38 results on '"Barenghi, Alessandro"'
Search Results
2. Fault Attacks Friendliness of Post-quantum Cryptosystems
3. A Non Profiled and Profiled Side Channel Attack Countermeasure through Computation Interleaving
4. A Complete Quantum Circuit to Solve the Information Set Decoding Problem
5. Evaluating the Trade-offs in the Hardware Design of the LEDAcrypt Encryption Functions
6. Scramble Suit: A Profile Differentiation Countermeasure to Prevent Template Attacks.
7. Compiler-Based Techniques to Secure Cryptographic Embedded Software Against Side-Channel Attacks.
8. Software-only Reverse Engineering of Physical DRAM Mappings for Rowhammer Attacks
9. OpenCL HLS Based Design of FPGA Accelerators for Cryptographic Primitives
10. Side-channel security of superscalar CPUs : Evaluating the Impact of Micro-architectural Features
11. A Security Audit of the OpenPGP Format
12. V2I Cooperation for Traffic Management with SafeCop
13. Safe cooperative CPS: A V2I traffic management scenario in the SafeCOP project
14. Cyber-security analysis and evaluation for smart home management solutions
15. Towards Transparently Tackling Functionality and Performance Issues across Different OpenCL Platforms
16. Security challenges in building automation and SCADA
17. Securing software cryptographic primitives for embedded systems against side channel attacks
18. Snake: An End-to-End Encrypted Online Social Network
19. A multiple equivalent execution trace approach to secure cryptographic embedded software
20. Drop-In Control Flow Hijacking Prevention through Dynamic Library Interception
21. Information leakage chaff: Feeding red herrings to side channel attackers.
22. Automated Security Analysis of Dynamic Web Applications through Symbolic Code Execution
23. On the Efficiency of Design Time Evaluation of the Resistance to Power Attacks
24. Security and Privacy in Smart Grid Infrastructures
25. A novel fault attack against ECDSA
26. Fault attack on AES with single-bit induced faults
27. Low voltage fault attacks to AES
28. Record Setting Software Implementation of DES Using CUDA
29. Fast Disk Encryption through GPGPU Acceleration
30. Low Voltage Fault Attacks on the RSA Cryptosystem
31. Design of a parallel AES for graphics hardware using the CUDA framework
32. A FPGA Coprocessor for the Cryptographic Tate Pairing over Fp
33. The MEET Approach: Securing Cryptographic Embedded Software Against Side Channel Attacks.
34. Compiler-based side channel vulnerability analysis and optimized countermeasures application.
35. A code morphing methodology to automate power analysis countermeasures.
36. Exploiting bit-level parallelism in GPGPUs: A case study on KeeLoq exhaustive key search attack.
37. Smart metering in power grids: Application scenarios and security.
38. Fault Injection Attacks on Cryptographic Devices: Theory, Practice, and Countermeasures.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.