After undergraduate studies at the University of Pisa and the Scuola Normale Superiore in Italy I moved to McGill University in Canada to complete a PhD in number theory.
My research interests have since shifted to mathematical cryptology, namely the mathematics of digital encryption. This is a rapidly evolving field at the intersection of computer science, electrical engineering, mathematics and even physics, with the realization of quantum computing. Specifically, I am interested in elliptic curve cryptography, integer factorization and quantum resistant cryptography (in particular the De Feo-Jao SIDH key agreement protocol and multivariate cryptography).
Teaching for Spring 2018:
Math 417 Cryptography
Math 460 Topology
Multiple point compression on elliptic curvesFan, X., Otemissov, A., Sica, F., Sidorenko, A.,
2016 In : Designs, Codes, and Cryptography. p. 1-24
Four-dimensional Gallant-Lambert-Vanstone scalar multiplicationLonga, P., Sica, F.,
2014 In : Journal of Cryptology. 27, 2, p. 248-283
Four-dimensional Gallant-Lambert-Vanstone scalar multiplicationLonga, P., Sica, F.,
2012 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7658 LNCS, p. 718-739
Compact elliptic curve representationsCiet, M., Quisquater, J., Sica, F.,
2011 In : Journal of Mathematical Cryptology. 5, 1, p. 89-100
Congruences satisfied by Apéry-like numbersChan, H., Cooper, S., Sica, F.,
2010 In : International Journal of Number Theory. 6, 1, p. 89-97
Double-Base number system for multi-scalar multiplicationsDoche, C., Kohel, D., Sica, F.,
2009 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5479 LNCS, p. 502-517
Selected Areas in Cryptography: 15th International Workshop, SAC 2008 Sackville, New Brunswick, Canada, August 14-15 Revised Selected Papers - PrefaceAvanzi, R., Keliher, L., Sica, F.,
2008 In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5381 LNCS,
Scalar multiplication on Koblitz curves using double basesAvanzi, R., Sica, F.,
2006 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4341 LNCS, p. 131-146
Extending scalar multiplication using double basesAvanzi, R., Dimitrov, V., Doche, C., Sica, F.,
2006 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4284 LNCS, p. 130-144
An analysis of double base number systems and a sublinear scalar multiplication algorithmCiet, M., Sica, F.,
2005 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3715 LNCS, p. 171-182
Faster scalar multiplication on koblitz curves combining point halving with the frobenius endomorphismAvanzi, R., Ciet, M., Sica, F.,
2004 In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2947, p. 28-40
Preventing differential analysis in GLV elliptic curve scalar multiplicationCiet, M., Quisquater, J., Sica, F.,
2003 In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2523, p. 540-550
Improved algorithms for efficient arithmetic on elliptic curves using fast endomorphismsCiet, M., Lange, T., Sica, F., Quisquater, J.,
2003 In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2656, p. 388-400
Analysis of the gallant-lambert-vanstone method based on efficient endomorphisms: Elliptic and hyperelliptic curvesSica, F., Ciet, M., Quisquater, J.,
2003 In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2595, p. 21-36
The Weight Distribution of C5(1, n)Lam, K., Sica, F.,
2001 In : Designs, Codes, and Cryptography. 24, 2, p. 181-191
Two classes of ternary codes and their weight distributionsDing, C., Kløve, T., Sica, F.,
2001 In : Discrete Applied Mathematics. 111, 1-2, p. 37-53
A secure family of composite finite fields suitable for fast implementation of elliptic curve cryptographyCiet, M., Quisquater, J., Sica, F.,
2001 Progress in Cryptology - INDOCRYPT 2001 - 2nd International Conference on Cryptology in India, Proceedings. Springer Verlag, 2247, p. 108-116