Pasar al contenido principal

Main navigation

  • Sobre El ITEFI
  • Investigación
  • Formación y empleo
  • OpenLab
  • Servicios científico técnicos
  • Directorio

GiCSI

2024

  • Structural analysis of Code-based Algorithms of the NIST Post-Quantum Call
    M. A. González de la Torre, L. Hernández Encinas and J. I. Sánchez García
    Logic Journal of the IGPL
    https://doi.org/10.1093/jigpal/jzae071
  • Análisis comparativo de las firmas digitales postcuánticas basadas en retículos
    E. Iglesias Hernández, L. Hernández-Álvarez L. Hernández Encinas y J. I. Sánchez García
    Actas de las IX Jornadas Nacionales de Investigación en Ciberseguridad (JNIC’2024), 2024, 404-411, Sevilla 27-29 mayo, 2024, ISBN: 978-84-09-62140-8
    https://idus.us.es/handle/11441/160623
  • Ataques por canal lateral contra AES mediante correlación de consumo de potencia
    M.A. González de la Torre, V. Sarasa Laborda, L. Hernández-Álvarez, I. Morales Sandoval, L. Hernández Encinas
    IX Jornadas Nacionales de Investigación en Ciberseguridad (JNIC’2024), 2024, 420-427, Sevilla 27-29 mayo, 2024, ISBN: 978-84-09-62140-8
    https://hdl.handle.net/11441/160773
  • Cybersecurity trends in Cooperative, Connected and Automated Mobility
    O. Castillo Campo, V. Gayoso Martínez, L. Hernández Encinas, A. Martín Muñoz, R. Álvarez Fernández,
    Logic Journal of the IGPL, 2024, jzae072
    https://doi.org/10.1093/jigpal/jzae072
  • Futuros Estándares de la Criptografía Postcuántica
    Luis Hernández Encinas
    Congreso Bienal de la Real Sociedad Matemática Española (RSME), Sesión especial de Criptografía, pág. 115, Pamplona, 23 de enero 2024

2023

  • How to Attack a Galaxy: From Star Wars to Star Trek
    L. Hernández-Álvarez, M. Á. G. de la Torre, E. I. Hernández and L. H. Encinas
    Computer Science, Computer Engineering, & Applied Computing (CSCE), Las Vegas, NV, USA, 2023, pp. 2347-2354
    https://doi.org/10.1109/CSCE60160.2023.00381
  • Manual básico de criptología
    Luis Hernández Encinas
    Editorial Pinolia
    ISBN: 978-84-18965-88-3
  • Enhancing the Anonymity and Auditability of Whistleblowers Protection
    Chica, S., Marín, A., Arroyo, D., Díaz, J., Almenares, F., Díaz, D.
    In: Prieto, J., Benítez Martínez, F.L., Ferretti, S., Arroyo Guardeño, D., Tomás Nevado-Batalla, P. (eds) Blockchain and Applications, 4th International Congress . BLOCKCHAIN 2022. Lecture Notes in Networks and Systems, vol 595. Springer, Cham.
    https://doi.org/10.1007/978-3-031-21229-1_38

