Today's Information Society is giving birth to enormous changes in the daily life of companies, institutions and citizens, and one of the main actors is Internet.
"The Web" has become a fundamental element of our society. We get connected for endless activities, both professional and personal, such as e-mailing, e-commercing, banking, chatting, and the like.
Publicaciones
Año: 2017
Study of the stability of a SEIRS model for computer worm propagationA. Martin del Rey, J.D. Hernández Guillén; Luis Hernández EncinasPhysica A - Nonlinear Analysis, 479, 411-421http://dx.doi.org/10.1016/j.physa.2017.03.023 | GiCSI |
A study on the performance of secure elliptic curves for cryptographic purposesR. Durán Díaz, V. Gayoso Martínez, L. Hernández Encinas, and A. Martín MuñozInternational Joint Conference SOCO'16-CISIS'16-ICEUTE'16 - Advances in Intelligent Systems and Computing 527, 658-667 San Sebastián (Spain), october 19-21, 2016http://dx.doi.org/10.1007/978-3-319-47364-2_64 | GiCSI |
A characterization of non-prime powersRaúl Durán Díaz; Luis Hernández Encinas; Agustín Martín Muñoz; Jaime Muñoz Masqué; Seok-Zun SONGTurkish Journal of Mathematics, vol.41, pp.1248-1259, 5http://dx.doi.org/10.3906/mat-1603-143 | GiCSI |
A Lightweight Pseudorandom Number Generator for Securing the Internet of ThingsA. Orúe López; L. Hernández Encinas; A. Martín Muñoz; F. Montoya VitiniIEEE Access, vol. 5 pp. 27800-27806. IEEE. ISSN 2169-3536http://dx.doi.org/10.1109/ACCESS.2017.2774105 | GiCSI |
A Framework for Acquiring and Analyzing Traces from Cryptographic DevicesA. Blanco Blanco, J.M. de Fuentes, L. González-Manzano, L. Hernández Encinas, A. Martín Muñoz, J.L. Rodrigo Oliva, and J.I. Sánchez García13th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2017), Niagara Falls (Canada), October 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 239, https://doi.org/10.1007/978-3-319-78816-6_20 | GiCSI |
Discrete linear models for the generalized selfshrunken sequencesD. Cardell, S.; Fúster-Sabater, AFinite Fields and their Applications, vol. 47, pp. 222-241, Academic Presshttp://dx.doi.org/10.1016/j.ffa.2017.06.010 | GiCSI |
Breaking a Hitag2 Protocol with Low Cost TechnologyV. Gayoso Martínez, L. Hernández Encinas, A. Martín Muñoz and J. Zhang3rd International Conference on Information Systems Security and Privacy (ICISSP'2017). Proceedings 579-584, P.Mori, S. Furnell and O. Camp (Ed.), Porto (Portugal), February 19-21, 2017 http://dx.doi.org/10.5220/0006271905790584 | GiCSI |
Linear Models for High-Complexity SequencesSara D. Cardell; Amparo Fúster-SabaterLecture Notes in Computer Science, vol.10404, pp. 314- 324, 1, Springer Verlaghttp://dx.doi.org/10.1007/978-3-319-62392-4_23 | GiCSI |
Año: 2016
Special Primes: Properties and ApplicationsR. Durán Díaz and L. Hernández EncinasChapter of the book: Geometry, Algebra and Applications: From Mechanics to Cryptography, Springer International Publishing Switzerland, 2016, 79-90, ISBN: 978-3-319-32084-7http://dx.doi.org/10.1007/978-3-319-32085-4_7 | GiCSI |
Implementation of Cryptographic Algorithms for Elliptic CurvesV. Gayoso Martínez, L. Hernández Encinas, and A. Martín MuñozChapter of the book: Geometry, Algebra and Applications: From Mechanics to Cryptography Springer International Publishing Switzerland, 2016, 121--133, ISBN: 978-3-319-32084-7http://dx.doi.org/10.1007/978-3-319-32085-4_11 | GiCSI |
A comparison of computer-based technologies for cryptographic attacksV. Gayoso Martínez, L. Hernández Encinas, A. Martín Muñoz, O. Martínez-Graullera, and J. Villazón-TerrazasInternational Workshop on Computational Intelligence in Security for Information Systems (CISIS'16) International Joint Conference SOCO'16-CISIS'16-ICEUTE'16, Advances in Intelligent Systems and Computing 527, 622-630 San Sebastián (Spain)ISBN: 978-3-319-47363-5 | GiCSI PSUM |
Malware Propagation Models in Wireless Sensor Networks: A ReviewA. Queiruga-Dios, A. Hernández Encinas, J. Martín-Vaquero, and L. Hernández EncinasInternational Workshop on Computational Intelligence in Security for Information Systems (CISIS'16) International Joint Conference SOCO'16-CISIS'16-ICEUTE'16, Advances in Intelligent Systems and Computing 527, 648-657 San Sebastián (Spain)https://doi.org/10.1007/978-3-319-47364-2_63 | GiCSI |
Generación de primos demostrables: implementación y resultadosR. Durán Díaz, V. Gayoso Martinez y L. Hernández EncinasXIV Reunión Española de Criptología y Seguridad de la Información (RECSI 2016) Actas 58-63, P.L. Ferrer Gomila y M.F. Hinarejos Campos (Eds.), Mahón, octubre 26-28, 2016ISBN: 978-84-608-9470-4 | GiCSI |
Herramientas visuales usadas en criptografía caótica útiles para el análisis de secuencias pseudoaleatoriasA.B. Orúe, A. Fúster, V. Fernández, F. Montoya, L. Hernández y A. MartínXIV Reunión Española de Criptología y Seguridad de la Información (RECSI 2016) Actas 180-185, P.L. Ferrer Gomila y M.F. Hinarejos Campos (Eds.), Mahón, octubre 26-28, 2016ISBN: 978-84-608-9470-4 | GiCSI |
Análisis de los métodos de generación de curvas elípticas segurasV. Gayoso Martínez, L. Hernández Encinas, A. Martín del Rey and R. Durán DíazSegundas Jornadas Nacionales de Investigación en Ciberseguridad (JNIC) Actas 87-93, Granada, junio 15-17, 2016ISBN: 978-84-608-8070-7 | GiCSI |
Propuesta de mejora de un modelo SEIRS para la simulación de la propagación de malwareJ.D. Hernández Guillén, A. Martín del Rey and L. Hernández EncinasSegundas Jornadas Nacionales de Investigación en Ciberseguridad (JNIC) Actas 136-143, Granada, junio 15-17, 2016ISBN: 978-84-608-8070-7 | GiCSI |
Año: 2018
Boolean differential operatorsL. Hernández Encinas and A. Martín del ReyTurkish Journal of Mathematics 42 57–68http://dx.doi.org/10.3906/mat-1607-22 | GiCSI |
ITEFI-CSIC, Universidad de Málaga, Universidad de Alcalá, Universidad de Alicante