logo-polimi
Loading...
Degree programme
Programme Structure
Show/Search Programme
Degree Programme
Quantitative data
International context
Customized Schedule
Your customized time schedule has been disabled
Enable
Search
Search a Lecturer
Lecturer's activities
Search a Course
Search a Course (system prior D.M. n. 509)
Search Lessons taught in English
Information on didactic, research and institutional assignments on this page are certified by the University; more information, prepared by the lecturer, are available on the personal web page and in the curriculum vitae indicated on this webpage.
Information
LecturerPelosi Gerardo
QualificationAssociate professor full time
Belonging DepartmentDipartimento di Elettronica, Informazione e Bioingegneria
Scientific-Disciplinary SectorIINF-05/A - Information Processing Systems
Curriculum VitaeDownload CV (289.0Kb - 15/09/2023)
OrcIDhttps://orcid.org/0000-0002-3812-5429

Contacts
Office hours
DepartmentFloorOfficeDayTimetableTelephoneFaxNotes
Dipartimento di Elettronica, Informazione e Bioingegneria (DEIB)1127WednesdayFrom 16:00
To 19:00
+39.02.2399.3476+.39.02.2399.3441---
E-mailgerardo.pelosi@polimi.it
Personal websitehttp://home.dei.polimi.it/pelosi/doku.php

Data source: RE.PUBLIC@POLIMI - Research Publications at Politecnico di Milano

List of publications and reserach products for the year 2025 (Show all details | Hide all details)
Type Title of the Publicaiton/Product
Voce (in dizionario o enciclopedia)
Differentially Private ORAM (Show >>)
Oblivious Parallel RAM (OPRAM) (Show >>)
Oblivious RAM (ORAM) (Show >>)
Privacy-Preserving Joins over Encrypted Data (Show >>)
Private Boolean Queries on Encrypted Data (Show >>)
Secure Audit Logs (Show >>)
Secure Index (Show >>)
Shuffle Index (Show >>)
Top-k Query Processing on Encrypted Data (Show >>)
Contributions on scientific books
Review of Policy-as-code Approaches to Manage Security and Privacy Conditions in Edge and Cloud Computing Ecosystems (Show >>)
Conference proceedings
A comparison of deep learning approaches for power-based side-channel attacks (Show >>)
Post Quantum Cryptography Research Lines in the Italian Center for Security and Rights in Cyberspace (Show >>)
Journal Articles
An Efficient and Unified RTL Accelerator Design for HQC-128, HQC-192, and HQC-256 (Show >>)


List of publications and reserach products for the year 2024 (Show all details | Hide all details)
Type Title of the Publicaiton/Product
Conference proceedings
A High Efficiency Hardware Design for the Post-Quantum KEM HQC (Show >>)
A Quantum Circuit to Execute a Key-Recovery Attack Against the DES and 3DES Block Ciphers (Show >>)
A Quantum Method to Match Vector Boolean Functions Using Simon's Solver (Show >>)
A Versatile and Unified HQC Hardware Accelerator (Show >>)
Bit-flipping Decoder Failure Rate Estimation for (v,w)-regular Codes (Show >>)
Design of a Quantum Walk Circuit to Solve the Subset-Sum Problem (Show >>)
Investigating The Health State Of X.509 Digital Certificate (Show >>)
Optimizing Quantum Circuit Synthesis with Dominator Analysis (Show >>)
Quantum Circuit Design for the Lee-Brickell Based Information Set Decoding (Show >>)
Journal Articles
Performance and Efficiency Exploration of Hardware Polynomial Multipliers for Post-Quantum Lattice-Based Cryptosystems (Show >>)


List of publications and reserach products for the year 2023 (Show all details | Hide all details)
Type Title of the Publicaiton/Product
Abstract in Atti di convegno
Fault Attacks Friendliness of Post-quantum Cryptosystems (Show >>)
Conference proceedings
A Flexible ASIC-Oriented Design for a Full NTRU Accelerator (Show >>)
A Non Profiled and Profiled Side Channel Attack Countermeasure through Computation Interleaving (Show >>)
An Efficient Unified Architecture for Polynomial Multiplications in Lattice-Based Cryptoschemes (Show >>)
Quantum Computing Research Lines in the Italian Center for Supercomputing (Show >>)
Journal Articles
Improving the Efficiency of Quantum Circuits for Information Set Decoding (Show >>)


List of publications and reserach products for the year 2022 (Show all details | Hide all details)
Type Title of the Publicaiton/Product
Conference proceedings
Performance bounds for QC-MDPC codes decoders (Show >>)
Journal Articles
Locating Side Channel Leakage in Time through Matched Filters (Show >>)
Privacy-aware character pattern matching over outsourced encrypted data (Show >>)
Profiled side channel attacks against the RSA cryptosystem using neural networks (Show >>)


List of publications and reserach products for the year 2021 (Show all details | Hide all details)
Type Title of the Publicaiton/Product
Contributions on scientific books
Profiled Attacks Against the Elliptic Curve Scalar Point Multiplication Using Neural Networks (Show >>)
Conference proceedings
A Complete Quantum Circuit to Solve the Information Set Decoding Problem (Show >>)
A Quantum Circuit to Speed-up the Cryptanalysis of Code-based Cryptosystem (Show >>)
Analysis of In-Place Randomized Bit-Flipping Decoders for the Design of LDPC and MDPC Code-Based Cryptosystems (Show >>)
Improving work life conditions via portable knowledge-driven recommender system (Show >>)
Integrating Side Channel Security in the FPGA Hardware Design Flow (Show >>)
Journal Articles
Exploring Cortex-M Microarchitectural Side Channel Information Leakage (Show >>)
Metis: An Integrated Morphing Engine CPU to Protect Against Side Channel Attacks (Show >>)
manifesti v. 3.9.3 / 3.9.3
Area Servizi ICT
24/04/2025