Center for Cryptology and Information Security

Selected Publications

Book
  • M. I. González Vasco and R. SteinwandtGroup Theoretic Cryptography, Chapman and Hall/CRC Cryptography and Network Security Series, 2015.
  • M. Burmester, G. Tsudik, S. S. Magliveras, I. Ilić, (eds.), Information Security, Proceedings of the 13th International Conference on Information Security (ISC2010), LNCS 6531, Springer, 2011.
Book Chapter
  • M. VanHilst and E.B.FernandezA Construct Grid Approach to Security Classification and Analysis, accepted as a chapter in "Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions ", Manish Gupta, John Walp, and Raj Sharman, IGI Global 2011.
  • E.B.Fernandez, N. Yoshioka, H. Washizaki, J. Jurjens, M.VanHilst , and G. Pernul, Using security patterns to develop secure systems, in H. Mouratidis, Ed., Software engineering for secure systems: Industrial and Research Perspectives, IGI Global Group, 2010.
  • E. B. Fernandez, K. Hashizume, I. Buckley, M. M. Larrondo-Petrie, and M. VanHilstWeb services security: Standards and products, Chapter 8 in "Web Services Security Development and Architecture: Theoretical and Practical Issues", Carlos A. Gutierrez, Eduardo Fernandez-Medina, and Mario Piattini (Eds.), IGI Global Group 2010. 152-177.
  • E. B. Fernandez, M.M. Larrondo-Petrie, T. Sorgente, and M. VanHilstA methodology to develop secure systems using patterns, Chapter 5 in "Integrating security and software engineering: Advances and future vision", H. Mouratidis and P. Giorgini (Eds.), IDEA Press, 2006, 107-126(ISI BCI)
  • E. B. FernandezWireless network security for health applications, will appear as Chapter 15 in the "Pervasive Communication Handbook”, M. Ilyas (Ed.), CRC Press 2011.
  • E. B. Fernandez, Carolina Marin, and Maria M. Larrondo PetrieSecurity requirements for social networks in Web 2.0, in the Handbook of Social Networks: Technologies and Applications, B. Furht (Editor), Springer 2010.
  • E.B.FernandezSecurity patterns and a methodology to apply them, in Security and Dependability for Ambient Intelligence, G. Spanoudakis and A. Maña (Eds.), Springer Verlag, 2009.
  • J. Jurjens and E.B. FernandezSecure database development, in Encyclopedia of Database Systems, Ling Liu and Tamer Oszu (eds.), Springer Verlag, Berlin, Germany, 2009.
  • E. B. Fernandez and M. VanHilstAn overview of WiMax security, Chapter 10 in the "Handbook of WiMax security and QoS", S. Ahson and M. Ilyas (Eds.), CRC Press, Taylor and Francis Group, Boca Raton, FL, 2008, 197-204.
  • E. B. Fernandez and M. M. Larrondo PetrieSecuring design patterns for distributed systems, Chapter 3 in "Security in Distributed, Grid, and Pervasive Computing", Y. Xiao (Ed.)., Auerbach Pubs., Taylor & Francis Group, LLC, 2007, 53-66.
Journal
  • A. Bonisoli, J.W. Hirschfeld, S.S. Magliveras (guest eds.): Special issue Designs, Codes and Cryptography, 2011 (to appear).
  • K. Gaj and R. Steinwandt (guest eds.): special issue Hardware Architectures for Algebra, Cryptology and Number Theory Integration, the VLSI Journal, vol. 44, no. 4, 2011.
  • R. Steinwandt, W. Geiselmann, and Ç.K. Koç (guest eds.): Special Section on Special-Purpose Hardware for Cryptography and Cryptanalysis of IEEE Transactions on Computers, vol. 57, no. 11, 2008.
  • M. I. González Vasco and R. Steinwandt (guest eds.): special issue Applications of Algebra to Cryptography of Discrete Applied Mathematics, vol. 156, no. 16, 2008.
Journal Article
  • Jean-Luc Danger, Youssef El Housni, Adrien Facon, Cheikh Thiecoumba Gueye, Sylvain Guilley, Sylvie Herbel, Ousmane Ndiaye, Edoardo Persichetti, Alexander Schaub: On the Performance and Security of Multiplication  in GF(2N). Cryptography 2(3): 25 (2018)
  • Edoardo Persichetti: Efficient One-Time Signatures from Quasi-Cyclic Codes: A Full Treatment. Cryptography  2(4): 30 (2018)
  • Gustavo Banegas, Paulo S. L. M. Barreto, Brice Odilon Boidje, Pierre-Louis Cayrel, Gilbert Ndollane Dione, Kris Gaj, Cheikh Thiécoumba Gueye, Richard Haeussler, Jean Belo Klamti, Ousmane Ndiaye, Duc Tri Nguyen, Edoardo Persichetti, Jefferson E. Ricardini: DAGS:  Key encapsulation using dyadic GS codes. J. Mathematical Cryptology  12(4): 221-239(2018)
  • § Ausmita Sarker, Mehran Mozaffari Kermani, Reza Azarderakhsh: Hardware Constructions for Error Detection of Number-Theoretic Transform Utilized in Secure Cryptographic Architectures. IEEE Trans. VLSI Syst. 27(3): 738-741 (2019)
  • Amir Jalali, Reza Azarderakhsh, Mehran Mozaffari Kermani, David Jao: Towards Optimized and Constant-Time CSIDH on Embedded Devices. COSADE 2019: 215-231 § https://dblp.org/img/n.png
  • Mehran Mozaffari Kermani, Siavash Bayat Sarmadi, A.-Bon Ackie, Reza Azarderakhsh: High-Performance Fault Diagnosis Schemes for Efficient Hash Algorithm  BLAKE. LASCAS2019: 201-204
  • Aaron Hutchinson, Koray Karabina: Constructing multidimensional differential addition chains and their applications. J. Cryptographic Engineering  9(1): 1-19 (2019) § 2018
  • Koray Karabina,  Angela Robinson: Extending a Framework for Biometric Visual Cryptography. CANS 2018: 481-494 § https://dblp.uni-trier.de/img/n.png
  • Aaron Hutchinson, Koray Karabina: Constructing Canonical Strategies for Parallel Implementation of Isogeny Based Cryptography. INDOCRYPT 2018: 169-189
  • Maria Isabel Gonzalez Vasco,  Angela Robinson,  Rainer SteinwandtCryptanalysis of a Proposal Based on the Discrete Logarithm Problem Inside Sn.Cryptography  2(3): 16 (2018) https://dblp.uni-trier.de/img/n.png
  • Okan Seker, Abraham Fernandez-Rubio, Thomas Eisenbarth,  Rainer Steinwandt: Extending Glitch-Free Multiparty Protocols to Resist Fault Injection Attacks. IACR Trans. Cryptogr.  Hardw. Embed. Syst. 2018(3): 394-430 (2018)
  • Diogo Oliveira, Nasir Ghani, Majeed M. Hayat, Jorge Crichigno, Elias Bou-Harb: SDN Testbed for Evaluation of Large Exo-Atmospheric EMP Attacks. IEEE Communications Magazine  57(1): 88-97 (2019) 
  • Martin Husák, Jana Komárková, Elias Bou-Harb, Pavel Celeda: Survey of Attack Projection, Prediction, and Forecasting in Cyber Security. IEEE Communications Surveys and Tutorials  21(1): 640-660 (2019) § 2018 § https://dblp.uni-trier.de/img/n.png
  • § Farooq Shaikh, Elias Bou-Harb, Nataliia Neshenko,  Andrea P. Wright, Nasir Ghani: Internet of Malicious Things: Correlating Active and Passive Measurements for Inferring and Characterizing Internet-Scale Unsolicited IoT Devices.  IEEE Communications Magazine56(9): 170-177 (2018) § https://dblp.uni-trier.de/img/n.png
  • Elias Bou-Harb, Nasir Ghani, Abdelkarim Erradi, Khaled Bashir Shaban: Passive inference of attacks on CPS communication protocols.  J. Inf. Sec. Appl. 43: 110-122(2018) https://dblp.uni-trier.de/img/n.png
  • Elias Bou-Harb, Chadi Assi, Mourad Debbabi: CSC-Detector:  A System to Infer Large-Scale Probing Campaigns. IEEE Trans. Dependable Sec. Comput.  15(3): 364-377 (2018) https://dblp.uni-trier.de/img/n.png
  • Martin Husák, Nataliia Neshenko, Morteza Safaei Pour, Elias Bou-Harb, Pavel Celeda: Assessing Internet-wide Cyber Situational Awareness of Critical Sectors. ARES 2018: 29:1-29:6
  • J. HiggsR. Pinsker, T. Smith, G. YoungThe Relationship Between Board-Level Technology Committees and Reported Security Breaches, Journal of Information Systems 30(1), 2016.
