Advanced search
Start date

Secure execution of cryptographic algorithms

Grant number: 14/50704-7
Support Opportunities:Research Grants - Research Partnership for Technological Innovation - PITE
Duration: November 01, 2015 - December 31, 2018
Field of knowledge:Physical Sciences and Mathematics - Computer Science
Convênio/Acordo: Intel
Principal Investigator:Julio César López Hernández
Grantee:Julio César López Hernández
Host Institution: Instituto de Computação (IC). Universidade Estadual de Campinas (UNICAMP). Campinas , SP, Brazil
Host Company: Intel Semicondutores do Brasil Ltda
City: Campinas
Pesquisadores principais:
Diego de Freitas Aranha ; Ricardo Dahab


The Internet of Things (loT) allows the interconnection of several embedded devices that manipulate data of different types and perform critical tasks. This environment promises to be a source of great benefits to people lives but it definitely brings new (AU)

Articles published in Agência FAPESP Newsletter about the research grant:
Articles published in other media outlets (0 total):
More itemsLess items

Scientific publications (4)
(References retrieved automatically from Web of Science and SciELO through information on FAPESP grants and their corresponding numbers as mentioned in the publications by the authors)
GUIMARAES, ANTONIO; ARANHA, DIEGO F.; BORIN, EDSON. Optimized implementation of QC-MDPC code-based cryptography. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, v. 31, n. 18, SI, . (13/08293-7, 14/50704-7)
DA SILVA, JOAO PAULO; LOPEZ, JULIO; DAHAB, RICARDO. ISOGENY FORMULAS FOR JACOBI INTERSECTION AND TWISTED HESSIAN CURVES. Advances in Mathematics of Communications, v. 14, n. 3, p. 507-523, . (14/50704-7)
FAZ-HERNANDEZ, ARMANDO; LOPEZ, JULIO; OCHOA-JIMENEZ, EDUARDO; RODRIGUEZ-HENRIQUEZ, FRANCISCO. A Faster Software Implementation of the Supersingular Isogeny Diffie-Hellman Key Exchange Protocol. IEEE TRANSACTIONS ON COMPUTERS, v. 67, n. 11, p. 1622-1636, . (14/50704-7)
FAZ-HERNANDEZ, ARMANDO; LOPEZ, JULIO; DAHAB, RICARDO. High-performance Implementation of Elliptic Curve Cryptography Using Vector Instructions. ACM TRANSACTIONS ON MATHEMATICAL SOFTWARE, v. 45, n. 3, . (14/50704-7)

Please report errors in scientific publications list by writing to: