Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Accelerated V2X provisioning with Extensible Processor Platform., , , , , , , and . IACR Cryptology ePrint Archive, (2019)Security of Hedged Fiat-Shamir Signatures under Fault Attacks., , , and . IACR Cryptology ePrint Archive, (2019)The Computer for the 21st Century: Security & Privacy Challenges after 25 Years., , , , , and . ICCCN, page 1-10. IEEE, (2017)Efficient software implementation of elliptic curves and bilinear pairings.. University of Campinas, Brazil, (2011)ndltd.org (oai:agregador.ibict.br.RI_UNICAMP:oai:repositorio.unicamp.br:REPOSIP/275735).NIZKCTF: A Non-Interactive Zero-Knowledge Capture the Flag Platform., , , , and . CoRR, (2017)Elliptic Curve Multiset Hash., , and . Comput. J., 60 (4): 476-490 (2017)The Realm of the Pairings., , , and . Selected Areas in Cryptography, volume 8282 of Lecture Notes in Computer Science, page 3-25. Springer, (2013)The computer for the 21st century: present security & privacy challenges., , , , , , , , and . J. Internet Serv. Appl., 9 (1): 24:1-24:25 (2018)Research in Security and Privacy in Brazil., and . IEEE Secur. Priv., 16 (6): 14-21 (2018)The Good, the Bad, and the Ugly: Two Decades of E-Voting in Brazil., and . IEEE Secur. Priv., 16 (6): 22-30 (2018)