Research
List of papers published by LASCA members
All
2025
Fast Amortized Bootstrapping with Small Keys and Polynomial Noise Overhead
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security
·
19 Nov 2025
·
doi:10.1145/3719027.3765181
Generation of Fast Finite Field Arithmetic forCortex-M4 with ECDH and SQIsign Applications
IACR Transactions on Cryptographic Hardware and Embedded Systems
·
05 Sep 2025
·
doi:10.46586/tches.v2025.i4.588-620
2024
Optimized One-Dimensional SQIsign Verification on Intel and Cortex-M4
IACR Transactions on Cryptographic Hardware and Embedded Systems
·
09 Dec 2024
·
doi:10.46586/tches.v2025.i1.497-522
Deep Learning Applied to Imbalanced Malware Datasets Classification
Journal of Internet Services and Applications
·
16 Sep 2024
·
doi:10.5753/jisa.2024.3907
Efficient isochronous fixed-weight sampling with applications to NTRU
IACR Communications in Cryptology
·
08 Jul 2024
·
doi:10.62056/a6n59qgxq
PQC-AMX: Accelerating Saber and FrodoKEM on the Apple M1 and M3 SoCs
2024 IEEE 31st Symposium on Computer Arithmetic (ARITH)
·
10 Jun 2024
·
doi:10.1109/arith61463.2024.00012
Fast polynomial multiplication using matrix multiplication accelerators with applications to NTRU on Apple M1/M3 SoCs
IACR Communications in Cryptology
·
09 Apr 2024
·
doi:10.62056/a3txommol
Verifiable FHE via Lattice-based SNARKs
IACR Communications in Cryptology
·
09 Apr 2024
·
doi:10.62056/a6ksdkp10
Towards Practical Transciphering for FHE with Setup Independent of the Plaintext Space
IACR Communications in Cryptology
·
09 Apr 2024
·
doi:10.62056/anxrxrxqi
Quasi-optimal Permutation Ranking and Applications to PERK
Lecture Notes in Computer Science
·
01 Jan 2024
·
doi:10.1007/978-3-031-64381-1_3
NTRU-Based FHE for Larger Key and Message Space
Lecture Notes in Computer Science
·
01 Jan 2024
·
doi:10.1007/978-981-97-5025-2_8
2023
Detecting Cryptography Misuses With Machine Learning: Graph Embeddings, Transfer Learning and Data Augmentation in Source Code Related Tasks
IEEE Transactions on Reliability
·
01 Dec 2023
·
doi:10.1109/TR.2023.3237849
Enhancing Malware Family Classification in the Microsoft Challenge Dataset via Transfer Learning
12th Latin-American Symposium on Dependable and Secure Computing
·
16 Oct 2023
·
doi:10.1145/3615366.3615374
Improving FALCON’s Key Generation on ARMv8-A Platforms
Anais do XXIII Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais (SBSeg 2023)
·
18 Sep 2023
·
doi:10.5753/sbseg.2023.233093
A Minimal White-Box Dedicated Cipher Proposal Using Incompressible Lookup Tables: Space-Hard AES
Anais do XXIII Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais (SBSeg 2023)
·
18 Sep 2023
·
doi:10.5753/sbseg.2023.233113
Real-Time Ego-Lane Detection in a Low-Cost Embedded Platform using CUDA-Based Implementation
Semina: Ciências Exatas e Tecnológicas
·
11 Sep 2023
·
doi:10.5433/1679-0375.2023.v44.48268
BASALISC: Programmable Hardware Accelerator for BGV Fully Homomorphic Encryption
IACR Transactions on Cryptographic Hardware and Embedded Systems
·
31 Aug 2023
·
doi:10.46586/tches.v2023.i4.32-57
Amortized Bootstrapping Revisited: Simpler, Asymptotically-Faster, Implemented
Lecture Notes in Computer Science
·
01 Jan 2023
·
doi:10.1007/978-981-99-8736-8_1
2022
Evaluation of modular multiplication techniques for Supersingular Isogeny Schemes on ARMv8 cores
Anais do XXII Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais (SBSeg 2022)
·
12 Sep 2022
·
doi:10.5753/sbseg.2022.224951
Evaluation of CRYSTALS-Kyber and Saber on the ARMv8 architecture
Anais do XXII Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais (SBSeg 2022)
·
12 Sep 2022
·
doi:10.5753/sbseg.2022.224450
AntiViruses under the microscope: A hands-on perspective
Computers & Security
·
01 Jan 2022
·
doi:10.1016/J.COSE.2021.102500
FINAL: Faster FHE Instantiated with NTRU and LWE
Lecture Notes in Computer Science
·
01 Jan 2022
·
doi:10.1007/978-3-031-22966-4_7
2021
The Ring-LWE Problem in Lattice-Based Cryptography: The Case of Twisted Embeddings
Entropy
·
26 Aug 2021
·
doi:10.3390/e23091108
One Size Does Not Fit All
ACM Transactions on Privacy and Security
·
21 Jan 2021
·
doi:10.1145/3429741
Tutte’s 3-flow Conjecture for almost even graphs
Procedia Computer Science
·
01 Jan 2021
·
doi:10.1016/J.PROCS.2021.11.035
Bootstrapping Fully Homomorphic Encryption over the Integers in Less than One Second
Lecture Notes in Computer Science
·
01 Jan 2021
·
doi:10.1007/978-3-030-75245-3_13
2020
Using Graph Embeddings and Machine Learning to Detect Cryptography Misuse in Source Code
2020 19th IEEE International Conference on Machine Learning and Applications (ICMLA)
·
01 Dec 2020
·
doi:10.1109/ICMLA51294.2020.00171
We need to talk about antiviruses: challenges & pitfalls of AV evaluations
Computers & Security
·
01 Aug 2020
·
doi:10.1016/j.cose.2020.101859
Fast AES Implementation Using ARMv8 ASIMD Without Cryptography Extension
Lecture Notes in Computer Science
·
01 Jan 2020
·
doi:10.1007/978-3-030-40921-0_5
Isogeny formulas for Jacobi intersection and twisted hessian curves
Advances in Mathematics of Communications
·
01 Jan 2020
·
doi:10.3934/AMC.2020048
Applied cryptography and network security. Part 1
Springer
·
01 Jan 2020
·
isbn:978-3-030-57808-4
2019
Analysis, comparison and assessment of the behavior of malware and goodware
Resumos do...
·
20 Dec 2019
·
doi:10.20396/revpibic2720192100
Characterizing lattices for cryptography
Resumos do...
·
20 Dec 2019
·
doi:10.20396/revpibic2720192087
Understanding How to Use Static Analysis Tools for Detecting Cryptography Misuse in Software
IEEE Transactions on Reliability
·
01 Dec 2019
·
doi:10.1109/tr.2019.2937214
Linux Malware Behavior Description
Resumos do...
·
30 Nov 2019
·
doi:10.20396/revpibic2720192426
Choosing parameters for trellis-based encryption systems
Resumos do...
·
30 Nov 2019
·
doi:10.20396/revpibic2720191576
A Secure White Box Implementation of AES Against First Order DCA
Anais do XIX Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais (SBSeg 2019)
·
02 Sep 2019
·
doi:10.5753/sbseg.2019.13986
High-performance Implementation of Elliptic Curve Cryptography Using Vector Instructions
ACM Transactions on Mathematical Software
·
30 Jul 2019
·
doi:10.1145/3309759
The AV says: Your Hardware Definitions Were Updated!
2019 14th International Symposium on Reconfigurable Communication-centric Systems-on-Chip (ReCoSoC)
·
01 Jul 2019
·
doi:10.1109/RECOSOC48741.2019.9034972
“VANILLA” malware: vanishing antiviruses by interleaving layers and layers of attacks
Journal of Computer Virology and Hacking Techniques
·
11 Jun 2019
·
doi:10.1007/s11416-019-00333-y
On Fair Cost Facility Location Games with Non-singleton Players
Electronic Notes in Theoretical Computer Science
·
01 Apr 2019
·
doi:10.1016/j.entcs.2019.04.003
Fast White-Box Implementations of Dedicated Ciphers on the ARMv8 Architecture
Lecture Notes in Computer Science
·
01 Jan 2019
·
doi:10.1007/978-3-030-30530-7_17
2018
White Box Implementations of Dedicated Ciphers on the ARM NEON Architecture
Anais do XVIII Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais (SBSeg 2018)
·
25 Oct 2018
·
doi:10.5753/sbseg.2018.4264
Leveraging ontologies and machine-learning techniques for malware analysis into Android permissions ecosystems
Computers & Security
·
01 Sep 2018
·
doi:10.1016/j.cose.2018.07.013
Who Watches the Watchmen
ACM Computing Surveys
·
13 Jul 2018
·
doi:10.1145/3199673
Connecting the dots: Toward accountable machine-learning printer attribution methods
Journal of Visual Communication and Image Representation
·
01 May 2018
·
doi:10.1016/j.jvcir.2018.04.002
Enhancing Branch Monitoring for Security Purposes
ACM Transactions on Privacy and Security
·
02 Jan 2018
·
doi:10.1145/3152162
Malicious Software Classification Using VGG16 Deep Neural Network’s Bottleneck Features
Advances in Intelligent Systems and Computing
·
01 Jan 2018
·
doi:10.1007/978-3-319-77028-4_9