2022

  • EEG Authentication System Based on One- and Multi-Class Machine Learning Classifiers
    Luis Hernández-Álvarez, Elena Barbierato, Stefano Caputo, Lorenzo Mucchi, and Luis Hernández Encinas (A)
    Sensors 23(1), 186 (2023), 1–19, Special Issue “Feature Papers in Smart and Intelligent Sensors Systems”
    https://doi.org/10.3390/s23010186
  • Recovering Decimation-Based Cryptographic Sequences by Means of Linear CAs
    Sara D Cardell, Diego F Aranha, Amparo Fúster-Sabater
    Logic Journal of the IGPL, Volume 28, Issue 4, August 2020, Pages 430–448
    https://doi.org/10.1093/jigpal/jzz051
  • A Review on Continuous-Variable Quantum Key Distribution Security
    Garcia-Callejo, A., Ruiz-Chamorro, A., Cano, D., Fernandez, V.
    In: Bravo, J., Ochoa, S., Favela, J. (eds) Proceedings of the International Conference on Ubiquitous Computing & Ambient Intelligence (UCAmI 2022). UCAmI 2022. Lecture Notes in Networks and Systems, vol 594. Springer, Cham.
    https://doi.org/10.1007/978-3-031-21333-5_107
  • Following Negationists on Twitter and Telegram: Application of NCD to the Analysis of Multiplatform Misinformation Dynamics
    de Paz, A., Suárez, M., Palmero, S., Degli-Esposti, S., Arroyo, D.
    In: Bravo, J., Ochoa, S., Favela, J. (eds) Proceedings of the International Conference on Ubiquitous Computing & Ambient Intelligence (UCAmI 2022). UCAmI 2022. Lecture Notes in Networks and Systems, vol 594. Springer, Cham.
    https://doi.org/10.1007/978-3-031-21333-5_110
  • About the Fujisaki-Okamoto Transformation in the Code-Based Algorithms of the NIST Post-quantum Call
    González de la Torre, M.Á., Hernández Encinas, L.
    P. García Bringas et al. (Eds.), Springer, Lecture Notes in Networks and Systems 523, 75-85, ISBN 978-3-031-18408-6, Salamanca, Septiembre, 2022
    https://doi.org/10.1007/978-3-031-18409-3_8
  • Cryptographic Protocols in Advanced Metering Infrastructures in Smart Grids
    Hernández-Álvarez, L., Bullón Pérez, J.J., Queiruga-Dios, A.
    In: , et al. CISIS ICEUTE 2022 2022. Lecture Notes in Networks and Systems, vol 532. Springer, Cham.
    https://doi.org/10.1007/978-3-031-18409-3_12
  • State of the Art of Cybersecurity in Cooperative, Connected and Automated Mobility
    Castillo Campo, Ó., Gayoso Martínez, V., Hernández Encinas, L., Martín Muñoz, A., Álvarez Fernández, R.
    P. García Bringas et al. (Eds.), Springer, Lecture Notes in Networks and Systems 523, 104–113, ISBN 978-3-031-18408-6, Salamanca, Septiembre, 2022
    https://doi.org/10.1007/978-3-031-18409-3_11
  • Comparative analysis of lattice-based post-quantum cryptosystems
    M.A. González de la Torre, L. Hernández Encinas and J.I. Sánchez García
    XVII Reunión Española sobre Criptología y Seguridad de la Información (RECSI 2022), Actas 121-126, D. Sadornil Renedo (Ed.), Ediciones Universidad de Cantabria, Santander, Octubre 19-21, 2022
    ISBN: 978-84-19024-14-5
  • Comparative analysis of lattice-based post-quantum cryptosystems
    M.A. González de la Torre, L. Hernández Encinas and J.I. Sánchez García
    XVII Reunión Española sobre Criptología y Seguridad de la Información (RECSI 2022), Actas 121–126, D. Sadornil Renedo (Ed.), Ediciones Universidad de Cantabria. Santander, Octubre 19–21, 2022
    ISBN: 978-84-19024-14-5
  • Quantum Key Distribution from a geostationary satellite: Hispasat’s CARAMUEL system feasibility study
    Gil Montoro, Juan; González, Félix; Abad, Antonio; Pintó, Pedro; Álvaro, Ángel; Pascual, Luis; Domingo, David; García, Marta; Miravet, Carlos; Campo, Pablo; Alvarez-Herrero, Alberto; Belenger, Tomás; Rodríguez, Luis; Reyes Garcia-Talavera, Marcos; Bermejo, Javier; Marmol, Veronica; Curty, Marcos.
    27th Ka and Broadband Communications Conference. Stresa (Italy)
  • Advancing the Use of Information Compression Distances in Authorship Attribution
    Muñoz, S.P., Oliva, C., Lago-Fernández, L.F., Arroyo, D.
    Spezzano, F., Amaral, A., Ceolin, D., Fazio, L., Serra, E. (eds) Disinformation in Open Online Media. MISDOOM 2022. Lecture Notes in Computer Science, vol 13545 . Springer, Cham.
    https://doi.org/10.1007/978-3-031-18253-2_8
  • Criptografía y computación cuántica. Fundamentos y estado actual
    Yepes Rodríguez, Fernando
    Trabajo fin de master presentado en la Universidad Autónoma de Madrid el 30 de septiembre de 2022
  • Vulnerability detection using deep learning: dataset classification
    de la Rubia Herrera, Alejandro
    Trabajo fin de máster presentado en la Universidad Carlos III el 28 de septiembre de 2022
  • Rumor and clickbait detection by combining information divergence measures and deep learning techniques
    Christian Oliva , Ignacio Palacio-Marín, Luis F. Lago-Fernández, David Arroyo
    ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and Security
    https://doi.org/10.1145/3538969.3543791
  • Analysis of the FO Transformation in the Lattice-Based Post-Quantum Algorithms
    González de la Torre MÁ, Hernández Encinas L, Queiruga-Dios A
    Mathematics 2022, 10, 2967.
    https://doi.org/10.3390/math10162967
  • Practical Side-Channel Attack on Free-Space QKD Systems With Misaligned Sources and Countermeasures
    P. Arteaga-Díaz, D. Cano and V. Fernandez
    EEE Access, vol. 10, pp. 82697-82705, 2022
    https://doi.org/10.1109/ACCESS.2022.3196677
  • Cryptographic Protocols for Privacy Enhancing Technologies. From Privacy Preserving Human Attestation to Internet Voting
    Querejeta Azurmendi, Íñigo
    Tesis doctoral presentada en el Departamento de Informática de la Universidad Carlos III de Madrid el 5 de julio de 2022
    http://hdl.handle.net/10016/35838
  • Biometrics and Artificial Intelligence: Attacks and Challenges
    L. Hernández-Álvarez, L. González-Manzano, J.M. Fuentes and L. Hernández Encinas
    pp. 213–240 in the book “Breakthroughs in Digital Biometrics and Forensics”, Springer, 2022
    https://doi.org/10.1007/978-3-031-10706-1_10
  • EEG Data for User Authentication with Multi-Class and One-Class Classifiers
    L. Hernández-Álvarez, S. Caputo, L. Mucchi, and L. Hernández Encinas
    Actas VII Jornadas Nacionales de Investigación en Ciberseguridad (JNIC'2022), 205-208. J. M. de Fuentes, L. González, J. C. Sancho, A. Ayerbe and M. L. Escalante (Eds.), Bilbao, Junio 27--29, 2022
    ISBN: 978-84-88734-13-6
  • A Hadamard Matrix-Based Algorithm to Evaluate the Strength of Binary Sequences
    Fúster-Sabater, A., Requena, V., Cardell, S.D.
    Groen, D., de Mulatier, C., Paszynski, M., Krzhizhanovskaya, V.V., Dongarra, J.J., Sloot, P.M.A. (eds) Computational Science – ICCS 2022. ICCS 2022. Lecture Notes in Computer Science, vol 13351. Springer, Cham
    https://doi.org/10.1007/978-3-031-08754-7_19
  • Improving LSTMs' under-performance in authorship attribution for short texts
    Oliva. Christian; Palmero Muñoz, Santiago; Lago-Fernández, Luis F.; Arroyo Guardeño, David
    Proceedings of the 2022 European Interdisciplinary Cybersecurity Conference
    http://hdl.handle.net/10261/268091
  • Modeling the effect of steering mirrors on polarization for free-space quantum key distribution
    Pablo Arteaga-Díaz, Natalia Denisenko, Veronica Fernandez
    Optik, 169434, 2022
    https://doi.org/10.1016/j.ijleo.2022.169434
  • Propuesta de un Marco de Referencia para una Seguridad Integral: Más allá de la Seguridad Física y Lógica. Casos de uso en PYME
    Javier Espinosa García
    Tesis doctoral presentada en la Universidad de Málaga, Departamento de Ingeniería de comunicaciones, el 20 de mayo de 2022
  • Self-Sovereign Identity in University Context
    Araceli Queiruga-Dios, Juan José Bullón Pérez, Luis Hernández Encinas
    Proc. 31st Conference of Open Innovations Association (FRUCT), 2022, 259-264, Helsinki, Finland, April 27-29, 2022.
    https://doi.org/10.23919/FRUCT54823.2022.9770913
  • Computational Analysis of Interleaving PN-Sequences with Different Polynomials.
    Cardell, S.D.; Requena, V.; Fúster-Sabater, A.
    Cryptography 2022, 6, 21
    https://doi.org/10.3390/cryptography6020021
  • Security and Efficiency of Linear Feedback Shift Registers in GF(2n) Using n-Bit Grouped Operations
    Espinosa García, J.; Cotrina, G.; Peinado, A.; Ortiz, A.
    Mathematics 2022, 10, 996
    https://doi.org/10.3390/math10060996
  • Security Threats and Cryptographic Protocols for Medical Wearables
    Luis Hernández-Álvarez , Juan José Bullón Pérez , Farrah Kristel Batista and Araceli Queiruga-Dios
    Mathematics 2022, 10(6), 886
    https://doi.org/10.3390/math10060886 (registering DOI)
  • An Efficient Algorithm to Compute the Linear Complexity of Binary Sequences
    Fúster-Sabater, A.; Requena, V.; Cardell, S.D.
    Mathematics 2022, 10, 794
    https://doi.org/10.3390/math10050794
  • A modification proposal for the reconciliation mechanism of the key exchange algorithm NewHope
    V Gayoso Martínez, L Hernández Encinas, A Martín Muñoz
    Logic Journal of the IGPL, 2022;, jzac011
    https://doi.org/10.1093/jigpal/jzac011
  • Randomness study of the concatenation of generalized sequences
    Sara D Cardell, Amalia B Orúe, Verónica Requena, Amparo Fúster-Sabater
    Logic Journal of the IGPL, Volume 30, Issue 6, December 2022, Pages 993–1004
    https://doi.org/10.1093/jigpal/jzac008
  • Desarrollo de técnicas de aprendizaje profundo para la clasificación de memes empleados en campañas de desinformación
    Llanos Velasco, Adrián
    Trabajo fin de máster presentado en la Universidad Politécnica de Madrid el 14 de enero de 2022

2021

  • Analysis of the angular influence in the spatial study of mechanical displacements in highly anisotropic media
    L. Hernández-Álvarez, C. Negreira, A. Ramos, N. Cubo Mateo, L. M. Rodríguez, A. Pinto del Corral and I. González Gómez
    Mechanics of Materials 163, 104094 (2021), (Q2, Materials Science, Multidisciplinary, Mechanics, F.I.; 3.266)
    https://doi.org/10.1016/j.mechmat.2021.104094
  • Trustworthy humans and machines
    Sara Degli-Esposti, David Arroyo
    Trust and Transparency in an Age of Surveillance, Lora Anne Viola, Paweł Laidler eds., Taylor & Francis Group, London, nov. 2021
    https://doi.org/10.4324/9781003120827-15
  • Photon statistics of the light transmitted and reflected by a two-dimensional atomic array
    Daniel Cano
    Phys. Rev. A 104, 053709
    https://doi.org/10.1103/PhysRevA.104.053709
  • Challenges of the market for initial coin offerings
    Pablo de Andrés, David Arroyo, Ricardo Correia, Alvaro Rezola
    International Review of Financial Analysis, vol. 79 (2022), 101966
    https://doi.org/10.1016/j.irfa.2021.101966
  • VeriFly: On-the-fly Assertion Checking via Incrementality
    Sanchez-ordaz, M., Garcia-Contreras, I., Perez, V., Morales, J., Lopez-Garcia, P., & Hermenegildo, M.
    Theory and Practice of Logic Programming, 21(6), 768-784.
    https://doi.org/10.1017/S1471068421000430
  • Using Free Mathematical Software in Engineering Classes
    V. Gayoso Martínez, L. Hernández Encinas, A. Martín Muñoz and A. Queiruga Dios
    Axioms, vol. 10, 253, pp. 1-18, 2021, ISSN: 2075-1680,
    https://doi.org/10.3390/axioms10040253
  • Challenges and Competences in Master Degrees from a Comprehensive Security Perspective
    J. Espinosa García, L. Hernández Encinas and A. Peinado Domínguez
    14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021)
    https://doi.org/10.1007/978-3-030-87872-6_40
  • Regular Path Clauses and their Application in Solving Loops
    Kafle, B., Gallagher, J., Hermenegildo, M.V., Klemen, M., Lopez-Garcia, P., Morales, J.F.
    Proceedings of the Eighth International Workshop Horn Clauses for Verification and Synthesis (HCVS 2021), Electronic Proceedings in Theoretical Computer Science (EPTCS), pág. 1-14, Open Publishing Association (OPA), Agosto 2021. Co-located with ETA
    https://doi.org/10.4204/EPTCS.344.3
  • Smart cybersecurity
    J. Godoy, J. Villagra, H. Mueller, V. Gallego, A. Kosgodagan, R. Naveiro, D. Rios Insua, D. Rodríguez González, S. Hidalgo Villena, S. Degli Esposti, P. Noheda Marín. Coordinators: D. Arroyo Guardeño y P. Brox Jiménez
    CSIC Scientific Challenges: towards 2030, vol. 11, Artificial Intelligence, Robotics & Data Science, Challenge 8. Editorial CSIC, 2021
    ISBN Vol. 11: 978-84-00-10758-1
  • Trust and security in the digital information
    Iluminada Baturone Castillo, Verónica Fernández Mármol, Agustín Martín Muñoz, Santiago Sánchez Solano, Lluis Terés Terés. Coordinator: Luis Hernández Encinas, Adjunct Coordinator: Ricardo Martínez Martínez
    CSIC Scientific Challenges: towards 2030, vol. 10, Digital & complex information, Challenge 5. Editorial CSIC, 2021
    ISBN Vol. 10: 978-84-00-10756-7
  • White Paper on Artificial Intelligence, Robotics and Data Science
    Sara Degli-Esposti, Carles Sierra, Felip Manyà, Adrià Colomé, Nardine Osman, Daniel López-Castro, José J. Ramasco, Lara Lloret-Iglesias, Guillem Alenyà, Jorge Villagrá, M. Dolores del Castillo, Pablo Noriega Marco Schorlemmer, Txetxu Ausín, Teresa Serrano-Gotarredona, Arantza Oyanguren, David Arroyo, Piedad Brox
    Volume 11 of CSIC Scientific Challenges: Towards 2030, CSIC, Madrid, 2021.
    ISBN: 978-84-00-10758-1
  • Preliminary Analysis of Interleaving PN-Sequences
    Sara D. Cardell, Amparo Fúster-Sabater & Verónica Requena
    ICCSA 2021: Computational Science and Its Applications – ICCSA 2021 pp 287–297
    https://doi.org/10.1007/978-3-030-86653-2_21
  • Real-Time Tool Detection for Workflow Identification in Open Cranial Vault Remodeling
    A. Pose Díez de la Lastra, L. García-Duarte Sáenz, D. García-Mato, L. Hernández-Álvarez, S. Ochandiano and J. Pascau
    Entropy 23 (7), 817 (2021); (Q2, Physics, Multidisciplinary, F.I.: 2.524)
    https://doi.org/10.3390/e23070817
  • A Comprehensive Security Framework Proposal to Contribute to Sustainability
    J. Espinosa García, L. Hernández Encinas and A. Peinado Domínguez
    Sustainability 13, 6901 (2021), 1--23 (Q2, Environmental Sciences, Sustainable Science & Technology, F.I. 2.576)
    https://doi.org/10.3390/su13126901
  • Towards Privacy–Preserving Sensor–Based Continuous Authentication
    Luis Hernández-Álvarez
    Jornadas Nacionales de Investigación en Ciberseguridad (JNIC’2021), M.A. Serrano, E. Fernández-Medina, C. Alcaraz, N. de Castro y G. Calvo (Eds.), Ciudad Real (Spain), 347-348, 2021
    http://doi.org/10.18239/jornadas_2021.34.00
  • Achieving cybersecurity in blockchain-based systems: A survey
    Mar Gimenez-Aguilar, Jose Maria de Fuentes, Lorena Gonzalez-Manzano, David Arroyo
    Future Generation Computer Systems, Volume 124, 2021, Pages 91-118
    https://doi.org/10.1016/j.future.2021.05.007
  • VeriFly: On-the-fly Assertion Checking with Ciao PP
    Sánchez, M.A., García, I., Pérez, V., Morales, J.F., López, P., Hermenegildo, M.V.
    6th Workshop on Formal Integrated Development Environment (F-IDE 2021), Electronic Proceedings in Theoretical Computer Science (EPTCS), pág. 1-5, Open Publishing Association (OPA), Mayo 2021. Co-located with ETAPS 2021
    https://doi.org/10.4204/EPTCS.338
  • A Compression-Based Method for Detecting Anomalies in Textual Data
    Gonzalo de la Torre-Abaitua, Luis F. Lago-Fernández and David Arroyo
    Entropy 2021, 23(5), 61
    https://doi.org/10.3390/e23050618
  • SmartCAMPP - Smartphone-based continuous authentication leveraging motion sensors with privacy preservation
    Luis Hernández-Álvarez, José María de Fuentes, Lorena González-Manzano, Luis Hernández Encinas
    Pattern Recognition Letters, Volume 147, 2021, Pages 189-196
    https://doi.org/10.1016/j.patrec.2021.04.013
  • Análisis estadístico del generador de secuencias pseudoaleatorias self-shrinking generalizado
    S.D. Cardell, A. Fúster-Sabater, A.B. Orúe, V. Requena
    Actas de la XVI Reunión Española sobre Criptología y Seguridad de la Información, RECSI XVI, 2021. Josep M. Miret y Francesc Sebé (Eds): pp. 71 - 76, Lleida, 14 – 16 Abril 2021
    ISBN-13: 978-84-09-29150-2
  • BSD: Algoritmos eficientes para la descomposición binomial de secuencias binarias
    J.L. Martín Navarro, A. Fúster Sabater
    Actas de la XVI Reunión Española sobre Criptología y Seguridad de la Información, RECSI XVI, 2021. Josep M. Miret y Francesc Sebé (Eds): pp. 57 - 61, Lleida, 14 – 16 Abril 2021
    ISBN-13: 978-84-09-29150-2
  • Criptoanálisis del esquema de dinero cuántico de clave pública de Aaronson y Christiano
    M. Conde Pena, L. Hernández Encinas, R. Durán Díaz, J.-C. Faugère, L. Perret
    Actas de la XVI Reunión Española de Criptología y Seguridad de la Información (RECSI 2020), pp. 25-30, J.M. Miret y F. Sebé (Eds.), ISBN: 978-84-09-29150-2, Lérida (Spain), abril 14–16, 2021
    ISBN: 978-84-09-29150-2
  • Interleaving Shifted Versions of a PN-Sequence
    S.D. Cardell, A. Fúster-Sabater, V. Requena
    Special Issue “Algebra and Number Theory”, Mathematics, vol. 9(6), 687, March 2021
    https://doi.org/10.3390/math9060687
  • A General Framework for Static Resource Analysis and Profiling of (Parallel) Programs and an Application to Runtime Checking
    Maximiliano Klemen
    Tesis doctoral presentada en la Escuela Técnica Superior de Ingenieros Informáticos de la Universidad Politécnica de Madrid el 5 de marzo de 2021
    https://doi.org/10.20868/UPM.thesis.66526
  • Chor-Rivest Knapsack Cryptosystem in a Post-quantum World
    R. Durán Díaz, L. Hernández-Álvarez, Luis Hernández Encinas and A. Queiruga-Dios
    In: Daimi K., Arabnia H.R., Deligiannidis L., Hwang MS., Tinetti F.G. (eds) Advances in Security, Networks, and Internet of Things. Transactions on Computational Science and Computational Intelligence. Springer, Cham.
    https://doi.org/10.1007/978-3-030-71017-0_6
  • El difícil equilibrio entre riesgo y oportunidad en el contexto blockchain
    David Arroyo Guardeño
    Actuarios, nº 48, primavera 2021, pp. 62-63
    https://www.actuarios.org/wp-content/uploads/2021/03/Actuarios-48-web-low.pdf
  • El papel de la estadística oficial en la administración y gestión de datos
    Grupo de Trabajo sobre Data Stewardship
    Consejo Superior de Estadística
  • Review of the Lineal Complexity Calculation through Binomial Decomposition-Based Algorithms
    J. L. Martin-Navarro, A. Fúster-Sabater
    Mathematics, vol. 9(5), 478, February 2021
    https://doi.org/10.3390/math9050478
  • Testing Your (Static Analysis) Truths
    Casso, I., Morales, J.F., López, P., Hermenegildo, M.V.
    Truths. Logic-Based Program Synthesis and Transformation - 30th International Symposium, Post-Proceedings, Lecture Notes in Computer Science, Vol. 12561, pág. 271-292, Springer, 2021.
    https://doi.org/10.1007/978-3-030-68446-4_14
  • Developing new deep-learning model to enhance network intrusion classification
    Hanane Azzaoui, Akram Zine Eddine Boukhamla, David Arroyo, Abdallah Bensayah
    Evolving Systems (2021)
    https://doi.org/10.1007/s12530-020-09364-z
  • Building A blockchain-based decentralized digital asset management system for commercial aircraft leasing
    Paul Kuhle, David Arroyo, Eric Schuster
    Computers in Industry, Volume 126, 2021, 103393
    https://doi.org/10.1016/j.compind.2020.103393
  • Cryptography and Information Security in Wireless Sensor Networks
    Alberto Peinado Domínguez, Ángel Martín del Rey; Luis Hernández Encinas
    Editores del Special Issue “Cryptography and Information Security in Wireless Sensor Networks”. MDPI Editorial, Suiza.
    ISSN 1424-8220
  • Privacy-Preserving Sensor-Based Continuous Authentication and User Profiling: A Review
    L. Hernández-Álvarez, J.M. de Fuentes, L. González-Manzano and L. Hernández Encinas
    Sensors, 21(1), 92 (2021), 23 pp., Special Issue “Cryptography and Information Security in Wireless Sensor Networks”
    https://doi.org/10.3390/s21010092
  • Quadratic maps in two variables on arbitrary fields
    R. Durán Díaz, L. Hernández Encinas and J. Muñoz Masqué
    Carpathian J. Math. 37, 1 (2021), 91–100 (Q1, Mathematics, F.I. 1.438)
    https://doi.org/10.37193/CJM.2021.01.09

