armfazh
armfazh
Home
Experience
Publications
Contact
Light
Dark
Automatic
paper-conference
Portunus: Re-imagining Access Control in Distributed Systems
TLS termination, which is essential to network and security infrastructure providers, is an extremely latency-sensitive operation that …
Watson Ladd
,
Tanya Verma
,
Marloes Venema
,
Armando Faz-Hernández
,
Brendan McMillion
,
Avani Wildani
,
Nick Sullivan
Cite
URL
Let The Right One In: Attestation as a Usable CAPTCHA Alternative
CAPTCHAs are necessary to protect websites from bots and malicious crawlers, yet are increasingly solvable by automated systems. This …
Tara Whalen
,
Thibault Meunier
,
Mrudula Kodali
,
Alex Davidson
,
Marwan Fayed
,
Armando Faz-Hernández
,
Watson Ladd
,
Deepak Maram
,
Nick Sullivan
,
Benedikt Christoph Wolters
,
Maxime Guerreiro
,
Andrew Galloni
Cite
URL
Implementing and Measuring KEMTLS
KEMTLS is a novel alternative to the Transport Layer Security (TLS) handshake that integrates post-quantum algorithms. It uses key …
Sofía Celi
,
Armando Faz-Hernández
,
Nick Sullivan
,
Goutam Tamvada
,
Luke Valenta
,
Thom Wiggers
,
Bas Westerbaan
,
Christopher A. Wood
PDF
Cite
DOI
ZKAttest: Ring and Group Signatures for existing ECDSA keys
Cryptographic keys are increasingly stored in dedicated hardware or behind software interfaces. Doing so limits access, such as …
Watson Ladd, Armando Faz-Hernández
,
Deepak Maram
PDF
Cite
DOI
Generation of Elliptic Curve Points in Tandem
A hash to curve function H, mapping bit strings to points on an elliptic curve, is often required in cryptographic schemes based on …
Armando Faz-Hernández
,
Julio López
PDF
Cite
DOI
How to (Pre-)Compute a Ladder: Improving the Performance of X25519 and X448
In the RFC7748 memorandum, the Internet Research Task Force specified a Montgomery-ladder scalar multiplication function based on two …
Thomaz Oliveira
,
Julio López
,
Hüseyin Hişil
,
Armando Faz-Hernández
,
Francisco Rodríguez-Henríquez
Cite
DOI
SoK: A Performance Evaluation of Cryptographic Instruction Sets on Modern Architectures
The latest processors have included extensions to the instruction set architecture tailored to speed up the execution of cryptographic …
Armando Faz-Hernández
,
Julio López
,
Ana Karina D. S. de Oliveira
Cite
DOI
URL
A Secure and Efficient Implementation of the Quotient Digital Signature Algorithm (qDSA)
Digital signatures provide a means to publicly authenticate messages sent over an insecure channel. Recently, the Quotient Digital …
Armando Faz-Hernández
,
Hayato Fujii
,
Diego F. Aranha
,
Julio López
Cite
DOI
Speeding up Elliptic Curve Cryptography on the P-384 Curve
The P-384 is one of the standardized elliptic curves by ANSI and NIST. This curve provides a 192-bit security level and is used in the …
Armando Faz-Hernández
,
Julio López
PDF
Cite
DOI
Fast Implementation of Curve25519 Using AVX2
AVX2 is the newest instruction set on the Intel Haswell processor that provides simultaneous execution of operations over vectors of …
Armando Faz-Hernández
,
Julio López
Cite
DOI
»
Cite
×