With this function you can construct your weekly calendar of lessons, which is customized on the basis of the courses that you intend to follow. Warning: the personal schedule does not replace the presentation of the study plan! It's an informal tool that can help you better manage the organization of class attendance before the study plan presentation. After the study plan presentation we recommend you to use the Lecture timetable service in your Online Services.
To create your customized schedule follow these instructions:
- Click on the "Enable" link to proceed. You will be asked your surname and first name in order to determine your alphabetic grouping.
-
To add or remove courses from your personal schedule, use the small icons which are found next to the courses:
addition of the course
removal of the course
selection of the section of the Laboratory of Architecture (Note: the effective area in which the teaching will be carried out will be determined after the presentation of the Study Plans)
-
The sidebar on the left displays the number of lessons included in schedule.
There are also these commands:
View the schedule: allows the viewing of the weekly synoptic schedule
Delete the schedule: cancels the selections made
When you have finished the entry, you can print the calendar you have made.
Semester (Sem) | 1 | First Semester | 2 | Second Semester | A | Annual course | (1) | First Half-semester | (2) | Second Half-semester |
Language
|
|
Course completely offered in italian
|
|
Course completely offered in english
|
--
|
Not available
|
Note on the teaching activities
|
The calculation of the number of students enrolled only considers students enrolled in the academic year in question and does not include any possible students who may be attending but who are enrolled in previous academic years.
In case of structured courses taught by more professors, the number of students enrolled is related to the individual professor module, while the students opinion of the teaching is related to the course as a whole.
The data related to the last academic years (number of students enrolled and students opinion of the teaching) have not yet been defined.
|
|
Information on didactic, research and institutional assignments on this page are certified by the University; more information, prepared by the professor, are available on the personal web page and in the curriculum vitae indicated on this webpage.
Professor's office hours | Department | Floor | Office | Day | Timetable | Telephone | Fax | Notes |
---|
Dipartimento di Elettronica, Informazione e Bioingegneria - ed.20 | -- | 127 | -- | From : To : | 02.2399.3476 | -- | For students: office hours do not have a fixed time-slot, contact me via e-mail, and we will arrange a time. |
| E-mail | alessandro.barenghi@polimi.it | Professor's personal website | https://barenghi.faculty.polimi.it |
List of publications and reserach products for the year 2023 (Show all details | Hide all details) |
Type |
Title of the Publicaiton/Product |
Conference proceedings |
A Flexible ASIC-Oriented Design for a Full NTRU Accelerator (Show >>)(Hide <<)
|
Author/s |
Antognazza, F.; Barenghi, A.; Pelosi, G.; Susella, R. |
Title of the convention |
28th Asia and South Pacific Design Automation Conference |
Location of the convention |
Tokyo, Japan |
Period of the convention |
16/01/2023-19/01/2023 |
Title of the review |
--
|
Pages |
591 - 597 |
Item link |
http://hdl.handle.net/11311/1231207 |
|
An Efficient Unified Architecture for Polynomial Multiplications in Lattice-Based Cryptoschemes (Show >>)(Hide <<)
|
Author/s |
Antognazza, Francesco; Barenghi, Alessandro; Pelosi, Gerardo; Susella, Ruggero |
Title of the convention |
International Conference on Information Systems Security and Privacy |
