Este proyecto pretende fortalecer las capacidades de prevención, detección y respuesta a los ciberataques. Para ello, el programa científico multidisciplinar propuesto en el proyecto abord–a tres retos importantes en ciberseguridad. Por un lado, la adopción de modelos de compartición de información sobre vulnerabilidades, amenazas, etc. Por otro, adaptar, y desarrollar en su caso, tecnologías de Big Data que faciliten el análisis de volúmenes ingentes de datos. Por último, el desarrollo de técnicas automatizadas que contextualicen la información disponible, deriven dinámicamente los niveles de riesgo de todos los componentes del sistema, y apoyen la toma de decisiones sobre la selección de contramedidas óptimas.
Publicaciones
Cryptanalysing the shrinking generatorS. D. Cardell, and A. Fúster-SabaterProcedia Computer Science, Volume 51, Issue 1, pp. 2893-2897http://dx.doi.org/10.1016/j.procs.2015.05.454 | GiCSI |
Performance of the Cryptanalysis over the Shrinking GeneratorS. D. Cardell, and A. Fúster-SabaterAdvances in Intelligent Systems and Computing 369 (2015), 111-121http://dx.doi.org/10.1007/978-3-319-19713-5_10 | GiCSI |
Design and optimization of the input modules of a DPA toolbox A. Fuentes Rodríguez, L. Hernández Encinas, A. Martín Muñoz, and B. Alarcos Alcázar Logic Jnl IGPL first published online: December 9, 2015 http://dx.doi.org/10.1093/jigpal/jzv041 | GiCSI |
PAgIoT – Privacy-preserving Aggregation protocol for Internet of ThingsL. González-Manzano, José M. de Fuentes, Sergio Pastrana, Pedro Peris-Lopez, Luis Hernández-EncinasJournal of Network and Computer Applications, Volume 71, August 2016, Pages 59–71http://dx.doi.org/10.1016/j.jnca.2016.06.001 | GiCSI |
Special Primes: Properties and ApplicationsR. Durán Díaz and L. Hernández EncinasChapter of the book: Geometry, Algebra and Applications: From Mechanics to Cryptography, Springer International Publishing Switzerland, 2016, 79-90, ISBN: 978-3-319-32084-7http://dx.doi.org/10.1007/978-3-319-32085-4_7 | GiCSI |
A comparison of computer-based technologies for cryptographic attacksV. Gayoso Martínez, L. Hernández Encinas, A. Martín Muñoz, O. Martínez-Graullera, and J. Villazón-TerrazasInternational Workshop on Computational Intelligence in Security for Information Systems (CISIS'16) International Joint Conference SOCO'16-CISIS'16-ICEUTE'16, Advances in Intelligent Systems and Computing 527, 622-630 San Sebastián (Spain)ISBN: 978-3-319-47363-5 | GiCSI PSUM |
Generación de primos demostrables: implementación y resultadosR. Durán Díaz, V. Gayoso Martinez y L. Hernández EncinasXIV Reunión Española de Criptología y Seguridad de la Información (RECSI 2016) Actas 58-63, P.L. Ferrer Gomila y M.F. Hinarejos Campos (Eds.), Mahón, octubre 26-28, 2016ISBN: 978-84-608-9470-4 | GiCSI |
Herramientas visuales usadas en criptografía caótica útiles para el análisis de secuencias pseudoaleatoriasA.B. Orúe, A. Fúster, V. Fernández, F. Montoya, L. Hernández y A. MartínXIV Reunión Española de Criptología y Seguridad de la Información (RECSI 2016) Actas 180-185, P.L. Ferrer Gomila y M.F. Hinarejos Campos (Eds.), Mahón, octubre 26-28, 2016ISBN: 978-84-608-9470-4 | GiCSI |
Análisis de los métodos de generación de curvas elípticas segurasV. Gayoso Martínez, L. Hernández Encinas, A. Martín del Rey and R. Durán DíazSegundas Jornadas Nacionales de Investigación en Ciberseguridad (JNIC) Actas 87-93, Granada, junio 15-17, 2016ISBN: 978-84-608-8070-7 | GiCSI |
Breaking a Hitag2 Protocol with Low Cost TechnologyV. Gayoso Martínez, L. Hernández Encinas, A. Martín Muñoz and J. Zhang3rd International Conference on Information Systems Security and Privacy (ICISSP'2017). Proceedings 579-584, P.Mori, S. Furnell and O. Camp (Ed.), Porto (Portugal), February 19-21, 2017 http://dx.doi.org/10.5220/0006271905790584 | GiCSI |
A study on the performance of secure elliptic curves for cryptographic purposesR. Durán Díaz, V. Gayoso Martínez, L. Hernández Encinas, and A. Martín MuñozInternational Joint Conference SOCO'16-CISIS'16-ICEUTE'16 - Advances in Intelligent Systems and Computing 527, 658-667 San Sebastián (Spain), october 19-21, 2016http://dx.doi.org/10.1007/978-3-319-47364-2_64 | GiCSI |
A characterization of non-prime powersRaúl Durán Díaz; Luis Hernández Encinas; Agustín Martín Muñoz; Jaime Muñoz Masqué; Seok-Zun SONGTurkish Journal of Mathematics, vol.41, pp.1248-1259, 5http://dx.doi.org/10.3906/mat-1603-143 | GiCSI |
