Books

Cover of Cryptography and the Intelligence Community: The Future of Encryption, published by the National Academies Press, 2022.
Cryptography and the Intelligence Community: The Future of Encryption

National Academies of Sciences, Engineering, and Medicine. Washington, DC: The National Academies Press, 2022.

https://doi.org/10.17226/26168

Cover of .NET Framework Security by Brian A. LaMacchia, Sebastian Lange, Matthew Lyons, Rudi Martin and Kevin T. Price.
.NET Framework Security

The definitive reference guide to the Microsoft .NET Framework security system, from Addison Wesley Professional. By Brian A. LaMacchia, Sebastian Lange, Matthew Lyons, Rudi Martin and Kevin T. Price.

Order this book from Amazon or Barnes & Noble.

Conference and Journal Publications

LaMacchia, Brian A. 2022. "The Long Road Ahead to Transition to Post-Quantum Cryptography." Communications of the ACM 65, no. 1 (January 2022): 28–31. https://doi.org/10.1145/3498706.

Alkim, Erdem, Joppe W. Bos, Léo Ducas, Lewis Glabush, Patrick Longa, Ilya Mironov, Michael Naehrig, Valeria Nikolaenko, Chris Peikert, Ananth Raghunathan, Douglas Stebila, Fernando Virdia, Karen Easterbrook, and Brian LaMacchia. 2020. "FrodoKEM: Learning with Errors Key Encapsulation." Submission to the NIST Post-Quantum Cryptography Standardization Project. https://frodokem.org/.

Jao, David, Reza Azarderakhsh, Matthew Campagna, Craig Costello, Luca De Feo, Basil Hess, Aaron Hutchinson, Amir Jalali, Koray Karabina, Brian Koziel, Brian LaMacchia, Patrick Longa, Michael Naehrig, Geovandro Pereira, Joost Renes, Vladimir Soukharev, and David Urbanik. 2020. "SIKE: Supersingular Isogeny Key Encapsulation." Submission to the NIST Post-Quantum Cryptography Standardization Project. https://sike.org/.

Brian LaMacchia , Kristin Lauter, and Anton Mityagin. 2007. "Stronger Security of Authenticated Key Exchange." In W. Susilo, J.K. Liu, & Y. Liu (eds). Presented at Provable Security 2007, Wollongong, Australia. Lecture Notes in Computer Science, vol 4784. Berlin: Springer. https://doi.org/10.1007/978-3-540-75670-5_1.

Fox, Barbara L. and Brian A. LaMacchia. "Encouraging recognition of fair uses in DRM systems". Communications of the ACM 46, 4 (April 2003), 74-83. https://doi.org/10.1145/641205.641233.

LaMacchia B.A. (2003) Key Challenges in DRM: An Industry Perspective. In: Feigenbaum J. (eds) Digital Rights Management. DRM 2002. Lecture Notes in Computer Science, vol 2696. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-44993-5_4.

Fox B., LaMacchia B. (1999) Online Certificate Status Checking in Financial Transactions: The Case for Re-issuance. In: Franklin M. (eds) Financial Cryptography. FC 1999. Lecture Notes in Computer Science, vol 1648. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48390-X_8.

Fox, B. and B. LaMacchia. "'Cooperative Security': A Model for the New Enterprise," Proceedings of the Seventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE '98), Stanford, CA, USA, 1998, pp. 314-319. https://doi.org/10.1109/ENABL.1998.725711.

Fox B., LaMacchia B. (1998) Certificate revocation: Mechanics and meaning. In: Hirchfeld R. (eds) Financial Cryptography. FC 1998. Lecture Notes in Computer Science, vol 1465. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0055479.

Cranor, Lorrie Faith and Brian A. LaMacchia. 1998. "Spam!" Communications of the ACM 41, 8 (August 1998), 74-83. https://doi.org/10.1145/280324.280336.

Chu, Yang-Hua, Joan Feigenbaum, Brian LaMacchia, Paul Resnick and Martin Strauss. "REFEREE: Trust Management for Web Applications." Computer Networks and ISDN Systems 29, Issues 8-13, 1997, Pages 953-964. https://doi.org/10.1016/S0169-7552(97)00009-3.

