Paulo S. L. M. Barreto

According to our database1, Paulo S. L. M. Barreto authored at least 86 papers between 1999 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Blind signatures from Zero-knowledge arguments.
IACR Cryptol. ePrint Arch., 2023

Blind signatures from Zero knowledge in the Kummer variety.
IACR Cryptol. ePrint Arch., 2023

2021
Schnorr-Based Implicit Certification: Improving the Security and Efficiency of Vehicular Communications.
IEEE Trans. Computers, 2021

Isogeny-based key compression without pairings.
IACR Cryptol. ePrint Arch., 2021

2019
Faster Key Compression for Isogeny-Based Cryptosystems.
IEEE Trans. Computers, 2019

Schnorr-based implicit certification: improving the security and efficiency of V2X communications.
IACR Cryptol. ePrint Arch., 2019

The Lattice-Based Digital Signature Scheme qTESLA.
IACR Cryptol. ePrint Arch., 2019

2018
A class of safe and efficient binary Edwards curves.
J. Cryptogr. Eng., 2018

qSCMS: Post-quantum certificate provisioning process for V2X.
IACR Cryptol. ePrint Arch., 2018

Designing Efficient Dyadic Operations for Cryptographic Applications.
IACR Cryptol. ePrint Arch., 2018

DAGS: Reloaded Revisiting Dyadic Key Encapsulation.
IACR Cryptol. ePrint Arch., 2018

2017
Faster isogeny-based compressed key agreement.
IACR Cryptol. ePrint Arch., 2017

Faster Cryptographic Hash Function From Supersingular Isogeny Graphs.
IACR Cryptol. ePrint Arch., 2017

CAKE: Code-based Algorithm for Key Encapsulation.
IACR Cryptol. ePrint Arch., 2017

A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM.
IACR Cryptol. ePrint Arch., 2017

DAGS: Key Encapsulation using Dyadic GS Codes.
IACR Cryptol. ePrint Arch., 2017

2016
Lyra2: Efficient Password Hashing with High Security against Time-Memory Trade-Offs.
IEEE Trans. Computers, 2016

Shorter hash-based signatures.
J. Syst. Softw., 2016

Sharper Ring-LWE Signatures.
IACR Cryptol. ePrint Arch., 2016

2015
Optimized and Scalable Co-Processor for McEliece with Binary Goppa Codes.
ACM Trans. Embed. Comput. Syst., 2015

Quantum-assisted QD-CFS signatures.
J. Comput. Syst. Sci., 2015

Security issues in Sarkar's e-cash protocol.
Inf. Process. Lett., 2015

Lyra2: Password Hashing Scheme with improved security against time-memory trade-offs.
IACR Cryptol. ePrint Arch., 2015

Subgroup security in pairing-based cryptography.
IACR Cryptol. ePrint Arch., 2015

Parallelism Level Analysis of Binary Field Multiplication on FPGAs.
Proceedings of the 2015 Brazilian Symposium on Computing Systems Engineering, 2015

2014
Scaling efficient code-based cryptosystems for embedded platforms.
J. Cryptogr. Eng., 2014

Lyra: password-based key derivation with tunable memory and processing costs.
J. Cryptogr. Eng., 2014

Scalable hardware implementation for Quasi-Dyadic Goppa encoder.
Proceedings of the IEEE 5th Latin American Symposium on Circuits and Systems, 2014

A Panorama of Post-quantum Cryptography.
Proceedings of the Open Problems in Mathematics and Computational Science, 2014

2013
Decoding Square-Free Goppa Codes Over $\BBF_{p}$.
IEEE Trans. Inf. Theory, 2013

SMSCrypto: A lightweight cryptographic framework for secure SMS transmission.
J. Syst. Softw., 2013

The Realm of the Pairings.
IACR Cryptol. ePrint Arch., 2013

A note on high-security general-purpose elliptic curves.
IACR Cryptol. ePrint Arch., 2013

Survey and comparison of message authentication solutions on wireless sensor networks.
Ad Hoc Networks, 2013

2012
Revisiting the Security of the ALRED Design and Two of Its Variants: Marvin and LetterSoup.
IEEE Trans. Inf. Theory, 2012

MDPC-McEliece: New McEliece Variants from Moderate Density Parity-Check Codes.
IACR Cryptol. ePrint Arch., 2012

Dynamic method to evaluate code optimization effectiveness.
Proceedings of the Workshop on Software and Compilers for Embedded Systems, 2012

2011
Whirlpool.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

One-time signature scheme from syndrome decoding over generic error-correcting codes.
J. Syst. Softw., 2011

Monoidic Codes in Cryptography.
IACR Cryptol. ePrint Arch., 2011

Decoding square-free Goppa codes over $\F_p$
CoRR, 2011

Comparison of Authenticated-Encryption schemes in Wireless Sensor Networks.
Proceedings of the IEEE 36th Conference on Local Computer Networks, 2011

Key reduction of McEliece's cryptosystem using list decoding.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

