Ricardo Dahab

Orcid: 0000-0002-7002-875X

According to our database1, Ricardo Dahab authored at least 62 papers between 1998 and 2023.

Collaborative distances:



In proceedings 
PhD thesis 


On csauthors.net:


Detecting Cryptography Misuses With Machine Learning: Graph Embeddings, Transfer Learning and Data Augmentation in Source Code Related Tasks.
IEEE Trans. Reliab., December, 2023

Tutte's 3-flow Conjecture for almost even graphs.
Proceedings of the XI Latin and American Algorithms, Graphs and Optimization Symposium, 2021

Isogeny formulas for Jacobi intersection and twisted hessian curves.
Adv. Math. Commun., 2020

Using Graph Embeddings and Machine Learning to Detect Cryptography Misuse in Source Code.
Proceedings of the 19th IEEE International Conference on Machine Learning and Applications, 2020

Understanding How to Use Static Analysis Tools for Detecting Cryptography Misuse in Software.
IEEE Trans. Reliab., 2019

High-performance Implementation of Elliptic Curve Cryptography Using Vector Instructions.
ACM Trans. Math. Softw., 2019

Fast White-Box Implementations of Dedicated Ciphers on the ARMv8 Architecture.
Proceedings of the Progress in Cryptology - LATINCRYPT 2019, 2019

Connecting the dots: Toward accountable machine-learning printer attribution methods.
J. Vis. Commun. Image Represent., 2018

In Praise of Twisted Canonical Embedding.
IACR Cryptol. ePrint Arch., 2018

Leveraging ontologies and machine-learning techniques for malware analysis into Android permissions ecosystems.
Comput. Secur., 2018

Practical Evaluation of Static Analysis Tools for Cryptography: Benchmarking Method and Case Study.
Proceedings of the 28th IEEE International Symposium on Software Reliability Engineering, 2017

Mining Cryptography Misuse in Online Forums.
Proceedings of the 2016 IEEE International Conference on Software Quality, 2016

Towards a Methodology for the Development of Secure Cryptographic Software.
Proceedings of the International Conference on Software Security and Assurance, 2016

ACBuilder: A tool for hardware architecture security evaluation.
Proceedings of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust, 2016

Adaptive key recovery attacks on NTRU-based somewhat homomorphic encryption schemes.
IACR Cryptol. ePrint Arch., 2015

Security and system architecture: comparison of Android customizations.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

Efficient and Secure Elliptic Curve Cryptography for 8-bit AVR Microcontrollers.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2015

Assurance Cases as a Didactic Tool for Information Security.
Proceedings of the Information Security Education Across the Curriculum, 2015

Hardware Security Evaluation Using Assurance Case Models.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

A key recovery attack to the scale-invariant NTRU-based somewhat homomorphic encryption scheme.
IACR Cryptol. ePrint Arch., 2014

A Panorama of Post-quantum Cryptography.
Proceedings of the Open Problems in Mathematics and Computational Science, 2014

FORTUNA - A framework for the design and development of hardware-based secure systems.
J. Syst. Softw., 2013

E-commerce of digital items and the problem of item validation: introducing the concept of reversible degradation.
Appl. Algebra Eng. Commun. Comput., 2013

Case Study: On the Security of Key Storage on PCs.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Fast Software Polynomial Multiplication on ARM Processors Using the NEON Engine.
Proceedings of the Security Engineering and Intelligence Informatics, 2013

TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks.
Comput. Commun., 2011

E-Commerce and Fair Exchange - The Problem of Item Validation.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

FORTUNA - A probabilistic framework for early design stages of hardware-based secure systems.
Proceedings of the 5th International Conference on Network and System Security, 2011

LWE-based identification schemes.
Proceedings of the 2011 IEEE Information Theory Workshop, 2011

Efficient implementation of elliptic curve cryptography in wireless sensors.
Adv. Math. Commun., 2010

T-DRE: a hardware trusted computing base for direct recording electronic vote machines.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

