Skip to main content

Main navigation

  • About ITEFI
  • Research
  • Formación y empleo
  • OpenLab
  • Servicios científico técnicos
  • Staff Directory

CYBERSECURITY: data, information and risks (CIBERDINE)

  • Proyecto
  • Resultados

This project aims at strengthening our capabilities to prevent, detect, and respond to cyberattacks by developing techniques that improve situational awareness and cater for a dynamic threat management. To do so, we propose an interdisciplinary research program that tackles three important challenges in cybersecurity research.

Publicaciones
Año: 2015
Libros y Capítulos de Libro
Cryptanalysing the shrinking generator
S. D. Cardell, and A. Fúster-Sabater
Procedia Computer Science, Volume 51, Issue 1, pp. 2893-2897
http://dx.doi.org/10.1016/j.procs.2015.05.454
GiCSI
Performance of the Cryptanalysis over the Shrinking Generator
S. D. Cardell, and A. Fúster-Sabater
Advances in Intelligent Systems and Computing 369 (2015), 111-121
http://dx.doi.org/10.1007/978-3-319-19713-5_10
GiCSI
Revistas JCR
Design and optimization of the input modules of a DPA toolbox
A. Fuentes Rodríguez, L. Hernández Encinas, A. Martín Muñoz, and B. Alarcos Alcázar
Logic Jnl IGPL first published online: December 9, 2015
http://dx.doi.org/10.1093/jigpal/jzv041
GiCSI
Año: 2016
Revistas JCR
PAgIoT – Privacy-preserving Aggregation protocol for Internet of Things
L. González-Manzano, José M. de Fuentes, Sergio Pastrana, Pedro Peris-Lopez, Luis Hernández-Encinas
Journal of Network and Computer Applications, Volume 71, August 2016, Pages 59–71
http://dx.doi.org/10.1016/j.jnca.2016.06.001
GiCSI
Libros y Capítulos de Libro
Special Primes: Properties and Applications
R. Durán Díaz and L. Hernández Encinas
Chapter of the book: Geometry, Algebra and Applications: From Mechanics to Cryptography, Springer International Publishing Switzerland, 2016, 79-90, ISBN: 978-3-319-32084-7
http://dx.doi.org/10.1007/978-3-319-32085-4_7
GiCSI
A comparison of computer-based technologies for cryptographic attacks
V. Gayoso Martínez, L. Hernández Encinas, A. Martín Muñoz, O. Martínez-Graullera, and J. Villazón-Terrazas
International Workshop on Computational Intelligence in Security for Information Systems (CISIS'16) International Joint Conference SOCO'16-CISIS'16-ICEUTE'16, Advances in Intelligent Systems and Computing 527, 622-630 San Sebastián (Spain)
ISBN: 978-3-319-47363-5
GiCSI PSUM
Proceedings
Generación de primos demostrables: implementación y resultados
R. Durán Díaz, V. Gayoso Martinez y L. Hernández Encinas
XIV Reunión Española de Criptología y Seguridad de la Información (RECSI 2016) Actas 58-63, P.L. Ferrer Gomila y M.F. Hinarejos Campos (Eds.), Mahón, octubre 26-28, 2016
ISBN: 978-84-608-9470-4
GiCSI
Herramientas visuales usadas en criptografía caótica útiles para el análisis de secuencias pseudoaleatorias
A.B. Orúe, A. Fúster, V. Fernández, F. Montoya, L. Hernández y A. Martín
XIV Reunión Española de Criptología y Seguridad de la Información (RECSI 2016) Actas 180-185, P.L. Ferrer Gomila y M.F. Hinarejos Campos (Eds.), Mahón, octubre 26-28, 2016
ISBN: 978-84-608-9470-4
GiCSI
Análisis de los métodos de generación de curvas elípticas seguras
V. Gayoso Martínez, L. Hernández Encinas, A. Martín del Rey and R. Durán Díaz
Segundas Jornadas Nacionales de Investigación en Ciberseguridad (JNIC) Actas 87-93, Granada, junio 15-17, 2016
ISBN: 978-84-608-8070-7
GiCSI
Año: 2017
Proceedings
Breaking a Hitag2 Protocol with Low Cost Technology
V. Gayoso Martínez, L. Hernández Encinas, A. Martín Muñoz and J. Zhang
3rd International Conference on Information Systems Security and Privacy (ICISSP'2017). Proceedings 579-584, P.Mori, S. Furnell and O. Camp (Ed.), Porto (Portugal), February 19-21, 2017
http://dx.doi.org/10.5220/0006271905790584
GiCSI
Revistas JCR
A study on the performance of secure elliptic curves for cryptographic purposes
R. Durán Díaz, V. Gayoso Martínez, L. Hernández Encinas, and A. Martín Muñoz
International Joint Conference SOCO'16-CISIS'16-ICEUTE'16 - Advances in Intelligent Systems and Computing 527, 658-667 San Sebastián (Spain), october 19-21, 2016
http://dx.doi.org/10.1007/978-3-319-47364-2_64
GiCSI
A characterization of non-prime powers
Raúl Durán Díaz; Luis Hernández Encinas; Agustín Martín Muñoz; Jaime Muñoz Masqué; Seok-Zun SONG
Turkish Journal of Mathematics, vol.41, pp.1248-1259, 5
http://dx.doi.org/10.3906/mat-1603-143
GiCSI
