Guillermo Morales-Luna

Orcid: 0000-0001-6800-4081

According to our database1, Guillermo Morales-Luna authored at least 84 papers between 1985 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Gene Expression Analysis through Parallel Non-Negative Matrix Factorization.
Comput., 2021

2020
Conversion of Element Representations in Galois Rings.
Math. Comput. Sci., 2020

Side Attacks on Stegosystems Executing Message Encryption Previous to Embedding.
J. Inf. Hiding Multim. Signal Process., 2020

Towards BIMAX: Binary Inclusion-MAXimal Parallel Implementation for Gene Expression Analysis Alejandra.
Computación y Sistemas, 2020

2019
Inferring Functional Dependencies through Similarity Functions in a Crime Database.
Proceedings of the 16th International Conference on Electrical Engineering, 2019

Cipher Modification Against Steganalysis Based on NIST Tests.
Proceedings of the 24th Conference of Open Innovations Association, 2019

Information theoretical secure key sharing protocol for noiseless public constant parameter channels without cryptographic assumptions.
Proceedings of the 2019 Federated Conference on Computer Science and Information Systems, 2019

2018
Secret Key Sharing Protocol between Units Connected by Wireless MIMO Fading Channels.
Proceedings of the 2018 Federated Conference on Computer Science and Information Systems, 2018

2017
Proof of Correspondence between Keys and Encoding Maps in an Authentication Code.
CoRR, 2017

Steganalysis Based on Statistical Properties of the Encrypted Messages.
Proceedings of the Computer Network Security, 2017

Design of Audio Digital Watermarking System Resistant to Removal Attack.
Proceedings of the 2017 Federated Conference on Computer Science and Information Systems, 2017

2016
Design of High Speed Stegosystem Based on Trellis Codes Jointly with Generalised Viterbi Algorithm.
Int. J. Comput. Sci. Appl., 2016

Authentication codes based on resilient Boolean maps.
Des. Codes Cryptogr., 2016

Trajectory Graphs Appearing from the Skein Problems at the Hypercube.
Computación y Sistemas, 2016

Semi-Fragile Image Authentication based on CFD and 3-Bit Quantization.
CoRR, 2016

Partitioning of complex networks for heterogeneous computing: A methodological approach.
Proceedings of the 13th IEEE International Conference on Networking, Sensing, and Control, 2016

Secret key agreement based on a communication through wireless MIMO-based fading channels.
Proceedings of the 2016 Federated Conference on Computer Science and Information Systems, 2016

Accelerating All-Sources BFS Metrics on Multi-core Clusters for Large-Scale Complex Network Analysis.
Proceedings of the High Performance Computing - Third Latin American Conference, 2016

2015
An Authentication Code over Galois Rings with Optimal Impersonation and Substitution Probabilities.
IACR Cryptol. ePrint Arch., 2015

A Linear Code and its Application into Secret Sharing.
IACR Cryptol. ePrint Arch., 2015

Analysis of Keyless Massive MIMO-based Cryptosystem Security.
IACR Cryptol. ePrint Arch., 2015

Selective image authentication tolerant to JPEG compression.
Proceedings of the 6th International Conference on Information, 2015

An ILP approach for the traveling repairman problem with unit time windows.
Proceedings of the 12th International Conference on Electrical Engineering, 2015

Using the generalised Viterbi algorithm to achieve a highly effective stegosystem for images.
Proceedings of the 2015 Federated Conference on Computer Science and Information Systems, 2015

2014
Approximability of Optimization Problems through Adiabatic Quantum Computation
Synthesis Lectures on Quantum Computing, Morgan & Claypool Publishers, ISBN: 978-3-031-02519-8, 2014

Authentication Schemes Based on Resilient Maps.
IACR Cryptol. ePrint Arch., 2014

Concatenated digital watermarking system robust to different removal attacks.
Comput. Sci. Inf. Syst., 2014

Wire-tap channel concept in nature and society.
Proceedings of the 5th International Conference on Information, 2014

2013
Audio Watermarking Based on Echo Hiding with Zero Error Probability.
Int. J. Comput. Sci. Appl., 2013

On Formal Expressions of BRW-polynomials.
IACR Cryptol. ePrint Arch., 2013

A stegosystem with blind decoder based on a noisy channel.
Proceedings of the 18th International Conference on Digital Signal Processing, 2013

Fingerprinting System for Still Images Based on the Use of a Holographic Transform Domain.
Proceedings of the 2013 Federated Conference on Computer Science and Information Systems, 2013

2012
The Capacity of a Stegosystem for the Noisy Attack Channel.
J. Inf. Hiding Multim. Signal Process., 2012

A Multiple Robust Digital Watermarking System for Still Images.
Int. J. Comput. Sci. Appl., 2012

Selección aleatoria de árboles generadores en gráficas.
Computación y Sistemas, 2012

Optimization of Key Distribution Protocols Based on Extractors for Noisy Channels within Active Adversaries.
Proceedings of the Computer Network Security, 2012

A Dynamic Logic-Based Modal Prolog.
Proceedings of the 11th Mexican International Conference on Artificial Intelligence, 2012

The Use of Wet Paper Codes With Audio Watermarking Based on Echo Hiding.
Proceedings of the Federated Conference on Computer Science and Information Systems, 2012

2011
Stegosystems Based on Noisy Channels.
Int. J. Comput. Sci. Appl., 2011

Secret Key Agreement Over Multipath Channels Exploiting a Variable-Directional Antenna
CoRR, 2011

