Segurança de dados: criptografia em rede de computador R Terada Editora Blucher, 2008 | 122 | 2008 |

Automatic programming of morphological machines by PAC learning J Barrera, R Terada, R Hirata Jr, NST Hirata Fundamenta Informaticae 41 (1-2), 229-258, 2000 | 74 | 2000 |

Set operations on closed intervals and their applications to the automatic programming of morphological machines J Barrera, GP Salas Journal of Electronic Imaging 5 (3), 335-352, 1996 | 56* | 1996 |

Desenvolvimento de algoritmos e estruturas de dados R Terada | 48 | 1991 |

A fast algorithm for the Euclidean traveling salesman problem, optimal with probability one JH Halton, R Terada SIAM Journal on Computing 11 (1), 28-46, 1982 | 38 | 1982 |

A timing attack on the HQC encryption scheme TB Paiva, R Terada Selected Areas in Cryptography–SAC 2019: 26th International Conference …, 2020 | 23 | 2020 |

How to strengthen DES-like cryptosystems against differential cryptanalysis K Koyama, R Terada IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 1993 | 20 | 1993 |

Criptografia e a importância das suas aplicações R Terada Revista do Professor de Matemática 12, 1-7, 1988 | 19 | 1988 |

Improved Identification Protocol Based on the *MQ* ProblemFS Monteiro, DH Goya, R Terada IEICE Transactions on Fundamentals of Electronics, Communications and …, 2015 | 16 | 2015 |

Text segmentation by automatically designed morphological operators NST Hirata, J Barbera, R Terada Proceedings 13th Brazilian Symposium on Computer Graphics and Image …, 2000 | 16 | 2000 |

The incremental splitting of intervals algorithm for the design of binary image operators NST Hirata, J Barrera, R Terada, ER Dougherty, H Talbot, R Beare Proceedings of the 6th ISMM, 219-228, 2002 | 15 | 2002 |

Automatic programming of binary morphological machines by PAC learning J Barrera, NS Tomita, FSC da Silva, R Terada Neural, Morphological, and Stochastic Methods in Image and Signal Processing …, 1995 | 14 | 1995 |

Dynamic swapping schemes and differential cryptanalysis T Kaneko, K Koyama, R Terada IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 1994 | 14 | 1994 |

Uma versão mais forte do algoritmo RC6 contra criptanálise χ2 ET Ueda, R Terada Anais do VII Simpósio Brasileiro em Segurança da Informação e de Sistemas …, 2007 | 10 | 2007 |

OCR based on mathematical morphology J Barrera, R Terada, RA Lotufo, NST Hirata, R Hirata Jr, FA Zampirolli Nonlinear Image Processing IX 3304, 197-208, 1998 | 10 | 1998 |

Introdução à complexidade de algoritmos paralelos R Terada | 9 | 1990 |

Introdução à Computação e à Construção de Algoritmos VW Setzer, R Terada | 9 | 1988 |

Cryptanalysis of the binary permuted kernel problem TB Paiva, R Terada International Conference on Applied Cryptography and Network Security, 396-423, 2021 | 8 | 2021 |

A certificateless signature scheme based in bilinear pairing functions R Terada, HG Denise symposium on Cryptography and Information Security, 2007 | 8 | 2007 |

Improving the efficiency of a reaction attack on the QC-MDPC McEliece TB Paiva, R Terada IEICE Transactions on Fundamentals of Electronics, Communications and …, 2018 | 7 | 2018 |