Luís T. A. N. Brandão

ORCID: 0000-0002-4501-089X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Cryptographic Implementations and Security
  • Chaos-based Image/Signal Encryption
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Complexity and Algorithms in Graphs
  • Quantum Computing Algorithms and Architecture
  • Coding theory and cryptography
  • Distributed systems and fault tolerance
  • Advanced Data Storage Technologies
  • Internet Traffic Analysis and Secure E-voting
  • Radiation Effects in Electronics
  • Electrostatic Discharge in Electronics
  • Quantum and electron transport phenomena
  • Privacy-Preserving Technologies in Data
  • Advanced Queuing Theory Analysis
  • Advanced Malware Detection Techniques
  • Security and Verification in Computing
  • graph theory and CDMA systems
  • Neural Networks and Applications
  • Real-Time Systems Scheduling
  • Parallel Computing and Optimization Techniques
  • Quantum Information and Cryptography
  • Quantum Mechanics and Applications
  • Quantum many-body systems
  • Speech Recognition and Synthesis

National Institute of Standards and Technology
2019-2025

National Institute of Standards
2023-2025

State Key Laboratory of Cryptology
2018

University of Lisbon
2011-2016

Carnegie Mellon University
2011-2015

Undesired coupling to the surrounding environment destroys long-range correlations in quantum processors and hinders coherent evolution nominally available computational space. This noise is an outstanding challenge when leveraging computation power of near-term

10.1038/s41586-024-07998-6 article EN cc-by-nc-nd Nature 2024-10-09

Abstract Available online public/governmental services requiring authentication by citizens have considerably expanded in recent years. This has hindered the usability and security associated with credential management users service providers. To address problem, some countries proposed nation-scale identification/authentication systems that intend to greatly reduce burden of management, while seemingly offering desirable privacy benefits. In this paper we analyze two such systems: Federal...

10.1515/popets-2015-0022 article EN cc-by-nc-nd Proceedings on Privacy Enhancing Technologies 2015-06-01

Abstract This paper considers the estimation of reliability and availability intrusion-tolerant systems subject to non-detectable intrusions caused by stealth attacks. We observe that typical intrusion tolerance techniques may in certain circumstances worsen dependability properties they were meant improve. model as a probabilistic effect adversarial efforts analyze different strategies attack rejuvenation. compare several configurations replication proactive rejuvenation, varying mission...

10.1007/s13173-012-0062-x article EN cc-by Journal of the Brazilian Computer Society 2012-02-29

NIST) promotes the U.S. economy and public welfare by

10.6028/nist.ir.8214a-draft preprint EN 2019-11-08

The security of encrypted data depends not only on the theoretical properties cryptographic primitives but also robustness their implementations in software and hardware. Threshold cryptography introduces a computational paradigm that enables higher assurance for such implementations.

10.1109/mc.2018.1151029 article EN Computer 2018-01-01

This paper considers the estimation of reliability and availability intrusion-tolerant systems subject to non-detectable intrusions. Our motivation comes from observation that typical techniques intrusion tolerance may in certain circumstances worsen non-functional properties they were meant improve (e.g., dependability). We start by modeling attacks as adversarial efforts capable affecting rate probability components system. Then, we analyze several configurations replication pro-active...

10.1109/ladc.2011.27 article EN 2011-04-01

The unpredictability of random numbers is fundamental to both digital security and applications that fairly distribute resources. However, existing number generators have limitations-the generation processes cannot be fully traced, audited, certified unpredictable. algorithmic steps used in pseudorandom are auditable, but they guarantee their outputs were a priori unpredictable given knowledge the initial seed. Device-independent quantum can ensure source randomness was unknown beforehand,...

10.48550/arxiv.2411.05247 preprint EN arXiv (Cornell University) 2024-11-07

The Computer Security Division at the National Institute of Standards and Technology (NIST) is taking steps towards standardization threshold schemes for cryptographic primitives. These schemes, applicable to single-device multi-party implementations, are designed with multiple components in a way enable essential security properties even when up certain number compromised. This offers path mitigate attacks on implementations operations primitives, therefore enhance their security....

10.1145/3338467.3358954 article EN 2019-11-08

Abstract Software-controlled measuring instruments used in commercial transactions, such as fuel dispensers and smart meters, are sometimes subject to ‘memory replacement’ attacks. Cybercriminals replace the approved software by a malicious one that then tampers with measurement results, inflicting financial loss customers companies. To mitigate attacks, legal metrology systems often require regular device attestation, where an auditor checks possesses (‘knows’) software. However, current...

10.1088/1361-6501/ac5438 article EN Measurement Science and Technology 2022-02-11

The National Cybersecurity Center of Excellence (NCCoE) (in the United States) has published on October 19, 2015, a white paper "privacy-enhanced identity brokers." We present here reply to their request for public comments. enumerate concerns whose consideration we find paramount design privacy-enhancing brokering solution, identification and authentication citizens into myriad online services, recommend how incorporate them revised paper. Our observations, focused privacy, security,...

10.48550/arxiv.1611.02968 preprint EN other-oa arXiv (Cornell University) 2016-01-01
Coming Soon ...