logo-polimi
Loading...
Degree programme
Programme Structure
Show/Search Programme
Degree Programme
International context
Customized Schedule
Your customized time schedule has been disabled
Enable
Search
Search a Professor
Professor's activities
Search a Course
Search a Course (system prior D.M. n. 509)
Search Lessons taught in English
Information on didactic, research and institutional assignments on this page are certified by the University; more information, prepared by the professor, are available on the personal web page and in the curriculum vitae indicated on this webpage.
Information on professor
ProfessorPelosi Gerardo
QualificationAssociate professor full time
Belonging DepartmentDipartimento di Elettronica, Informazione e Bioingegneria
Scientific-Disciplinary SectorING-INF/05 - Information Processing Systems
Curriculum Vitae--
OrcIDhttps://orcid.org/0000-0002-3812-5429

Contacts
Professor's office hours
DepartmentFloorOfficeDayTimetableTelephoneFaxNotes
Dipartimento di Elettronica, Informazione e Bioingegneria (DEIB)+ 39 02 2399 3441127WednesdayFrom 16:00
To 19:00
+39.02.2399.3476+.39.02.2399.3441--
E-mailgerardo.pelosi@polimi.it
Professor's personal websitehttp://home.dei.polimi.it/pelosi/doku.php

Data source: RE.PUBLIC@POLIMI - Research Publications at Politecnico di Milano

List of publications and reserach products for the year 2020 (Show all details | Hide all details)
Type Title of the Publicaiton/Product
Conference proceedings
A Failure Rate Model of Bit-flipping Decoders for QC-LDPC and QC-MDPC Code-based Cryptosystems (Show >>)
A comprehensive analysis of constant-time polynomial inversion for post-quantum cryptosystems (Show >>)
Constant weight strings in constant time: a building block for code-based post-quantum cryptosystems (Show >>)
WorkingAge: Providing Occupational Safety through Pervasive Sensing and Data Driven Behavior Modeling (Show >>)
Journal Articles
Compiler-based Techniques to Secure Cryptographic Embedded Software against Side Channel Attacks (Show >>)
Scramble Suit: A Profile Differentiation Countermeasure to Prevent Template Attacks (Show >>)


List of publications and reserach products for the year 2019 (Show all details | Hide all details)
Type Title of the Publicaiton/Product
Contributions on scientific books
LEDAcrypt: QC-LDPC Code-Based Cryptosystems with Bounded Decryption Failure Rate (Show >>)
The M2DC Approach towards Resource-efficient Computing (Show >>)
Conference proceedings
A secure and authenticated host-to-memory communication interface (Show >>)
Accelerating Automotive Analytics: The M2DC Appliance Approach (Show >>)
Evaluating the Trade-offs in the Hardware Design of the LEDAcrypt Encryption Functions (Show >>)
Privacy Preserving Substring Search Protocol with Polylogarithmic Communication Cost (Show >>)
Editorship of scientific books
Foreword -Proceedings of the Sixth Workshop on Cryptography and Security in Computing Systems - ISBN:978-1-4503-6182-8. In ACM INTERNATIONAL CONFERENCE PROCEEDINGS SERIES (Show >>)
Journal Articles
A Finite Regime Analysis of Information Set Decoding Algorithms (Show >>)
Plaintext recovery attacks against linearly decryptable fully homomorphic encryption schemes (Show >>)


List of publications and reserach products for the year 2018 (Show all details | Hide all details)
Type Title of the Publicaiton/Product
Contributions on scientific books
A Novel Regular Format for X.509 Digital Certificates (Show >>)
Access Privacy in the Cloud (Show >>)
LEDAkem: a post-quantum key encapsulation mechanism based on QC-LDPC codes (Show >>)
M2DC-A novel heterogeneous hyperscale microserver platform (Show >>)
Conference proceedings
Comparison-based Attacks against Noise-free Fully Homomorphic Encryption Schemes (Show >>)
OpenCL HLS Based Design of FPGA Accelerators for Cryptographic Primitives (Show >>)
Side-channel security of superscalar CPUs: Evaluating the Impact of Micro-architectural Features (Show >>)
Software-only reverse engineering of physical dram mappings for rowhammer attacks (Show >>)
Editorship of scientific books
Foreword -Proceedings of the Fifth Workshop on Cryptography and Security in Computing Systems (Show >>)
Journal Articles
A Comprehensive Side-Channel Information Leakage Analysis of an In-Order RISC CPU Microarchitecture (Show >>)
Enforcing authorizations while protecting access confidentiality (Show >>)
Reactive Side-channel Countermeasures: Applicability and Quantitative Security Evaluation (Show >>)
Systematic Parsing of X.509: Eradicating Security Issues with a Parse Tree (Show >>)
Three-server swapping for access confidentiality (Show >>)


List of publications and reserach products for the year 2017 (Show all details | Hide all details)
Type Title of the Publicaiton/Product
Conference proceedings
A Security Audit of the OpenPGP Format (Show >>)
A dynamic tree-based data structure for access privacy in the cloud (Show >>)
An Enhanced Dataflow Analysis to Automatically Tailor Side Channel Attack Countermeasures to Software Block Ciphers (Show >>)
Data Centres for IoT applications: the M2DC Approach (Show >>)
Safe Cooperative CPS: A V2I Traffic Management scenario in the SafeCOP project (Show >>)
Editorship of scientific books
Foreword - Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems (Show >>)
Journal Articles
M2DC – Modular Microserver DataCentre with Heterogeneous Hardware (Show >>)


List of publications and reserach products for the year 2016 (Show all details | Hide all details)
Type Title of the Publicaiton/Product
Conference proceedings
A note on fault attacks against deterministic signature schemes (Show >>)
Access control for the shuffle index (Show >>)
Automated instantiation of side-channel attacks countermeasures for software cipher implementations (Show >>)
Encasing Block Ciphers to Foil Key Recovery Attempts via Side Channel (Show >>)
The M2DC Project: Modular Microserver DataCentre (Show >>)
V2I Cooperation for Traffic Management with SafeCOP (Show >>)
Editorship of scientific books
Foreword - Proceedings of the Third Workshop on Cryptography and Security in Computing Systems (Show >>)
Journal Articles
A fault-based secret key retrieval method for ECDSA: analysis and countermeasure (Show >>)
A privacy-preserving encrypted OSN with stateless server interaction: the Snake design (Show >>)
manifesti v. 3.3.7 / 3.3.7
Area Servizi ICT
13/08/2020