A Lightweight Pseudorandom Number Generator for Securing the Internet of Things
A. Orúe López; L. Hernández Encinas; A. Martín Muñoz; F. Montoya Vitini
IEEE Access, vol. 5 pp. 27800-27806. IEEE. ISSN 2169-3536
http://dx.doi.org/10.1109/ACCESS.2017.2774105
GiCSI
A Framework for Acquiring and Analyzing Traces from Cryptographic Devices
A. Blanco Blanco, J.M. de Fuentes, L. González-Manzano, L. Hernández Encinas, A. Martín Muñoz, J.L. Rodrigo Oliva, and J.I. Sánchez García
13th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2017), Niagara Falls (Canada), October 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 239,
https://doi.org/10.1007/978-3-319-78816-6_20
GiCSI
Discrete linear models for the generalized selfshrunken sequences
D. Cardell, S.; Fúster-Sabater, A
Finite Fields and their Applications, vol. 47, pp. 222-241, Academic Press
http://dx.doi.org/10.1016/j.ffa.2017.06.010
GiCSI
Libros y Capítulos de Libro
Linear Models for High-Complexity Sequences
Sara D. Cardell; Amparo Fúster-Sabater
Lecture Notes in Computer Science, vol.10404, pp. 314- 324, 1, Springer Verlag
http://dx.doi.org/10.1007/978-3-319-62392-4_23
GiCSI
Año: 2018
Libros y Capítulos de Libro
Security Protocols for Network and Internet: A Global Vision
J.M. de Fuentes, L. Hernández Encinas, and A. Ribagorda
Chapter 8 of the book “Computer and Network Security Essentials”, Springer International Publishing, The Netherlands, 2018, 135–151
https://doi.org/10.1007/978-3-319-58424-9_8
GiCSI
Review of the Main Security Treats and Challenges in Free-Access Public Cloud Storage Servers
A. Sánchez-Gómez, J. Diaz, L. Hernández Encinas, and D. Arroyo
Chapter 15 of the book “Computer and Network Security Essentials”, Springer International Publishing, The Netherlands, 2018
https://doi.org/10.1007/978-3-319-58424-9_15
GiCSI
Computing the linear complexity in a class of cryptographic sequences
Amparo Fúster-Sabater; Sara Díaz Cardell
Lecture Notes in Computer Science, vol. 10960, pp. 110-122, n.º 1, Springer Verlag
http://dx.doi.org/10.1007/978-3-319-95162-1_8
GiCSI
Revistas JCR
Recovering decimation-based cryptographic sequences by means of linear CAs
Sara D. Cardell, Amparo Fúster-Sabater
CoRRabs/1802.02206, 2018, http://arxiv.org/abs/1802.02206
https://arxiv.org/abs/1802.02206
GiCSI
Linearity in decimation-based generators: an improved cryptanalysis on the shrinking generator
Sara Díaz Cardell; Amparo Fúster-Sabater; Adrián Ranea
Open Mathematics, vol. 16, pp. 646-655, n.º 1
http://dx.doi.org/10.1515/math-2018-0058
GiCSI
Secure elliptic curves and their performance
V. Gayoso Martínez, L. Hernández Encinas, A. Martín Muñoz, R. Durán Díaz
Logic Journal of the IGPL, jzy035, 17 September 2018
http://dx.doi.org/10.1093/jigpal/jzy035
GiCSI
The t-modified self-shrinking generator
Sara D. Cardell and Amparo Fúster-Sabater
Lecture Notes in Computer Science, vol 10860. Springer, Cham.
http://dx.doi.org/10.1007/978-3-319-93698-7_50
GiCSI
Año: 2019
Revistas JCR
Non-quantum cryptanalysis of the noisy version of Aaronson–Christiano's quantum money scheme
Marta Conde Pena; Raul Durán Díaz; Jean-Charles Faugère; Luis Hernández Encinas; Ludovic Perret
IET Information Security (Volume: 13 , Issue: 4 , 7 2019) Page(s): 362 - 366
http://dx.doi.org/10.1049/iet-ifs.2018.5307
GiCSI
Non-quantum Cryptanalysis of the Noisy Version of Aaronson-Christiano’s Quantum Money Scheme
M. Conde Pena, R. Durán Díaz, J.-C. Faugère, L. Hernández Encinas, and L. Perret
IET Inf. Secur., 13: 362-366
http://dx.doi.org/10.1049/iet-ifs.2018.5307
GiCSI
A Modular and Optimized Toolbox for Side-Channel Analysis
Alberto Fuentes Rodríguez, Luis Hernández Encinas, Agustín Martín Muñoz, Bernardo Alarcos Alcázar
IEEE Access, vol. 7 pp. 21889-21903
http://dx.doi.org/10.1109/ACCESS.2019.2897938
GiCSI
Libros y Capítulos de Libro
A Methodology for Retrofitting Privacy and Its Application to e-Shopping Transactions
Jesus Diaz, Seung Geol Choi, David Arroyo, Angelos D. Keromytis, Francisco B. Rodriguez and Moti Yung
Advances in Cyber Security: Principles, Techniques, and Applications. Springer, 2019, pp. 143-183.
https://doi.org/10.1007/978-981-13-1483-4_7
Año: 2021
Revistas JCR
Achieving cybersecurity in blockchain-based systems: A survey
Mar Gimenez-Aguilar, Jose Maria de Fuentes, Lorena Gonzalez-Manzano, David Arroyo
Future Generation Computer Systems, Volume 124, 2021, Pages 91-118
https://doi.org/10.1016/j.future.2021.05.007
GiCSI
Regresar arriba

