Follow
Alessandro Barenghi
Title
Cited by
Cited by
Year
Fault injection attacks on cryptographic devices: Theory, practice, and countermeasures
A Barenghi, L Breveglieri, I Koren, D Naccache
Proceedings of the IEEE 100 (11), 3056-3076, 2012
7282012
Shieldfs: a self-healing, ransomware-aware filesystem
A Continella, A Guagnelli, G Zingaro, G De Pasquale, A Barenghi, ...
Proceedings of the 32nd annual conference on computer security applications …, 2016
3802016
On the vulnerability of FPGA bitstream encryption against power analysis attacks: extracting keys from xilinx Virtex-II FPGAs
A Moradi, A Barenghi, T Kasper, C Paar
Proceedings of the 18th ACM conference on Computer and communications …, 2011
3212011
Low voltage fault attacks on the RSA cryptosystem
A Barenghi, G Bertoni, E Parrinello, G Pelosi
2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 23-31, 2009
1372009
Countermeasures against fault attacks on software implemented AES: effectiveness and cost
A Barenghi, L Breveglieri, I Koren, G Pelosi, F Regazzoni
Proceedings of the 5th Workshop on Embedded Systems Security, 1-10, 2010
1272010
Design of a parallel AES for graphics hardware using the CUDA framework
A Di Biagio, A Barenghi, G Agosta, G Pelosi
2009 IEEE international symposium on parallel & distributed processing, 1-8, 2009
1262009
Low voltage fault attacks to AES
A Barenghi, GM Bertoni, L Breveglieri, M Pellicioli, G Pelosi
2010 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2010
912010
A code morphing methodology to automate power analysis countermeasures
G Agosta, A Barenghi, G Pelosi
Proceedings of the 49th Annual Design Automation Conference, 77-82, 2012
812012
LEDAkem: A post-quantum key encapsulation mechanism based on QC-LDPC codes
M Baldi, A Barenghi, F Chiaraluce, G Pelosi, P Santini
International Conference on Post-Quantum Cryptography, 3-24, 2018
722018
Automated security analysis of dynamic web applications through symbolic code execution
G Agosta, A Barenghi, A Parata, G Pelosi
2012 Ninth International Conference on Information Technology-New …, 2012
632012
LESS-FM: fine-tuning signatures from the code equivalence problem
A Barenghi, JF Biasse, E Persichetti, P Santini
Post-Quantum Cryptography: 12th International Workshop, PQCrypto 2021 …, 2021
612021
A fault induction technique based on voltage underfeeding with application to attacks against AES and RSA
A Barenghi, GM Bertoni, L Breveglieri, G Pelosi
Journal of Systems and Software 86 (7), 1864-1878, 2013
562013
A finite regime analysis of information set decoding algorithms
M Baldi, A Barenghi, F Chiaraluce, G Pelosi, P Santini
Algorithms 12 (10), 209, 2019
552019
Software-only reverse engineering of physical DRAM mappings for RowHammer attacks
A Barenghi, L Breveglieri, N Izzo, G Pelosi
2018 IEEE 3rd International Verification and Security Workshop (IVSW), 19-24, 2018
492018
Compiler-based side channel vulnerability analysis and optimized countermeasures application
G Agosta, A Barenghi, M Maggi, G Pelosi
Proceedings of the 50th Annual Design Automation Conference, 1-6, 2013
472013
Improving first order differential power attacks through digital signal processing
A Barenghi, G Pelosi, Y Teglia
Proceedings of the 3rd international conference on Security of information …, 2010
452010
Protection system and method for protecting a computer system against ransomware attacks
A Continella, S Zanero, F Maggi, A Guagnelli, G Zingaro, A Barenghi, ...
US Patent App. 15/368,465, 2018
442018
Parallel parsing made practical
A Barenghi, SC Reghizzi, D Mandrioli, F Panella, M Pradella
Science of Computer Programming 112, 195-226, 2015
422015
Low voltage fault attacks to AES and RSA on general purpose processors
A Barenghi, G Bertoni, L Breveglieri, M Pellicioli, G Pelosi
Cryptology ePrint Archive, 2010
392010
Side-channel security of superscalar CPUs: Evaluating the impact of micro-architectural features
A Barenghi, G Pelosi
Proceedings of the 55th Annual Design Automation Conference, 1-6, 2018
372018
The system can't perform the operation now. Try again later.
Articles 1–20