2020

  • Folding-BSD Algorithm for Binary Sequence Decomposition
    J.L. Martin-Navarro, A. Fúster-Sabater
    Computers, 2020, 9, 100
    https://doi.org/10.3390/computers9040100
  • Design and implementation of software tools for side channel attacks to cryptographic devices
    Alberto Fuentes Rodríguez
    Tesis doctoral presentada en la Universidad de Alcalá el 11 de diciembre de 2020
  • Using Freeware Mathematical Software in Calculus Classes
    Víctor Gayoso Martínez, Luis Hernández Encinas, Agustín Martín Muñoz y Araceli Queiruga Dios
    International Conference on Mathematics and its Applications in Sciencie and Engineering (ICMASE 2020). Proceedings Book.
    https://doi.org/10.14201/0AQ0302
  • Ciberseguridad
    David Arroyo Guardeño, Víctor Gayoso Martínez, Luis Hernández Encinas
    CSIC - La Catarata . Colección ¿Qué sabemos de?
    ISBN: 978-84-00-10713-0
  • Security Information Sharing in Smart Grids: Persisting Security Audits to the Blockchain
    Andrés Marín-López, Sergio Chica-Manjarrez, David Arroyo, Florina Almenares-Mendoza, Daniel Díaz-Sánchez
    Electronics 2020, 9(11), 1865
    https://doi.org/10.3390/electronics9111865
  • Modelización Matemática de la propagación de malware: Un nuevo enfoque basado en la seguridad de la información
    José Diamantino Hernández Guillén
    Tesis doctoral presentada en la Universidad de Salamanca el 22 de octubre de 2020
    http://hdl.handle.net/10366/144537
  • Folding-BSD Algorithm for Binary Sequence Decomposition
    J.L. Martín-Navarro, A. Fúster-Sabater
    Gervasi et al. (Eds.): ICCSA 2020, LNCS 12249, Part I, pp. 345-359, 2020
    https://doi.org/10.1007/978-3-030-58799-4_26
  • Correcting Polarization Degradation in Free-Space QKD Systems
    Pablo Arteaga-Diaz, Magín Parra-Serrano, Natalia Denisenko, Veronica Fernandez Marmol
    2020 22nd International Conference on Transparent Optical Networks (ICTON), Bari, Italy, 2020, pp. 1-4
    https://doi.org/10.1109/ICTON51198.2020.9203359
  • NetVote: A Strict-Coercion Resistance Re-Voting Based Internet Voting Scheme with Linear Filtering
    Iñigo Querejeta-Azurmendi, David Arroyo Guardeño, Jorge L. Hernández-Ardieta, and Luis Hernández Encinas
    Mathematics, 8 (9), 1618 (2020), 37 pp., Special Issue "Mathematics Cryptography and Information Security" (Q1, Mathematics, F.I. 1.747)
    https://doi.org/10.3390/math8091618
  • Traceability of Ready-to-Wear Clothing through Blockchain Technology
    Bullón Pérez, J.J.; Queiruga-Dios, A.; Gayoso Martínez, V.; Martín del Rey, Á.
    Sustainability 2020, 12, 7491
    https://doi.org/10.3390/su12187491
  • Elliptic curves as a basic tool for the security of blockchain
    Víctor Gayoso Martínez, Hernández Encinas Luis, Martín Muñoz Agustín y Araceli Queiruga Dios
    19th Conference on Applied Mathematics (APLIMAT 2020), proceedings. Dagmar Szarková, Daniela Richtáriková, Monika Prášilová (Eds.), 513-520,2020.
    ISBN: 978-1-7138-0796-4
  • A Study of the Reconciliation Mechanism of NewHope
    V. Gayoso Martínez, L. Hernández Encinas, and A. Martín Muñoz
    Proc. 13th International Conference on Computational Intelligence in Security for Information Systems (CISIS’2020). Advances in Intelligent Systems and Computing 1267, 361–370, A. Herrero, C. Cambra, D. Urda, J.Sedano, H. Quintián, E. Corchado (Eds.)
    https://doi.org/10.1007/978-3-030-57805-3
  • An Innovative Linear Complexity Computation for Cryptographic Sequences
    J.L. Martín-Navarro, A. Fúster-Sabater, S. D. Cardell
    Á. Herrero et al. (Eds.). 13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020). Advances in Intelligent Systems and Computing (AISC), vol. 1267. Springer, Cham, pp. 339-349, 2021.
    https://doi.org/10.1007/978-3-030-57805-3_32
  • Blockchain in Education. New challenges
    Wilson Rojas, Víctor Gayoso Martínez y Araceli Queiruga Dios
    Herrero Á., Cambra C., Urda D., Sedano J., Quintián H., Corchado E. (eds) 13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020). Advances in Intelligent Systems and Computing, 1267. Springer, Charm.
    https://doi.org/10.1007/978-3-030-57805-3_36
  • Fake News Detection
    Ignacio Palacio Marín, David Arroyo
    13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020), Springer International Publishing, pp. 229-238, 2021
    https://doi.org/10.1007/978-3-030-57805-3_22
  • Randomness Analysis for GSS-sequences Concatenated
    S. D. Cardell, A. Fúster-Sabater, A. B. Orúe, V. Requena
    Á. Herrero et al. (Eds.). 13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020). Advances in Intelligent Systems and Computing (AISC), vol. 1267. Springer, Cham, pp. 350-360, 2021
    https://doi.org/10.1007/978-3-030-57805-3_33
  • Securing Blockchain with Quantum Safe Cryptography: When and How?
    Veronica Fernandez Marmol, Amalia Orue, David Arroyo
    13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020), pp 371-379
    https://doi.org/10.1007/978-3-030-57805-3_35
  • Limits and apparent paradoxes in economics and engineering
    V. Gayoso Martínez, L. Hernández Encinas, and A. Martín Muñoz
    "Calculus for Engineering Students. Fundamentals, Real Problems, and Computers”. J. Martín-Vaquero, M. Carr, A. Queiruga-Dios, and D. Richtáriková (Eds.) Academic Press-Elsevier Mathematics in Science and Engineering, 1–14 (2020)
    https://doi.org/10.1016/C2018-0-00422-3
  • Recovering Decimation-Based Cryptographic Sequences by Means of Linear CAs
    S.D. Cardell, D.F. Aranha, A. Fúster-Sabater
    Logic Journal of the IGPL, vol. 18, Issue 4, pp. 430-448, 2020
    https://doi.org/10.1093/jigpal/jzz051
  • Using the Spanish national identity card in social networks
    V Gayoso Martínez, L Hernández Encinas, A Martín Muñoz, R Durán Díaz
    Logic Journal of the IGPL, Volume 28, Issue 4, August 2020, Pages 519–530
    https://doi.org/10.1093/jigpal/jzz058
  • Sandbox for Minimal Viable Governance of Blockchain Services and DAOs: CLAUDIA
    Arribas I., Arroyo D., Reshef Kera D
    In: Prieto J., Pinto A., Das A., Ferretti S. (eds) Blockchain and Applications. BLOCKCHAIN 2020. Advances in Intelligent Systems and Computing, vol 1238. Springer, Cham
    https://doi.org/10.1007/978-3-030-52535-4_3
  • The Square-Zero Basis of Matrix Lie Algebras
    R. Durán Díaz, V. Gayoso Martínez, L. Hernández Encinas and J. Muñoz Masqué
    Mathematics, 8(6), 1032 (2020), 9 pp., Special Issue “Algebra and Its Applications” (Q1, Mathematics, F.I. 1.747)
    https://doi.org/10.3390/math8061032
  • Representations of Generalized Self-Shrunken Sequences
    S.D. Cardell, J.J. Climent, A. Fúster-Sabater, V. Requena
    Mathematics, vol. 8, issue 6, pp. 1006, June 2020
    https://doi.org/10.3390/math8061006
  • A Group Law on the Projective Plane with Applications in Public Key Cryptography
    Raúl Durán Díaz, Luis Hernández Encinas and Jaime Muñoz Masqué
    Mathematics, 8(5), 734 (2020), 20pp., Special Issue "Mathematics Cryptography and Information Security (Q1, Mathematics, F.I. 1.105)
    https://doi.org/10.3390/math8050734
  • An Improved Bytewise Approximate Matching Algorithm Suitable for Files of Dissimilar Sizes
    Víctor Gayoso Martínez, Fernando Hernández-Álvarez, Luis Hernández Encinas
    Mathematics 2020, 8(4), 503
    https://www.mdpi.com/2227-7390/8/4/503
  • En la encrucijada de la “blockchain”: posibilidades, expectativas y retos en la configuración de nuevos espacios de confianza digital
    David Arroyo Guardeño
    Novática, Nº241: Blockhain. Monografía.
    https://www.novatica.es/en-la-encrucijada-de-la-blockchain-posibilidades-expectativas-y-retos-en-la-configuracion-de-nuevos-espacios-de-confianza-digital/
  • A Virus Infected Your Laptop. Let’s Play an Escape Game
    Queiruga-Dios, A.; Santos Sánchez, M.J.; Queiruga Dios, M.; Gayoso Martínez, V.; Hernández Encinas, A.
    Mathematics 2020, 8, 166
    https://doi.org/10.3390/math8020166
  • Linear complexity of generalized sequences by comparison of PN-sequences
    Fúster-Sabater, A., Cardell, S.D.
    Revista de la Real Academia de Ciencias Exactas, Físicas y Naturales. Serie A-Matemáticas, vol. 114, pp. 79-97, April 2020
    https://doi.org/10.1007/s13398-020-00807-5
  • On the application of compression-based metrics to identifying anomalous behaviour in web traffic
    Gonzalo de la Torre-Abaitua, Luis F Lago-Fernández, David Arroyo
    Logic Journal of the IGPL, Volume 28, Issue 4, August 2020, Pages 546–557
    https://doi.org/10.1093/jigpal/jzz062
  • Analysis of the Cryptographic Tools for Blockchain and Bitcoin
    Víctor Gayoso Martínez, Luis Hernández-Álvarez and Luis Hernández Encinas
    Mathematics 2020, 8(1), 131; 11 pp.
    https://doi.org/10.3390/math8010131
  • Mathematics Cryptography and Information Security
    Luis Hernández Encinas, Víctor Gayoso Martínez. Editores del Special Issue “Mathematics Cryptography and Information Security"
    “Mathematics (Basel)”. MDPI Editorial, Suiza, del 26 de febrero al 31 de diciembre de 2020
    ISSN 2227-7390