  • T. Eisenbarth, A. Meyerowitz, and R. SteinwandtOn the security margin of MAC striping, Information Processing Letters 115(11): 899-902, 2015.
  • S. Kepley and R. SteinwandtQuantum circuits for F   2n-multiplication with subquadratic gate count, Quantum Information Processing 14(7): 2373-2386, 2015.
  • P. Budhathoki and R. SteinwandtAutomatic synthesis of quantum circuits for point addition on ordinary binary elliptic curves, Quantum Information Processing 14(1): 201–216, 2015.
  • M. Roetteler and R. Steinwandt, A note on quantum related-key attacks, Information Processing Letters 115(1): 40-44, 2015.
  • W. Gao, K. Neupane and R. SteinwandtTuning a two-round group key agreement, International Journal of Information Security, 2014.
  • R. Steinwandt and A. Suárez Corona, Scalable Attribute-based Group Key Establishment: from Passive to Active and Deniable, Applicable Algebra in Engineering, Communication and Computing, vol. 25, pp. 1-20, 2014.
  • M. Rötteler and R. SteinwandtA quantum circuit to find discrete logarithms on ordinary binary elliptic curves in depth O(log2 n), Quantum Information & Computation 14: 888-900, 2014.
  • B. Amento, M. Rötteler and R. SteinwandtQuantum Binary Field Inversion: Improved Circuit Depth via Choice of Basis Representation, Quantum Information & Computation 13: 116–134, 2013.
  • B. Amento, M. Rötteler and R. SteinwandtEfficient quantum circuits for binary elliptic curve arithmetic: reducing T-gate complexity, Quantum Information & Computation 13: 631–644, 2013.
  • L. Klingler, R. Steinwandt and D. Unruh, On using probabilistic Turing machines to model participants in cryptographic protocols, Theoretical Computer Science 501: 49–51, 2013.
  • M. González Muñiz and R. SteinwandtSecurity of Message Authentication Codes in the Presence of Key-Dependent Messages, Designs, Codes and Cryptography, vol. 64, no. 1-2, pp. 161-169, 2012.
  • R. Steinwandt and A. Suárez Corona: Identity-based non-interactive key distribution with forward security, Designs, Codes and Cryptography, vol. 64, no. 1-2, pp. 195-208, 2012.
  • V. Božović, D. Socek, R. Steinwandt and V. I. Villányi: Multi-authority attribute based encryption with honest-but-curious central authority, International Journal of Computer Mathematics (to appear).
  • E.B.Fernandez and Sergio Mujica , Model-based development of security requirements, accepted for the CLEI (Latin-American Center for Informatics Studies) Journal (to appear).
  • E.B.Fernandez and Xiaohong Yuan, Semantic analysis patterns and secure semantic analysis patterns, Int. Journal of Information and Computer Security (IJICS) (to appear).
  • M. González Muñiz and R. SteinwandtSecurity of Message Authentication Codes in the Presence of Key-Dependent Messages, Designs, Codes and Cryptography (to appear).
  • Anthony Marcus, Mihaela Cardei, Ionut Cardei, E.B.Fernandez, Fulvio Frati, and Ernesto Damiani, "A pattern for web-based WSN monitoring", Journal of Communications (JCM), Special Issue on New Advances in Wireless Sensor Networks (to appear).
  • R. Steinwandt and A. Suárez Corona: Identity-based non-interactive key distribution with forward security, Designs, Codes and Cryptography (to appear).
  • H. J. Smith, T. Dinev, and H. Xu. 2011. The Information Privacy Research: An Interdisciplinary Review, MIS Quarterly, forthcoming.
  • M. Grassl, I. Ilić, S. S. Magliveras and R. SteinwandtCryptanalysis of the Tillich-Zémor hash function, Journal of Cryptology, vol. 24, no. 1, pp. 148-156, 2011.
  • S. Hinduja, J.W. Patchin, Cyberbullying: A review of the legal issues facing educators. Preventing School Failure: Alternative Education for Children and Youth, 55(2), 71-78, 2011.
  • Q. Hu, Z.C. Xu, T.   Dinev, and H. Ling. Does Deterrence Work in Reducing Information Security Policy Abuse by Employees?, Communications of the ACM, 54(6), 34-40, 2011.
  • R. Steinwandt and A. Suárez Corona: Cryptanalysis of a 2-party key establishment based on a semigroup action problem, Advances in Mathematics of Communications, vol. 5, no. 1, pp. 87-92, 2011.
  • H. Xu, T. Dinev, and H. Li. 2011. Trust in the Social Computing: The Case of Peer-to-Peer (P2P) File Sharing Networks, ICST Transactions on Security and Safety, forthcoming
  • H. Xu, T. Dinev, H. J. Smith, and P.   Hart. 2011. Information Privacy Concerns: Linking Individual Perceptions with Institutional Privacy Assurances, Journal of the Association for Information Systems, forthcoming.
  • H. Xu, and T.   Dinev. 2011. The Security-Liberty Debate – Individuals’ Attitudes towards Internet Government Surveillance, Electronic Government: An International Journal, forthcoming
  • R.S.   Behara, C.D. Huang, and Q. Hu , A System Dynamics Model of Information Security Investments, Journal of Information Systems Security, 6 (2): 30-46, 2010.
  • W. Geiselmann, K. Matheis and R. SteinwandtPET SNAKE: A Special Purpose Architecture to Implement an Algebraic Attack in Hardware, Transactions on Computational Science, vol. 10, pp. 298-328, 2010.