Lumus: Dynamically Uncovering Evasive Android Applications
Lecture Notes in Computer Science
·
01 Jan 2018
·
doi:10.1007/978-3-319-99136-8_3
2017
Malicious Software Classification Using Transfer Learning of ResNet-50 Deep Neural Network
2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA)
·
01 Dec 2017
·
doi:10.1109/ICMLA.2017.00-19
Practical Evaluation of Static Analysis Tools for Cryptography: Benchmarking Method and Case Study
2017 IEEE 28th International Symposium on Software Reliability Engineering (ISSRE)
·
01 Oct 2017
·
doi:10.1109/ISSRE.2017.27
Non-Cooperative Facility Location Games: a Survey
Revista de Informática Teórica e Aplicada
·
02 Aug 2017
·
doi:10.22456/2175-2745.71429
The other guys: automated analysis of marginalized malware
Journal of Computer Virology and Hacking Techniques
·
27 Feb 2017
·
doi:10.1007/s11416-017-0292-8
Non-interactive Privacy-preserving k-NN Classifier
Proceedings of the 3rd International Conference on Information Systems Security and Privacy
·
01 Jan 2017
·
doi:10.5220/0006187703620371
Non-cooperative capacitated facility location games
Information Processing Letters
·
01 Jan 2017
·
doi:10.1016/j.ipl.2016.09.001
2016
Detecção de técnicas de anti-forense em programas maliciosos
Anais do Congresso de Iniciação Científica da Unicamp
·
22 Oct 2016
·
doi:10.19146/pibic-2016-51820
Mining Cryptography Misuse in Online Forums
2016 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C)
·
01 Aug 2016
·
doi:10.1109/QRS-C.2016.23
Towards a Methodology for the Development of Secure Cryptographic Software
2016 International Conference on Software Security and Assurance (ICSSA)
·
01 Aug 2016
·
doi:10.1109/ICSSA.2016.12
ACBuilder: A tool for hardware architecture security evaluation
2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)
·
01 May 2016
·
doi:10.1109/HST.2016.7495564
An ontology of suspicious software behavior
Applied Ontology
·
22 Mar 2016
·
doi:10.3233/AO-160163
Going Native: Using a Large-Scale Analysis of Android Apps to Create a Practical Native-Code Sandboxing Policy
Proceedings 2016 Network and Distributed System Security Symposium
·
01 Jan 2016
·
doi:10.14722/NDSS.2016.23384
2015
MALICIOUS SOFTWARE IDENTIFICATION THROUGH OPERATING SYSTEM MONITORING
Anais do Congresso de Iniciação Científica da Unicamp
·
20 Nov 2015
·
doi:10.19146/pibic-2015-37604
Return on security investment for cloud computing
Proceedings of the 7th International Conference on Management of computational and collective intElligence in Digital EcoSystems
·
25 Oct 2015
·
doi:10.1145/2857218.2857254
Hardware Security Evaluation Using Assurance Case Models
2015 10th International Conference on Availability, Reliability and Security
·
01 Aug 2015
·
doi:10.1109/ARES.2015.60
Toward a Taxonomy of Malware Behaviors
The Computer Journal
·
13 Jul 2015
·
doi:10.1093/comjnl/bxv047
Security and system architecture: comparison of Android customizations
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks
·
22 Jun 2015
·
doi:10.1145/2766498.2766519
Security Testing Methodology for Evaluation of Web Services Robustness - Case: XML Injection
2015 IEEE World Congress on Services
·
01 Jun 2015
·
doi:10.1109/SERVICES.2015.53
Efficient and Secure Elliptic Curve Cryptography for 8-bit AVR Microcontrollers
Lecture Notes in Computer Science
·
01 Jan 2015
·
doi:10.1007/978-3-319-24126-5_17
Assurance Cases as a Didactic Tool for Information Security
IFIP Advances in Information and Communication Technology
·
01 Jan 2015
·
doi:10.1007/978-3-319-18500-2_2
Adaptive Key Recovery Attacks on NTRU-Based Somewhat Homomorphic Encryption Schemes
Lecture Notes in Computer Science
·
01 Jan 2015
·
doi:10.1007/978-3-319-17470-9_17
2014
An approach to security-SLA in cloud computing environment
2014 IEEE Latin-America Conference on Communications (LATINCOM)
·
01 Nov 2014
·
doi:10.1109/LATINCOM.2014.7041843
Identifying Android malware using dynamically obtained features
Journal of Computer Virology and Hacking Techniques