2019

  • Structure of Gauge-Invariant Lagrangians
    Castrillón López, M., Muñoz Masqué, J. & Rosado María, E.
    Mediterranean Journal of Mathematics, 2019, 17.
    https://doi.org/10.1007/s00009-019-1454-3
  • Randomness Analysis for the Generalized Self- Shrinking Sequences
    Cardell, S.D.; Requena, V.; Fúster-Sabater, A.; Orúe, A.B.
    Symmetry 2019, 11, 1460
    https://doi.org/10.3390/sym11121460
  • Strong preservers of symmetric arctic rank of nonnegative real matrices
    Beasley, L.B., Encinas, L.H., Song, S.-Z.
    Journal of the Korean Mathematical SocietyVolume 56, Issue 6, 2019, Pages 1503-1514
    http://dx.doi.org/10.4134/JKMS.j180771
  • Double-Loop Wavefront Tilt Correction for Free- Space Quantum Key Distribution
    A. Ocampos-Guillén, J. Gómez-García, N. Denisenko and V. Fernandez
    IEEE Access, vol. 7, pp. 114033-114041, 2019
    https://doi.org/10.1109/ACCESS.2019.2933694
  • Non-quantum Cryptanalysis of the Noisy Version of Aaronson-Christiano’s Quantum Money Scheme
    M. Conde Pena, R. Durán Díaz, J.-C. Faugère, L. Hernández Encinas, and L. Perret
    IET Inf. Secur., 13: 362-366
    http://dx.doi.org/10.1049/iet-ifs.2018.5307
  • Non-quantum cryptanalysis of the noisy version of Aaronson–Christiano's quantum money scheme
    Marta Conde Pena; Raul Durán Díaz; Jean-Charles Faugère; Luis Hernández Encinas; Ludovic Perret
    IET Information Security (Volume: 13 , Issue: 4 , 7 2019) Page(s): 362 - 366
    http://dx.doi.org/10.1049/iet-ifs.2018.5307
  • Binomial Characterization of Cryptographic Sequence
    Sara D. Cardell, Amparo Fúster-Sabater
    Computational Science and Its Applications – ICCSA 2019, pp. 803- 816. Part of the Lecture Notes in Computer Science book series (LNCS, volume 11619), Springer International Publishing
    https://doi.org/10.1007/978-3-030-24289-3_59
  • Robust dynamical invariants in sequential neural activity
    Elices I., Levi R., Arroyo D., Rodriguez F.B., Varona P.
    Scientific Reports, vol. 9, Issue 1, 1 December 2019, Article number 9048
    http://dx.doi.org/10.1038/s41598-019-44953-2
  • Linearization of Cryptographic Sequences
    Sara D. Cardell, Amparo Fúster-Sabater
    Martínez Álvarez F., Troncoso Lora A., Sáez Muñoz J., Quintián H., Corchado E. (eds) International Joint Conference: 12th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2019) and 10th International Confer
    https://doi.org/10.1007/978-3-030-20005-3_17http://dx.doi.org/
  • Comparing low and medium cost computer-based technologies suitable for cryptographic attacks
    V. Gayoso Martínez, L. Hernández Encinas, A. Martín Muñoz, O. Martínez-Graullera
    Logic Journal of the IGPL, pp. 177-188, vol. 27 (2)
    http://dx.doi.org/10.1093/jigpal/jzy031
  • Secure elliptic curves and their performance
    Gayoso Martínez V., Hernández Encinas L., Martín Muñoz A., Durán Diáz R.
    Logic Journal of the IGPLVolume 27, Issue 2, 25 March 2019, Pages 227-238
    https://doi.org/10.1093/jigpal/jzy035
  • Binomial Representation of Cryptographic Binary Sequences and Its Relation to Cellular Automata
    Sara D. Cardell, Amparo Fúster-Sabater
    Complexity, 2019, 2108014
    https://doi.org/10.1155/2019/2108014
  • A Modular and Optimized Toolbox for Side-Channel Analysis
    Alberto Fuentes Rodríguez, Luis Hernández Encinas, Agustín Martín Muñoz, Bernardo Alarcos Alcázar
    IEEE Access, vol. 7 pp. 21889-21903
    http://dx.doi.org/10.1109/ACCESS.2019.2897938
  • Optimising the interconnection of free-space to fibre quantum networks
    Alejandro Ocampos-Guillén, Natalia Denisenko and Verónica Fernández-Mármol
    EPJ Web Conf. Volume 198, 2019. Quantum Technology International Conference 2018 (QTech 2018)
    https://doi.org/10.1051/epjconf/201919800007
  • Blockchain
    David Arroyo Guardeño, Jesús Díaz Vico y Luis Hernández Encinas
    Ed. CSIC, Los libros de la Catarata
    https://editorial.csic.es/publicaciones/libros/13181/0/blockchain.html