Location of the convention |
Lisbon |
Period of the convention |
22/02/2023-24/02/2023 |
Title of the review |
--
|
Pages |
81 - 88 |
Item link |
http://hdl.handle.net/11311/1231206 |
|
Journal Articles |
Improving the Efficiency of Quantum Circuits for Information Set Decoding (Show >>)(Hide <<)
|
Author/s |
Perriello, S.; Barenghi, A.; Pelosi, G. |
Title of the review |
ACM TRANSACTIONS ON QUANTUM COMPUTING (ISSN: 2643-6809) |
Volume |
4 |
Brochure |
4 |
Pages |
1 - 40 |
Item link |
http://hdl.handle.net/11311/1247957 |
|
ON THE COMPUTATIONAL HARDNESS OF THE CODE EQUIVALENCE PROBLEM IN CRYPTOGRAPHY (Show >>)(Hide <<)
|
Author/s |
Barenghi, A.; Biasse, J. -F.; Persichetti, E.; Santini, P. |
Title of the review |
ADVANCES IN MATHEMATICS OF COMMUNICATIONS (ISSN: 1930-5346) |
Volume |
17 |
Brochure |
1 |
Pages |
23 - 55 |
Item link |
http://hdl.handle.net/11311/1233849 |
|
List of publications and reserach products for the year 2022 (Show all details | Hide all details) |
Type |
Title of the Publicaiton/Product |
Conference proceedings |
Author/s |
Baldi, M.; Barenghi, A.; Chiaraluce, F.; Pelosi, G.; Santini, P. |
Title of the convention |
International Workshop on Code-Based Cryptography (CBCrypto 2021) |
Location of the convention |
Munich, Germany |
Period of the convention |
21/06/2021-22/062021 |
Title of the review |
--
|
Pages |
1 - 27 |
Item link |
http://hdl.handle.net/11311/1204087 |
|
Journal Articles |
Advanced signature functionalities from the code equivalence problem (Show >>)(Hide <<)
|
Author/s |
Barenghi, A.; Biasse, J. -F.; Ngo, T.; Persichetti, E.; Santini, P. |
Title of the review |
INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS. COMPUTER SYSTEMS THEORY (ISSN: 2379-9927) |
Volume |
7 |
Brochure |
2 |
Pages |
112 - 128 |
Item link |
http://hdl.handle.net/11311/1233846 |
|
Locating Side Channel Leakage in Time through Matched Filters (Show >>)(Hide <<)
|
Author/s |
Barenghi, Alessandro; Falcetti, Gioele; Pelosi, Gerardo |
Title of the review |
CRYPTOGRAPHY (ISSN: 2410-387X) |
Volume |
6 |
Brochure |
2 |
Pages |
1 - 9 |
Item link |
http://hdl.handle.net/11311/1217363 |
|
Privacy-aware character pattern matching over outsourced encrypted data (Show >>)(Hide <<)
|
Author/s |
Mainardi, N.; Barenghi, A.; Pelosi, G. |
Title of the review |
DIGITAL THREATS (ISSN: 2692-1626) |
Volume |
3 |
Brochure |
1 |
Pages |
1 - 38 |
Item link |
http://hdl.handle.net/11311/1180993 |
|
Profiled side channel attacks against the RSA cryptosystem using neural networks (Show >>)(Hide <<)
|
Author/s |
Barenghi, A.; Carrera, D.; Mella, S.; Pace, A.; Pelosi, G.; Susella, R. |
Title of the review |
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (ISSN: 2214-2134) |
Volume |
66 |
Brochure |
-- |
Pages |
1 - 14 |
Item link |
http://hdl.handle.net/11311/1203208 |
|
List of publications and reserach products for the year 2021 (Show all details | Hide all details) |
Type |
Title of the Publicaiton/Product |
Contributions on scientific books |
Profiled Attacks Against the Elliptic Curve Scalar Point Multiplication Using Neural Networks (Show >>)(Hide <<)
|
Author/s of the contributin |
Barenghi, A.; Carrera, D.; Mella, S.; Pace, A.; Pelosi, G.; Susella, R. |
Title of the book |
Network and System Security. NSS 2021 (ISBN: 978-3-030-92707-3; 978-3-030-92708-0) |
Author/s of the book |
Yang M., Chen C., Liu Y. |
Publisher |
Springer Science and Business Media Deutschland GmbH |
Pages |
238 - 257 |
Item link |
http://hdl.handle.net/11311/1198513 |
|
Conference proceedings |
A Complete Quantum Circuit to Solve the Information Set Decoding Problem (Show >>)(Hide <<)
|
Author/s |
Perriello, S.; Barenghi, A.; Pelosi, G. |
Title of the convention |
