Protocolos criptográficos para la ciberseguridad: identificación, autenticación y protección de la información (ProCriCiS)

procricis.pngToday's Information Society is giving birth to enormous changes in the daily life of companies, institutions and citizens, and one of the main actors is Internet.

"The Web" has become a fundamental element of our society. We get connected for endless activities, both professional and personal, such as e-mailing, e-commercing, banking, chatting, and the like.

Publicaciones
Revistas JCR
GiCSI Study of the stability of a SEIRS model for computer worm propagation
A. Martin del Rey, J.D. Hernández Guillén; Luis Hernández Encinas
Physica A - Nonlinear Analysis, 479, 411-421
http://dx.doi.org/10.1016/j.physa.2017.03.023
GiCSI A study on the performance of secure elliptic curves for cryptographic purposes
R. Durán Díaz, V. Gayoso Martínez, L. Hernández Encinas, and A. Martín Muñoz
International Joint Conference SOCO'16-CISIS'16-ICEUTE'16 - Advances in Intelligent Systems and Computing 527, 658-667 San Sebastián (Spain), october 19-21, 2016
http://dx.doi.org/10.1007/978-3-319-47364-2_64
GiCSI A characterization of non-prime powers
Raúl Durán Díaz; Luis Hernández Encinas; Agustín Martín Muñoz; Jaime Muñoz Masqué; Seok-Zun SONG
Turkish Journal of Mathematics, vol.41, pp.1248-1259, 5
http://dx.doi.org/10.3906/mat-1603-143
GiCSI A Lightweight Pseudorandom Number Generator for Securing the Internet of Things
A. Orúe López; L. Hernández Encinas; A. Martín Muñoz; F. Montoya Vitini
IEEE Access, vol. 5 pp. 27800-27806. IEEE. ISSN 2169-3536
http://dx.doi.org/10.1109/ACCESS.2017.2774105
GiCSI Boolean differential operators
L. Hernández Encinas and A. Martín del Rey
Turkish Journal of Mathematics 42 57–68
http://dx.doi.org/10.3906/mat-1607-22
GiCSI A Framework for Acquiring and Analyzing Traces from Cryptographic Devices
A. Blanco Blanco, J.M. de Fuentes, L. González-Manzano, L. Hernández Encinas, A. Martín Muñoz, J.L. Rodrigo Oliva, and J.I. Sánchez García
13th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2017), Niagara Falls (Canada), October 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 239,
https://doi.org/10.1007/978-3-319-78816-6_20
GiCSI Discrete linear models for the generalized selfshrunken sequences
D. Cardell, S.; Fúster-Sabater, A
Finite Fields and their Applications, vol. 47, pp. 222-241, Academic Press
http://dx.doi.org/10.1016/j.ffa.2017.06.010
Proceedings
GiCSI Breaking a Hitag2 Protocol with Low Cost Technology
V. Gayoso Martínez, L. Hernández Encinas, A. Martín Muñoz and J. Zhang
3rd International Conference on Information Systems Security and Privacy (ICISSP'2017). Proceedings 579-584, P.Mori, S. Furnell and O. Camp (Ed.), Porto (Portugal), February 19-21, 2017
http://dx.doi.org/10.5220/0006271905790584
GiCSI Generación de primos demostrables: implementación y resultados
R. Durán Díaz, V. Gayoso Martinez y L. Hernández Encinas
XIV Reunión Española de Criptología y Seguridad de la Información (RECSI 2016) Actas 58-63, P.L. Ferrer Gomila y M.F. Hinarejos Campos (Eds.), Mahón, octubre 26-28, 2016
ISBN: 978-84-608-9470-4
GiCSI Herramientas visuales usadas en criptografía caótica útiles para el análisis de secuencias pseudoaleatorias
A.B. Orúe, A. Fúster, V. Fernández, F. Montoya, L. Hernández y A. Martín
XIV Reunión Española de Criptología y Seguridad de la Información (RECSI 2016) Actas 180-185, P.L. Ferrer Gomila y M.F. Hinarejos Campos (Eds.), Mahón, octubre 26-28, 2016
ISBN: 978-84-608-9470-4
GiCSI Análisis de los métodos de generación de curvas elípticas seguras
V. Gayoso Martínez, L. Hernández Encinas, A. Martín del Rey and R. Durán Díaz
Segundas Jornadas Nacionales de Investigación en Ciberseguridad (JNIC) Actas 87-93, Granada, junio 15-17, 2016
ISBN: 978-84-608-8070-7
GiCSI Propuesta de mejora de un modelo SEIRS para la simulación de la propagación de malware
J.D. Hernández Guillén, A. Martín del Rey and L. Hernández Encinas
Segundas Jornadas Nacionales de Investigación en Ciberseguridad (JNIC) Actas 136-143, Granada, junio 15-17, 2016
ISBN: 978-84-608-8070-7
Libros y Capítulos de Libro
GiCSI Special Primes: Properties and Applications
R. Durán Díaz and L. Hernández Encinas
Chapter of the book: Geometry, Algebra and Applications: From Mechanics to Cryptography, Springer International Publishing Switzerland, 2016, 79-90, ISBN: 978-3-319-32084-7
http://dx.doi.org/10.1007/978-3-319-32085-4_7
GiCSI Implementation of Cryptographic Algorithms for Elliptic Curves
V. Gayoso Martínez, L. Hernández Encinas, and A. Martín Muñoz
Chapter of the book: Geometry, Algebra and Applications: From Mechanics to Cryptography Springer International Publishing Switzerland, 2016, 121--133, ISBN: 978-3-319-32084-7
http://dx.doi.org/10.1007/978-3-319-32085-4_11
GiCSI PSUM A comparison of computer-based technologies for cryptographic attacks
V. Gayoso Martínez, L. Hernández Encinas, A. Martín Muñoz, O. Martínez-Graullera, and J. Villazón-Terrazas
International Workshop on Computational Intelligence in Security for Information Systems (CISIS'16) International Joint Conference SOCO'16-CISIS'16-ICEUTE'16, Advances in Intelligent Systems and Computing 527, 622-630 San Sebastián (Spain)
ISBN: 978-3-319-47363-5
GiCSI Malware Propagation Models in Wireless Sensor Networks: A Review
A. Queiruga-Dios, A. Hernández Encinas, J. Martín-Vaquero, and L. Hernández Encinas
International Workshop on Computational Intelligence in Security for Information Systems (CISIS'16) International Joint Conference SOCO'16-CISIS'16-ICEUTE'16, Advances in Intelligent Systems and Computing 527, 648-657 San Sebastián (Spain)
https://doi.org/10.1007/978-3-319-47364-2_63
GiCSI Linear Models for High-Complexity Sequences
Sara D. Cardell; Amparo Fúster-Sabater
Lecture Notes in Computer Science, vol.10404, pp. 314- 324, 1, Springer Verlag
http://dx.doi.org/10.1007/978-3-319-62392-4_23
Entidades participantes en el proyecto

ITEFI-CSIC, Universidad de Málaga, Universidad de Alcalá, Universidad de Alicante