A Lightweight Pseudorandom Number Generator for Securing the Internet of ThingsA. Orúe López; L. Hernández Encinas; A. Martín Muñoz; F. Montoya VitiniIEEE Access, vol. 5 pp. 27800-27806. IEEE. ISSN 2169-3536http://dx.doi.org/10.1109/ACCESS.2017.2774105 | GiCSI |
A Framework for Acquiring and Analyzing Traces from Cryptographic DevicesA. Blanco Blanco, J.M. de Fuentes, L. González-Manzano, L. Hernández Encinas, A. Martín Muñoz, J.L. Rodrigo Oliva, and J.I. Sánchez García13th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2017), Niagara Falls (Canada), October 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 239, https://doi.org/10.1007/978-3-319-78816-6_20 | GiCSI |
Discrete linear models for the generalized selfshrunken sequencesD. Cardell, S.; Fúster-Sabater, AFinite Fields and their Applications, vol. 47, pp. 222-241, Academic Presshttp://dx.doi.org/10.1016/j.ffa.2017.06.010 | GiCSI |
Linear Models for High-Complexity SequencesSara D. Cardell; Amparo Fúster-SabaterLecture Notes in Computer Science, vol.10404, pp. 314- 324, 1, Springer Verlaghttp://dx.doi.org/10.1007/978-3-319-62392-4_23 | GiCSI |
Security Protocols for Network and Internet: A Global VisionJ.M. de Fuentes, L. Hernández Encinas, and A. RibagordaChapter 8 of the book “Computer and Network Security Essentials”, Springer International Publishing, The Netherlands, 2018, 135–151https://doi.org/10.1007/978-3-319-58424-9_8 | GiCSI |
Review of the Main Security Treats and Challenges in Free-Access Public Cloud Storage ServersA. Sánchez-Gómez, J. Diaz, L. Hernández Encinas, and D. ArroyoChapter 15 of the book “Computer and Network Security Essentials”, Springer International Publishing, The Netherlands, 2018https://doi.org/10.1007/978-3-319-58424-9_15 | GiCSI |
Computing the linear complexity in a class of cryptographic sequencesAmparo Fúster-Sabater; Sara Díaz CardellLecture Notes in Computer Science, vol. 10960, pp. 110-122, n.º 1, Springer Verlaghttp://dx.doi.org/10.1007/978-3-319-95162-1_8 | GiCSI |
Recovering decimation-based cryptographic sequences by means of linear CAsSara D. Cardell, Amparo Fúster-SabaterCoRRabs/1802.02206, 2018, http://arxiv.org/abs/1802.02206https://arxiv.org/abs/1802.02206 | GiCSI |
Linearity in decimation-based generators: an improved cryptanalysis on the shrinking generatorSara Díaz Cardell; Amparo Fúster-Sabater; Adrián RaneaOpen Mathematics, vol. 16, pp. 646-655, n.º 1http://dx.doi.org/10.1515/math-2018-0058 | GiCSI |
Secure elliptic curves and their performanceV. Gayoso Martínez, L. Hernández Encinas, A. Martín Muñoz, R. Durán DíazLogic Journal of the IGPL, jzy035, 17 September 2018http://dx.doi.org/10.1093/jigpal/jzy035 | GiCSI |
The t-modified self-shrinking generatorSara D. Cardell and Amparo Fúster-SabaterLecture Notes in Computer Science, vol 10860. Springer, Cham.http://dx.doi.org/10.1007/978-3-319-93698-7_50 | GiCSI |
Non-quantum cryptanalysis of the noisy version of Aaronson–Christiano's quantum money scheme Marta Conde Pena; Raul Durán Díaz; Jean-Charles Faugère; Luis Hernández Encinas; Ludovic Perret IET Information Security (Volume: 13 , Issue: 4 , 7 2019) Page(s): 362 - 366 http://dx.doi.org/10.1049/iet-ifs.2018.5307 | GiCSI |
Non-quantum Cryptanalysis of the Noisy Version of Aaronson-Christiano’s Quantum Money SchemeM. Conde Pena, R. Durán Díaz, J.-C. Faugère, L. Hernández Encinas, and L. PerretIET Inf. Secur., 13: 362-366http://dx.doi.org/10.1049/iet-ifs.2018.5307 | GiCSI |
A Modular and Optimized Toolbox for Side-Channel AnalysisAlberto Fuentes Rodríguez, Luis Hernández Encinas, Agustín Martín Muñoz, Bernardo Alarcos Alcázar IEEE Access, vol. 7 pp. 21889-21903http://dx.doi.org/10.1109/ACCESS.2019.2897938 | GiCSI |
A Methodology for Retrofitting Privacy and Its Application to e-Shopping TransactionsJesus Diaz, Seung Geol Choi, David Arroyo, Angelos D. Keromytis, Francisco B. Rodriguez and Moti YungAdvances in Cyber Security: Principles, Techniques, and Applications. Springer, 2019, pp. 143-183.https://doi.org/10.1007/978-981-13-1483-4_7 |
Achieving cybersecurity in blockchain-based systems: A surveyMar Gimenez-Aguilar, Jose Maria de Fuentes, Lorena Gonzalez-Manzano, David ArroyoFuture Generation Computer Systems, Volume 124, 2021, Pages 91-118https://doi.org/10.1016/j.future.2021.05.007 | GiCSI |
COSEC; AIDA; MCCD; CUGC; CCN/CNI; INCIBE; Grupo Banco Santander; Epoche & Espri.