2nd IEEE International Conference on Quantum Computing and Engineering, QCE 2021 |
Location of the convention |
usa |
Period of the convention |
2021 |
Title of the review |
--
|
Pages |
366 - 377 |
Item link |
http://hdl.handle.net/11311/1201187 |
|
A Quantum Circuit to Speed-up the Cryptanalysis of Code-based Cryptosystem (Show >>)(Hide <<)
|
Author/s |
Perriello, S.; Barenghi, A.; Pelosi, G. |
Title of the convention |
EAI SecureComm 2021 - 17th EAI International Conference on Security and Privacy in Communication Networks |
Location of the convention |
Virtual, Online |
Period of the convention |
06/09/2021-09/09/2021 |
Title of the review |
--
|
Pages |
458 - 474 |
Item link |
http://hdl.handle.net/11311/1191841 |
|
Analysis of In-Place Randomized Bit-Flipping Decoders for the Design of LDPC and MDPC Code-Based Cryptosystems (Show >>)(Hide <<)
|
Author/s |
Baldi, M.; Barenghi, A.; Chiaraluce, F.; Pelosi, G.; Santini, P. |
Title of the convention |
17th International Joint Conference on e-Business and Telecommunications, ICETE 2020 |
Location of the convention |
virtual |
Period of the convention |
2020 |
Title of the review |
--
|
Pages |
151 - 174 |
Item link |
http://hdl.handle.net/11311/1201190 |
|
Improving work life conditions via portable knowledge-driven recommender system (Show >>)(Hide <<)
|
Author/s |
Atzori, M.; Barenghi, A.; Comai, S.; Fugini, M.; Marcia, D.; Pelosi, G.; Sanguinetti, M.; Scotti, V. |
Title of the convention |
29th Italian Symposium on Advanced Database Systems |
Location of the convention |
Pizzo Calabro |
Period of the convention |
05/09/2021-09/09/2021 |
Title of the review |
--
|
Pages |
1 - 8 |
Item link |
http://hdl.handle.net/11311/1193882 |
|
Integrating Side Channel Security in the FPGA Hardware Design Flow (Show >>)(Hide <<)
|
Author/s |
Barenghi, A.; Brevi, M.; Fornaciari, W.; Pelosi, G.; Zoni, D. |
Title of the convention |
11th International Workshop on Constructive Side-Channel Analysis and Secure Design (Cosade 2020) |
Location of the convention |
Lugano, Switzerland |
Period of the convention |
05/10/2020 - 07/10/2020 |
Title of the review |
--
|
Pages |
275 - 290 |
Item link |
http://hdl.handle.net/11311/1165568 |
|
LESS-FM: Fine-Tuning Signatures from the Code Equivalence Problem (Show >>)(Hide <<)
|
Author/s |
Barenghi, A.; Biasse, J. -F.; Persichetti, E.; Santini, P. |
Title of the convention |
12th International Conference on post-quantum cryptography, PQCrypto 2021 |
Location of the convention |
kor |
Period of the convention |
2021 |
Title of the review |
--
|
Pages |
23 - 43 |
Item link |
http://hdl.handle.net/11311/1206468 |
|
Journal Articles |
Exploring Cortex-M Microarchitectural Side Channel Information Leakage (Show >>)(Hide <<)
|
Author/s |
Barenghi, A.; Breveglieri, L.; Izzo, N.; Pelosi, G. |
Title of the review |
IEEE ACCESS (ISSN: 2169-3536) |
Volume |
9 |
Brochure |
-- |
Pages |
156507 - 156527 |
Item link |
http://hdl.handle.net/11311/1191836 |
|
Metis: An Integrated Morphing Engine CPU to Protect Against Side Channel Attacks (Show >>)(Hide <<)
|
Author/s |
Antognazza, Francesco; Barenghi, Alessandro; Pelosi, Gerardo |
Title of the review |
IEEE ACCESS (ISSN: 2169-3536) |
Volume |
9 |
Brochure |
-- |
Pages |
69210 - 69225 |
Item link |
http://hdl.handle.net/11311/1178088 |
|
List of publications and reserach products for the year 2020 (Show all details | Hide all details) |
Type |
Title of the Publicaiton/Product |
Conference proceedings |
A Failure Rate Model of Bit-flipping Decoders for QC-LDPC and QC-MDPC Code-based Cryptosystems (Show >>)(Hide <<)
|
Author/s |
Baldi, M.; Barenghi, A.; Chiaraluce, F.; Pelosi, G.; Santini, P. |
Title of the convention |
SECRYPT 2020 - 17th International Conference on Security and Cryptography |
