshops, 28. Februar - 2. März 2012, München, Germany, 2012

2011
Secure Index.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Secure Audit Logs.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Information Leakage Discovery Techniques to Enhance Secure Chip Design.
Proceedings of the Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, 2011

Fault attack to the elliptic curve digital signature algorithm with multiple bit faults.
Proceedings of the 4th International Conference on Security of Information and Networks, 2011

Efficient and Private Access to Outsourced Data.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

Supporting Concurrency in Private Data Outsourcing.
Proceedings of the Computer Security - ESORICS 2011, 2011

Security and Privacy in Smart Grid Infrastructures.
Proceedings of the 2011 Database and Expert Systems Applications, 2011

Selective Exchange of Confidential Data in the Outsourcing Scenario.
Proceedings of the Privacy and Identity Management for Life, 2011

2010
Low Voltage Fault Attacks to AES and RSA on General Purpose Processors.
IACR Cryptology ePrint Archive, 2010

Improving first order differential power attacks through digital signal processing.
Proceedings of the 3rd International Conference on Security of Information and Networks, 2010

SMaC: spatial map caching technique for mobile devices.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Record Setting Software Implementation of DES Using CUDA.
Proceedings of the Seventh International Conference on Information Technology: New Generations, 2010

Encryption-Based Policy Enforcement for Cloud Storage.
Proceedings of the 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 2010

Low Voltage Fault Attacks to AES.
Proceedings of the HOST 2010, 2010

Countermeasures against fault attacks on software implemented AES: effectiveness and cost.
Proceedings of the 5th Workshop on Embedded Systems Security, 2010

Fault attack on AES with single-bit induced faults.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010

2009
A Transform-Parametric Approach to Boolean Matching.
IEEE Trans. on CAD of Integrated Circuits and Systems, 2009

Fast Disk Encryption through GPGPU Acceleration.
Proceedings of the 2009 International Conference on Parallel and Distributed Computing, 2009

Design of a parallel AES for graphics hardware using the CUDA framework.
Proceedings of the 23rd IEEE International Symposium on Parallel and Distributed Processing, 2009

Low Voltage Fault Attacks on the RSA Cryptosystem.
Proceedings of the Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2009

2008
A pairing SW implementation for Smart-Cards.
Journal of Systems and Software, 2008

Parallel Hardware Architectures for the Cryptographic Tate Pairing.
I. J. Network Security, 2008

Preserving confidentiality of security policies in data outsourcing.
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, 2008

A FPGA Coprocessor for the Cryptographic Tate Pairing over Fp.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008

2007
Programming Highly Parallel Reconfigurable Architectures for Symmetric and Asymmetric Cryptographic Applications.
JCP, 2007

Programming Highly Parallel Reconfigurable Architectures for Public-Key Cryptographic Applications.
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007

Countermeasures against Branch Target Buffer Attacks.
Proceedings of the Fourth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2007

A Domain Specific Language for Cryptography.
Proceedings of the Forum on specification and Design Languages, 2007

A Unified Approach to Canonical Form-based Boolean Matching.
Proceedings of the 44th Design Automation Conference, 2007

2006
Countermeasures for the Simple Branch Prediction Analysis.
IACR Cryptology ePrint Archive, 2006

Parallel Hardware Architectures for the Cryptographic Tate Pairing.
Proceedings of the Third International Conference on Information Technology: New Generations (ITNG 2006), 2006

Software implementation of Tate pairing over GF(2m).
Proceedings of the Conference on Design, Automation and Test in Europe: Designers' Forum, 2006


  Loading...