2018

  • Secure elliptic curves and their performance
    V. Gayoso Martínez, L. Hernández Encinas, A. Martín Muñoz, R. Durán Díaz
    Logic Journal of the IGPL, jzy035, 17 September 2018
    http://dx.doi.org/10.1093/jigpal/jzy035
  • Computing the linear complexity in a class of cryptographic sequences
    Amparo Fúster-Sabater; Sara Díaz Cardell
    Lecture Notes in Computer Science, vol. 10960, pp. 110-122, n.º 1, Springer Verlag
    http://dx.doi.org/10.1007/978-3-319-95162-1_8
  • Linearity in decimation-based generators: an improved cryptanalysis on the shrinking generator
    Sara Díaz Cardell; Amparo Fúster-Sabater; Adrián Ranea
    Open Mathematics, vol. 16, pp. 646-655, n.º 1
    http://dx.doi.org/10.1515/math-2018-0058
  • The t-modified self-shrinking generator
    Sara D. Cardell and Amparo Fúster-Sabater
    Lecture Notes in Computer Science, vol 10860. Springer, Cham.
    http://dx.doi.org/10.1007/978-3-319-93698-7_50
  • An Intra-Slice Security Solution for Emerging 5G Networks Based on Pseudo-Random Number Generators
    Borja Bordel, Amalia B. Orúe, Ramón Alcarria, Diego Sánchez-de-Rivera
    IEEE Access, Volume: PP, Issue: 99
    https://ieeexplore.ieee.org/document/8315003/
  • Bifurcation diagram of a map with multiple critical points
    M. Romera, G. Pastor, M. F, Danca, A. Martín, A. B. Orue, F. Montoya, L. Hernández Encinas E. Tundrea
    International Journal of Bifurcation and Chaos, 28, 5, 1850065 (2018) [17 pages]
    https://doi.org/10.1142/S0218127418500657
  • Numerical schemes for general Klein—Gordon equations with Dirichlet and nonlocal boundary conditions
    Martín-Vaquero, J.; Encinas, A.H.; Queiruga- Dios, A.; Gayoso-Martínez, V.; del Rey, Á.M.
    Nonlinear Analysis: Modelling and Control, vol. 23, pp. 50-62, n.º 1, Institute of Mathematics and Informatics.
    http://dx.doi.org/10.15388/NA.2018.1.5
  • A new look at the classification of the tri-covectors of a 6-dimensional symplectic space
    J. Muñoz Masqué, L. M. Pozo Coronado
    Linear and Multilinear Algebra Volume 67, 2019 - Issue 5
    https://doi.org/10.1080/03081087.2018.1440517
  • Recovering decimation-based cryptographic sequences by means of linear CAs
    Sara D. Cardell, Amparo Fúster-Sabater
    CoRRabs/1802.02206, 2018, http://arxiv.org/abs/1802.02206
    https://arxiv.org/abs/1802.02206
  • Correction of Wavefront Tilt Caused by Atmospheric Turbulence Using Quadrant Detectors for Enabling Fast Free-Space Quantum Communications in Daylight
    Veronica Fernandez, Jorge Gómez-García, Alejandro Ocampos-Guillén and Alberto Carrasco-Casado
    IEEE Access, vol. 6, pp. 3336-3345
    http://dx.doi.org/10.1109/ACCESS.2018.2791099
  • Boolean differential operators
    L. Hernández Encinas and A. Martín del Rey
    Turkish Journal of Mathematics 42 57–68
    http://dx.doi.org/10.3906/mat-1607-22
  • Computer and Network Security Essentials
    Editors: K. Daimi, G. Francia, L. Ertaul, L. Hernández Encinas, and E. El-Sheikh
    Springer International Publishing, The Netherlands, 618 pp.
    http://doi.org/10.1007/978-3-319-58424-9
  • Criptografía con Curvas Elípticas
    V. Gayoso Martínez, L. Hernández Encinas y A. Martín Muñoz
    CSIC, Biblioteca de Ciencias nº 44, 261 pp.
    ISBN: 978-84-00-10432-0 (papel), 978-84-00-10433-7 (electrónico)
  • Review of the Main Security Treats and Challenges in Free-Access Public Cloud Storage Servers
    A. Sánchez-Gómez, J. Diaz, L. Hernández Encinas, and D. Arroyo
    Chapter 15 of the book “Computer and Network Security Essentials”, Springer International Publishing, The Netherlands, 2018
    https://doi.org/10.1007/978-3-319-58424-9_15
  • Security Protocols for Network and Internet: A Global Vision
    J.M. de Fuentes, L. Hernández Encinas, and A. Ribagorda
    Chapter 8 of the book “Computer and Network Security Essentials”, Springer International Publishing, The Netherlands, 2018, 135–151
    https://doi.org/10.1007/978-3-319-58424-9_8

2017

  • A Lightweight Pseudorandom Number Generator for Securing the Internet of Things
    A. Orúe López; L. Hernández Encinas; A. Martín Muñoz; F. Montoya Vitini
    IEEE Access, vol. 5 pp. 27800-27806. IEEE. ISSN 2169-3536
    http://dx.doi.org/10.1109/ACCESS.2017.2774105
  • A study on the performance of secure elliptic curves for cryptographic purposes
    R. Durán Díaz, V. Gayoso Martínez, L. Hernández Encinas, and A. Martín Muñoz
    International Joint Conference SOCO'16-CISIS'16-ICEUTE'16 - Advances in Intelligent Systems and Computing 527, 658-667 San Sebastián (Spain), october 19-21, 2016
    http://dx.doi.org/10.1007/978-3-319-47364-2_64
  • A characterization of non-prime powers
    Raúl Durán Díaz; Luis Hernández Encinas; Agustín Martín Muñoz; Jaime Muñoz Masqué; Seok-Zun SONG
    Turkish Journal of Mathematics, vol.41, pp.1248-1259, 5
    http://dx.doi.org/10.3906/mat-1603-143
  • Discrete linear models for the generalized selfshrunken sequences
    D. Cardell, S.; Fúster-Sabater, A
    Finite Fields and their Applications, vol. 47, pp. 222-241, Academic Press
    http://dx.doi.org/10.1016/j.ffa.2017.06.010
  • Study of the stability of a SEIRS model for computer worm propagation
    A. Martin del Rey, J.D. Hernández Guillén; Luis Hernández Encinas
    Physica A - Nonlinear Analysis, 479, 411-421
    http://dx.doi.org/10.1016/j.physa.2017.03.023
  • Second-order Lagrangians admitting a first-order Hamiltonian formalism
    Rosado María, E.; Muñoz Masqué, J
    Annali di Matematica Pura ed Applicata, Series 2, vol. 197, pp. 357-397, n.º 2, Nicola Zanichelli
    http://dx.doi.org/10.1007/s10231-017-0683-y
  • Linear Models for High-Complexity Sequences
    Sara D. Cardell; Amparo Fúster-Sabater
    Lecture Notes in Computer Science, vol.10404, pp. 314- 324, 1, Springer Verlag
    http://dx.doi.org/10.1007/978-3-319-62392-4_23
  • A comparative study of three Spanish eGoverment smart cards
    V. Gayoso Martínez, L. Hernández Encinas, A. Martín Muñoz, M.A. Álvarez Mariño, and D. Arroyo Guardeño
    Logic Journal of the IGPL, 25, 1 (2017), 42-53
    http://dx.doi.org/10.1093/jigpal/jzw038
  • A Framework for Acquiring and Analyzing Traces from Cryptographic Devices
    A. Blanco Blanco, J.M. de Fuentes, L. González-Manzano, L. Hernández Encinas, A. Martín Muñoz, J.L. Rodrigo Oliva, and J.I. Sánchez García
    13th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2017), Niagara Falls (Canada), October 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 239,
    https://doi.org/10.1007/978-3-319-78816-6_20
  • Breaking a Hitag2 Protocol with Low Cost Technology
    V. Gayoso Martínez, L. Hernández Encinas, A. Martín Muñoz and J. Zhang
    3rd International Conference on Information Systems Security and Privacy (ICISSP'2017). Proceedings 579-584, P.Mori, S. Furnell and O. Camp (Ed.), Porto (Portugal), February 19-21, 2017
    http://dx.doi.org/10.5220/0006271905790584

