Politecnico di Milano
Manifesti degli Studi
 
Menu
Degree programme
Programme Structure
Show/Search Programme
Degree Programme
International context
Customized Schedule
Your customized time schedule has been disabled
Enable
Your customized schedule contains 0/15 courses
Delete schedule
Search
Search a Professor
Professor's activities
Search a Course
Search a Course (system prior D.M. n. 509)
Search Lessons taught in English
Exit

Professor's activitiesCambia LinguaCambia Lingua
Information on didactic, research and institutional assignments on this page are certified by the University; more information, prepared by the professor, are available on the personal web page and in the curriculum vitae indicated on this webpage.
Add this page to bookmarks

Information on professor
ProfessorPelosi Gerardo
QualificationAssociate professor
Belonging DepartmentDipartimento di Elettronica, Informazione e Bioingegneria
Scientific-Disciplinary SectorING-INF/05 - Information Processing Systems
Curriculum Vitae--
OrcIDhttps://orcid.org/0000-0002-3812-5429

Contacts
Professor's office hours
DepartmentFloorOfficeDayTimetableTelephoneFaxNotes
Dipartimento di Elettronica, Informazione e Bioingegneria (DEIB)1127WednesdayFrom 16:00
To 19:00
+39.02.2399.3476+.39.02.2399.3441--
E-mailgerardo.pelosi@polimi.it
Professor's personal websitehttp://home.dei.polimi.it/pelosi/doku.php

Data source: RE.PUBLIC@POLIMI - Research Publications at Politecnico di Milano

List of publications and reserach products for the year 2019
No product yet registered in the year 2019


List of publications and reserach products for the year 2018 (Show all details | Hide all details)
Type Title of the Publicaiton/Product
Journal Articles
Three-server swapping for access confidentiality (Show >>)
Enforcing authorizations while protecting access confidentiality (Show >>)
A Comprehensive Side-Channel Information Leakage Analysis of an In-Order RISC CPU Microarchitecture (Show >>)
Systematic Parsing of X.509: Eradicating Security Issues with a Parse Tree (Show >>)
Reactive Side-channel Countermeasures: Applicability and Quantitative Security Evaluation (Show >>)
Contributions on scientific books
A Novel Regular Format for X.509 Digital Certificates (Show >>)
LEDAkem: a post-quantum key encapsulation mechanism based on QC-LDPC codes (Show >>)
Access Privacy in the Cloud (Show >>)
M2DC-A novel heterogeneous hyperscale microserver platform (Show >>)
Conference proceedings
Side-channel security of superscalar CPUs: Evaluating the Impact of Micro-architectural Features (Show >>)
OpenCL HLS Based Design of FPGA Accelerators for Cryptographic Primitives (Show >>)
Software-only reverse engineering of physical dram mappings for rowhammer attacks (Show >>)
Comparison-based Attacks against Noise-free Fully Homomorphic Encryption Schemes (Show >>)


List of publications and reserach products for the year 2017 (Show all details | Hide all details)
Type Title of the Publicaiton/Product
Journal Articles
M2DC – Modular Microserver DataCentre with Heterogeneous Hardware (Show >>)
Conference proceedings
A dynamic tree-based data structure for access privacy (Show >>)
Data Centres for IoT applications: the M2DC Approach (Show >>)
Safe Cooperative CPS: A V2I Traffic Management scenario in the SafeCOP project (Show >>)
An Enhanced Dataflow Analysis to Automatically Tailor Side Channel Attack Countermeasures to Software Block Ciphers (Show >>)
A Security Audit of the OpenPGP Format (Show >>)
Editorship of scientific books
Foreword - Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems (Show >>)


List of publications and reserach products for the year 2016 (Show all details | Hide all details)
Type Title of the Publicaiton/Product
Journal Articles
A fault-based secret key retrieval method for ECDSA: analysis and countermeasure (Show >>)
A privacy-preserving encrypted OSN with stateless server interaction: the Snake design (Show >>)
Conference proceedings
A note on fault attacks against deterministic signature schemes (Show >>)
Access control for the shuffle index (Show >>)
Automated instantiation of side-channel attacks countermeasures for software cipher implementations (Show >>)
Encasing Block Ciphers to Foil Key Recovery Attempts via Side Channel (Show >>)
V2I Cooperation for Traffic Management with SafeCOP (Show >>)
The M2DC Project: Modular Microserver DataCentre (Show >>)
Editorship of scientific books
Foreword - Proceedings of the Third Workshop on Cryptography and Security in Computing Systems (Show >>)
Foreword (Show >>)


List of publications and reserach products for the year 2015 (Show all details | Hide all details)
Type Title of the Publicaiton/Product
Journal Articles
Trace-based Schedulability Analysis to Enhance Passive Side-Channel Attack Resilience of Embedded Software (Show >>)
OpenCL Performance Portability for GPGPUs: an Exploration on Cryptographic Primitives (Show >>)
The MEET Approach: Securing Cryptographic Embedded Software Against Side Channel Attacks (Show >>)
Shuffle Index: Efficient and Private Access to Outsourced Data (Show >>)
Contributions on scientific books
Computer Security Anchors in Smart Grids: The Smart Metering Scenario and Challenges (Show >>)
Fault Sensitivity Analysis at Design Time (Show >>)
Conference proceedings
Information Leakage Chaff: Feeding Red Herrings to Side Channel Attackers (Show >>)
Challenging the Trustworthiness of PGP: Is the Web-of-Trust Tear-Proof? (Show >>)
Cyber-Security Analysis and Evaluation for Smart Home Management Solutions (Show >>)
Editorship of scientific books
Foreword - Proceedings of the Second Workshop on Cryptography and Security in Computing Systems (Show >>)
16/06/2019 Area Servizi ICT v. 2.13.4 / 2.13.4