  • M. González Muñiz and R. SteinwandtSecurity of Signature Schemes in the Presence of Key-Dependent Messages, Tatra Mountains Mathematical Publications, vol. 47, pp. 15-29, 2010.
  • S. Hinduja, J. Schafer, Cybercrime units on the world wide web. Policing: An International Journal of Police Strategies & Management, (2), 278-296, 2010.
  • I. Ilić and S. S. MagliverasWeak discrete logarithms in non-abelian groups, J. of Combin. Math. and Combin. Computing (JCMCC), vol. 74, pp 3-11, 2010.
  • J.W. Patchin, S. Hinduja , Changes in Adolescent Online Social Networking Behaviors from 2006 to 2009. Computers and Human Behavior, 26, 1818–1821, 2010.
  • N.Singhi, N. Singhi, S.S. MagliverasMinimal logarithmic signatures for finite groups of Lie type, Designs, Codes and Cryptography (DCC), vol. 55, pp. 243-260, 2010.
  • R. SteinwandtA ciphertext-only attack on Polly Two, Applicable Algebra Engineering, Communication and Computing, vol. 21, no. 2, pp. 85-92, 2010.
  • R. Steinwandt and A. Suárez Corona: Attribute-based group key establishmemt, Advances in Mathematics of Communications, vol. 4, no. 3, pp. 381-398, 2010.
  • P. Carrillo, H. Kalva, and S. S. MagliverasCompression independent reversible encryption for privacy in video surveillance, EURASIP J. on Information Security, Article ID 429581, 2009.
  • T.   DinevJ. Goo, Q. Hu, and K. Nam. User behavior towards protective information technologies: The role of cultural differences between the United States and South Korea, Information Systems Journal, 19, 391-412, 2009
  • M. Grassl and R. SteinwandtCryptanalysis of an Authentication Scheme Using Truncated Polynomials, Information Processing Letters, vol. 109, pp. 861-863, 2009.
  • L. Klingler, S. S. Magliveras, F. Richman, and M. Sramka, Discrete logarithms for finite groups. Computing, vol. 85, pp. 3-19, 2009.
  • W. Lempken, S. S. Magliveras, T. van Trung and W. Wei, A public key cryptosystem based on non-abelian finite groups, J. Cryptology, vol. 22, pp. 62-74, 2009.
  • T. DinevP. Hart, M. Mullen, Internet privacy concerns and beliefs about government surveillance - an empirical investigation, Journal of Strategic Information Systems, 17, 3, 214-233, 2008.
  • S. Hinduja, J. Ingram, Self-Control and Ethical Beliefs on the Social Learning of Intellectual Property Theft. Western Criminology Review, 9 (2), 52-72, 2008.
  • S. HindujaDeindividuation and Internet Software Piracy. CyberPsychology and Behavior, 11 (4), 391-398, 2008.
  • C.D. Huang, Q. Hu, and R.S. BeharaAn Economic Analysis of the Optimal Information Security Investment in the Case of a Risk-Averse Firm, International Journal of Production Economics, Vol. 114, No. 2, pp. 793-804, 2008.
  • C.D.   HuangR.S.   Behara, Q. Hu, Securing the Information Supply Chain: Managing Risk Propagation in Extended Enterprise Networks, IEEE IT Professional, 10 (4), p.14-19, 2008.
  • B. Kooi, S. HindujaTeaching Security Courses Experientially. Journal of Criminal Justice Education, 19 (2), 290-307, 2008.
  • S. S. Magliveras, P. Svaba, Tran van Trung and P. Zajac, On the security of a realization of cryptosystem MST3, Tatra Mt. Publ., vol. 41, pp 1-13, 2008.
  • R. Steinwandt and V. I. Villányi: A one-time signature using run-length encoding, Information Processing Letters, vol. 108, no. 4, pp. 179-185, 2008.
  • J.-M. Bohli, M. I. González Vasco and R. SteinwandtSecure Group Key Establishment Revisited, International Journal of Information Security, vol. 6, no. 4, pp. 243-254, 2007.
  • W. Geiselmann and R. SteinwandtSpecial Purpose Hardware in Cryptanalysis: The Case of 1024 Bit RSA, IEEE Security & Privacy, vol. 5, no. 1, pp. 63-66, 2007.
  • S. HindujaComputer Crime Investigations in the United States: Leveraging Knowledge from the Past to Address the Future. International Journal of Cyber Criminology, 1 (1), 1-26, 2007.
  • S. Hinduja, J.W. Patchin, Offline Consequences of Online Victimization: School Violence and Delinquency. Journal of School Violence, 6 (3), 89-112, 2007.
  • D. Socek, H. Kalva, S. S. Magliveras, O. Marques, D. Culibrk and B. Furht: New approaches to encryption and steganography for digital videos, Multimedia Systems Journal, vol. 13, no. 3, Springer-Verlag, pp. 191-204, 2007.
  • D. Socek, H. Kalva, S. S. Magliveras, O. Marques, D. Culibrk and B. Furht: Digital Video Encryption Algorithms Based on Correlation Preserving Permutations, EURASIP Journal on Information Security, vol. 2007, Article ID 52965, 15 pages, 2007.
  • B. Wu, J. Wu, E. B. Fernandez, M. Ilyas, and S. S. Magliveras   :   Secure and efficient key management in mobile ad hoc networks, J. of Network and Computer Applications, Academic Press, issn 1084-8045, vol. 30, no. 3, pp. 937-954, 2007.
Conference or Workshop Article
  • K. Neupane, R. Steinwandt and A. Suárez Corona
    Group key establishment: adding perfect forward secrecy at the cost of one round, Proceedings of 11th International Conference on Cryptology and Network Security CANS 2012, Lecture Notes in Computer Science, pp. 158–168, Springer, 2012.
  • K. Neupane, R. Steinwandt and A. Suárez Corona
    Scalable Deniable Group Key Establishment (short paper), Proceedings of 5th International Symposium on Foundations & Practice of Security, Lecture Notes in Computer Science, pp. 365–373, Springer, 2013.
  • R.S. Behara and C.D. Huang (2011) “Securing Electronic Health Records in a Health Information Exchange Environment," Proceedings of the 42 nd Annual Meeting of the Decision Science Institute, November 19-22, Boston, Massachusetts, 4611-4616.
  • Ingrid Buckley, Eduardo Fernandez, Marco Anisetti, Claudio A. Ardagna, Masoud Sadjadi, and Ernesto Damiani, "Towards Pattern-based Reliability Certification of Services”, accepted for the 1st International Symposium on Secure Virtual Infrastructures (DOA-SVI'11) , 17-19 Oct. 2011, Crete, Greece.
  • Mihaela Cardei, E. B. Fernandez, Anupama Sahu, and Ionut Cardei, "A pattern for Wireless System Architectures", Asian PLoP 2011.
  • Eduardo B. Fernandez, Nobukazu Yoshioka, and Hironori Washizaki, "Two patterns for distributed systems: Enterprise Service Bus (ESB) and Distributed Publish/Subscribe" , accepted for the 18th Conference on Pattern Languages of Programs (PLoP 2011)
  • E. B. Fernandez, Nobukazu Yoshioka, Hironori Washizaki, and Michael VanHilst, "An approach to model-based development of secure and reliable systems", Sixth International Conference on Availability, Reliability and Security (ARES 2011), August 22-26, Vienna, Austria
  • Keiko Hashizume, Eduardo B. Fernandez, and Nobukazu Yoshioka, "Misuse patterns for cloud computing", Twenty-Third International Conference on Software Engineering and Knowledge Engineering (SEKE 2011), Miami Beach, USA, July 7-9, 2011.
