Francesco Regazzoni
YOU?
Author Swipe
View article: Building Trust in Synthetic Health Data: Methodological and Acceptance Challenges across Seven European Projects (Preprint)
Building Trust in Synthetic Health Data: Methodological and Acceptance Challenges across Seven European Projects (Preprint) Open
BACKGROUND Synthetic data generation (SDG) is increasingly used in health research to address privacy concerns and data sharing barriers, particularly in cross-border and multi-institutional contexts. Despite growing interest, questions r…
View article: Emergence of Structure in Ensembles of Random Neural Networks
Emergence of Structure in Ensembles of Random Neural Networks Open
Randomness is ubiquitous in many applications across data science and machine learning. Remarkably, systems composed of random components often display emergent global behaviors that appear deterministic, manifesting a transition from micr…
View article: DBHMT: Dynamic Balancing Hybrid Merkle Tree-Design, Optimization and Evaluation in IOTA Tangle for Healthcare 4.0
DBHMT: Dynamic Balancing Hybrid Merkle Tree-Design, Optimization and Evaluation in IOTA Tangle for Healthcare 4.0 Open
View article: Enabling Quantum-Resistant EDHOC: Design and Performance Evaluation
Enabling Quantum-Resistant EDHOC: Design and Performance Evaluation Open
The Ephemeral Diffie-Hellman over COSE (EDHOC) is a compact and lightweight key establishment protocol for constrained scenarios that provides end-to-end application layer security context. However, because of the vulnerability of the disc…
View article: Energy Analysis of Cryptographic Algorithms in Server Environment
Energy Analysis of Cryptographic Algorithms in Server Environment Open
View article: 120 Domain-Specific Languages for Security
120 Domain-Specific Languages for Security Open
Security engineering, from security requirements engineering to the implementation of cryptographic protocols, is often supported by domain-specific languages (DSLs). Unfortunately, a lack of knowledge about these DSLs, such as which secur…
View article: MYRTUS: Multi-layer 360° dYnamic orchestration and interopeRable design environmenT for compute-continUum Systems
MYRTUS: Multi-layer 360° dYnamic orchestration and interopeRable design environmenT for compute-continUum Systems Open
<p>Started on January 2024, the MYRTUS Horizon Europe project aims at unlocking the new living dimension of Cyber-Physical Systems (CPS), embracing the principles of the TransContinuum Initiative, integrating edge, fog and cloud comp…
View article: Jailbreak Imagers: Transforming a Single-Photon Image Sensor into a True Random Number Generator.
Jailbreak Imagers: Transforming a Single-Photon Image Sensor into a True Random Number Generator. Open
In this paper we present a large array of SPADs and we discuss its suitability for applications different than imaging, exploring in particular how to transform it into a high speed True Random Number Generator (TRNG). The proposed matrix …
View article: COMPARISON OF TWO CAMERAS BASED ON SINGLE PHOTON AVALANCHE DIODES (SPADS) FOR FLUORESCENCE LIFETIME IMAGING APPLICATION WITH PICOSECOND RESOLUTION
COMPARISON OF TWO CAMERAS BASED ON SINGLE PHOTON AVALANCHE DIODES (SPADS) FOR FLUORESCENCE LIFETIME IMAGING APPLICATION WITH PICOSECOND RESOLUTION Open
We report on a comparative study of two time-resolved cameras based on digital Single Photon Avalanche Diodes (SPADs) for Fluorescence Lifetime Imaging applications. SPAD imagers provide intensity as well as direct access to the fluorescen…
View article: Special Issue on Post-Quantum Cryptography for Embedded Systems
Special Issue on Post-Quantum Cryptography for Embedded Systems Open
This survey provides a comparative overview of code-based signature schemes with respect to security and performance. Furthermore, we explicitly describe serveral code-based signature schemes with additional properties such as identity-bas…
View article: A System Development Kit for Big Data Applications on FPGA-based Clusters: The EVEREST Approach
A System Development Kit for Big Data Applications on FPGA-based Clusters: The EVEREST Approach Open
Modern big data workflows are characterized by computationally intensive kernels. The simulated results are often combined with knowledge extracted from AI models to ultimately support decision-making. These energy-hungry workflows are inc…
View article: SECURED for Health: Scaling Up Privacy to Enable the Integration of the European Health Data Space
SECURED for Health: Scaling Up Privacy to Enable the Integration of the European Health Data Space Open
View article: Compact Circuits for Efficient Möbius Transform
Compact Circuits for Efficient Möbius Transform Open
The Möbius transform is a linear circuit used to compute the evaluations of a Boolean function over all points on its input domain. The operation is very useful in finding the solution of a system of polynomial equations over GF(2) for obv…
View article: A System Development Kit for Big Data Applications on FPGA-based Clusters: The EVEREST Approach
A System Development Kit for Big Data Applications on FPGA-based Clusters: The EVEREST Approach Open
Modern big data workflows are characterized by computationally intensive kernels. The simulated results are often combined with knowledge extracted from AI models to ultimately support decision-making. These energy-hungry workflows are inc…
View article: Physics-informed Neural Network Estimation of Material Properties in Soft Tissue Nonlinear Biomechanical Models