Solving the enumeration and word problems on Coxeter groups.
Proceedings of the 8th International Conference on Electrical Engineering, 2011

Information recovery through a simple epistemic logic from a relational database.
Proceedings of the 8th International Conference on Electrical Engineering, 2011

HTTPS connections over Android.
Proceedings of the 8th International Conference on Electrical Engineering, 2011

Robust Digital Watermarking System for Still Images.
Proceedings of the Federated Conference on Computer Science and Information Systems, 2011

2010
Collusion-Resistant Fingerprints Based on Real Superimposed Codes.
Int. J. Comput. Sci. Appl., 2010

Two identification protocols based on Cayley graphs of Coxeter groups.
IACR Cryptol. ePrint Arch., 2010

Solinas primes of small weight for fixed sizes.
IACR Cryptol. ePrint Arch., 2010

A Geometric Presentation of Probabilistic Satisfiability
CoRR, 2010

Key Distribution Protocols Based on Extractors Under the Condition of Noisy Channels in the Presence of an Active Adversary
CoRR, 2010

On the Hamiltonian Operators for Adiabatic Quantum Reduction of SAT.
Proceedings of the Language and Automata Theory and Applications, 2010

Undetectable Spread-time Stegosystem Based on Noisy Channels.
Proceedings of the International Multiconference on Computer Science and Information Technology, 2010

2009
Searching Prime Numbers with Short Binary Signed Representation.
Computación y Sistemas, 2009

Cryptographic Methods During the Mexican Revolution.
Cryptologia, 2009

Collusion-resistant fingerprints based on the use of superimposed codes in real vector spaces.
Proceedings of the International Multiconference on Computer Science and Information Technology, 2009

2008
Key Distribution Protocols Based on Noisy Channels in Presence of an Active Adversary: Conventional and New Versions With Parameter Optimization.
IEEE Trans. Inf. Theory, 2008

On the Use of Bhattacharyya Distance as a Measure of the Detectability of Steganographic Systems.
Trans. Data Hiding Multim. Secur., 2008

Low-Complexity Bit-Parallel Square Root Computation over GF(2^{m}) for All Trinomials.
IEEE Trans. Computers, 2008

Simulation for bulk synchronous parallel superstep task assignment in desktop grids characterised by gaussian parameter distributions.
Multiagent Grid Syst., 2008

On differences of quadratic residues.
IACR Cryptol. ePrint Arch., 2008

Wet Paper Coding for Watermarking of Binary Images
CoRR, 2008

ECA-Rule Visual Programming for Ubiquitous and Nomadic Computing.
Proceedings of the MICAI 2008: Advances in Artificial Intelligence, 2008

2007
Common subproofs in proof pairs.
Eng. Lett., 2007

Parallel Itoh-Tsujii multiplicative inversion algorithm for a special class of trinomials.
Des. Codes Cryptogr., 2007

A Parallel Version of the Itoh-Tsujii Multiplicative Inversion Algorithm.
Proceedings of the Reconfigurable Computing: Architectures, 2007

2006
Image Authentication Based on Modular Embedding.
IEICE Trans. Inf. Syst., 2006

Low Complexity Bit-Parallel Square Root Computation over GF(2<sup>m</sup>) for all Trinomials.
IACR Cryptol. ePrint Arch., 2006

Counting Prime Numbers with Short Binary Signed Representation.
IACR Cryptol. ePrint Arch., 2006

A Solution to the Information Retrieval Problem in Desktop Grid Task Assignment Using the Force Field Model.
Proceedings of the 2006 International Conference on Grid Computing & Applications, 2006

2005
FPGA implementation of an efficient multiplier over finite fields GF(2<sup>m</sup>).
Proceedings of the 2005 International Conference on Reconfigurable Computing and FPGAs, 2005

Geometric Aspects Related to Solutions of #<i>k</i>SAT.
Proceedings of the MICAI 2005: Advances in Artificial Intelligence, 2005

On the Existence of Perfect Stegosystems.
Proceedings of the Digital Watermarking, 4th International Workshop, 2005

Design of the Force Field Task Assignment Method and Associated Performance Evaluation for Desktop Grids.
Proceedings of the Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30, 2005

2004
ADM: An Active Deductive XML Database System.
Proceedings of the MICAI 2004: Advances in Artificial Intelligence, 2004

2003
Watermarking of binary messages in conditions of an additive binary noise attack.
IEEE Signal Process. Lett., 2003

Hybrid authentication based on noisy channels.
Int. J. Inf. Sec., 2003

Digital Watermarking under a Filtering and Additive Noise Attack Condition.
Proceedings of the Computer Network Security, 2003

Hardware Implementation of the Binary Method for Exponentiation in GF(2m).
Proceedings of the 4th Mexican International Conference on Computer Science (ENC 2003), 2003

2002
Digital Semipublic Watermarking.
Informatica (Slovenia), 2002

Simple Epistemic Logic for Relational Database.
Proceedings of the MICAI 2002: Advances in Artificial Intelligence, 2002

Indeed : Interactive Deduction on Horn Clause Theories.
Proceedings of the Advances in Artificial Intelligence, 2002

2001
Privacy Amplification Theorem for Noisy Main Channel.
Proceedings of the Information Security, 4th International Conference, 2001

Information Hiding through Noisy Channels.
Proceedings of the Information Hiding, 4th International Workshop, 2001

1991
On the Polynomial Representation of Generalized Liouville Operators.
J. Symb. Comput., 1991

1985
A Recursive Model for Arithmetic with Weak Induction.
J. Symb. Log., 1985


  Loading...