  • K. Hashizume, N. Yoshioka, and E.B.Fernandez, "Misuse Patterns for Cloud Computing", Asian PLoP 2011.
  • Carolina Marin, E.B.Fernandez, and Maria M. Larrondo-Petrie, "Secure location-based service for social networks", 9th Latin American and Caribbean Conference (LACCEI'2011).
  • Sergio Mujica, Francisca Valenzuela, and E.B. Fernandez, "Two security patterns: Least Privilege and Secure Logger/Auditor.", Asian PLoP 2011.
  • Jaime Muñoz-Arteaga,    E.B. Fernandez   , and Hector Caudel, "Misuse pattern: Spoofing web services", Asian PLoP 2011.
  • Jaime Muñoz-Arteaga, Eduardo B. Fernandez, René Santaolaya-Salgado, "Interaction Patterns for Designing Visual Feedback in Secure Websites", Fourth International Conference on Advances in Computer-Human Interactions (ACHI 2011), IARIA, February 23-28, 2011, Gosier, Guadeloupe, France, 95-100.
  • K. Neupane and R. Steinwandt: "Communication-efficient 2-round group key establishment from pairings", Proceedings of CT-RSA, vol. 6558 of Lecture Notes in Computer Science, pp. 65-76, Springer, 2011.
  • I. Ilić and S. S. Magliveras, “Crypto applications of combinatorial group theory”, Information Security, Coding Theory and Related Combinatorics, D. Crnković and V. Tonchev (eds), ASI-NATO volume, IOS Press, pp. 1-16, 2011.
  • K. Matheis and S. S. Magliveras, "Generating rooted trees of m nodes uniformly at random", Information Security, Coding Theory and Related Combinatorics, D. Crnković and V. Tonchev (eds), ASI-NATO volume, IOS Press, pp. 17-26, 2011.
  • S.S. Magliveras, Tran van Trung, Wandi Wei: “On Jacobsthal Binary Sequences”, Information Security, Coding Theory and Related Combinatorics, D. Crnković and V. Tonchev (eds), ASI-NATO volume, IOS Press, pp. 27-37, 2011.
  • Ola Ajaj and E.B. Fernandez, "A pattern for the WS-Policy standard", Procs.of the 8th Latin American Conference on Pattern Languages of Programs (SugarLoafPLoP 2010), Salvador, Bahia, Brazil, Sept 23-26, 2010.
  • Ola Ajaj and E.B. Fernandez, "A pattern for the  WS-Trust standard of web services", Procs. of the 1st Asian Conference on Pattern  Languages of Programs (AsianPLoP 2010) , Tokyo, Japan, March 16-17, 2010.
  • A. Bogdanov, T. Eisenbarth, C. Paar, M. Wienecke: “Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs”. Topics in Cryptology - CT-RSA 2010, Vol. 5985 of Lecture Notes in Computer Science,  pp. 235-251, Springer 2010.
  • T. Dinev, V. Albano, A. D’Atri, H. Xu, and P. Hart, (2010). Individual’s Attitudes Toward Electronic Health Records – A Privacy Calculus Perspective,” Proceedings of 70th Annual Meeting of the Academy of Management (AOM 2010), Montréal, Canada.
  • E.B.Fernandez and Sergio Mujica , "Building secure systems: From threats to security patterns", Procs. of the XXIX International Conference of the Chilean Computer Society, Antofagasta, Chile, November 2010.
  • E.B. Fernandez, D. LaRed Martines, and J. I. Pelaez, "A conceptual approach to voting based on patterns", Procs. of the 36th Latin American Conf. on Informatics (CLEI 2010), 18-22 October, Asuncion, Paraguay.
  • E.B. Fernandez and M.M. Larrondo-Petrie, "Designing secure SCADA systems using security patterns", Procs. of the 43rd Hawaii Conf. on Systems Science, Honolulu, HI, Jan. 2010, 1-8. ISI
  • E.B. Fernandez, N. Yoshioka, and H. Washizaki, "A Worm misuse pattern", Procs. of the 1st Asian Conference on Pattern  Languages of Programs(AsianPLoP 2010) , Tokyo, Japan, March 16-17, 2010.
  • E.B. Fernandez, N. Yoshioka, H. Washizaki, and M. VanHilst, "Measuring the level of security introduced by security patterns", Procs. of the 4th workshop on Secure systems methodologies using patterns (SPattern 2010), in conjunction with ARES 2010, Krakow, Poland, February 2010. ISI
  • Q. Hu, Z.C. Xu, T. Dinev, and H. Ling. (2010). Why Individuals Commit Computer Offences in Organizations: Investigating the Roles of Rational Choice, Self-Control, and Deterrence, Proceedings of the 14th Pacific Asia Conference on Information Systems (PACIS 2010), July 9-12, 2010, Taipei, ROC. 1378-1389.
  • Q. Hu, Z.C. Xu, T. Dinev, and H. Ling. (2010). The Centrality of Low Self-Control in Internal Computer Offenses, The Dewald Roode Workshop on Information Systems Security Research, IFIP WG8.11/11.13, October 8-9, 2010, Bentley University, Waltham, MA. 316-345.
  • C.D. Huang (2010) “Optimal Investment in Information Security: A Business Value Approach,” Proceedings of the 14 th Pacific Asia Conference on Information Systems, July 9-12, Taipei, Taiwan; available electronically.
  • Ajoy Kumar and E.B.Fernandez, "Security patterns for Virtual Private Networks", Procs. of the 8th Latin American Conference on Pattern Languages of Programs (SugarLoafPLoP 2010), Salvador, Bahia, Brazil, Sept 23-26, 2010
  • Carolina Marin, E.B. Fernandez, and M.M. Larrondo-Petrie, "Patterns for social networks in Web 2.0", Procs. of the 8th Latin American and Caribbean Conf. for Eng. and Technology (LACCEI'2010), June 1-4, 2010, Arequipa, Peru
  • I. von Maurich, T. Poeppelmann, J. Rave, C. Reuber, A. Wild, T. Eisenbarth, S. Heyse:" Evaluation of SHA-3 Candidates for 8-bit Embedded Processors", presented at: The Second SHA-3 Candidate Conference, University of California, Santa Barbara, August 23-24, 2010.
  • Moradi, O. Mischke, T. Eisenbarth: “Correlation-Enhanced Power Analysis Collision Attack”, Cryptographic Hardware and Embedded Systems - CHES 2010, Vol. 6225 of Lecture Notes in Computer Science, pp. 125-139, Springer 2010.
  • M. Netter, E.B. Fernandez, and G. Pernul, "Refining the pattern-based reference model for electronic invoices by incorporating threats", Procs. of the 4th workshop on Secure systems methodologies using patterns (SPattern 2010). In conjunction with ARES 2010, Krakow, Poland, February 2010. ISI
  • K. Neupane and R. Steinwandt: "Server-assisted long-term secure 3-party key establishment" Proceedings of 5th International Conference on Security and Cryptography SECRYPT 2010, pp. 372-378, 2010.