2010
Signcryption Schemes Based on Bilinear Maps.
Proceedings of the Practical Signcryption, 2010

Signcryption Schemes Based on the Diffie-Hellman Problem.
Proceedings of the Practical Signcryption, 2010

Implementation of Multivariate Quadratic Quasigroup for Wireless Sensor Network.
Trans. Comput. Sci., 2010

A Family of Implementation-Friendly BN Elliptic Curves.
IACR Cryptol. ePrint Arch., 2010

A new one-time signature scheme from syndrome decoding.
IACR Cryptol. ePrint Arch., 2010

Decoding square-free Goppa codes over F<sub>p</sub>.
IACR Cryptol. ePrint Arch., 2010

Whirlwind: a new cryptographic hash function.
Des. Codes Cryptogr., 2010

A survey on key management mechanisms for distributed Wireless Sensor Networks.
Comput. Networks, 2010

Revisiting the Security of the Alred Design.
Proceedings of the Information Security - 13th International Conference, 2010

Impact of Operating Systems on Wireless Sensor Networks (Security) Applications and Testbeds.
Proceedings of the 19th International Conference on Computer Communications and Networks, 2010

Quasi-Dyadic CFS Signatures.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

2009
Providing Integrity and Authenticity in DICOM Images: A Novel Approach.
IEEE Trans. Inf. Technol. Biomed., 2009

The MARVIN message authentication code and the LETTERSOUP authenticated encryption scheme.
Secur. Commun. Networks, 2009

Compact McEliece Keys from Goppa Codes.
IACR Cryptol. ePrint Arch., 2009

2008
Rotation symmetry in algebraically generated cryptographic substitution tables.
Inf. Process. Lett., 2008

The SIP Security Enhanced by Using Pairing-assisted Massey-Omura Signcryption.
IACR Cryptol. ePrint Arch., 2008

The CURUPIRA-2 Block Cipher for Constrained Platforms: Specification and Benchmarking.
Proceedings of the 1st International Workshop on Privacy in Location-Based Applications, 2008

2007
A flexible processor for the characteristic 3 η<sub>T</sub> pairing.
Int. J. High Perform. Syst. Archit., 2007

On compressible pairings and their computation.
IACR Cryptol. ePrint Arch., 2007

Efficient pairing computation on supersingular Abelian varieties.
Des. Codes Cryptogr., 2007

A Reconfigurable Processor for the Cryptographic nT Pairing in Characteristic 3.
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007

2006
Hardware Implementation of the η<sup>T</sup> Pairing in Characteristic 3.
IACR Cryptol. ePrint Arch., 2006

Demonstrating data possession and uncheatable data transfer.
IACR Cryptol. ePrint Arch., 2006

Generating More MNT Elliptic Curves.
Des. Codes Cryptogr., 2006

Efficient Computation of Roots in Finite Fields.
Des. Codes Cryptogr., 2006

2005
On a (Flawed) Proposal to Build More Pairing-Friendly Curves.
IACR Cryptol. ePrint Arch., 2005

Efficient hardware for the Tate pairing calculation in characteristic three.
IACR Cryptol. ePrint Arch., 2005

Pairing-Friendly Elliptic Curves of Prime Order.
IACR Cryptol. ePrint Arch., 2005

Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps.
Proceedings of the Advances in Cryptology, 2005

2004
Efficient Implementation of Pairing-Based Cryptosystems.
J. Cryptol., 2004

Compressed Pairings.
IACR Cryptol. ePrint Arch., 2004

A New Two-Party Identity-Based Authenticated Key Agreement.
IACR Cryptol. ePrint Arch., 2004

Efficient and Forward-Secure Identity-Based Signcryption.
IACR Cryptol. ePrint Arch., 2004

A note on efficient computation of cube roots in characteristic 3.
IACR Cryptol. ePrint Arch., 2004

2003
On the Selection of Pairing-Friendly Groups.
IACR Cryptol. ePrint Arch., 2003

2002
Constructing Elliptic Curves with Prescribed Embedding Degrees.
IACR Cryptol. ePrint Arch., 2002

Efficient Algorithms for Pairing-Based Cryptosystems.
IACR Cryptol. ePrint Arch., 2002

2001
SQUARE Attacks on Reduced-Round PES and IDEA Block Ciphers.
IACR Cryptol. ePrint Arch., 2001

Fast hashing onto elliptic curves over fields of characteristic 3.
IACR Cryptol. ePrint Arch., 2001

Toward a secure public-key blockwise fragile authentication watermarking.
Proceedings of the 2001 International Conference on Image Processing, 2001

Improved SQUARE Attacks against Reduced-Round HIEROCRYPT.
Proceedings of the Fast Software Encryption, 8th International Workshop, 2001

2000
Fast Binary Image Resolution Increasing by K-Nearest Neighbor Learning.
Proceedings of the 2000 International Conference on Image Processing, 2000

1999
Pitfalls in Public Key Watermarking.
Proceedings of the XII Brazilian Symposium on Computer Graphics and Image Processing (SIBGRAPI '99), 1999


  Loading...