Sfoglia per Relatore
A compiler-based technique for automated analysis and protection against side-channel attacks
2015/2016 SANFILIPPO, STEFANO
Achieving low-cost side channel attacks via quantitative information leakage analysis
2017/2018 CARLUCCI, ALAIN FEDERICO
Architectural characterization of passive side channel leakage : the case of ARM Cortex-A7
2015/2016 BOTTI, DAVIDE
Automatic identification and extraction of side channel information leakage from AES computations
2018/2019 FALCETTI, GIOELE
A concrete evaluation of information set decoding techniques
2020/2021 LUNARDI, EMANUELE
Design and implementation of a countermeasure against profiled side-channel attacks based on temporal redundancy
2021/2022 Piacentini, Isabella
Design of a quantum circuit for quantum random walks on Johnson Graphs
2020/2021 Lancellotti, Giacomo
Enabling robust keyservers for OpenPGP : key reconciliation reengineering for the peaks keyserver
2017/2018 GRAZIOSO, ANDREA
Evaluating OpenCL programming practices for FPGAs : a case study on symmetric block ciphers
2016/2017 MADASCHI, MICHELE
Implementing ChaCha20: analysis on performance, resource utilization and side-channel protection
2023/2024 DANI, VITTORIO
Inverse optimization in LEDAcrypt a post-quantum cryptosystem
2018/2019 ZAMPOGNA, GIAN LUCA
Low overhead side channel protection for code-based post-quantum cryptosystems
2020/2021 Prosdocimi, Marco
MEETing again: a recursive static morphing countermeasure to side-channel attacks
2023/2024 SONA, VALENTINA
On the effectiveness of code morphing side-channel countermeasures : an information theoretic evaluation
2020/2021 FIOZZI, DAVIDE
PEAKS : adding proactive security to OpenPGP keyservers
2016/2017 PINI, MATTIA
Private information retrieval: an overview and recent developments
2023/2024 BATTIATO, JACOPO
Reliably achieving and efficiently preventing Rowhammer attacks
2017/2018 IZZO, NICCOLO'
Secure and efficient post-quantum cryptosystem realizations. Constant weight encoding and vectorization in LEDACrypt
2018/2019 GERVASONI, NICOLE
SIEM and SOAR: Securing Active Directory using Wazuh and Cortex xSOAR
2023/2024 Viafora, Matteo
A survey of post-quantum signatures based on the Fiat-Shamir heuristic
2021/2022 DAOLIO, PAOLO
Legenda icone accesso al fulltext
- File accessibili da tutti
- File accessibili dagli utenti autorizzati
- File accessibili da tutti o solo dagli utenti autorizzati, a partire dalla la data indicata nella scheda
- File non accessibili