Location of the convention |
Lieusaint - Paris, France |
Period of the convention |
08/07/2020 - 10/07/2020 |
Title of the review |
--
|
Pages |
238 - 249 |
Item link |
http://hdl.handle.net/11311/1144467 |
|
A comprehensive analysis of constant-time polynomial inversion for post-quantum cryptosystems (Show >>)(Hide <<)
|
Author/s |
Barenghi, Alessandro; Pelosi, Gerardo |
Title of the convention |
17th ACM International Conference on Computing Frontiers (CF'20) |
Location of the convention |
Catania, Sicily, Italy |
Period of the convention |
01/06/2020 - 10/06/2020 |
Title of the review |
--
|
Pages |
269 - 276 |
Item link |
http://hdl.handle.net/11311/1137354 |
|
Constant weight strings in constant time: a building block for code-based post-quantum cryptosystems (Show >>)(Hide <<)
|
Author/s |
Barenghi, Alessandro; Pelosi, Gerardo |
Title of the convention |
17th ACM International Conference on Computing Frontiers (CF 2020) |
Location of the convention |
Catania, Sicily, Italy |
Period of the convention |
01/06/2020 - 10/06/2020 |
Title of the review |
--
|
Pages |
132 - 141 |
Item link |
http://hdl.handle.net/11311/1137353 |
|
Decision Support Systems to Promote Health and Well-being of People during their Working Age: the Case of the WorkingAge EU Project (Show >>)(Hide <<)
|
Author/s |
Resende de Almeida, R. M.; Grau Aberturas, A.; Bueno Aguado, Y.; Atzori, M.; Barenghi, A.; Borghini, G.; Catalina Ortega, C. A.; Comai, S.; Losada Durán, R.; Fugini, M.; Gunes, H.; Musleh Lancis, B.; Pelosi, G.; Ronca, V.; Sbattella, L.; Tedesco, R.; Xu, T. |
Title of the convention |
20th International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation (SAMOS) |
Location of the convention |
Samos, Greece |
Period of the convention |
05/07/2020 - 09/07/2020 |
Title of the review |
--
|
Pages |
336 - 347 |
Item link |
http://hdl.handle.net/11311/1150487 |
|
Efficient Oblivious Substring Search via Architectural Support (Show >>)(Hide <<)
|
Author/s |
Mainardi, N.; Sampietro, D.; Barenghi, A.; Pelosi, G. |
Title of the convention |
36th Annual Computer Security Applications Conference, ACSAC 2020 |
Location of the convention |
Austin, Texas, USA - virtual event |
Period of the convention |
7/12/2020-11/12/2020 |
Title of the review |
--
|
Pages |
526 - 541 |
Item link |
http://hdl.handle.net/11311/1150488 |
|
WorkingAge: Providing Occupational Safety through Pervasive Sensing and Data Driven Behavior Modeling (Show >>)(Hide <<)
|
Author/s |
Fugini, M.; Barenghi, A.; Comai, S.; Pelosi, G.; Tedesco, R.; van Gasteren, M.; Catalina, C. A.; Arribas Leal, E.; Losada Durán, R.; Martins de Almeida, R. M.; Mertens, A.; Rick, V.; Gunes, H.; Xu, T.; Borghini, G.; Ronca, V.; Sagha, H. |
Title of the convention |
30th European Safety and Reliability Conference (ESREL 2020) |
Location of the convention |
Venice, Italy (Virtual) |
Period of the convention |
01/11/2020 - 06/11/2020 |
Title of the review |
--
|
Pages |
1 - 8 |
Item link |
http://hdl.handle.net/11311/1141547 |
|
Journal Articles |
Compiler-based Techniques to Secure Cryptographic Embedded Software against Side Channel Attacks (Show >>)(Hide <<)
|
Author/s |
Agosta, G.; Barenghi, A.; Pelosi, G. |
Title of the review |
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS (ISSN: 0278-0070) |
Volume |
39 |
Brochure |
8 |
Pages |
1550 - 1554 |
Item link |
http://hdl.handle.net/11311/1098871 |
|
Scramble Suit: A Profile Differentiation Countermeasure to Prevent Template Attacks (Show >>)(Hide <<)
|
Author/s |
Barenghi, A.; Fornaciari, W.; Pelosi, G.; Zoni, D. |
Title of the review |
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS (ISSN: 0278-0070) |
Volume |
39 |
Brochure |
9 |
Pages |
1778 - 1791 |
Item link |
http://hdl.handle.net/11311/1092738 |
|
