Alessandro Barenghi
Alessandro Barenghi
Dirección de correo verificada de - Página principal
Citado por
Citado por
Fault injection attacks on cryptographic devices: Theory, practice, and countermeasures
A Barenghi, L Breveglieri, I Koren, D Naccache
Proceedings of the IEEE 100 (11), 3056-3076, 2012
On the vulnerability of FPGA bitstream encryption against power analysis attacks: extracting keys from xilinx Virtex-II FPGAs
A Moradi, A Barenghi, T Kasper, C Paar
Proceedings of the 18th ACM conference on Computer and communications …, 2011
ShieldFS: a self-healing, ransomware-aware filesystem
A Continella, A Guagnelli, G Zingaro, G De Pasquale, A Barenghi, ...
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
Design of a parallel AES for graphics hardware using the CUDA framework
A Di Biagio, A Barenghi, G Agosta, G Pelosi
2009 IEEE international symposium on parallel & distributed processing, 1-8, 2009
Low voltage fault attacks on the RSA cryptosystem
A Barenghi, G Bertoni, E Parrinello, G Pelosi
2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 23-31, 2009
Countermeasures against fault attacks on software implemented AES: effectiveness and cost
A Barenghi, L Breveglieri, I Koren, G Pelosi, F Regazzoni
Proceedings of the 5th Workshop on Embedded Systems Security, 1-10, 2010
A code morphing methodology to automate power analysis countermeasures
G Agosta, A Barenghi, G Pelosi
Proceedings of the 49th Annual Design Automation Conference, 77-82, 2012
Low voltage fault attacks to AES
A Barenghi, GM Bertoni, L Breveglieri, M Pellicioli, G Pelosi
2010 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2010
Automated security analysis of dynamic web applications through symbolic code execution
G Agosta, A Barenghi, A Parata, G Pelosi
2012 Ninth International COnference on Information Technology-New …, 2012
Improving first order differential power attacks through digital signal processing
A Barenghi, G Pelosi, Y Teglia
Proceedings of the 3rd international conference on Security of information …, 2010
A fault induction technique based on voltage underfeeding with application to attacks against AES and RSA
A Barenghi, GM Bertoni, L Breveglieri, G Pelosi
Journal of Systems and Software 86 (7), 1864-1878, 2013
LEDAkem: A post-quantum key encapsulation mechanism based on QC-LDPC codes
M Baldi, A Barenghi, F Chiaraluce, G Pelosi, P Santini
International Conference on Post-Quantum Cryptography, 3-24, 2018
Compiler-based side channel vulnerability analysis and optimized countermeasures application
G Agosta, A Barenghi, M Maggi, G Pelosi
2013 50th ACM/EDAC/IEEE Design Automation Conference (DAC), 1-6, 2013
Exploring the feasibility of low cost fault injection attacks on sub-threshold devices through an example of a 65nm aes implementation
A Barenghi, C Hocquet, D Bol, FX Standaert, F Regazzoni, I Koren
International Workshop on Radio Frequency Identification: Security and …, 2011
Record setting software implementation of DES using CUDA
G Agosta, A Barenghi, F De Santis, G Pelosi
2010 Seventh International Conference on Information Technology: New …, 2010
Low Voltage Fault Attacks to AES and RSA on General Purpose Processors.
A Barenghi, G Bertoni, L Breveglieri, M Pellicioli, G Pelosi
IACR Cryptol. ePrint Arch. 2010, 130, 2010
Information leakage discovery techniques to enhance secure chip design
A Barenghi, G Pelosi, Y Teglia
IFIP International Workshop on Information Security Theory and Practices …, 2011
Fault attack on AES with single-bit induced faults
A Barenghi, GM Bertoni, L Breveglieri, M Pellicioli, G Pelosi
2010 Sixth International Conference on Information Assurance and Security …, 2010
OpenCL performance portability for general‐purpose computation on graphics processor units: an exploration on cryptographic primitives
G Agosta, A Barenghi, A Di Federico, G Pelosi
Concurrency and Computation: Practice and Experience 27 (14), 3633-3660, 2015
Security and privacy in smart grid infrastructures
A Barenghi, G Pelosi
2011 22nd International Workshop on Database and Expert Systems Applications …, 2011
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20