  • Juan C. Pelaez and Eduardo B. Fernandez, "Network Forensics Models for Converged Architectures", Int. Journal on Advances in Security, IARIA, 2010, vol. 3 No 1 & 2, 2010.
  • Yuki Shiroma, Hironori Washizaki, Yoshiaki Fukazawa , Atsuto Kubo, Nobukazu Yoshioka, and E.B.Fernandez, "Model-driven application and validation of security patterns", 17th Conf. on Pattern Languages of Programs, PLoP 2010.
  • Miguel Solinas, Jairo Trad, Juan Abdala, Francisco Capdevila, E.B. FernandezLeandro Antonelli, "Caso de éxito de método que aplica patrones de seguridad en la Ingeniería en Computación", Congreso Argentino de Ciencias de la Computación 2010 - CACIC 2010.
  • T.Eisenbarth, T. Güneysu, S. Heyse, C. Paar, “MicroEliece: McEliece for Embedded Devices”, Cryptographic Hardware and Embedded Systems — CHES 2009, LNCS, Springer-Verlag, 2009.
  • M. González Muñiz and R. Steinwandt: "Cryptanalysis of a Message Recognition Protocol by Mashatan and Stinson", in International Conference on Information Security ICISC 2009, Lecture Notes in Computer Science, pp. 362-373, 2010.
  • I.A.Buckley and E.B. Fernandez, "Three patterns for fault tolerance", Procs. of the OOPSLA MiniPLoP, October 26, 2009.
  • I. Buckley, E.B. Fernandez, G.Rossi, and M. Sadjadi, "Web services reliability patterns", short paper in the 21st International Conference on Software Engineering and Knowledge Engineering (SEKE'2009), Boston, July 1-3, 2009, 4-9.
  • T. Dinev, H. Xu, and H.J. Smith, (2009). Information Privacy Values, Beliefs and Attitudes: An Empirical Analysis of Web 2.0 Privacy, Proceedings of 42th Hawaii International Conference on System Sciences (HICSS), Hawaii, Hawaii.
  • T. Dinev, H. Xu, and H.J. Smith. (2009). Information Privacy and Correlates: An Attempt to Navigate in the Misty Conceptual Waters, Proceedings of 69th Academy of Management Meeting, August 7-11, Chicago, Illinois
  • E.B. Fernandez and M. M. Larrondo-Petrie, "A project on web services security and reliability", 7th Latin American and Caribbean Conference for Engineering and Technology (LACCEI 2009 ), June 2-5, San Cristobal, Venezuela.
  • E. B. Fernandez, J. Wu, M.M. Larrondo-Petrie and Y. Shao, "On building secure SCADA Systems using Security Patterns", Procs. of the Cyber security and information intelligence challenges and strategies (CSIIR 2009). Oak Ridge, TN, April 13-15, 2009.
  • E.B. Fernandez and J.Munoz-Arteaga, "Extending a secure software methodology with usability aspects" , position paper for the 3rd Workshop on Software Patterns and Quality (SPAQu'09), in conjunction with OOPSLA 2009.
  • E. B. Fernandez and J. L. Ortega-Arjona, "Securing the Adapter pattern" , Procs. of the OOPSLA MiniPLoP, October 26, 2009.
  • E.B. Fernandez and J. L. Ortega-Arjona, "The secure Pipes and Filters pattern", Procs.of the Third Int Workshop on Secure System Methodologies using Patterns (SPattern 2009).
  • E.B. FernandezM. VanHilst, D. laRed M., and S. Mujica, "An extended reference monitor for security and safety", Procs. of the 5th Iberoamerican Conference on Information Security (CIBSI 2009). Montevideo, Uruguay, November 2009.
  • E.B. Fernandez, N. Yoshioka, and H. Washizaki, "Security patterns and quality", position paper for the 3rd Workshop on Software Patterns and Quality (SPAQu'09), in conjunction with OOPSLA 2009. Proceedings of the Third International Workshop on Software Patterns and Quality (pp. 46-47).
  • E.B. Fernandez, N. Yoshioka and H. Washizaki, "Modeling misuse patterns", Procs. of the 4th Int. Workshop on Dependability Aspects of Data Warehousing and Mining Applications (DAWAM 2009), in conjunction with the 4th Int.Conf. on Availability, Reliability, and Security (ARES 2009). March 16-19, 2009, Fukuoka, Japan.
  • E.B. Fernandez and X. Yuan, "An Analysis Pattern for Invoice Processing", Procs. of the 16th Conf. on Pattern Languages of Programs (PLoP 2009).
  • Keiko Hashizume, E.B.Fernandez, and Shihong Huang, "The WS-Security pattern", First IEEE Int. Workshop on Security Eng. Environments, Dec. 17-19, 2009, Shanghai, China.
  • K. Hashizume and E.B. Fernandez, "Symmetric Encryption and XML Encryption Patterns", Procs. of the 16th Conf. on Pattern Languages of Programs (PLoP 2009).
  • K. Hashizume, E.B. Fernandez, and S. Huang, "Digital Signature with Hashing and XML Signature patterns", Procs. of the 14th European Conf. on Pattern Languages of Programs, EuroPLoP 2009.
  • Q. Hu, T. Dinev, Z.C. Xu, and H. Ling. (2009). Why Individuals Abuse Computer Systems in Organizations: Perspectives from Multiple Theories, IFIP WG 8.11/11.13International Working Conference on Information Systems Security Research, May 29-30, 2009, University of Cape Town, Graduate School of Business, Cape Town, South Africa.
  • C.D. Huang and J. Goo (2009) “Investment Decision on Information System Security: A Scenario Approach,” Proceedings of the 2009 Americas Conference on Information Systems, August 6-9, San Francisco, California, USA.
  • L. L. Lobato and E.B. Fernandez, "Patterns to support the development of privacy  policies", Procs. of the First Int. Wokshop on Organizational Security Aspects  (OSA 2009). In conjuction with ARES 2009. March 16-19, 2009, Fukuoka, Japan.
  • A. Moradi, T. Eisenbarth, A. Poschmann, C. Paar, “Power Analysis of Single-Rail Storage Elements as used in MDPL”, 12th International Conference on Information Security and Cryptology - ICISC 2009, Seoul, Korea, December 2-4, 2009.
  • D. Naccache, R. Steinwandt and M. Yung: "Reverse Public Key Encryption", BIOSIG 2009 Proceedings, vol. 155 of Lecture Notes in Informatics, GI, pp. 155-169, 2009.
  • C. Paar, T. Eisenbarth, M. Kasper, T. Kasper, A. Moradi, “KeeLoq and Side-Channel Analysis — Evolution of an Attack”, 6th IEEE Workshop on Fault Diagnosis and Tolerance in Cryptography - FDTC 2009.Lausanne, Switzerland, September 6, 2009.
  • J.C. Pelaez and E.B. Fernandez. “VoIP Network Forensic Patterns”, Procs. of the Fourth International Multi-Conference on Computing in the Global Information Technology (ICCGI 2009), Cannes, France, August 23-29.
