Jan-Dec 2024
Jun 2023 - May 2025
Springer, 2006.
Lecture Notes in Computer Science 8540, Springer 2015.
Lecture Notes in Computer Science 11349, Springer 2019.
Code-Based Cryptography. CBCrypto 2022. LNCS13839, pages 21-36, Springer, 2023.
Topics in Cryptology - CT-RSA 2022. LNCS13161, pages 451-483, Springer, 2022.
International Conference on Cryptology And Network Security - CANS 2021, LNCS 13099, pages 42-62, Springer 2021.
Proceedings of INDOCRYPT 2020 - 21st International Conference on Cryptology in India, Bangalore, India, Dec 13-16, 2020, LNCS 12578, pages 373-394, Springer 2020.
Proceedings of ISC 2020 - 23rd International Conference on Information Security, Bali, Indonesia, Dec 16-18, 2020, LNCS 12472, pages 107-125, Springer 2020.
Topics in Cryptology - CT-RSA 2020 - The Cryptographers' Track at the RSA Conference 2020, San Francisco, CA, USA, Feb 24-28, 2020, LNCS 12006, pages 85-105, Springer 2020.
Proceedings of ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, Dec 8-12, 2019, Part III. LNCS 11923, pages 371-397, Springer 2019.
Information Security Theory and Practice - 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, Dec 10-11, 2018, LNCS 11469, pages 91-106, Springer 2019.
Advances in Cryptology – EUROCRYPT 2018. LNCS 10821, pages 683–714. Springer Heidelberg, 2018.
Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing. ACM, pages 19–26, Abu Dhabi, United Arab Emirates, 2 April 2017.
Proceedings of ACISP 2017 – the 22nd Australasian Conference on Information Security and Privacy, Part II. LNCS 10343, pages 261–278, Auckland, New Zealand, 3-5 July 2017.
Proceedings of WISCS 2016, the 3rd ACM on Workshop on Information Sharing and Collaborative Security. ACM, pages 3–14, Vienna, Austria, 24-24 October 2016.
Topics in Cryptology - CT-RSA 2016 - The Cryptographers’ Track at the RSA Conference 2016, LNCS 9610, pages 147–163, San Francisco, CA, USA, Mar 2016.
ACM Communications in Computer Algebra, 49(2), August 2015 (link to extended version in eprint).
IEEE 28th Computer Security Foundations Symposium, CSF 2015, pages 243–257, Verona, Italy Jul 2015. IEEE (2015).
Proceedings of RFIDsec 2015, LNCS 9440, pages 104–121, New York – USA, Jun 2015. Springer-Verlag.
Proceedings of ASIA CCS 2015 – 10th ACM Symposium on Information, Computer and Communications Security, pages 657–662, Singapore, Apr 2015. ACM (2015).
Proceedings of Inscrypt 2014 – 10th International Conference of Information Security and Cryptology, LNCS 8957, pages 51–71, Beijing, China, Dec 2014. Springer-Verlag.
Proceedings of GameSec 2014 – Fifth Conference on Decision and Game Theory for Security, LNCS 8840, pages 59-78, Los Angeles – USA, Nov 2014. Springer-Verlag.
Proceedings of GameSec 2014 – Fifth Conference on Decision and Game Theory for Security, LNCS 8840, pages 79-98, Los Angeles – USA, Nov 2014. Springer-Verlag.
Proceedings of WEIS 2014 – 13th Annual Workshop on the Economics of Information Security, Penn State, Jun 2014.
Proceedings of FSE 2013 – 20th International Workshop on Fast Software Encryption, LNCS 8424, pages 287-304, Singapore, Mar 2013. Springer-Verlag (winner of FSE 2013 Best Paper Award).
Proceedings of TCC 2013 – 10th Theory of Cryptography Conference, LNCS 7785, pages 499-518, Tokyo, Japan, Mar 2013. Springer-Verlag.
Proceedings of CARDIS 2012, LNCS 7771, pages 188-202, Graz, Austria, Nov 2012. Springer-Verlag.
Proceedings of GameSec 2012 – Conference on Decision and Game Theory for Security, LNCS 7638, pages 234-247, Budapest, Hungary, Nov 2012. Springer-Verlag.
Proceedings of 9th International Conference on Applied Cryptography and Network Security (ACNS’11), LNCS 6715, pages 57-72, Nerja, Spain, June 2011. Springer-Verlag.
Proceedings of 9th International Conference on Applied Cryptography and Network Security (ACNS’11), LNCS 6715, pages 498-513, Nerja, Spain, June 2011. Springer-Verlag.
