Sfoglia per Relatore BARENGHI, ALESSANDRO
On the effectiveness of code morphing side-channel countermeasures : an information theoretic evaluation
2020/2021 FIOZZI, DAVIDE
PEAKS : adding proactive security to OpenPGP keyservers
2016/2017 PINI, MATTIA
Practical format transforming encryption with context-free grammars and finite automata
2024/2025 CALCATERRA, ALICE
Private information retrieval: an overview and recent developments
2023/2024 BATTIATO, JACOPO
A proactive approach to X.509 monitoring: adding cryptographic checks to Certificate Transparency monitors
2023/2024 Vismara, Alessio
Reliably achieving and efficiently preventing Rowhammer attacks
2017/2018 IZZO, NICCOLO'
Secure and efficient post-quantum cryptosystem realizations. Constant weight encoding and vectorization in LEDACrypt
2018/2019 GERVASONI, NICOLE
SIEM and SOAR: Securing Active Directory using Wazuh and Cortex xSOAR
2023/2024 Viafora, Matteo
A survey of post-quantum signatures based on the Fiat-Shamir heuristic
2021/2022 DAOLIO, PAOLO
Synthetic models for side channel attack analysis and countermeasure development
2025/2026 Piacentini, Isabella
A systematic analysis and optimization of information set decoding techniques : theoretical bounds and software realization
2018/2019 TINARELLI, FRANCESCO
A systematic analysis of neural network based approaches to power Side-Channel Attack
2022/2023 CARIATI, LEONARDO
Towards efficient post-quantum signatures: parallelizing keccak in CROSS and contributing to open-source libraries
2023/2024 Gianvecchio, Marco
towards fast and side-channel resistant implementations of hamming quasi-cyclic: a case study on arm cortex-m4 devices
2022/2023 Cacace, Domenico
Legenda icone accesso al fulltext
- File accessibili da tutti
- File accessibili dagli utenti autorizzati
- File accessibili da tutti o solo dagli utenti autorizzati, a partire dalla la data indicata nella scheda
- File non accessibili