  • M. Solinas and E.B. Fernandez, Procs. of the 3rd Int. Workshop on Secure Systems Methodologies using Patterns (SPattern'09). In conjunction with the 6th International Conference onTrust, Privacy & Security in Digital Busines(TrustBus'09), 176-180.
  • M. VanHilstE.B. Fernandez, and F. Braz, "Building a Concept Grid to Classify Security Patterns", Procs. of the 3rd Workshop on Software Patterns and Quality (SPAQu'09), in conjuction with OOPSLA 2009.
  • M. VanHilstE.B. Fernandez, and F. Braz, "Building a Concept Grid to Classify Security Patterns", short paper for the 21st International Conference on Software Engineering and Knowledge Engineering (SEKE'2009), Boston, July 1-3, 2009.
  • H. Xu, T. Dinev, H. Wang, and R. Parks, (2009). “Trust in the Social Computing:  The Case of Peer-to-Peer (P2P) File Sharing Networks,” Proceedings of 15th Annual Americas Conference on Information Systems (AMCIS 2009), San Francisco, CA.
  • H. Washizaki, E.B.Fernandez, K. Maruyama, A. Kubo, and N. Yoshioka, “Improving the classification of security patterns”, Procs. of the Third Int. Workshop on Secure System Methodologies using Patterns (SPattern 2009).
  • A. Bogdanov, T. Eisenbarth, A. Rupp, C. Wolf “Time-Area Optimized Public-Key Engines: MQ-Cryptosystems as Replacement for Elliptic Curves?” Workshop on Cryptographic Hardware and Embedded Systems (CHES 2008), LNCS, Springer-Verlag, 2008 (Best Paper Award).
  • F. Braz,    E.B. Fernandez   , and    M. VanHilst   , "Eliciting security requirements through misuse activities”, Procs. of the 2nd Int. Workshop on Secure Systems Methodologies using Patterns (SPattern'08). In    conjunction with the    4   th   International Conference onTrust, Privacy & Security in Digital Busines(TrustBus'08), Turin, Italy, September 1-5, 2008. 328-333.
  • N. Delessy and    E. B. Fernandez   , “A pattern-driven security process for SOA applications", Procs. of the ACM Symposium on Applied Computing, Fortaleza, Ceara, Brazil, March 16-20, 2008. Short paper.
  • N. Delessy and    E. B. Fernandez   , “A pattern-driven security process for SOA applications", Procs. of the 3rd Int. Conf. on Availability, Reliability, and Security (ARES 2008). Barcelona, Spain, March 4-7, 2008, 416-421.
  • T. Dinev,    (2008). Internet Users’ Beliefs about Government Surveillance – The Role of Social Awareness and Internet Literacy, Hawaii International Conference on System Sciences (HICSS), Hawaii, January 7-10.    Nominated for Best Paper Award.
  • T. Eisenbarth, T. Kasper, A. Moradi, C. Paar, M. Salmasizadeh, M. Shalmani “On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme” Advances in Cryptology - CRYPTO 2008, LNCS, Springer-Verlag, 2008.
  • E.B. Fernandez, M. Fonoage, M. VanHilst, and M. Marta, "The secure three-tier architecture", Procs. of the Second Workshop on Engineering Complex Distributed Systems (ECDS 2008), Barcelona, Spain, March 4-7, 2008. 555-560.
  • E.B. Fernandez, J. Jurjens, N. Yoshioka, and H. Washizaki, "Incorporating database systems into a secure software development methodology", Procs. of the 2nd Int. Workshop on Secure Systems Methodologies using Patterns (Spattern'07). In conjunction with the 4th International Conference on Trust, Privacy & Security in Digital Business (TrustBus'07), Turin, Italy, September 1-5, 2008. 310-314.
  • E.B. Fernandez and D. LaRed M., "Patterns for the secure and reliable execution of processes". Procs. of the 15th Int.Conference on Pattern Languages of Programs (PLoP 2008), collocated with OOPSLA, Nashville, TN, Oct. 2008.
  • E.B.Fernandez and M.M. Larrondo-Petrie, "A Course on security for critical infrastructure systems", Procs. of the 6th Latin American and CaribbeanConference for Engineering and Technology, June 4-6, 2008, Tegucigalpa, Honduras.
  • E.B. FernandezM. M Larrondo-Petrie, and M. VanHilst, "A methodology to build secure systems using patterns", short paper in the 23rd Annual Computer Security Applications Conference (ACSAC), Miami Beach, December 10-14.
  • E.B.Fernandez, G. Pernul, and M. M. Larrondo-Petrie, “Patterns and pattern diagrams for access control”, Procs. of the 5th Int. Conf. on Trust, Privacy, and Security in Digital Systems (Trustbus'08), Turin, Italy, Sept. 1-5, 2008. Springer LNCS 5185, 38-47.
  • E. B. Fernandez, H. Washizaki, and N. Yoshioka, "Abstract security patterns", Position paper in Procs. of the 2nd Workshop on Software Patterns and Quality (SPAQu'08), in conjunction with the 15th Conf. on Pattern Languages of Programs (PLoP 2008), October 18-20, Nashville, TN.
  • B. Gierlichs, L. Batina, C. Clavier, T. Eisenbarth, A. Gouget, H. Handschuh, T. Kasper, K. Lemke-Rust, S. Mangard, A. Moradi, E. Oswald:“Susceptibility of eSTREAM Candidates towards Side Channel Analysis”, SASC workshop 2008.
  • Q. Hu,    T. Dinev     P. Hart   , and D. Cooke. (2008). Top Management Championship and Individual Behavior Towards Information Security: An Integrative Model, 16th European Conference on Information Systems (ECIS), Galway, Ireland, June 8-11.
  • S. S. Magliveras, W. Wei and X. Zou , ”Notes on the CRTDH Group Key Agreement Protocol”, 28th International Conference on Distributed Computing Systems Workshops, IEEE Computer Society, DOI 10.1109/ICDCS.Workshops.2008.36, pp. 406-411, 2008.
  • G. Meiser, T. Eisenbarth, K. Lemke-Rust, C. Paar: “Efficient Implementation of eSTREAM Ciphers on 8-bit AVR Microcontrollers” , SIES 2008, IEEE, 2008.
  • J. L. Ortega-Arjona and E.B. Fernandez, "The Secure Blackboard pattern". Procs. of the 15th Int. Conference on Pattern Languages of Programs (PLoP 2008), co-located with OOPSLA, Nashville, TN, Oct. 2008.
  • F. Regazzoni,    T. Eisenbarth   , L. Breveglieri, P. Ienne, I. Koren: “Can Knowledge Regarding the Presence of Countermeasures against Fault Attacks Simplify Power Attacks on Cryptographic Devices?” 21st IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT’08), 2008.
  • S. Rohde,    T. Eisenbarth   , E. Dahmen, J. Buchmann, C. Paar: “Fast Hash-Based Signature Verification on Constrained Devices”, CARDIS 2008, London, UK
  • M. VanHilstE.B. Fernandez, and F. Braz, "A multidimensional classification for users of security patterns", Procs. of the 6th Int. Workshop on Security in Information Systems (WOSIS 2008), Barcelona, Spain, June 12-13, 2008, in conjunction with ICEIS 2008, 89-98.
