Amparo Fúster-Sabater

Orcid: 0000-0002-8261-3550

Affiliations:
  • Spanish National Research Council, CSIC, Spain


According to our database1, Amparo Fúster-Sabater authored at least 122 papers between 1994 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Reducing the Security Margin Against a Differential Attack in the TinyJambu Cryptosystem.
Proceedings of the International Joint Conference 16th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2023) 14th International Conference on EUropean Transnational Education (ICEUTE 2023), 2023

2022
Randomness study of the concatenation of generalized sequences.
Log. J. IGPL, 2022

Computational Analysis of Interleaving PN-Sequences with Different Polynomials.
Cryptogr., 2022

A Hadamard Matrix-Based Algorithm to Evaluate the Strength of Binary Sequences.
Proceedings of the Computational Science - ICCS 2022, 2022

2021
Preliminary Analysis of Interleaving PN-Sequences.
Proceedings of the Computational Science and Its Applications - ICCSA 2021, 2021

2020
Recovering Decimation-Based Cryptographic Sequences by Means of Linear CAs.
Log. J. IGPL, 2020

Folding-BSD Algorithm for Binary Sequence Decomposition.
Comput., 2020

An Innovative Linear Complexity Computation for Cryptographic Sequences.
Proceedings of the 13th International Conference on Computational Intelligence in Security for Information Systems, 2020

Randomness Analysis for GSS-sequences Concatenated.
Proceedings of the 13th International Conference on Computational Intelligence in Security for Information Systems, 2020

2019
Randomness Analysis for the Generalized Self-Shrinking Sequences.
Symmetry, 2019

Binomial Representation of Cryptographic Binary Sequences and Its Relation to Cellular Automata.
Complex., 2019

Binomial Characterization of Cryptographic Sequences.
Proceedings of the Computational Science and Its Applications - ICCSA 2019, 2019

Linearization of Cryptographic Sequences.
Proceedings of the International Joint Conference: 12th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2019) and 10th International Conference on EUropean Transnational Education (ICEUTE 2019), 2019

2018
Recovering decimation-based cryptographic sequences by means of linear CAs.
CoRR, 2018

Computing the Linear Complexity in a Class of Cryptographic Sequences.
Proceedings of the Computational Science and Its Applications - ICCSA 2018, 2018

The t-Modified Self-Shrinking Generator
Proceedings of the Computational Science - ICCS 2018, 2018

2017
Discrete linear models for the generalized self-shrunken sequences.
Finite Fields Their Appl., 2017

A New Simple Attack on a Wide Class of Cryptographic Sequence Generators.
Proceedings of the International Joint Conference SOCO'17-CISIS'17-ICEUTE'17, 2017

Linear Models for High-Complexity Sequences.
Proceedings of the Computational Science and Its Applications - ICCSA 2017, 2017

2016
Linear Models for the Self-Shrinking Generator Based on CA.
J. Cell. Autom., 2016

Optimal modes of operation of pseudorandom sequence generators based on DLFSRs.
Log. J. IGPL, 2016

Software implementation of the SNOW 3G Generator on iOS and Android platforms.
Log. J. IGPL, 2016

Modelling the shrinking generator in terms of linear CA.
Adv. Math. Commun., 2016

Modelling the MSSG in Terms of Cellular Automata.
Proceedings of the Computational Science and Its Applications - ICCSA 2016, 2016

Cryptographic Properties of Equivalent Ciphers.
Proceedings of the International Conference on Computational Science 2016, 2016

Recovering the MSS-sequence via CA.
Proceedings of the International Conference on Computational Science 2016, 2016

2015
Revision of J3Gen and Validity of the Attacks by Peinado et al.
Sensors, 2015

Software implementation of cryptographic sequence generators over extended fields.
Log. J. IGPL, 2015

Cryptanalysing the Shrinking Generator.
Proceedings of the International Conference on Computational Science, 2015

A Simple Linearisation of the Self-shrinking Generator.
Proceedings of the Computer Aided Systems Theory - EUROCAST 2015, 2015

Performance of the Cryptanalysis over the Shrinking Generator.
Proceedings of the International Joint Conference, 2015

2014
EPCGen2 Pseudorandom Number Generators: Analysis of J3Gen.
Sensors, 2014

Improving the Period and Linear Span of the Sequences Generated by DLFSRs.
Proceedings of the International Joint Conference SOCO'14-CISIS'14-ICEUTE'14, 2014

Weak Equivalents for Nonlinear Filtering Functions.
Proceedings of the Computational Science and Its Applications - ICCSA 2014 - 14th International Conference, Guimarães, Portugal, June 30, 2014

Computation of Filtering Functions for Cryptographic Applications.
Proceedings of the International Conference on Computational Science, 2014

2013
Generation of pseudorandom binary sequences by means of linear feedback shift registers (LFSRs) with dynamic feedback.
Math. Comput. Model., 2013

Characterization of the Least Periods of the Generalized Self-Shrinking Sequences.
CoRR, 2013

Analysis and Implementation of the SNOW 3G Generator Used in 4G/LTE Systems.
Proceedings of the International Joint Conference SOCO'13-CISIS'13-ICEUTE'13, 2013