SB-RAWVec - A Semi-Blind Watermarking Method for Vector Maps.
Proceedings of IEEE International Conference on Communications, 2009

On Device Identity Establishment and Verification.
Proceedings of the Public Key Infrastructures, Services and Applications, 2009

NanoECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks.
Proceedings of the Wireless Sensor Networks, 5th European Conference, 2008

A Custom Instruction Approach for Hardware and Software Implementations of Finite Field Arithmetic over F<sub>2<sup>163</sup></sub> using Gaussian Normal Bases.
J. VLSI Signal Process., 2007

SecLEACH - On the security of clustered sensor networks.
Signal Process., 2007

On the design of secure protocols for hierarchical sensor networks.
Int. J. Secur. Networks, 2007

TinyPBC: Pairings for Authenticated Identity-Based Non-Interactive Key Distribution in Sensor Networks.
IACR Cryptol. ePrint Arch., 2007

TinyTate: Identity-Based Encryption for Sensor Networks.
IACR Cryptol. ePrint Arch., 2007

Implementing Cryptographic Pairings over Barreto-Naehrig Curves.
IACR Cryptol. ePrint Arch., 2007

Efficient Certificateless Signatures Suitable for Aggregation.
IACR Cryptol. ePrint Arch., 2007

Two Notes on the Security of Certificateless Signatures.
Proceedings of the Provable Security, 2007

SOS: Secure Overlay Sensornets.
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, 2007

Identity-Based Encryption for Sensor Networks.
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, 2007

TinyTate: Computing the Tate Pairing in Resource-Constrained Sensor Nodes.
Proceedings of the Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007), 12, 2007

Software Multiplication Using Gaussian Normal Bases.
IEEE Trans. Computers, 2006

Multiplication and Squaring on Pairing-Friendly Fields.
IACR Cryptol. ePrint Arch., 2006

SecLEACH - A Random Key Distribution Solution for Securing Clustered Sensor Networks.
Proceedings of the Fifth IEEE International Symposium on Network Computing and Applications, 2006

New Point Compression Algorithms for Binary Curves.
Proceedings of the 2006 IEEE Information Theory Workshop, 2006

3-flow Conjecture and Matchings in Bipartite Graphs.
Ars Comb., 2005

A custom instruction approach for hardware and software implementations of finite field arithmetic over F<sub>2<sup>63</sup></sub> using Gaussian normal bases.
Proceedings of the 2005 IEEE International Conference on Field-Programmable Technology, 2005

Optimistic Blinded-Key Signatures for ElGamal and Related Schemes.
Proceedings of the Mobility Aware Technologies and Applications, 2004

Blinded-key signatures: securing private keys embedded in mobile agents.
Proceedings of the 2002 ACM Symposium on Applied Computing (SAC), 2002

An Attack on a Protocol for Certified Delivery.
Proceedings of the Information Security, 5th International Conference, 2002

Tutte's 3-flow Conjecture and Matchings in Bipartite Graphs.
Electron. Notes Discret. Math., 2001

Two Approaches for Pay-per-Use Software Construction.
Proceedings of the Second International Workshop on Advance Issues of E-Commerce and Web-Based Information Systems (WECWIS 2000), 2000

High-Speed Software Multiplication in F<sub>2m</sub>.
Proceedings of the Progress in Cryptology, 2000

Fast Multiplication on Elliptic Curves over GF(2<sup>m</sup>) without Precomputation.
Proceedings of the Cryptographic Hardware and Embedded Systems, 1999

An Improvement of the Guajardo-Paar Method for Multiplication on Non-Supersingular Elliptic Curves.
Proceedings of 18th International Conference of the Chilean Computer Science Society (SCCC '98), 1998

Um Sistema de Padrões para Software Criptográfico Orientado a Objetos.
Proceedings of the 12th Brazilian Symposium on Software Engineering, 1998

Improved Algorithms for Elliptic Curve Arithmetic in GF(2<sup>n</sup>).
Proceedings of the Selected Areas in Cryptography '98, 1998

A Scheme for Analyzing Electronic Payment Systems.
Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC 1998), 1998