  • H. Xu,    T. Dinev   , H.J. Smith,    P. Hart   . (2008). Examining the Formation of Individual’s Privacy Concerns: Toward An Integrative View, Proceedings of 29   th    International Conference of Information Systems (ICIS), December 11-14, 2008, Paris.
  • M. Abdalla, J.-M. Bohli, M. I. González Vasco, and R. Steinwandt: "(Password) Authenticated Key Establishment: From 2-Party to Group", in Fourth Theory of Cryptography Conference, TCC 2007, S. P. Vadhan, ed., vol. 4392 of Lecture Notes in Computer Science, pp. 499-514, Springer, 2007.
  • R.S. BeharaC.D. Huang, and Q. Hu (2007) “A System Dynamics Model of Information Security Investments,” Proceedings of the 15th European Conference on Information Systems, June 7-9, St. Galon, Switzerland, 1572-1583.
  • R.S. BeharaC.D. Huang, and Q. Hu (2007) “Extended-Enterprise Information Security: A Risk Propagation Framework for Information Supply Chains,” Proceedings of the 2007 Americas Conference on Information Systems, August 9-12, Keystone, Colorado, USA; available online at http://aisel.aisnet.org/amcis2007/270.
  • A. Bogdanov,    T. Eisenbarth   , A. Rupp: "A Hardware-Assisted Realtime Attack on A5/2 without Precomputations"Cryptographic Hardware and Embedded Systems - CHES 2007, LNCS, Springer-Verlag, September 10 - 13, 2007.
  • A. Bogdanov,    T. Eisenbarth   , M. Wolf, T. Wollinger: “Trusted Computing for Automotive Systems: New Approaches to Enforce Security for Electronic Systems in Vehicles”, VDI-Kongress "Automotive Security", Wolfsburg, 2007.
  • J.-M. Bohli, M. I. González Vasco, and R. Steinwandt: "A Subliminal-free Variant of ECDSA", 8th Information Hiding IH 2006, vol. 4437 of Lecture Notes In Computer Science, pp. 375-387, Springer, 2007.
  • N. Delessy and E.B. Fernandez, "Adapting web services security standards for mobile and wireless environments", in “Advances in Web and Network Technologies, and Information Management”, K. Chen-Chuan Chang, W. Wang, L. Chen, C.A.Ellis, C-H Hsu, A.C.Tsoi, and H. Wang (Eds.), Springer LNCS 4537, 624-633.
  • N. Delessy. E.B. FernandezM.M. Larrondo-Petrie, and J. Wu, "Patterns for access control in distributed systems", Procs. of the 14th Pattern Languages  of Programs Conference (PLoP2007), Monticello, Illinois, USA, September 5-8, 2007.
  • N. Delessy, E.B. Fernandez, and M.M. Larrondo-Petrie, "A pattern language for identity management", Procs. of the 2nd IEEE Int. Multiconference on Computing in the Global Information Technology (ICCGI 2007), March 4-9, Guadeloupe, French Caribbean.
  • T. Dinev and Q. Hu. 2007. The centrality of awareness in the formation of user behavioral intention toward protective information technologies. Journal of the Association for Information Systems, 8, 7, 386-408.
  • T. Dinev and P. Hart. 2007. Privacy concerns and levels of information exchange: An empirical investigation of intended e-services use. E-Service Journal, 4, 3, 25-61.
  • T. Eisenbarth, T. Güneysu, C. Paar, A.-R. Sadeghi, D. Schellekens, M. Wolf: “Reconfigurable Trusted Computing in Hardware“, Scalable Trusted Computing, ACM STC 2007, Alexandria, Virginia, USA. Proceedings, ACM Press. November 2, 2007.
  • T. Eisenbarth, T. Güneysu, C. Paar, A.-R. Sadeghi, M. Wolf, R. Tessier: “Establishing Chain of Trust in Reconfigurable Hardware“, 15th Annual IEEE Symposium on Field-Programmable Custom Computing Machines. IEEE, 2007, pp. 287-288, Napa, California, April 23-25, 2007.
  • E.B.Fernandez, J. Ballesteros, A. C. Desouza-Doucet, and M.M. Larrondo-Petrie, “Security Patterns for Physical Access Control Systems”, in S. Barker and G.J. Ahn (Eds.), Data and Applications Security XXI, LNCS 4602, 259-274, Springer 2007.
  • E.B. Fernandez, P. Cholmondeley, and O. Zimmermann, "Extending a secure system development methodology to SOA", Procs. of the 1st Int. Workshop on Secure Systems Methodologies Using Patterns (SPattern'07). in conjunction with the 4th International Conference on Trust, Privacy & Security in Digital Business (TrustBus'07), Regensburg, Germany, September 03-07, 2007, 749-754.
  • E. B. Fernandez, D. L. LaRed M., J. Forneron, V. E. Uribe, and G. Rodriguez G., “A secure analysis pattern for handling legal cases”, Procs. of the 6th Latin American Conference on Pattern Languages of Programming ( SugarLoafPLoP’2007), 178-187.
  • E.B. FernandezM.M. Larrondo-Petrie, and A. Escobar, "Contexts and context-based access control", Procs. of the 3rd IEEE Int. Conf. on Wireless and Mobile Communications (ICWMC 2007), March 4-9, Guadeloupe, French Caribbean.
  • E.B.Fernandez, J.C. Pelaez, and M.M. Larrondo-Petrie, "Security patterns for voice over IP networks", Journal of Software, Vol. 2, No 2, August 2007, 19-29.
  • E.B. Fernandez, J.C. Pelaez, and M.M. Larrondo-Petrie, "Security patterns for voice over IP networks", Procs. of the 2nd IEEE Int. Multiconference on Computing in the Global Information Technology (ICCGI 2007), March 4-9, Guadeloupe, French Caribbean.
  • E.B. Fernandez, J.C. Pelaez, and M.M. Larrondo-Petrie, "Attack patterns: A new forensic and design tool", Procs. of the Third Annual IFIP WG 11.9 Int. Conf. on Digital Forensics, Orlando, FL, Jan. 29-31, 2007. Chapter 24 in Advances in Digital Forensics III, P. Craiger and S. Shenoi (Eds.), Springer/IFIP, 2007, 345-357.
  • E.B. Fernandez, C. Pertuz, and M.M. Larrondo-Petrie, “A security pattern for Pipes and Filters”, Procs. of the 5th Latin American and Caribbean Conference for Engineering and Technology (LACCEI 2007). Tampico, MX, May 29-June 1st, 2007.
  • E. B. FernandezM. VanHilst, and J.C. Pelaez, "Patterns for WiMax security", Procs. EuroPLoP 2007.
  • E.B. Fernandez, N. Yoshioka, H. Washizaki, and J. Jurjens, "Using security patterns to build secure systems", position paper in the 1st Int. Workshop on Software Patterns and Quality (SPAQu'07), Nagoya, Japan, December 3, 2007, collocated with the 14th  Asia-Pacific Software Engineering Conference (APSEC).
  • E.B. Fernandez and X.Y. Yuan, "Securing analysis patterns", Procs. of the 45th ACM Southeast Conference (ACMSE 2007), March 23-24, 2007,  Winston-Salem, North Carolina.