Physics-informed Neural Network Estimation of Material Properties in Soft Tissue Nonlinear Biomechanical Models Open
The development of biophysical models for clinical applications is rapidly advancing in the research community, thanks to their predictive nature and their ability to assist the interpretation of clinical data. However, high-resolution and…
View article: A Visionary Look at the Security of Reconfigurable Cloud Computing
A Visionary Look at the Security of Reconfigurable Cloud Computing Open
Field-programmable gate arrays (FPGAs) have become critical components in many cloud computing platforms. These devices possess the fine-grained parallelism and specialization needed to accelerate applications ranging from machine learning…
View article: The QARMAv2 Family of Tweakable Block Ciphers
The QARMAv2 Family of Tweakable Block Ciphers Open
We introduce the QARMAv2 family of tweakable block ciphers. It is a redesign of QARMA (from FSE 2017) to improve its security bounds and allow for longer tweaks, while keeping similar latency and area. The wider tweak input caters to both …
View article: Practical Implementations of Remote Power Side-Channel and Fault-Injection Attacks on Multitenant FPGAs
Practical Implementations of Remote Power Side-Channel and Fault-Injection Attacks on Multitenant FPGAs Open
View article: Data Under Siege: The Quest for the Optimal Convolutional Autoencoder in Side-Channel Attacks
Data Under Siege: The Quest for the Optimal Convolutional Autoencoder in Side-Channel Attacks Open
Encryption is a method to keep our data safe from third parties. However, side-channel information may be leaked during encryption due to physical properties. This information can be used in side-channel attacks to recover critical values …
View article: A Survey on Thwarting Memory Corruption in RISC-V
A Survey on Thwarting Memory Corruption in RISC-V Open
With embedded devices becoming more pervasive and entrenched in society, it is paramount to keep these systems secure. A threat plaguing these systems consists of software vulnerabilities that cause memory corruption, potentially allowing …
View article: CCSW '22
CCSW '22 Open
Clouds and massive-scale computing infrastructures are starting to dominate computing and will likely continue to do so for the foreseeable future. Major cloud operators are now comprising millions of cores hosting substantial fractions of…
View article: The Side-channel Metrics Cheat Sheet
The Side-channel Metrics Cheat Sheet Open
Side-channel attacks exploit a physical observable originating from a cryptographic device in order to extract its secrets. Many practically relevant advances in the field of side-channel analysis relate to security evaluations of cryptogr…
View article: Optimizing Lattice-based Post-Quantum Cryptography Codes for High-Level Synthesis
Optimizing Lattice-based Post-Quantum Cryptography Codes for High-Level Synthesis Open
High-level synthesis is a mature Electronics Design Automation (EDA) technology for building hardware design in a short time. It produces automatically HDL code for FPGAs out of C/C++, bridging the gap from algorithm to hardware. Neverthel…
View article: Future Computer Systems and Networking Research in the Netherlands: A Manifesto
Future Computer Systems and Networking Research in the Netherlands: A Manifesto Open
Our modern society and competitive economy depend on a strong digital foundation and, in turn, on sustained research and innovation in computer systems and networks (CompSys). With this manifesto, we draw attention to CompSys as a vital pa…
View article: Design Exploration and Code Optimizations for FPGA-Based Post-Quantum Cryptography using High-Level Synthesis
Design Exploration and Code Optimizations for FPGA-Based Post-Quantum Cryptography using High-Level Synthesis Open
Design Exploration and Code Optimizations for FPGA-Based Post-Quantum Cryptography using High-Level Synthesis. In this paper we try to detect and address bottleneck and limitation of HLS while synthesizing general-purpose code for emerging…
View article: Design Exploration and Code Optimizations for FPGA-Based Post-Quantum Cryptography using High-Level Synthesis
Design Exploration and Code Optimizations for FPGA-Based Post-Quantum Cryptography using High-Level Synthesis Open
Design Exploration and Code Optimizations for FPGA-Based Post-Quantum Cryptography using High-Level Synthesis. In this paper we try to detect and address bottleneck and limitation of HLS while synthesizing general-purpose code for emerging…
View article: Experimental Evaluation of e.MMC Data Recovery
Experimental Evaluation of e.MMC Data Recovery Open
In this paper, we explore the data recovery procedures from e⋅MMCs. The e⋅MMC is one of the “managed” flash memory devices that are popularly used in modern digital devices as their storage media. The e⋅MMC, which consists of flash memory …
View article: Bias Cancellation of MixColumns
Bias Cancellation of MixColumns Open
View article: A Small GIFT-COFB: Lightweight Bit-Serial Architectures
A Small GIFT-COFB: Lightweight Bit-Serial Architectures Open
View article: Post-Quantum Cryptography: Challenges and Opportunities for Robust and Secure HW Design
Post-Quantum Cryptography: Challenges and Opportunities for Robust and Secure HW Design Open
Post-Quantum Cryptography (PQC) will become soon the standard for many systems of the future. With the advent of quantum computers, all encrypted communications based on traditional asymmetric cryptography (e.g., RSA, ECC) will become inse…