2016

  • Case study: Malware propagation models for undergraduate engineering students
    A. Queiruga-Dios, G. Rodríguez Sánchez, A. Hernández Encinas, A. Martín del Rey, J. Martín Vaquero, and L. Hernández Encinas
    Fourth International Conference on Technological Ecosystems for Enhancing Multiculturality (TEEM'16) Proceedings 931-936, F.J. García-Peñalvo (Ed.), ISBN: 978-1-4503-4747-1
    https://doi.org/10.1145/3012430.3012628
  • Generación de primos demostrables: implementación y resultados
    R. Durán Díaz, V. Gayoso Martinez y L. Hernández Encinas
    XIV Reunión Española de Criptología y Seguridad de la Información (RECSI 2016) Actas 58-63, P.L. Ferrer Gomila y M.F. Hinarejos Campos (Eds.), Mahón, octubre 26-28, 2016
    ISBN: 978-84-608-9470-4
  • Herramientas visuales usadas en criptografía caótica útiles para el análisis de secuencias pseudoaleatorias
    A.B. Orúe, A. Fúster, V. Fernández, F. Montoya, L. Hernández y A. Martín
    XIV Reunión Española de Criptología y Seguridad de la Información (RECSI 2016) Actas 180-185, P.L. Ferrer Gomila y M.F. Hinarejos Campos (Eds.), Mahón, octubre 26-28, 2016
    ISBN: 978-84-608-9470-4
  • Malware Propagation Models in Wireless Sensor Networks: A Review
    A. Queiruga-Dios, A. Hernández Encinas, J. Martín-Vaquero, and L. Hernández Encinas
    International Workshop on Computational Intelligence in Security for Information Systems (CISIS'16) International Joint Conference SOCO'16-CISIS'16-ICEUTE'16, Advances in Intelligent Systems and Computing 527, 648-657 San Sebastián (Spain)
    https://doi.org/10.1007/978-3-319-47364-2_63
  • PAgIoT – Privacy-preserving Aggregation protocol for Internet of Things
    L. González-Manzano, José M. de Fuentes, Sergio Pastrana, Pedro Peris-Lopez, Luis Hernández-Encinas
    Journal of Network and Computer Applications, Volume 71, August 2016, Pages 59–71
    http://dx.doi.org/10.1016/j.jnca.2016.06.001
  • Análisis de los métodos de generación de curvas elípticas seguras
    V. Gayoso Martínez, L. Hernández Encinas, A. Martín del Rey and R. Durán Díaz
    Segundas Jornadas Nacionales de Investigación en Ciberseguridad (JNIC) Actas 87-93, Granada, junio 15-17, 2016
    ISBN: 978-84-608-8070-7
  • Propuesta de mejora de un modelo SEIRS para la simulación de la propagación de malware
    J.D. Hernández Guillén, A. Martín del Rey and L. Hernández Encinas
    Segundas Jornadas Nacionales de Investigación en Ciberseguridad (JNIC) Actas 136-143, Granada, junio 15-17, 2016
    ISBN: 978-84-608-8070-7
  • Claves para la gestión de la seguridad integral
    Luis Hernández Encinas, Javier Espinosa García
    Seguritecnia 432, pp. 50-52
    http://www.seguritecnia.es/revistas/seg/432/index.html#52/z
  • Implementation of Cryptographic Algorithms for Elliptic Curves
    V. Gayoso Martínez, L. Hernández Encinas, and A. Martín Muñoz
    Chapter of the book: Geometry, Algebra and Applications: From Mechanics to Cryptography Springer International Publishing Switzerland, 2016, 121--133, ISBN: 978-3-319-32084-7
    http://dx.doi.org/10.1007/978-3-319-32085-4_11
  • Special Primes: Properties and Applications
    R. Durán Díaz and L. Hernández Encinas
    Chapter of the book: Geometry, Algebra and Applications: From Mechanics to Cryptography, Springer International Publishing Switzerland, 2016, 79-90, ISBN: 978-3-319-32084-7
    http://dx.doi.org/10.1007/978-3-319-32085-4_7
  • A comparison of computer-based technologies for cryptographic attacks
    V. Gayoso Martínez, L. Hernández Encinas, A. Martín Muñoz, O. Martínez-Graullera, and J. Villazón-Terrazas
    International Workshop on Computational Intelligence in Security for Information Systems (CISIS'16) International Joint Conference SOCO'16-CISIS'16-ICEUTE'16, Advances in Intelligent Systems and Computing 527, 622-630 San Sebastián (Spain)
    ISBN: 978-3-319-47363-5
  • Blockchain: Usos y Abusos
    O. Delgado, D. Arroyo, J. Díaz y L. Hernández
    X Jornadas de Seguridad TIC del CCN-CERT Centro Criptológico Nacional, Centro Nacional de Inteligencia Madrid, diciembre 13-14, 2016
  • Geometry, Algebra and Applications: From Mechanics to Cryptography
    M. Castrillón López, L. Hernández Encinas, P. Martínez Gadea, and M.E. Rosado María (Editors)
    Springer International Publishing Switzerland, 2016, 181-187, ISBN: 978-3-319-32084-7 (Print) 978-3-319-32085-4 (Online)
    http://dx.doi.org/10.1007/978-3-319-32085-4
  • La criptografía
    Luis Hernández Encinas
    Consejo Superior de Ivestigaciones Científicas. Colección ¿Qué sabemos de?
    ISBN: 978-84-00-10045-2
  • Una visión de la Seguridad Integral para una Formación Global en Seguridad
    Luis Hernández Encinas y Javier Espinosa García
    Gestión digital. España y América Latina
    Acceso al artículo

2015

  • Design and optimization of the input modules of a DPA toolbox
    A. Fuentes Rodríguez, L. Hernández Encinas, A. Martín Muñoz, and B. Alarcos Alcázar
    Logic Jnl IGPL first published online: December 9, 2015
    http://dx.doi.org/10.1093/jigpal/jzv041
  • Performance of the Cryptanalysis over the Shrinking Generator
    S. D. Cardell, and A. Fúster-Sabater
    Advances in Intelligent Systems and Computing 369 (2015), 111-121
    http://dx.doi.org/10.1007/978-3-319-19713-5_10
  • Linealización del generador auto-shrinking a través de autómatas celulares
    S. D. Cardell, and A. Fúster-Sabater
    Libro de Resúmenes de Conferencias y Pósteres del Congreso Bienal de la Real Sociedad Matemática Española RSME 2015. Sesión S16: Matemáticas de la teoría de la Información, 107-108, Granada, 2-6 Febrero
  • Cryptanalysis of two combinatorial public key cryptosystems
    R. Durán Díaz, L. Hernández Encinas, J. Muñoz Masqué
    Logic Journal of the IGPL, Volume 23, Issue 1, pp. 4-16
    http://dx.doi.org/10.1093/jigpal/jzu036
  • Cryptanalysing the shrinking generator
    S. D. Cardell, and A. Fúster-Sabater
    Procedia Computer Science, Volume 51, Issue 1, pp. 2893-2897
    http://dx.doi.org/10.1016/j.procs.2015.05.454
  • Revision of J3Gen and Validity of the Attacks by Peinado et al.
    A. Peinado, J. Munilla, and A. Fúster-Sabater
    Sensors, Volume 15, Issue 5, pp. 11988-11992
    http://dx.doi.org/10.3390/s150511988
  • Software Implementation of Cryptographic Sequence Generators over Extended Fields
    O. Delgado, and A. Fúster-Sabater
    Logic Journal of the IGPL, Volume 23, Issue 1, pp. 73-87
    http://dx.doi.org/10.1093/jigpal/jzu039