  • W. Geiselmann and R. Steinwandt: "Cryptanalysis of a Hash Function Proposed at ICISC 2006" in International Conference on Information Security ICISC 2007, K.-H. Nam and G. Rhee, eds., vol. 4817 of Lecture Notes in Computer Science, pp. 1-10, Springer 2007.
  • W. Geiselmann and R. Steinwandt: "Non-Wafer-Scale Sieving Hardware for the NFS: Another Attempt to Cope with 1024-bit", in Advances in Cryptology - EUROCRYPT 2007, M. Naor, ed., vol. 4515 of Lecture Notes in Computer Science, pp. 466-481, Springer, 2007.
  • G. Meiser, T. Eisenbarth, K. Lemke-Rust, C. Paar “Software Implementation of eSTREAM Profile I Ciphers on embedded 8-bit AVR Microcontrollers“, The State of the Art of Stream Ciphers - SASC 2007, Bochum, Deutschland, Januar 31- Februar 1, 2007.
  • J. C. Pelaez, E.B. FernandezM.M. Larrondo-Petrie, and C. Wieser, "Attack patterns in VoIP", Procs. of the 14th Pattern Languages of Programs Conference (PLoP2007), Monticello, Illinois, USA, September 5-8, 2007.
  • J. C. Pelaez, E.B. Fernandez, and C. Wieser, "Patterns for VoIP signaling protocol architectures", Procs. EuroPLoP 2007.
  • F. Regazzoni, S. Badel, T. Eisenbarth, J. Großschädl, A. Poschmann, Z. Toprak, M. Macchetti, L. Pozzi, C. Paar, Y. Leblebici, P. Ienne “A Simulation-Based Methodology for Evaluating the DPA-Resistance of Cryptographic Functional Units with Application to CMOS and MCML Technologies”, International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation (SAMOS IC 07), Samos, Greece, July 16-19 , 2007.
  • F. Regazzoni, T. Eisenbarth, J. Großschädl, L. Breveglieri, P. Ienne, I. Koren, C. Paar: “Power Attacks Resistance of Cryptographic S-boxes with added Error Detection Circuits“, In Proceedings of the 21st IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT’07), Rome, Italy, September 26-28, 2007.
  • S. Rinne, T. Eisenbarth, C. Paar “Performance Analysis of Contemporary Light-Weight Block Ciphers on 8-bit Microcontrollers”, Software Performance Enhancement for Encryption and Decryption (SPEED 2007), Amsterdam, NL, June 11-12, 2007.
  • M. VanHilst and E.B. Fernandez, "Reverse engineering and the verification of security patterns in code", Procs. of the 1st Int. Workshop on Software Patterns and Quality (SPAQu'07), Nagoya, Japan, December 3, 2007, collocated with the 14th Asia-Pacific Software Engineering Conference (APSEC).
Misc.
  • L. Batina, T. Eisenbarth, B. Gierlichs, F. Koeune, E. Oswald, F.-X. Standaert, S. Tillich, “Theoretical Models for Side-Channel Attacks”, ECRYPT NOE Deliverable, D.VAM.15, June 2008http://www.ecrypt.eu.org/ecrypt1/documents/D.VAM.15.pdf
  • E.B. Fernandez, "Security patterns and secure systems design using UML", 2011 version (265 slides). Given at ISSADS, Guadalajara, MX., Jan. 2006, WCC Chile August 2006, IEEE WICSA 2008,FAMAF, Cordoba (Argentina) 2008, ACM OOPSLA 2008 and 2009.
  • E.B. Fernandez, "Internet and web services (distributed systems) security", Tutorial notes (387 slides). Given at INFORMS 98, COMPSAC'98, IFIP'98, BOCA2000 (Fifth INFORMS Telecomm. Conf.), March 5-8,2000, Boca Raton, FL, SANS2000, March 25, 2000, Orlando, FL,  Software Development East 2000, West 2001, and East 2001, Escuela de Ciencias Informaticas, Buenos Aires, July 2003, Univ. Tec. F. Santa Maria, Valparaiso, Chile, ISSADS, Guadalajara, MX.Jan. 2005, Pilar, Paraguay, May 2006, Ciudad del Este, Paraguay, May 2007, Aguascalientes, MX, 2009, Ciudad del Este, PY, 2011.
  • M. I. González Vasco, F. Hess and R. Steinwandt: "Combined (identity-based) public key schemes", Cryptology ePrint Archive: Report 2008/466, 2009.
  • R. Canetti, S. Goldwasser, G. Müller and R. Steinwandt (eds.): “Theoretical Foundations of Practical Information Security”, Dagstuhl Seminar Proceedings 08491, 2008
Grants
  • Development of a Blockchain Oriented Security Class | 7/01/2018 - 12/31/2019 |  PI: Koray Karabina Funding Agency: Cyber Florida
  • Lattice Algorithms for Post-Quantum Cryptography | 12/15/2018 - 12/14/2021  PI: Shi Bai/Co-PI: Rainer Steinwandt Funding Agency: NIST
  • A Platform for the Evaluation of Post-Quantum Primitives | 12/15/2018 - 12/14/2020 |  PI: Edoardo Persichetti/Co-PIs: Shi Bai, Koray Karabina, Rainer Steinwandt 12/15/2018 - 12/14/2020 Funding Agency: NIST
  • Secure Communication in the Quantum Era | Approved  Mar 2018 Co-Director US: Rainer Steinwandt Funding Agency: NATO SPS
  • Emerging Side-Channel Resistant and Resource-Friendly Elliptic Curve Algorithms and Architectures | 5/1/17 - 4/30/20  PI: Reza Azarderakhsh / Co-PI: Koray Karabina Funding Agency: US Army
  • Studie Entwicklungsstand Quantencomputer/ Study development of the quantum computer  | 1/10/17 - 1/9/20  PI:  Rainer Steinwandt Funding Agency: Saarland University (GER)/ German Federal Office for Information Security
  • Privacy-Aware Wearable-Assisted Continuous Authentication Framework  | 8/15/17 - 7/31/19 PI: Koray Karabina Funding Agency: National Science Foundation
  • Online Modules for Emerging Topics in Cryptography  |  PI: Jean-François Biasse (USF), Co-PI: Rainer Steinwandt
  • Young CryptograpHERS: a Cybersecurity Summer Camp for K-12 Girls  | PI: Edoardo Persichetti, Co-PI(s): Shi Bai and Rainer Steinwandt
  • Inferring, Attributing, Mitigating and Analyzing the Malicious Orchestration of Internet-scale Exploited IoT Devices:  A Network Telescope Approach
    March 1, 2019 –  PI: Elias Bou-Harb, February 29, 2020,$175,000
  • CyberTraining CIP: Cyberinfrastructure Expertise on High-throughput Networks for Big Science Data Transfers 
    October 1, 2018 – September 30, 2021, $499,959
Additional Information
The Charles E. Schmidt College of Science offers unparalleled experiential learning opportunities to prepare the next generation of scientists and problem solvers.
Address
Charles E. Schmidt College of Science
Florida Atlantic University
777 Glades Rd, SE-43
Boca Raton, FL 33431
Fax: (561) 297-3292