Groups St Andrews 2009 in Bath, London Mathematical Society Lecture Note Series 387, Vol 1, pp. 133-149. Cambridge University Press, 2011.
Proceedings of INSCRYPT 2010, LNCS 6584, p. 387-403. Shanghai, China, October 2010. Springer-Verlag.
Proceedings of Fast Software Encryption (FSE) 2010, LNCS 6147, pages 40-54, Seoul, Korea, February 2010. Springer-Verlag.
Proceedings of ICICS 2009, LNCS 5927, pages 32-46, Beijing, China, December 2009. Springer-Verlag.
Proceedings of Fast Software Encryption (FSE) 2009, LNCS 5665, pages 193-208, Leuven, Belgium, February 2009. Springer-Verlag.
Proceedings of the 12th Australasian Conference on Information Security and Privacy, ACISP 2007, LNCS 4586, pages 1-10, Townsville, Australia, July 2007. Springer-Verlag.
Proceedings of the 10th IMA International Conference on Coding and Cryptography, LNCS 3796, pages 278-289, Cirencester – UK, Dec 2005. Springer-Verlag.
Proceedings of ASIACRYPT 2005, LNCS 3788, pages 333-352, Chennai – India, Dece 2005. Springer-Verlag.
Proceedings of Fast Software Encryption (FSE) 2005, LNCS 3557, pages 145-162, Paris, February 2005. Springer-Verlag.
Proceedings of the Fourth Conference on the Advanced Encryption Standard (AES4), LNCS 3373, pages 58-66, Bonn, May 2004. Springer-Verlag.
Proceedings of the Seventh International Workshop on Computer Algebra in Scientific Computing, CASC’2004, pp. 93-103, St. Petersburg 2004.
Proceedings of the Sixth International Workshop on Computer Algebra in Scientific Computing, CASC’ 2003, Passau 2003.
Proceedings of the Sixth International Workshop on Computer Algebra in Scientific Computing, CASC’ 2003, Passau 2003.
Proceedings of the Fourth International Workshop on Computer Algebra in Scientific Computing, CASC’ 2001, Springer, Berlin 2001, pp. 123-136.
Advanced Quantum Technologies 7, Issue 4 (2024). Wiley.
IACR Transactions on Symmetric Cryptology, Vol 2022 (1), pages 110-137, Mar 2022.
Information 2021, 12(8), 297.
IACR Transactions on Symmetric Cryptology, Vol 2017 (3), pages 73–107, Sep 2017.
Designs, Codes and Cryptography, Vol. 74, Number 2, pages 325–354, February 2015.
Journal of Cryptology, Vol 28 (4), pages 769–795 (2015).
Journal of Symbolic Computation, Vol 47 (8), pages 926–941, August 2012.
Journal of Mathematical Cryptology. Volume 5, Issue 2, Pages 159 – 168. de Gruyter, 2011.
Journal of Mathematical Cryptology. Volume 3, Issue 4, Pages 321–338. de Gruyter, 2009.
IEE Proceedings Information Security. Volume 153, Issue 2 (2006), p. 51–53.
IEE Proceedings Information Security. Volume 153, Issue 1 (2006), p. 12–14.
Journal of Algebra, 248, 15-36 (2002).
Experimental Mathematics, Vol. 10, No. 1, 2001, p. 109-115.
Journal of Group Theory. 3, Issue 2 (2000), 113–125.
In: M. Sala, T. Mora, L. Perret, S. Sakata, C. Traverso (Eds.), Gröbner Bases, Coding, and Cryptography, pp. 307-328, Springer 2009.
Round-4 candidate in NIST's Post-Quantum Cryptography Standardization Process.
Submission to NIST's Post-Quantum Cryptography Standardization Process.
Information Security Technical Report, Volume 15, Issue 1, Page 8-12 (2010), Elsevier Ltd.
ECRYPT II Report (D.SYM.10), 16 January 2012.
ECRYPT II Report (D.SYM.3), 01 October 2009, Revision 1.1.
ECRYPT Report (D.STVL.7), 18 July 2008.
ECRYPT Report (D.STVL.2), 30 January 2006.
Information Security Technical Report, Volume 11, Issue 2, Page 100-107 (2006), Elsevier Ltd.
SANS InfoSec Reading Room (October 2005).
SANS InfoSec Reading Room (May 2003).
PhD Thesis, Universidade de Brasília - UnB, Jul 1999.