Ricardo Dahab
Orcid: 0000-0002-7002-875X
According to our database1,
Ricardo Dahab
authored at least 62 papers
between 1998 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Detecting Cryptography Misuses With Machine Learning: Graph Embeddings, Transfer Learning and Data Augmentation in Source Code Related Tasks.
IEEE Trans. Reliab., December, 2023
2021
Proceedings of the XI Latin and American Algorithms, Graphs and Optimization Symposium, 2021
2020
Adv. Math. Commun., 2020
Using Graph Embeddings and Machine Learning to Detect Cryptography Misuse in Source Code.
Proceedings of the 19th IEEE International Conference on Machine Learning and Applications, 2020
2019
Understanding How to Use Static Analysis Tools for Detecting Cryptography Misuse in Software.
IEEE Trans. Reliab., 2019
High-performance Implementation of Elliptic Curve Cryptography Using Vector Instructions.
ACM Trans. Math. Softw., 2019
Proceedings of the Progress in Cryptology - LATINCRYPT 2019, 2019
2018
Connecting the dots: Toward accountable machine-learning printer attribution methods.
J. Vis. Commun. Image Represent., 2018
Leveraging ontologies and machine-learning techniques for malware analysis into Android permissions ecosystems.
Comput. Secur., 2018
2017
Practical Evaluation of Static Analysis Tools for Cryptography: Benchmarking Method and Case Study.
Proceedings of the 28th IEEE International Symposium on Software Reliability Engineering, 2017
2016
Proceedings of the 2016 IEEE International Conference on Software Quality, 2016
Proceedings of the International Conference on Software Security and Assurance, 2016
Proceedings of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust, 2016
2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2015
Proceedings of the Information Security Education Across the Curriculum, 2015
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
2014
A key recovery attack to the scale-invariant NTRU-based somewhat homomorphic encryption scheme.
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Open Problems in Mathematics and Computational Science, 2014
2013
FORTUNA - A framework for the design and development of hardware-based secure systems.
J. Syst. Softw., 2013
E-commerce of digital items and the problem of item validation: introducing the concept of reversible degradation.
Appl. Algebra Eng. Commun. Comput., 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the Security Engineering and Intelligence Informatics, 2013
2011
TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks.
Comput. Commun., 2011
E-Commerce and Fair Exchange - The Problem of Item Validation.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011
FORTUNA - A probabilistic framework for early design stages of hardware-based secure systems.
Proceedings of the 5th International Conference on Network and System Security, 2011
Proceedings of the 2011 IEEE Information Theory Workshop, 2011
2010
Adv. Math. Commun., 2010
T-DRE: a hardware trusted computing base for direct recording electronic vote machines.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
2009
Proceedings of IEEE International Conference on Communications, 2009
Proceedings of the Public Key Infrastructures, Services and Applications, 2009
2008
Proceedings of the Wireless Sensor Networks, 5th European Conference, 2008
2007
A Custom Instruction Approach for Hardware and Software Implementations of Finite Field Arithmetic over F<sub>2<sup>163</sup></sub> using Gaussian Normal Bases.
J. VLSI Signal Process., 2007
Int. J. Secur. Networks, 2007
TinyPBC: Pairings for Authenticated Identity-Based Non-Interactive Key Distribution in Sensor Networks.
IACR Cryptol. ePrint Arch., 2007
IACR Cryptol. ePrint Arch., 2007
IACR Cryptol. ePrint Arch., 2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of the Provable Security, 2007
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, 2007
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, 2007
Proceedings of the Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007), 12, 2007
2006
IACR Cryptol. ePrint Arch., 2006
SecLEACH - A Random Key Distribution Solution for Securing Clustered Sensor Networks.
Proceedings of the Fifth IEEE International Symposium on Network Computing and Applications, 2006
Proceedings of the 2006 IEEE Information Theory Workshop, 2006
2005
3-flow Conjecture and Matchings in Bipartite Graphs.
Ars Comb., 2005
A custom instruction approach for hardware and software implementations of finite field arithmetic over F<sub>2<sup>63</sup></sub> using Gaussian normal bases.
Proceedings of the 2005 IEEE International Conference on Field-Programmable Technology, 2005
2004
Proceedings of the Mobility Aware Technologies and Applications, 2004
2002
Proceedings of the 2002 ACM Symposium on Applied Computing (SAC), 2002
Proceedings of the Information Security, 5th International Conference, 2002
2001
Electron. Notes Discret. Math., 2001
2000
Proceedings of the Second International Workshop on Advance Issues of E-Commerce and Web-Based Information Systems (WECWIS 2000), 2000
Proceedings of the Progress in Cryptology, 2000
1999
Fast Multiplication on Elliptic Curves over GF(2<sup>m</sup>) without Precomputation.
Proceedings of the Cryptographic Hardware and Embedded Systems, 1999
1998
An Improvement of the Guajardo-Paar Method for Multiplication on Non-Supersingular Elliptic Curves.
Proceedings of 18th International Conference of the Chilean Computer Science Society (SCCC '98), 1998
Proceedings of the 12th Brazilian Symposium on Software Engineering, 1998
Proceedings of the Selected Areas in Cryptography '98, 1998
Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC 1998), 1998