Design of Nonlinear Filters with Guaranteed Lower Bounds on Sequence Complexity.
Proceedings of the International Joint Conference SOCO'13-CISIS'13-ICEUTE'13, 2013

Identification of Degeneracies in a Class of Cryptographic Sequences.
Proceedings of the International Joint Conference SOCO'13-CISIS'13-ICEUTE'13, 2013

Analysis of the Linear Complexity in Pseudorandom Sequence Generators.
Proceedings of the Computational Science and Its Applications - ICCSA 2013, 2013

Aspects of Linearity in Cryptographic Sequence Generators.
Proceedings of the Computational Science and Its Applications - ICCSA 2013, 2013

Computing Classes of Cryptographic Sequence Generators.
Proceedings of the International Conference on Computational Science, 2013

Design of Decimation-Based Sequence Generators over Extended Fields.
Proceedings of the Computer Aided Systems Theory - EUROCAST 2013, 2013

2012
Software Implementation of Linear Feedback Shift Registers over Extended Fields.
Proceedings of the International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions, 2012

Cryptographic Analysis of a Type of Sequence Generators.
Proceedings of the Information Systems Security, 8th International Conference, 2012

2011
Analysis of the generalized self-shrinking generator.
Comput. Math. Appl., 2011

Performance evaluation of highly efficient techniques for software implementation of LFSR.
Comput. Electr. Eng., 2011

Chaotic modelling of the generalized self-shrinking generator.
Appl. Soft Comput., 2011

A light-weight authentication scheme for wireless sensor networks.
Ad Hoc Networks, 2011

Generation of Pseudorandom Binary Sequences with Controllable Cryptographic Parameters.
Proceedings of the Computational Science and Its Applications - ICCSA 2011, 2011

Cryptanalytic Attack on the Self-Shrinking Sequence Generator.
Proceedings of the Adaptive and Natural Computing Algorithms, 2011

A cryptanalytic attack on a class of cryptographic sequence generators.
Proceedings of EUROCON 2011, 2011

Pseudorandom Generator to Strengthen Cooperation in VANETs.
Proceedings of the Computer Aided Systems Theory - EUROCAST 2011, 2011

Structural Properties of Cryptographic Sequences.
Proceedings of the Computational Intelligence in Security for Information Systems, 2011

2010
A simple linearization of the self-shrinking generator by means of cellular automata.
Neural Networks, 2010

Characterisation of observability and controllability for nonuniformly sampled discrete systems
CoRR, 2010

An External Description for MIMO Systems Sampled in an Aperiodic Way
CoRR, 2010

New modelling technique for aperiodic-sampling linear systems
CoRR, 2010

Correction to "Generalized Self-Shrinking Generator"
CoRR, 2010

A Joint Criterion for Reachability and Observability of Nonuniformly Sampled Discrete Systems
CoRR, 2010

Cellular Automata in Stream Ciphers
CoRR, 2010

Modelling Nonlinear Sequence Generators in terms of Linear Cellular Automata
CoRR, 2010

A Simple Computational Model for Acceptance/Rejection of Binary Sequence Generators
CoRR, 2010

Likelihood that a pseudorandom sequence generator has optimal properties
CoRR, 2010

On the Use of Cellular Automata in Symmetric Cryptography
CoRR, 2010

Using Linear Difference Equations to Model Nonlinear Cryptographic Sequences
CoRR, 2010

Linear solutions for cryptographic nonlinear sequence generators
CoRR, 2010

On the Design of Cryptographic Primitives
CoRR, 2010

Global Linear Complexity Analysis of Filter Keystream Generators
CoRR, 2010

An Energy-Efficient Symmetric Cryptography Based Authentication Scheme for Wireless Sensor Networks.
Proceedings of the Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 2010

On Privacy and Integrity in Vehicular Ad hoc Networks.
Proceedings of the 2010 International Conference on Wireless Networks, 2010

On the Linearity of Cryptographic Sequence Generators.
Proceedings of the Computational Science and Its Applications, 2010

A Linear Cellular Automata-Based Model for Generating Cryptographic Sequences.
Proceedings of the 2010 International Conference on Scientific Computing, 2010

Simple Cellular Automata-Based Linear Models for a Class of Sequence Generators.
Proceedings of the 2010 International Conference on Scientific Computing, 2010

Chaotic Cellular Automata with Cryptographic Application.
Proceedings of the Cellular Automata, 2010

2009
Graph-Based Approach to the Edit Distance Cryptanalysis of Irregularly Clocked Linear Feedback Shift Registers.
J. Univers. Comput. Sci., 2009

A simple attack on some clock-controlled generators.
Comput. Math. Appl., 2009

Synthesis of cryptographic interleaved sequences by means of linear cellular automata.
Appl. Math. Lett., 2009

New Attack Strategy for the Shrinking Generator.
J. Res. Pract. Inf. Technol., 2009

Rethinking Self-organized Public-key Management for Mobile Ad-Hoc Networks.
Proceedings of the Security in Information Systems, 2009

Deterministic Cryptanalysis of some Stream Ciphers.
Proceedings of the Security in Information Systems, 2009

