Ricardo Felipe Custódio

Orcid: 0000-0001-9611-5694

According to our database1, Ricardo Felipe Custódio authored at least 51 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Probabilistic root finding in code-based cryptography.
J. Cryptogr. Eng., April, 2024

Proposal of an Electronic Auditing System Applied to the Brazilian Electronic Voting Machine.
CoRR, 2024

A Concrete LIP-Based KEM With Simple Lattices.
IEEE Access, 2024

From Self-Sovereign Identity to Fiduciary Identity: A Journey Towards Greater User Privacy and Usability.
Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, 2024

The Role-Artifact-Function Framework for Understanding Digital Identity Models.
Proceedings of the Conceptual Modeling - 43rd International Conference, 2024

2023
Post-quantum hybrid key exchange: a systematic mapping study.
J. Cryptogr. Eng., April, 2023

Monitoring Key Pair Usage through Distributed Ledgers and One-Time Signatures.
Inf., 2023

Automated Issuance of Post-Quantum Certificates: a New Challenge.
IACR Cryptol. ePrint Arch., 2023

Post-quantum Hybrid KEMTLS Performance in Simulated and Real Network Environments.
Proceedings of the Progress in Cryptology - LATINCRYPT 2023, 2023

2022
Self-Sovereign Identity: A Systematic Review, Mapping and Taxonomy.
Sensors, 2022

Post-Quantum Hybrid KEMTLS Performance in Simulated and Real Network Environments.
IACR Cryptol. ePrint Arch., 2022

Simplifying Electronic Document Digital Signatures.
CoRR, 2022

Leveraging Self-Sovereign Identity, Blockchain, and Zero-Knowledge Proof to Build a Privacy-Preserving Vaccination Pass.
CoRR, 2022

Touchless Authentication for Health Professionals: Analyzing the Risks and Proposing Alternatives to Dirty Interfaces.
Proceedings of the 35th IEEE International Symposium on Computer-Based Medical Systems, 2022

Post-Quantum Electronic Identity: Adapting OpenID Connect and OAuth 2.0 to the Post-Quantum Era.
Proceedings of the Cryptology and Network Security - 21st International Conference, 2022

Redacting Blockchain Without Exposing Chameleon Hash Collisions.
Proceedings of the Cryptology and Network Security - 21st International Conference, 2022

2021
Steganographic Analysis of Blockchains.
Sensors, 2021

Improved constant-sum encodings for hash-based signatures.
J. Cryptogr. Eng., 2021

Self-Sovereign Identity: A Systematic Map and Review.
CoRR, 2021

Matching Metadata on Blockchain for Self-Sovereign Identity.
Proceedings of the Business Process Management Workshops, 2021

2020
Bitcoin Blockchain Steganographic Analysis.
Proceedings of the Applied Cryptography and Network Security Workshops, 2020

2019
A new class of irreducible pentanomials for polynomial-based multipliers in binary fields.
J. Cryptogr. Eng., 2019

Don't forget your roots: constant-time root finding over 픽<sub>2<sup>m</sup></sub>.
IACR Cryptol. ePrint Arch., 2019

Don't Forget Your Roots: Constant-Time Root Finding over \mathbb F_2^m F 2 m.
Proceedings of the Progress in Cryptology - LATINCRYPT 2019, 2019

Handling Vinegar Variables to Shorten Rainbow Key Pairs.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2019, 2019

2018
Fast modular reduction and squaring in <i>GF</i>(2<sup><i>m</i></sup>).
Inf. Process. Lett., 2018

Secret Sharing Schemes with Hidden Sets.
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018

Tuning the Winternitz hash-based digital signature scheme.
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018

2017
Privacy information in a positive credit system.
Int. J. Grid Util. Comput., 2017

2015
Locating modifications in signed data for partial data integrity.
Inf. Process. Lett., 2015

An adaptive threat model for security ceremonies.
Int. J. Inf. Sec., 2015

Sharing Privacy Information in Credit Analysis Environment.
Proceedings of the Ninth International Conference on Complex, 2015

2013
Multi-factor Authentication in Key Management Systems.
Proceedings of the 12th IEEE International Conference on Trust, 2013

An updated threat model for security ceremonies.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

μMobile IPv6 in wireless sensor networks.
Proceedings of the Seventh International Conference on Sensing Technology, 2013

A User-Centric Digital Signature Scheme.
Proceedings of the Public Key Infrastructures, Services and Applications, 2013

2012
Towards a Formal Verification of a Multi-factor Authentication Protocol Using Automated Theorem Provers.
Proceedings of the 11th IEEE International Conference on Trust, 2012

A Proposed Framework for Analysing Security Ceremonies.
Proceedings of the SECRYPT 2012, 2012

The Notary Based PKI - A Lightweight PKI for Long-Term Signatures on Documents.
Proceedings of the Public Key Infrastructures, Services and Applications, 2012

2011
A coordination layer to handle real-time communication in Wi-Fi networks with uncontrolled traffic sources.
Proceedings of the IEEE 36th Conference on Local Computer Networks, 2011

2010
Analytical Model to Evaluate the Performance of Mobile Agents in a Generic Network Topology.
J. Netw. Syst. Manag., 2010

Assessment of the IEEE 802.11e EDCA Protocol Limitations when Dealing with Real-Time Communication.
EURASIP J. Wirel. Commun. Netw., 2010

An Infrastructure for Long-Term Archiving of Authenticated and Sensitive Electronic Documents.
Proceedings of the Public Key Infrastructures, Services and Applications, 2010

2009
Distributed DBP: A (m, k)-firm based Distributed Approach for QoS Provision in IEEE 802.15.4 Networks.
Proceedings of 12th IEEE International Conference on Emerging Technologies and Factory Automation, 2009

Ceremonies Formal Analysis in PKI's Context.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
Audit and backup procedures for hardware security modules.
Proceedings of the IDtrust 2008, 2008

Optimized Certificates - A New Proposal for Efficient Electronic Document Signature Validation.
Proceedings of the Public Key Infrastructure, 2008

Self-Adaptable and Intrusion Tolerant Certificate Authority for Mobile Ad Hoc Networks.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
A Verifiable Voting Protocol based on Farnel.
IACR Cryptol. ePrint Arch., 2007

OpenHSM: An Open Key Life Cycle Protocol for Public Key Infrastructure's Hardware Security Modules.
Proceedings of the Public Key Infrastructure, 2007

2003
Reliable Clock Synchronization for Eletronic Documents.
Proceedings of the 3rd Latin American Network Operations and Management Symposium, 2003


  Loading...