Paulo S. L. M. Barreto

From MaRDI portal
(Redirected from Person:473199)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Faster cryptographic hash function from supersingular isogeny graphs2024-10-16Paper
DAGS: reloaded revisiting dyadic key encapsulation
Code-Based Cryptography
2024-02-23Paper
Schnorr-Based Implicit Certification: Improving the Security and Efficiency of Vehicular Communications
IEEE Transactions on Computers
2022-03-23Paper
Isogeny-based key compression without pairings2021-12-21Paper
The lattice-based digital signature scheme qTESLA2021-02-23Paper
Designing efficient dyadic operations for cryptographic applications
Journal of Mathematical Cryptology
2020-06-24Paper
Faster Key Compression for Isogeny-Based Cryptosystems
IEEE Transactions on Computers
2019-08-13Paper
DAGS: key encapsulation using dyadic GS codes
Journal of Mathematical Cryptology
2019-01-11Paper
Faster isogeny-based compressed key agreement2018-06-22Paper
CAKE: CODE-based algorithm for key encapsulation2018-04-20Paper
Decoding Square-Free Goppa Codes Over $\BBF_{p}$
IEEE Transactions on Information Theory
2017-06-08Paper
Revisiting the Security of the ALRED Design and Two of Its Variants: Marvin and LetterSoup
IEEE Transactions on Information Theory
2017-06-08Paper
Lyra2: Efficient Password Hashing with High Security against Time-Memory Trade-Offs
IEEE Transactions on Computers
2017-05-16Paper
The realm of the pairings
Selected Areas in Cryptography -- SAC 2013
2015-10-01Paper
Subgroup security in pairing-based cryptography
Progress in Cryptology -- LATINCRYPT 2015
2015-09-17Paper
Security issues in Sarkar's e-cash protocol
Information Processing Letters
2015-07-15Paper
A panorama of post-quantum cryptography
Open Problems in Mathematics and Computational Science
2015-06-22Paper
Quantum-assisted QD-CFS signatures
Journal of Computer and System Sciences
2014-11-24Paper
Monoidic codes in cryptography
Post-Quantum Cryptography
2011-11-25Paper
Quasi-dyadic CFS signatures
Information Security and Cryptology
2011-07-29Paper
Signcryption schemes based on the Diffie-Hellman problem
Practical Signcryption
2011-05-18Paper
Signcryption schemes based on bilinear maps
Practical Signcryption
2011-05-18Paper
A survey on key management mechanisms for distributed wireless sensor networks
Computer Networks
2010-11-25Paper
Whirlwind: a new cryptographic hash function
Designs, Codes and Cryptography
2010-09-16Paper
Rotation symmetry in algebraically generated cryptographic substitution tables
Information Processing Letters
2010-04-19Paper
Compact McEliece keys from Goppa codes
Selected Areas in Cryptography
2009-12-09Paper
Efficient Hardware for the Tate Pairing Calculation in Characteristic Three
Cryptographic Hardware and Embedded Systems – CHES 2005
2008-08-29Paper
On Compressible Pairings and Their Computation
Progress in Cryptology – AFRICACRYPT 2008
2008-06-13Paper
Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps
Lecture Notes in Computer Science
2008-03-18Paper
Pairing-Friendly Elliptic Curves of Prime Order
Selected Areas in Cryptography
2007-11-15Paper
Efficient computation of roots in finite fields
Designs, Codes and Cryptography
2006-05-29Paper
Topics in Cryptology – CT-RSA 2005
Lecture Notes in Computer Science
2005-12-08Paper


Research outcomes over time


This page was built for person: Paulo S. L. M. Barreto