LaMacchia, Brian A. "The Internet Fish Construction Kit." Computer Networks and ISDN Systems Volume 29, Issues 8-13, 1997, Pages 1237-1248. https://doi.org/10.1016/S0169-7552(97)00023-8.

LaMacchia, Brian A. 1996. Internet Fish. PhD diss., Massachusetts Institute of Technology.
Also available as AI Technical Report 1579, MIT Artificial Intelligence Laboratory, Cambridge, MA (1996).

Coster, M.J., Joux, A., LaMacchia, B.A. et al. "Improved Low-Density Subset Sum Algorithms." Computational Complexity (1992) 2: 111. https://doi.org/10.1007/BF01201999.

Coster M.J., LaMacchia B.A., Odlyzko A.M., Schnorr C.P. (1991) An Improved Low-Density Subset Sum Algorithm. In: Davies D.W. (eds) Advances in Cryptology — EUROCRYPT ’91. EUROCRYPT 1991. Lecture Notes in Computer Science, vol 547. Springer, Berlin, Heidelberg.

Brian A. LaMacchia. 1991. Basis Reduction Algorithms and Subset Sum Problems. SM thesis, Massachusetts Institute of Technology.
Also available as AI Technical Report 1283, MIT Artificial Intelligence Laboratory, Cambridge, MA (1991). Download pdf here

Brian A. LaMacchia and Andrew M. Odlyzko, Computation of Discrete Logarithms in Prime Fields, Designs, Codes and Cryptography 1 (1991), 47-62.

Brian A. LaMacchia and Andrew M. Odlyzko, Solving Large Sparse Linear Systems over Finite Fields, Advances in Cryptology: Proceedings of Crypto '90, A. Menezes, S. Vanstone, eds., Lecture Notes in Computer Science 537, Springer-Verlag, NY (1991), 109-133.

Brian A. LaMacchia, Precision Measurements of Chaotic Circuits, SB Thesis, Dept. of Elect. Eng. and Comp. Sci., Massachusetts Institute of Technology, Cambridge, MA (1990).

B. A. LaMacchia and J. Nieh, The Standard Map Machine, AI Memo 1165, Artificial Intelligence Laboratory, Massachusetts Institute of Technology, Cambridge, MA (1989).

CCC/CRA Quadrennial Papers and Whitepapers

LaMacchia, Brian, Matt Campagna, and William Gropp. 2025. "The Post-Quantum Cryptography Transition: Making Progress, But Still a Long Road Ahead." CRA Quadrennial Paper 2024–2025. PDF.

Gropp, William, Randal Burns, Brian LaMacchia, Charles E. Leiserson, and Michela Taufer. 2025. "Setting a Course for Post-Moore Software Performance." CRA Quadrennial Paper 2024–2025. PDF.

Shostack, Adam, L. Jean Camp, Yi Ting Chua, Josiah Dykstra, Brian LaMacchia, and Daniel Lopresti. 2025. "Lessons for Cybersecurity from the American Public Health System." CRA Quadrennial Paper 2024–2025. PDF.

Singh, Mona, Katie Siek, David Danks, Rayid Ghani, Haley Griffin, Brian LaMacchia, Daniel Lopresti, and Tammy Toscos. 2025. "Enabling the AI Revolution in Healthcare." CRA Quadrennial Paper 2024–2025. PDF.

Jensen, David, Brian LaMacchia, Ufuk Topcu, and Pamela Wisniewski. 2023. "Algorithmic Robustness." CCC Whitepaper. PDF.

Campagna, Matt, Brian LaMacchia, and David Ott. 2020. "Post-Quantum Cryptography: Readiness Challenges and the Approaching Storm." CCC Quadrennial Paper. PDF.

Standards

Bartel, Mark, John Boyer, Barb Fox, Brian LaMacchia, and Ed Simon. XML Signature Syntax and Processing. W3C, 2002–2015. Author of the core specification across four versions:
Version 2.0, W3C Working Group Note, 23 July 2015 · Version 1.1, W3C Recommendation, 11 April 2013 · Second Edition, W3C Recommendation, 10 June 2008 · First Edition, W3C Recommendation, 12 February 2002

OASIS Web Services Security: SOAP Message Security 1.0 (WS-Security 2004). OASIS Standard, 19 April 2004. https://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0.pdf.