Testing Topologies for the Evaluation of IPSEC Implementations.
Proceedings of the Computational Science and Its Applications, 2009

Deterministic Computation of Pseudorandomness in Sequences of Cryptographic Application.
Proceedings of the Computational Science, 2009

Differentiated Services to Provide Efficient Node Authentication in VANETs.
Proceedings of the 2009 International Conference on Security & Management, 2009

Linearization of the Alternating Step Generator in Terms of Cellular Automata.
Proceedings of the 2009 International Conference on Scientific Computing, 2009

2008
Solving Linear Difference Equations by Means of Cellular Automata.
Proceedings of the Innovations in Hybrid Intelligent Systems, 2008

Strategic attack on the shrinking generator.
Theor. Comput. Sci., 2008

Linear Cellular Automata as Discrete Models for Generating Cryptographic Sequences.
J. Res. Pract. Inf. Technol., 2008

Cryptanalytic Attack on Cryptographic Sequence Generators: The Class of Clock-Controlled Shrinking Generators.
Proceedings of the Computational Science and Its Applications - ICCSA 2008, International Conference, Perugia, Italy, June 30, 2008

On the Use of Linear Cellular Automata for the Synthesis of Cryptographic Sequences.
Proceedings of the Hybrid Artificial Intelligence Systems, Third International Workshop, 2008

Linear Cellular Automata as Discrete Models for Generating Cryptographic Sequences.
Proceedings of the Sixth Australasian Information Security Conference, 2008

Cellular Automata-Based Structures to Compute the Solutions of Linear Difference Equations.
Proceedings of the Cellular Automata, 2008

2007
Balancedness in Binary Sequences with Cryptographic Applications.
Proceedings of the Parallel Processing and Applied Mathematics, 2007

Reconstruction of Suboptimal Paths in the Constrained Edit Distance Array with Application in Cryptanalysis.
Proceedings of the Computational Science and Its Applications, 2007

Linearization of Stream Ciphers by Means of Concatenated Automata.
Proceedings of the Computational Science and Its Applications, 2007

Application of Linear Hybrid Cellular Automata to Stream Ciphers.
Proceedings of the Computer Aided Systems Theory, 2007

2006
Using Linear Hybrid Cellular Automata to Attack the Shrinking Generator.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

Deterministic Analysis of Balancedness in Symmetric Cryptography.
Proceedings of the Computer and Information Sciences, 2006

Modelling of Complex Cryptographic Systems in Terms of Simple Cellular Automata .
Proceedings of the Computational Science and Its Applications, 2006

Practical Attack on the Shrinking Generator.
Proceedings of the Computational Science and Its Applications, 2006

Efficient Application of Hybrid 150/90 Cellular Automata to Symmetric Cryptography.
Proceedings of the Computational Science, 2006

Concatenated Automata in Cryptanalysis of Stream Ciphers.
Proceedings of the Cellular Automata, 2006

2005
A Deterministic Approach to Balancedness and Run Quantification in Pseudorandom Pattern Generators.
Proceedings of the Advances in Informatics, 2005

A Simple Acceptance/Rejection Criterium for Sequence Generators in Symmetric Cryptography.
Proceedings of the Computational Science and Its Applications, 2005

Improvement of the Edit Distance Attack to Clock-Controlled LFSR-Based Stream Ciphers.
Proceedings of the Computer Aided Systems Theory, 2005

2004
A wide family of nonlinear filter functions with a large linear span.
Inf. Sci., 2004

Run distribution innonlinear binary generators.
Appl. Math. Lett., 2004

Comments on "a family of keystream generators with large linear complexity".
Appl. Math. Lett., 2004

Efficient Computation of Balancedness in Binary Sequence Generators.
Proceedings of the String Processing and Information Retrieval, 2004

Clock Control Sequence Reconstruction in the Ciphertext Only Attack Scenario.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

Cellular Automata Application to the Linearization of Stream Cipher Generators.
Proceedings of the Cellular Automata, 2004

2003
On the balancedness of nonlinear generators of binary sequences.
Inf. Process. Lett., 2003

Keystream Generator Analysis in Terms of Cellular Automata.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2003

Simple cellular automata-based linear models for the shrinking generator.
Proceedings of the Proceedings 2003 IEEE Information Theory Workshop, 2003

Aspects of Pseudorandomness in Nonlinear Generators of Binary Sequences.
Proceedings of the Theoretical Computer Science, 8th Italian Conference, 2003

2001
An efficient algorithm to generate binary sequences for cryptographic purposes.
Theor. Comput. Sci., 2001

2000
On the linear complexity of the sequences generated by nonlinear filterings.
Inf. Process. Lett., 2000

CRYPTANALYSIS OF THE A5/2 ALGORITHM.
IACR Cryptol. ePrint Arch., 2000

1999
On the General Classification of Nonlinear Filters of <i>m</i>-Sequences.
Inf. Process. Lett., 1999

1995
Linear Span Analysis of a Set of Periodic Sequence Generators.
Proceedings of the Cryptography and Coding, 1995

1994
On the Linear Complexity of Nonlinear Filtered PN-sequences.
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994


  Loading...