List of publications and reserach products for the year 2019 (Show all details | Hide all details) |
Type |
Title of the Publicaiton/Product |
Contributions on scientific books |
LEDAcrypt: QC-LDPC Code-Based Cryptosystems with Bounded Decryption Failure Rate (Show >>)(Hide <<)
|
Author/s of the contributin |
Baldi, M.; Barenghi, A.; Chiaraluce, F.; Pelosi, G.; Santini, P. |
Title of the book |
Code-Based Cryptography. 7th International Workshop, CBC 2019, Darmstadt, Germany, May 18–19, 2019, Revised Selected Papers (ISBN: 978-3-030-25921-1; 978-3-030-25922-8) |
Author/s of the book |
Marco Baldi, Edoardo Persichetti, Paolo Santini |
Publisher |
Springer, Cham |
Pages |
11 - 43 |
Item link |
http://hdl.handle.net/11311/1113938 |
|
The M2DC Approach towards Resource-efficient Computing (Show >>)(Hide <<)
|
Author/s of the contributin |
Agosta, Giovanni; Barenghi, Alessandro; Ciesielczyk, Tomasz; Dutta, Rahul; Fornaciari, William; Goubier, Thierry; Hagemeyer, Jens; Kosmann, Lars; Mainardi, Nicholas; Oleksiak, Ariel; Pelosi, Gerardo; Piatek, Wojciech; Pieper, Christian; Porrmann, Mario; Schlitt, Daniel; Zanella, Michele |
Title of the book |
OPPORTUNITIES AND CHALLENGES for European Projects (ISBN: 978-989-758-361-2) |
Author/s of the book |
A. Bagnato, R. Couceiro, J. Monteiro, D. Petrovska-Delacrétaz, A. Lopes, É. Gouveia |
Publisher |
SciTePress |
Pages |
150 - 176 |
Item link |
http://hdl.handle.net/11311/1104886 |
|
Conference proceedings |
A secure and authenticated host-to-memory communication interface (Show >>)(Hide <<)
|
Author/s |
Izzo, Niccolò; Barenghi, Alessandro; Breveglieri, Luca; Pelosi, Gerardo; Amato, Paolo |
Title of the convention |
16th ACM International Conference on Computing Frontiers |
Location of the convention |
Alghero, Italy |
Period of the convention |
April 30 - May 02, 2019 |
Title of the review |
--
|
Pages |
386 - 391 |
Item link |
http://hdl.handle.net/11311/1097592 |
|
Evaluating the Trade-offs in the Hardware Design of the LEDAcrypt Encryption Functions (Show >>)(Hide <<)
|
Author/s |
Barenghi, A.; Fornaciari, W.; Galimberti, A.; Pelosi, G.; Zoni, D. |
Title of the convention |
26th IEEE International Conference on Electronics, Circuits and Systems (ICECS) |
Location of the convention |
Genova, Italy |
Period of the convention |
27/11/2019-29/11/2019 |
Title of the review |
--
|
Pages |
739 - 742 |
Item link |
http://hdl.handle.net/11311/1121479 |
|
Privacy Preserving Substring Search Protocol with Polylogarithmic Communication Cost (Show >>)(Hide <<)
|
Author/s |
Mainardi, N.; Barenghi, A.; Pelosi, G. |
Title of the convention |
Computer Security Applications Conference (ACSAC 2019) |
Location of the convention |
San Juan, Puerto Rico, USA |
Period of the convention |
9/12/2019-13/12/2019 |
Title of the review |
--
|
Pages |
1 - 16 |
Item link |
http://hdl.handle.net/11311/1121480 |
|
Editorship of scientific books |
Foreword -Proceedings of the Sixth Workshop on Cryptography and Security in Computing Systems - ISBN:978-1-4503-6182-8. In ACM INTERNATIONAL CONFERENCE PROCEEDINGS SERIES (Show >>)(Hide <<)
|
|
Journal Articles |
A Finite Regime Analysis of Information Set Decoding Algorithms (Show >>)(Hide <<)
|
Author/s |
Baldi, M.; Barenghi, A.; Chiaraluce, F.; Pelosi, G.; Santini, P. |
Title of the review |
ALGORITHMS (ISSN: 1999-4893) |
Volume |
12 |
Brochure |
10 |
Pages |
1 - 35 |
Item link |
http://hdl.handle.net/11311/1116861 |
|
Plaintext recovery attacks against linearly decryptable fully homomorphic encryption schemes (Show >>)(Hide <<)
|
Author/s |
Mainardi, N.; Barenghi, A.; Pelosi, G. |
Title of the review |
COMPUTERS & SECURITY (ISSN: 0167-4048) |
Volume |
87 |
Brochure |
-- |
Pages |
1 - 17 |
Item link |
http://hdl.handle.net/11311/1099981 |
|
|
|