Pelosi, Gerardo
133  results:
Search for persons X
?
1

Quantum Circuit Design for the Lee-Brickell Based Informati..:

, In: Lecture Notes in Computer Science; Applied Cryptography and Network Security Workshops,
 
?
2

A High Efficiency Hardware Design for the Post-Quantum KEM ..:

, In: 2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST),
 
?
4

A Versatile and Unified HQC Hardware Accelerator:

, In: Lecture Notes in Computer Science; Applied Cryptography and Network Security Workshops,
 
?
5

Fault Attacks Friendliness of Post-quantum Cryptosystems:

, In: 2023 Workshop on Fault Detection and Tolerance in Cryptography (FDTC),
 
?
6

A Non Profiled and Profiled Side Channel Attack Countermeas..:

, In: 2023 26th Euromicro Conference on Digital System Design (DSD),
 
?
8

Quantum Computing Research Lines in the Italian Center for ..:

, In: Lecture Notes in Computer Science; Embedded Computer Systems: Architectures, Modeling, and Simulation,
 
?
9

A Flexible ASIC-Oriented Design for a Full NTRU Accelerator:

, In: Proceedings of the 28th Asia and South Pacific Design Automation Conference,
 
?
10

Profiled side channel attacks against the RSA cryptosystem ..:

Barenghi, Alessandro ; Carrera, Diego ; Mella, Silvia...
Journal of Information Security and Applications.  66 (2022)  - p. 103122 , 2022
 
?
12

Performance Bounds for QC-MDPC Codes Decoders:

, In: Code-Based Cryptography; Lecture Notes in Computer Science,
 
?
13

Analysis of In-Place Randomized Bit-Flipping Decoders for t..:

, In: E-Business and Telecommunications; Communications in Computer and Information Science,
 
?
15

Profiled Attacks Against the Elliptic Curve Scalar Point Mu..:

, In: Network and System Security; Lecture Notes in Computer Science,
 
1-15