COSEC; AIDA; MCCD; CUGC; CCN/CNI; INCIBE; Grupo Banco Santander; Epoche & Espri.

Datos del proyecto

CIBERDINE
Plan Regional de Investigación Científica e Innovación Tecnológica (Comunidad de Madrid)
S2013/ICE-3095
Investigador principal
Luis Hernández Encinas (ITEFI-CSIC)
Otros participantes ITEFI
Marta Conde Pena
Amparo Fúster Sabater
Víctor Antonio Martínez Gayoso
Agustín Martín Muñoz
Jaime Muñoz Masqué
Jesús Antonio Negrillo Espigares
Inicio: 01-10-2014 Finalización: 30-09-2018
Página web del proyecto
GiCSI
Acoustics and Non Destructive Evaluation (DAEND)
  • Environmental Acoustics (GAA)
  • G Carma: Materials Characterization by Non Destructive Evaluation
  • ULAB, Ultrasounds for Liquid Analysis and Bioengineering
Information and Communication Technologies (TIC)
  • Cybersecurity and Privacy Protection Research Group (GiCP)
  • Research group on Cryptology and Information Security (GiCSI)
    • Quantum Communications Laboratory (LCQE)
  • Multichannel Ultrasonic Signal Processing Group (MUSP)
Sensors and Ultrasonic Systems (DSSU)
  • Ultrasonic Systems and Technologies (USTG)
  • Nanosensors and Smart Systems (NoySi)
  • Ultrasonic Resonators for cavitation and micromanipulation (RESULT)
  • Advanced Sensor Technology (SENSAVAN)
  • Quantum Electronics (QE)
Laboratorios
  • Laboratorio de Acústica
  • Laboratorio de Metrología Ultrasónica Médica (LMUM)
  • Laboratorio de Comunicaciones Cuánticas
  • Laboratory for International Collaboration in Advanced Biophotonics Imaging

Instituto de Tecnologías Físicas y de la Información Leonardo Torres Quevedo  - ITEFI
C/ Serrano, 144. 28006 - Madrid • Tel.: (+34) 91 561 88 06  Contacto  •  Intranet
EDIFICIO PARCIALMENTE ACCESIBLE POR PERSONAS CON MOVILIDAD REDUCIDA