Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ewerton R. Andrade is active.

Publication


Featured researches published by Ewerton R. Andrade.


Journal of Cryptographic Engineering | 2014

Lyra: password-based key derivation with tunable memory and processing costs

Leonardo C. Almeida; Ewerton R. Andrade; Paulo S. L. M. Barreto; Marcos A. Simplicio

We present Lyra, a password-based key derivation scheme based on cryptographic sponges. Lyra was designed to be strictly sequential (i.e., not easily parallelizable), providing strong security even against attackers that use multiple processing cores (e.g., custom hardware or a powerful GPU). At the same time, it is very simple to implement in software and allows legitimate users to fine-tune its memory and processing costs according to the desired level of security against brute force password guessing. We compare Lyra with similar-purpose state-of-the-art solutions, showing how our proposal provides a higher security level and overcomes limitations of existing schemes. Specifically, we show that if we fix Lyra ’s total processing time


IEEE Transactions on Computers | 2016

Lyra2: Efficient Password Hashing with High Security against Time-Memory Trade-Offs

Ewerton R. Andrade; Marcos A. Simplicio; Paulo S. L. M. Barreto; Paulo Cc Santos


Computers & Electrical Engineering | 2018

A framework for enabling security services collaboration across multiple domains

Daniel Migault; Marcos A. Simplício; Bruno M. Barros; Makan Pourzandi; Thiago R. M. Almeida; Ewerton R. Andrade; Tereza Cristina M. B. Carvalho

t


ieee european symposium on security and privacy | 2017

Redactable Blockchain – or – Rewriting History in Bitcoin and Friends

Giuseppe Ateniese; Bernardo Magri; Daniele Venturi; Ewerton R. Andrade


IACR Cryptology ePrint Archive | 2015

Lyra2: Password Hashing Scheme with improved security against time-memory trade-offs

Marcos A. Simplício; Leonardo C. Almeida; Ewerton R. Andrade; Paulo Cc Santos; and Paulo S. L. M. Barreto

t in a legitimate platform, the cost of a memory-free attack against the algorithm is exponential, while the best-known result in the literature (namely, against the scrypt algorithm) is quadratic. In addition, for an identical same processing time, Lyra allows for a higher memory usage than its counterparts, further increasing the cost of brute force attacks.


international conference on distributed computing systems | 2017

A Framework for Enabling Security Services Collaboration Across Multiple Domains

Daniel Migault; Marcos A. Simplício; Bruno M. Barros; Makan Pourzandi; Thiago R. M. Almeida; Ewerton R. Andrade; Tereza Cristina M. B. Carvalho

We present Lyra2, a password hashing scheme (PHS) based on cryptographic sponges. Lyra2 was designed to be strictly sequential for a given number of cores (i.e., not easily parallelizable beyond that number), providing strong security even against attackers using custom hardware or GPUs. At the same time, it is very simple to implement in software and allows legitimate users to fine tune its memory and processing costs according to the desired level of security against brute force password-guessing. Lyra2 is an improvement of the recently proposed Lyra algorithm, providing an even higher security level against different attack venues and overcoming some limitations of this and other existing schemes.


IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences | 2016

Comparison of Two Signature Schemes Based on the MQ Problem and Quartz

Routo Terada; Ewerton R. Andrade

Network virtualization technologies are creating a new era for information security, enabling the on demand creation and deployment of security appliances (generically called security service functions – SSF) for detecting and/or mitigating attacks. However, given the increasing size and complexity of contemporary attacks, it is usually hard for a single administrative domain to deal with several malicious flows by itself, which motivates the collaboration among SSFs from multiple domains. In this paper, we present a technical demonstration of a framework that leverages SDN (Software Defined Networking) and SFC (Service Function Chaining) to enhance the collaboration among different SSFs for mitigating large scale attacks. This framework allows SSFs from different domains to negotiate and dynamically control the amount of resources allocated for collaboration, in what we call a “best-effort” collaboration mode. The demonstration hereby presented consists in a video streaming service that is targeted by a volumetric denial-of-service attack, showing basically two situations: (1) after the attack reaches a certain volume, the SSF from the streaming services domain becomes unable to handle the attack on its own, so packets are dropped and the video quality decreases; and (2) when there is a collaboration among SSFs, the amount of traffic dropped is considerably reduced, so the video quality is preserved even during the attack.


symposium on cloud computing | 2018

Multi-tenant Isolation of What?: Building a Secure Tenant Isolation Architecture for Cloud Networks.

Bruno Medeiros; Marcos A. Simplício; Ewerton R. Andrade


ieee conference on network softwarization | 2018

Demonstration of a framework for enabling security services collaboration across multiple domains

Thiago R. M. Almeida; Bruno M. Barros; Ewerton R. Andrade; Marcos A. Simplicio; Daniel Migault; Makan Pourzandi


IACR Cryptology ePrint Archive | 2016

Redactable Blockchain - or - Rewriting History in Bitcoin and Friends.

Giuseppe Ateniese; Bernardo Magri; Daniele Venturi; Ewerton R. Andrade

Collaboration


Dive into the Ewerton R. Andrade's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Bernardo Magri

Sapienza University of Rome

View shared research outputs
Top Co-Authors

Avatar

Daniele Venturi

Sapienza University of Rome

View shared research outputs
Researchain Logo
Decentralizing Knowledge