·
17 Oct 2014
·
doi:10.1007/s11416-014-0226-7
Ontology for malware behavior: A core model proposal
2014 IEEE 23rd International WETICE Conference
·
01 Jun 2014
·
doi:10.1109/WETICE.2014.72
2013
FORTUNA—A framework for the design and development of hardware-based secure systems
Journal of Systems and Software
·
01 Aug 2013
·
doi:10.1016/j.jss.2013.03.059
E-commerce of digital items and the problem of item validation: introducing the concept of reversible degradation
Applicable Algebra in Engineering, Communication and Computing
·
02 Jul 2013
·
doi:10.1007/s00200-013-0197-9
Case Study: On the Security of Key Storage on PCs
2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
·
01 Jul 2013
·
doi:10.1109/TrustCom.2013.203
An empirical analysis of malicious internet banking software behavior
Proceedings of the 28th Annual ACM Symposium on Applied Computing
·
18 Mar 2013
·
doi:10.1145/2480362.2480704
Fast Software Polynomial Multiplication on ARM Processors Using the NEON Engine
Lecture Notes in Computer Science
·
01 Jan 2013
·
doi:10.1007/978-3-642-40588-4_10
2012
A methodology for management of cloud computing using security criteria
2012 IEEE Latin America Conference on Cloud Computing and Communications (LatinCloud)
·
01 Nov 2012
·
doi:10.1109/LatinCloud.2012.6508157
A hybrid framework to analyze web and OS malware
2012 IEEE International Conference on Communications (ICC)
·
01 Jun 2012
·
doi:10.1109/ICC.2012.6364108
Pinpointing Malicious Activities through Network and System-Level Malware Execution Behavior
Lecture Notes in Computer Science
·
01 Jan 2012
·
doi:10.1007/978-3-642-31128-4_20
Interactive, Visual-Aided Tools to Analyze Malware Behavior
Lecture Notes in Computer Science
·
01 Jan 2012
·
doi:10.1007/978-3-642-31128-4_22
Interactive Analysis of Computer Scenarios through Parallel Coordinates Graphics
Lecture Notes in Computer Science
·
01 Jan 2012
·
doi:10.1007/978-3-642-31128-4_23
2011
LWE-based identification schemes
2011 IEEE Information Theory Workshop
·
01 Oct 2011
·
doi:10.1109/ITW.2011.6089439
FORTUNA - A probabilistic framework for early design stages of hardware-based secure systems
2011 5th International Conference on Network and System Security
·
01 Sep 2011
·
doi:10.1109/ICNSS.2011.6059999
TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks
Computer Communications
·
01 Mar 2011
·
doi:10.1016/j.comcom.2010.05.013
On the Smoothed Price of Anarchy of the Traffic Assignment Problem
OASIcs, Volume 20, ATMOS 2011
·
01 Jan 2011
·
doi:10.4230/OASIcs.ATMOS.2011.122
2010
T-DRE
Proceedings of the 26th Annual Computer Security Applications Conference
·
06 Dec 2010
·
doi:10.1145/1920261.1920291
Scalable model‐based configuration management of security services in complex enterprise networks
Software: Practice and Experience
·
19 Oct 2010
·
doi:10.1002/spe.1014
Kolline
Proceedings of the 28th ACM International Conference on Design of Communication
·
27 Sep 2010
·
doi:10.1145/1878450.1878465
Formal validation of automated policy refinement in the management of network security systems
International Journal of Information Security
·
20 Feb 2010
·
doi:10.1007/s10207-010-0101-6
On Device Identity Establishment and Verification
Lecture Notes in Computer Science
·
01 Jan 2010
·
doi:10.1007/978-3-642-16441-5_9
Efficient implementation of elliptic curve cryptography in wireless sensors
Advances in Mathematics of Communications
·
01 Jan 2010
·
doi:10.3934/amc.2010.4.169
2009
SB-RAWVec - A Semi-Blind Watermarking Method for Vector Maps
2009 IEEE International Conference on Communications
·
01 Jun 2009
·
doi:10.1109/ICC.2009.5199433
2008
TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks
2008 5th International Conference on Networked Sensing Systems
·
01 Jun 2008
·
doi:10.1109/INSS.2008.4610921
Model-based management of security services in complex network environments
NOMS 2008 - 2008 IEEE Network Operations and Management Symposium
·
01 Jan 2008
·
doi:10.1109/NOMS.2008.4575274
2007
SecLEACH—On the security of clustered sensor networks
Signal Processing
·
01 Dec 2007
·
doi:10.1016/j.sigpro.2007.05.016
TinyTate: Computing the Tate Pairing in Resource-Constrained Sensor Nodes
Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007)
·
01 Jul 2007
·
doi:10.1109/NCA.2007.48
A Custom Instruction Approach for Hardware and Software Implementations of Finite Field Arithmetic over $$\mathbb{F}_{{2^{{163}} }} $$ using Gaussian Normal Bases
The Journal of VLSI Signal Processing Systems for Signal, Image, and Video Technology
·
27 Mar 2007
·
doi:10.1007/s11265-006-0015-8
SOS: Secure Overlay Sensornets
Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)
·
01 Mar 2007
·
doi:10.1109/PERCOMW.2007.107
Identity-Based Encryption for Sensor Networks
Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)
·
01 Mar 2007
·
doi:10.1109/PERCOMW.2007.56
A Policy-Based Framework for Interoperable Digital Content Management
2007 4th IEEE Consumer Communications and Networking Conference
·
01 Jan 2007
·
doi:10.1109/CCNC.2007.191
2006
Software multiplication using Gaussian normal bases
IEEE Transactions on Computers
·
01 Aug 2006
·
doi:10.1109/TC.2006.132
2005
Modellierung von Netzsicherheitsystemen umfangreicher vernetzter IT-Infrastrukturen
Lecture Notes in Informatics (LNI) Proceedings;P-68
·
01 Sep 2005
·
doi:10.17877/de290r-15888
Adenoids: a hybrid IDS based on the immune system
Proceedings of the 9th International Conference on Neural Information Processing, 2002. ICONIP '02.
·
[no date info]
·
doi:10.1109/ICONIP.2002.1202866
Policy Modeling and Refinement for Network Security Systems
Sixth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'05)
·
[no date info]
·
doi:10.1109/POLICY.2005.24
An improvement of the Guajardo-Paar method for multiplication on non-supersingular elliptic curves
Proceedings SCCC'98. 18th International Conference of the Chilean Society of Computer Science (Cat. No.98EX212)
·
[no date info]
·
doi:10.1109/SCCC.1998.730787
A scheme for analyzing electronic payment systems
Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217)
·
[no date info]
·
doi:10.1109/CSAC.1998.738600
Web of Science
[no publisher info]
·
[no date info]
·
wosuid:WOS:000086437300016
Web of Science
[no publisher info]
·
[no date info]
·
wosuid:WOS:000088608600027
Two approaches for pay-per-use software construction
Proceedings Second International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems. WECWIS 2000
·
[no date info]
·
doi:10.1109/WECWIS.2000.853874
Web of Science
[no publisher info]
·
[no date info]
·
wosuid:WOS:000188940300033
Web of Science
[no publisher info]
·
[no date info]
·
wosuid:WOS:000224550900024
A custom instruction approach for hardware and software implementations of finite field arithmetic over F//sub 2/sup163// using Gaussian normal bases
Proceedings. 2005 IEEE International Conference on Field-Programmable Technology, 2005.
·
[no date info]
·
doi:10.1109/FPT.2005.1568517
SecLEACH - A Random Key Distribution Solution for Securing Clustered Sensor Networks
Fifth IEEE International Symposium on Network Computing and Applications (NCA'06)
·
[no date info]
·
doi:10.1109/NCA.2006.48
Web of Science
[no publisher info]
·
[no date info]
·
wosuid:WOS:000251784900006
Web of Science
[no publisher info]
·
[no date info]
·
wosuid:WOS:000247908000010
Implementing Cryptographic Pairings over Barreto-Naehrig Curves
Lecture Notes in Computer Science
·
[no date info]
·
doi:10.1007/978-3-540-73489-5_10
Web of Science
[no publisher info]
·
[no date info]
·
wosuid:WOS:000253413500019
NanoECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks
Lecture Notes in Computer Science
·
[no date info]
·
doi:10.1007/978-3-540-77690-1_19
Web of Science
[no publisher info]
·
[no date info]
·
wosuid:WOS:000288935800009
Web of Science
[no publisher info]
·
[no date info]
·
wosuid:WOS:000342217900040
Web of Science
[no publisher info]
·
[no date info]
·
wosuid:PPRN:18908939