I'm a lecturer (adjunkt, in Danish) at KEA - Copenhagen School of Design and Technology (Københavns Erhvervsakademi, in Danish), in the DIGITAL program, where I've been working from January 2016.
Before the current position, I was in academia doing research. From January 2013 to December 2015 I was a postdoc at the DemTech research project, led by Carsten Schürmann, at the IT University of Copenhagen, in Denmark. My research there was focused on cryptography applied to e-voting, which dealt with all those mechanisms and cryptographic primitives that form the basis of a secure, robust, private and E2E verifiable voting protocol.
Previously, I was a PhD student at the Combinatorics, Coding and Security Group (CCSG) from the Universitat Autònoma de Barcelona. My PhD thesis was focused on coding theory and data-hiding, and had as title "On additive binary nonlinear codes and steganography".
If you would like to have a copy of my CV, please, contact me, although you can also get an idea visiting my LinkedIn profile.
My current research interests and the fields in which I try to be up-to-date even now, where my main tasks are teaching, are: cryptography (in particular, zero-knowledge proofs, commitment schemes), electronic voting (everlasting privacy, secret sharing, coercion-freeness), and data-hiding (steganography). In the past, mainly in relation to my PhD, I was also interested in coding theory (Z4-linear codes, nonlinear codes, perfect codes, syndrome coding problem).
- O. Bélanger, R. Markussen, L. Ronquillo, C. Schuermann, Framing Electoral Transparency: A Comparative Analysis of Three E-vote Counting Ceremonies. 24th World Congress of Political Science. July 2016.
- R. Markussen, L. Ronquillo, C. Schuermann, Trust in Internet Election: Observing the Norwegian Decryption and Counting Ceremony. Proceedings of the 6th International Conference on Electronic Voting 2014 (EVOTE2014). October 2014. pdf
- H. Rifà-Pous, J. Rifà, L. Ronquillo, Z2Z4-additive perfect codes in Steganography, Advances in Mathematics of Communication (AMC), DOI:10.3934/amc.2011.5.425, vol. 5(3), pp. 425–433, August 2011, Shandong (China). pdf
- J. Rifà, L. Ronquillo, Construction of new completely regular Z2Z4-linear codes from old, Proceedings of the 7th International Workshop on Coding and Cryptography 2011 (WCC2011), Ed. D. Augot, A. Canteaut, pp. 71–79, April 2011, Paris (France). pdf
- J. Rifà, L. Ronquillo, Product Perfect Z2Z4-linear codes in steganography, Proceedings of the 2010 International Symposium on Information Theory and its Applications (ISITA2010), pp. 696–701, October 2010, Taichung (Taiwan). pdf
- H. Rifà-Pous, J. Rifà, L. Ronquillo, Perfect Z2Z4-linear codes applied to steganography, Proceedings of the VII Jornadas de Matemática Discreta y Algorítmica (JMDA2010), Ed. D. Sadornil, D. Gómez, F. Santos, pp. 553–564, July 2010, Universidad de Cantabria, Cantabria (Spain).
- J. Pujol, J. Rifà, L. Ronquillo, Construction of Additive Reed-Muller Codes, Lecture Notes in Computer Science, 18th Symposium on Applied algebra, Algebraic algorithms, and Error Correcting Codes (AAECC2009), Springer Berlin, vol. 5527, pp. 223–226, June 2009, Heidelberg (Germany). pdf
- J. Rifà, L. Ronquillo, About the Z4-linear Reed-Muller ZRM−(r,m − 1) and RMs(r,m) codes, Proceedings of the VI Jornadas de Matemática Discreta y Algorítmica (JMDA2008), Ed. J. Conde, J. Gimbert, J.M. Miret, R. Moreno, M. Valls, Edicions i publicacions de la UdL, pp. 517–526, July 2008, Lleida (Spain). pdf
I did my PhD at the Combinatorics, Coding and Security Group (CCSG) in the department of Information and Communications Engineering (dEIC), at the Universitat Autònoma de Barcelona, in Spain.
My supervisor was Josep Rifà
, head of the research group.
My PhD was focused on applying coding theory to the branch of data-hiding known as steganography. Further information about the defense, abstract and full text can be found here.
I have been a member of the evaluation committee of the vVote electronic voting system, which was developed by the Victorial electoral commmission, Australia. Our security audit included an analysis of the cryptographic components (in particular, the mix-net) of the voting system, a code review and static code analysis.
Our report can be accessed here.