2014

  • Aplicación de los transductores ultrasónicos de placa en procesos de aglomeración de partículas en el marco del proyecto europeo PASSAM
    Enrique Riera, J.A. Gallego-Juárez, Luís Herranz, Germán Rodríguez, Víctor M. Acosta, Alfonso Blanco, Alberto Pinto, Ignacio Martínez, Roque R. Andrés
    Conferencia invitada. Tecniacustica, 29-31 Oct. 2014, Murcia. Publicación oficial del Congreso, 1396-1405. ISBN: 978-84-87985-25-6.
    https://doi.org/10.13140/2.1.1321.1847
  • Aplicación de transductores ultrasónicos de placa para la mejora de procesos de transferencia de materia en alimentos
    Enrique Riera, Víctor M. Acosta, Alfonso Blanco, Alberto Pinto, Roque R. Andrés, Miguel Blasco
    Conferencia invitada. Tecniacustica, 29-31 Oct. 2014, Murcia Publicación oficial del Congreso, 1386-1395. ISBN: 978-84-87985-25-6.
    http://dx.doi.org/10.13140/2.1.4204.7686
  • Linear Solutions for Irregularly Decimated Generators of Cryptographic Sequences
    A. Fúster-Sabater
    International Journal of Nonlinear Sciences and Numerical Simulation, vol. 15, no. 6, pp. 377-385
    http://dx.doi.org/10.1515/ijnsns-2013-0121 (Impact Factor: 0.453)
  • New trends in air coupled power ultrasound applications
    E. Riera, V.M. Acosta, A. Blanco, J.A. Gallego-Juárez, A. Cardoni
    Conferencia invitada. Proceedings Forum Acusticum, 7-12 Sept. 2014. Cracovia, Polonia. EAA, SS19-2. ISSN: 2221-3767
  • Correction of beam wander for a free-space quantum key distribution system operating in urban environment
    Alberto Carrasco-Casado, Natalia Denisenko, Veronica Fernandez
    Opt. Eng. 53(8), 084112 (Aug 22, 2014)
    http://dx.doi.org/10.1117/1.OE.53.8.084112
  • EPCGen2 Pseudorandom Number Generators: Analysis of J3Gen
    A. Peinado, J. Munilla, A. Fúster-Sabater
    Sensors, vol. 14, no. 4, pp. 6500-6515
    http://dx.doi.org/10.3390/s140406500 (Impact Factor: 2.048)
  • Generation of Cryptographic Sequences by means of Difference Equations
    A. Fúster-Sabater
    Applied Mathematics & Information Sciences, vol. 8, no. 2, pp. 475-484
    http://dx.doi.org/ 10.12785/amis/080204 (Impact Factor: 1.232)
  • A learning resource to acquire engineering skills through programming languages
    A. Queiruga-Dios, A. Hernández Encinas, I. Visus Ruíz, L. Hernández Encinas, V. Gayoso Martínez, and E. Yuste Martínez
    Procedia-Social and Behavioral Sciences 116 (2014), 831–835
    http://dx.doi.org/10.1016/j.sbspro.2014.01.387
  • A new approach for obtaining the bachelor’s degree by technology professionals
    V. Gayoso Martínez, L. Hernández Encinas, J. Martín Vaquero, A. Queiruga Dios, J. Pueyo Candil
    Procedia-Social and Behavioral Sciences 116 (2014), 1305–1308
    http://dx.doi.org/10.1016/j.sbspro.2014.01.306
  • A toolbox for DPA attacks to smart cards
    A. Fuentes Rodríguez, L. Hernández Encinas, A. Martín Muñoz, and B. Alarcos Alcázar
    Advances in Intelligent Systems and Computing 239 (2014), 399-408
    http://dx.doi.org/10.1007/978-3-319-01854-6_41
  • Disclosure of sensitive information in the virtual learning environment Moodle
    V. Gayoso Martínez, L. Hernández Encinas, A. Hernández Encinas, and A. Queiruga Dios
    Advances in Intelligent Systems and Computing 239 (2014), 517-526
    http://dx.doi.org/10.1007/978-3-319-01854-6_53
  • The isomorphism of polynomials problem applied to multivariate quadratic cryptography
    M. Conde Pena, R. Durán Díaz, L. Hernández Encinas, and J. Muñoz Masqué
    Advances in Intelligent Systems and Computing 239 (2014), 567-576
    http://dx.doi.org/10.1007/978-3-319-01854-6_58

2009

  • Cómo protegernos de los peligros de Internet
    Gonzalo Álvarez Marañón
    Colección ¿Qué sabemos de...?
  • About the FrodoKEM lattice-based algorithm
    M. A. González de la Torre, L. Hernández Encinas and A. Queiruga Dios
    Proc. VII Jornadas Nacionales de Investigación en Ciberseguridad (JNIC'2022), 253-256, J. M. de Fuentes, L. González, J. C. Sancho, A. Ayerbe and M. L. Escalante (Eds.), Bilbao, June 27-29, 2022
    ISBN: 978-84-88734-13-6
  • Effects of experimental impairments on the security of continuous-variable quantum key distribution
    Andres Ruiz-Chamorro, Daniel Cano, Aida Garcia-Callejo, Veronica Fernandez
    Heliyon, Volume 9, Issue 6, 2023, e16670
    https://doi.org/10.1016/j.heliyon.2023.e16670

Investigador responsable

  • Fernández Mármol, Verónica

Investigadores

  • Fúster Sabater, Amparo
  • Hernández Álvarez, Luis
  • Hernández Encinas, Luis
  • López García, Pedro
  • Martín Muñoz, Agustín

Técnicos

  • Blanco Blanco, Alfonso
  • Cano Reol, Daniel
  • Negrillo Espigares, Jesús Antonio
  • Sánchez García, José Ignacio

Contratados

  • Arteaga Díaz, Pablo
  • Balado Souto, Daniel
  • Calleja Vázquez, Adrián
  • Díaz García, Inés Meili
  • García Callejo, Aida
  • González de la Torre, Miguel Ángel
  • Llanos Velasco, Adrián
  • Maza Muñoz, Jesús
  • Ruiz Chamorro, Andrés
  • Sarasa Laborda, Sebastián Ventura

En prácticas

  • Rojas Rodríguez, Diego

 


Proyectos


Publicaciones


Reuniones y congresos científicos


Divulgación

Departamento de Acústica y Evaluación No Destructiva (DAEND)
  • GAA: Grupo de Acústica ambiental
  • G CARMA: Grupo de Caracterización de materiales mediante evaluación no destructiva
  • ULAB: Ultrasonidos para el análisis de líquidos y bioingeniería
Departamento de Tecnologías de la Información y Las Comunicaciones (DTIC)
  • GiCP: Grupo de investigación en Ciberseguridad y Protección de la Privacidad
  • GICSI: Grupo de investigación en Criptología y Seguridad de la Información
    • LCQE: Laboratorio de Comunicaciones Cuánticas
  • PSUM: Grupo de Procesamiento de Señal en sistemas Ultrasónicos Multicanal
Departamento de Sensores y Sistemas Ultrasónicos (DSSU)
  • GSTU: Grupo de Sistemas y tecnologías ultrasónicas
  • NoySI: Grupo de Nanosensores y Sistemas Inteligentes
  • RESULT: Resonadores ultrasónicos para cavitación y micromanipulación
  • SENSAVAN: Grupo de Tecnología de Sensores Avanzados
  • QE: Electrónica Cuántica
Laboratorios
  • Laboratorio de Acústica
  • Laboratorio de Metrología Ultrasónica Médica (LMUM)
  • Laboratorio de Comunicaciones Cuánticas
  • Laboratory for International Collaboration in Advanced Biophotonics Imaging

Instituto de Tecnologías Físicas y de la Información Leonardo Torres Quevedo  - ITEFI
C/ Serrano, 144. 28006 - Madrid • Tel.: (+34) 91 561 88 06  Contacto  •  Intranet
EDIFICIO PARCIALMENTE ACCESIBLE POR PERSONAS CON MOVILIDAD REDUCIDA