logo-polimi
Loading...
Degree programme
Programme Structure
Show/Search Programme
Degree Programme
International context
Customized Schedule
Your customized time schedule has been disabled
Enable
Search
Search a Professor
Professor's activities
Search a Course
Search a Course (system prior D.M. n. 509)
Search Lessons taught in English
Information on didactic, research and institutional assignments on this page are certified by the University; more information, prepared by the professor, are available on the personal web page and in the curriculum vitae indicated on this webpage.
Information on professor
ProfessorPelosi Gerardo
QualificationAssociate professor
Belonging DepartmentDipartimento di Elettronica, Informazione e Bioingegneria
Scientific-Disciplinary SectorING-INF/05 - Information Processing Systems
Curriculum Vitae--
OrcIDhttps://orcid.org/0000-0002-3812-5429

Contacts
Professor's office hours
DepartmentFloorOfficeDayTimetableTelephoneFaxNotes
Dipartimento di Elettronica, Informazione e Bioingegneria (DEIB)+ 39 02 2399 3441127WednesdayFrom 16:00
To 19:00
+39.02.2399.3476+.39.02.2399.3441--
E-mailgerardo.pelosi@polimi.it
Professor's personal websitehttp://home.dei.polimi.it/pelosi/doku.php

Data source: RE.PUBLIC@POLIMI - Research Publications at Politecnico di Milano

List of publications and reserach products for the year 2019 (Show all details | Hide all details)
Type Title of the Publicaiton/Product
Journal Articles
Compiler-based Techniques to Secure Cryptographic Embedded Software against Side Channel Attacks (Show >>)
Scramble Suit: A Profile Differentiation Countermeasure to Prevent Template Attacks (Show >>)
Plaintext recovery attacks against linearly decryptable fully homomorphic encryption schemes (Show >>)
A Finite Regime Analysis of Information Set Decoding Algorithms (Show >>)
Contributions on scientific books
LEDAcrypt: QC-LDPC Code-Based Cryptosystems with Bounded Decryption Failure Rate (Show >>)
The M2DC Approach towards Resource-efficient Computing (Show >>)
Conference proceedings
A secure and authenticated host-to-memory communication interface (Show >>)
Accelerating Automotive Analytics: The M2DC Appliance Approach (Show >>)
Privacy Preserving Substring Search Protocol with Polylogarithmic Communication Cost (Show >>)
Evaluating the Trade-offs in the Hardware Design of the LEDAcrypt Encryption Functions (Show >>)


List of publications and reserach products for the year 2018 (Show all details | Hide all details)
Type Title of the Publicaiton/Product
Journal Articles
Three-server swapping for access confidentiality (Show >>)
Enforcing authorizations while protecting access confidentiality (Show >>)
A Comprehensive Side-Channel Information Leakage Analysis of an In-Order RISC CPU Microarchitecture (Show >>)
Systematic Parsing of X.509: Eradicating Security Issues with a Parse Tree (Show >>)
Reactive Side-channel Countermeasures: Applicability and Quantitative Security Evaluation (Show >>)
Contributions on scientific books
A Novel Regular Format for X.509 Digital Certificates (Show >>)
LEDAkem: a post-quantum key encapsulation mechanism based on QC-LDPC codes (Show >>)
Access Privacy in the Cloud (Show >>)
M2DC-A novel heterogeneous hyperscale microserver platform (Show >>)
Conference proceedings
Side-channel security of superscalar CPUs: Evaluating the Impact of Micro-architectural Features (Show >>)
OpenCL HLS Based Design of FPGA Accelerators for Cryptographic Primitives (Show >>)
Software-only reverse engineering of physical dram mappings for rowhammer attacks (Show >>)
Comparison-based Attacks against Noise-free Fully Homomorphic Encryption Schemes (Show >>)
Editorship of scientific books
Foreword -Proceedings of the Fifth Workshop on Cryptography and Security in Computing Systems (Show >>)


List of publications and reserach products for the year 2017 (Show all details | Hide all details)
Type Title of the Publicaiton/Product
Journal Articles
M2DC – Modular Microserver DataCentre with Heterogeneous Hardware (Show >>)
Conference proceedings
A dynamic tree-based data structure for access privacy in the cloud (Show >>)
Data Centres for IoT applications: the M2DC Approach (Show >>)
Safe Cooperative CPS: A V2I Traffic Management scenario in the SafeCOP project (Show >>)
An Enhanced Dataflow Analysis to Automatically Tailor Side Channel Attack Countermeasures to Software Block Ciphers (Show >>)
A Security Audit of the OpenPGP Format (Show >>)
Editorship of scientific books
Foreword - Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems (Show >>)


List of publications and reserach products for the year 2016 (Show all details | Hide all details)
Type Title of the Publicaiton/Product
Journal Articles
A fault-based secret key retrieval method for ECDSA: analysis and countermeasure (Show >>)
A privacy-preserving encrypted OSN with stateless server interaction: the Snake design (Show >>)
Conference proceedings
A note on fault attacks against deterministic signature schemes (Show >>)
Access control for the shuffle index (Show >>)
Automated instantiation of side-channel attacks countermeasures for software cipher implementations (Show >>)
Encasing Block Ciphers to Foil Key Recovery Attempts via Side Channel (Show >>)
V2I Cooperation for Traffic Management with SafeCOP (Show >>)
The M2DC Project: Modular Microserver DataCentre (Show >>)
Editorship of scientific books
Foreword - Proceedings of the Third Workshop on Cryptography and Security in Computing Systems (Show >>)


List of publications and reserach products for the year 2015 (Show all details | Hide all details)
Type Title of the Publicaiton/Product
Journal Articles
Trace-based Schedulability Analysis to Enhance Passive Side-Channel Attack Resilience of Embedded Software (Show >>)
OpenCL Performance Portability for GPGPUs: an Exploration on Cryptographic Primitives (Show >>)
The MEET Approach: Securing Cryptographic Embedded Software Against Side Channel Attacks (Show >>)
Shuffle Index: Efficient and Private Access to Outsourced Data (Show >>)
Contributions on scientific books
Computer Security Anchors in Smart Grids: The Smart Metering Scenario and Challenges (Show >>)
Fault Sensitivity Analysis at Design Time (Show >>)
Conference proceedings
Information Leakage Chaff: Feeding Red Herrings to Side Channel Attackers (Show >>)
Challenging the Trustworthiness of PGP: Is the Web-of-Trust Tear-Proof? (Show >>)
Cyber-Security Analysis and Evaluation for Smart Home Management Solutions (Show >>)
Editorship of scientific books
Foreword - Proceedings of the Second Workshop on Cryptography and Security in Computing Systems (Show >>)
manifesti v. 3.1.9 / 3.1.9
Area Servizi ICT
13/12/2019