Sfoglia per Correlatore PELOSI, GERARDO
Mostrati risultati da 1 a 15 di 15
A compiler-based technique for automated analysis and protection against side-channel attacks
2015/2016 SANFILIPPO, STEFANO
Applicazione automatizzata di contromisure ad attacchi side-channel basati sull'analisi del consumo di potenza per primitive crittografiche a chiave simmetrica
2013/2014 FIDUCCIA, FRANCESCO
Architectural characterization of passive side channel leakage : the case of ARM Cortex-A7
2015/2016 BOTTI, DAVIDE
Closed form decoding failure rate estimation for code-based post-quantum cryptosystems
2024/2025 ANNECHINI, ALESSANDRO
Design of a quantum circuit for quantum random walks on Johnson Graphs
2020/2021 Lancellotti, Giacomo
On the effectiveness of code morphing side-channel countermeasures : an information theoretic evaluation
2020/2021 FIOZZI, DAVIDE
Private information retrieval: an overview and recent developments
2023/2024 BATTIATO, JACOPO
Reliably achieving and efficiently preventing Rowhammer attacks
2017/2018 IZZO, NICCOLO'
A secure transport layer for the TDMH network stack with key management, authentication, and encryption services
2019/2020 Mazzola, Valeria
SELinux policies for fine-grained protection of Android apps
2017/2018 ROSSI, MATTHEW
A systematic analysis of neural network based approaches to power Side-Channel Attack
2022/2023 CARIATI, LEONARDO
Towards efficient post-quantum signatures: parallelizing keccak in CROSS and contributing to open-source libraries
2023/2024 Gianvecchio, Marco
Towards efficient training in deep learning side-channel attacks
2021/2022 CASTELLAZZI, LUCA
towards fast and side-channel resistant implementations of hamming quasi-cyclic: a case study on arm cortex-m4 devices
2022/2023 Cacace, Domenico
Vulnerability analysis and xountermeasures in building automation networks and Cyber-Physical Systems
ANTONINI, ALESSIO
Mostrati risultati da 1 a 15 di 15
Legenda icone accesso al fulltext
- File accessibili da tutti
- File accessibili dagli utenti autorizzati
- File accessibili da tutti o solo dagli utenti autorizzati, a partire dalla la data indicata nella scheda
- File non accessibili