Chalmers University of Technology

Nov 2019 – Present Gothenburg
As a postdoc researcher I will continue researching about cryptography with focus in post-quantum cryptography and its applications. I will be part of the WASP Expedition project which is a multidisciplinary project for innovative approaches in technology.



Sep 2018 – Nov 2018 Paris
Side channel attacks on Post-Quantum cryptography implementations.

  • Detected leakage of timing in operations to develop timing attacks.



Feb 2017 – Apr 2017 Delft
Side channel attacks on ECC implementations.

  • Investigated attacks in implementations of ECC in FPGAs using power analysis.

PhD Student

Technische Universiteit Eindhoven

Oct 2015 – Nov 2019 Eindhoven
Research in post-quantum cryptography, including but not limited to: Quantum algorithms - Developing attacks against symmetric and asymmetric cryptography, Developing of quantum circuits for attacking cryptosystems. Code-based cryptography - Implementation of code-based cryptography, Developing attacks against it.

System Analyst

BRy Tecnologia

Oct 2014 – Sep 2015 Florianópolis

Software for Public Key Infrastructure.

  • Developed software in Java and C++

  • Integrated HSM in Java applications

  • Managed a team using Scrum


Researcher, Project Manager and Developer

LabSEC - Laboratory for Computer Security

Nov 2009 – Oct 2014 Florianópolis
Researcher in cryptography, project manager and developer of security software, using Java, C, C++, and Python.

  • Researched cryptography applied to PKI.
  • Managed the project reference for the Brazilian PKI.
  • Managed the project involving the definition of attribute certification in Brazil.
  • Developed software in C/C++, Java and Python.


Pixeon Medical Systems

Nov 2009 – Oct 2014 Florianópolis
Tester of medical imaging software.

  • Learned application of unit tests (Junit).
  • Executed manual tests in the software.

Recent Publications

Quickly discover relevant content by filtering publications.

Rank metric is a very promising research direction for code-based cryptography. In fact, thanks to the high complexity of generic …

In the last few years, post-quantum cryptography has received much attention. NIST is running a competition to select some post-quantum …

In this paper we revisit some of the main aspects of the DAGS Key Encapsulation Mechanism, one of the code-based candidates to …

In this paper we revisit some of the main aspects of the DAGS Key Encapsulation Mechanism, one of the code-based candidates to …