LaMacchia, Brian A. 2022. "The Long Road Ahead to Transition to Post-Quantum Cryptography." Communications of the ACM 65, no. 1 (January 2022): 28–31. https://doi.org/10.1145/3498706.
Alkim, Erdem, Joppe W. Bos, Léo Ducas, Lewis Glabush, Patrick Longa, Ilya Mironov, Michael Naehrig, Valeria Nikolaenko, Chris Peikert, Ananth Raghunathan, Douglas Stebila, Fernando Virdia, Karen Easterbrook, and Brian LaMacchia. 2020. "FrodoKEM: Learning with Errors Key Encapsulation." Submission to the NIST Post-Quantum Cryptography Standardization Project. https://frodokem.org/.
Jao, David, Reza Azarderakhsh, Matthew Campagna, Craig Costello, Luca De Feo, Basil Hess, Aaron Hutchinson, Amir Jalali, Koray Karabina, Brian Koziel, Brian LaMacchia, Patrick Longa, Michael Naehrig, Geovandro Pereira, Joost Renes, Vladimir Soukharev, and David Urbanik. 2020. "SIKE: Supersingular Isogeny Key Encapsulation." Submission to the NIST Post-Quantum Cryptography Standardization Project. https://sike.org/.
Brian LaMacchia , Kristin Lauter, and Anton Mityagin. 2007. "Stronger Security of Authenticated Key Exchange." In W. Susilo, J.K. Liu, & Y. Liu (eds). Presented at Provable Security 2007, Wollongong, Australia. Lecture Notes in Computer Science, vol 4784. Berlin: Springer. https://doi.org/10.1007/978-3-540-75670-5_1.
Fox, Barbara L. and Brian A. LaMacchia. "Encouraging recognition of fair uses in DRM systems". Communications of the ACM 46, 4 (April 2003), 74-83. https://doi.org/10.1145/641205.641233.
LaMacchia B.A. (2003) Key Challenges in DRM: An Industry Perspective. In: Feigenbaum J. (eds) Digital Rights Management. DRM 2002. Lecture Notes in Computer Science, vol 2696. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-44993-5_4.
Fox B., LaMacchia B. (1999) Online Certificate Status Checking in Financial Transactions: The Case for Re-issuance. In: Franklin M. (eds) Financial Cryptography. FC 1999. Lecture Notes in Computer Science, vol 1648. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48390-X_8.
Fox, B. and B. LaMacchia. "'Cooperative Security': A Model for the New Enterprise," Proceedings of the Seventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE '98), Stanford, CA, USA, 1998, pp. 314-319. https://doi.org/10.1109/ENABL.1998.725711.
Fox B., LaMacchia B. (1998) Certificate revocation: Mechanics and meaning. In: Hirchfeld R. (eds) Financial Cryptography. FC 1998. Lecture Notes in Computer Science, vol 1465. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0055479.
Chu, Yang-Hua, Joan Feigenbaum, Brian LaMacchia, Paul Resnick and Martin Strauss. "REFEREE: Trust Management for Web Applications." Computer Networks and ISDN Systems 29, Issues 8-13, 1997, Pages 953-964. https://doi.org/10.1016/S0169-7552(97)00009-3.
LaMacchia, Brian A. 1996. Internet Fish. PhD diss., Massachusetts Institute of Technology.
Also available as AI Technical Report 1579, MIT Artificial Intelligence Laboratory, Cambridge, MA (1996).
Coster M.J., LaMacchia B.A., Odlyzko A.M., Schnorr C.P. (1991) An Improved Low-Density Subset Sum Algorithm. In: Davies D.W. (eds) Advances in Cryptology — EUROCRYPT ’91. EUROCRYPT 1991. Lecture Notes in Computer Science, vol 547. Springer, Berlin, Heidelberg.
Brian A. LaMacchia. 1991. Basis Reduction Algorithms and Subset Sum Problems. SM thesis, Massachusetts Institute of Technology.
Also available as AI Technical Report 1283, MIT Artificial Intelligence Laboratory, Cambridge, MA (1991). Download pdf here
B. A. LaMacchia and J. Nieh, The Standard Map Machine, AI Memo 1165, Artificial Intelligence Laboratory, Massachusetts Institute of Technology, Cambridge, MA (1989).