Luis Hernández Encinas

According to our database1, Luis Hernández Encinas authored at least 70 papers between 1998 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
Using the Spanish national identity card in social networks.
Log. J. IGPL, 2020

Study of the Reconciliation Mechanism of NewHope.
Proceedings of the 13th International Conference on Computational Intelligence in Security for Information Systems, 2020

2019
Comparing low and medium cost computer-based technologies suitable for cryptographic attacks.
Log. J. IGPL, 2019

Secure elliptic curves and their performance.
Log. J. IGPL, 2019

Non-quantum cryptanalysis of the noisy version of Aaronson-Christiano's quantum money scheme.
IET Inf. Secur., 2019

A Modular and Optimized Toolbox for Side-Channel Analysis.
IEEE Access, 2019

An Internet Voting Proposal Towards Improving Usability and Coercion Resistance.
Proceedings of the International Joint Conference: 12th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2019) and 10th International Conference on EUropean Transnational Education (ICEUTE 2019), 2019

On-the-Fly Testing an Implementation of Arrow Lightweight PRNG Using a LabVIEW Framework.
Proceedings of the International Joint Conference: 12th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2019) and 10th International Conference on EUropean Transnational Education (ICEUTE 2019), 2019

2018
Bifurcation Diagram of a Map with Multiple Critical Points.
Int. J. Bifurc. Chaos, 2018

A group law for PKC purposes.
CoRR, 2018

Review of the Main Security Threats and Challenges in Free-Access Public Cloud Storage Servers.
Proceedings of the Computer and Network Security Essentials., 2018

Security Protocols for Networks and Internet: A Global Vision.
Proceedings of the Computer and Network Security Essentials., 2018

2017
A comparative study of three Spanish eGoverment smart cards.
Log. J. IGPL, 2017

A Lightweight Pseudorandom Number Generator for Securing the Internet of Things.
IEEE Access, 2017

A Proposal for Using a Cryptographic National Identity Card in Social Networks.
Proceedings of the International Joint Conference SOCO'17-CISIS'17-ICEUTE'17, 2017

A Review of Cryptographically Secure PRNGs in Constrained Devices for the IoT.
Proceedings of the International Joint Conference SOCO'17-CISIS'17-ICEUTE'17, 2017

New Approaches of Epidemic Models to Simulate Malware Propagation.
Proceedings of the International Joint Conference SOCO'17-CISIS'17-ICEUTE'17, 2017

A Framework for Acquiring and Analyzing Traces from Cryptographic Devices.
Proceedings of the Security and Privacy in Communication Networks, 2017

Breaking a Hitag2 Protocol with Low Cost Technology.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

2016
PAgIoT - Privacy-preserving Aggregation protocol for Internet of Things.
J. Netw. Comput. Appl., 2016

Hidden and Nonstandard Bifurcation Diagram of an Alternate Quadratic System.
Int. J. Bifurc. Chaos, 2016

Design and optimization of the input modules of a DPA toolbox.
Log. J. IGPL, 2016

Case study: Malware propagation models for undergraduate engineering students.
Proceedings of the Fourth International Conference on Technological Ecosystems for Enhancing Multiculturality, Salamanca, Spain, November 02, 2016

A Comparison of Computer-Based Technologies Suitable for Cryptographic Attacks.
Proceedings of the International Joint Conference SOCO'16-CISIS'16-ICEUTE'16, 2016

Malware Propagation Models in Wireless Sensor Networks: A Review.
Proceedings of the International Joint Conference SOCO'16-CISIS'16-ICEUTE'16, 2016

A Study on the Performance of Secure Elliptic Curves for Cryptographic Purposes.
Proceedings of the International Joint Conference SOCO'16-CISIS'16-ICEUTE'16, 2016

2015
Cryptanalysis of two combinatorial public key cryptosystems.
Log. J. IGPL, 2015

Security and Practical Considerations When Implementing the Elliptic Curve Integrated Encryption Scheme.
Cryptologia, 2015

Group Signatures in Practice.
Proceedings of the International Joint Conference, 2015

Using Smart Cards for Authenticating in Public Services: A Comparative Study.
Proceedings of the International Joint Conference, 2015

2013
Two proposals for group signature schemes based on number theory problems.
Log. J. IGPL, 2013

Identification by means of a national ID card for wireless services.
Proceedings of the 16th International Symposium on Wireless Personal Multimedia Communications, 2013

A Toolbox for DPA Attacks to Smart Cards.
Proceedings of the International Joint Conference SOCO'13-CISIS'13-ICEUTE'13, 2013

The Isomorphism of Polynomials Problem Applied to Multivariate Quadratic Cryptography.
Proceedings of the International Joint Conference SOCO'13-CISIS'13-ICEUTE'13, 2013

Disclosure of Sensitive Information in the Virtual Learning Environment Moodle.
Proceedings of the International Joint Conference SOCO'13-CISIS'13-ICEUTE'13, 2013

Developing ECC applications in Java Card.
Proceedings of the 9th International Conference on Information Assurance and Security, 2013

2012
A crypto-biometric scheme based on iris-templates with fuzzy extractors.
Inf. Sci., 2012

Comments on a Cryptosystem Proposed by Wang and Hu.
Proceedings of the International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions, 2012

2011
Java Card Implementation of the Elliptic Curve Integrated Encryption Scheme Using Prime and Binary Finite Fields.
Proceedings of the Computational Intelligence in Security for Information Systems, 2011

A Group Signature Scheme Based on the Integer Factorization and the Subgroup Discrete Logarithm Problems.
Proceedings of the Computational Intelligence in Security for Information Systems, 2011

A Multisignature Scheme Based on the SDLP and on the IFP.
Proceedings of the Computational Intelligence in Security for Information Systems, 2011

2010
Development of Capstone Projects on Secure Communications for Engineering Students.
Proceedings of the 2010 International Conference on Security & Management, 2010

A Java Implementation of the Elliptic Curve Integrated Encryption Scheme.
Proceedings of the 2010 International Conference on Security & Management, 2010

A comparison of the standardized versions of ECIES.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010

2009
Analysis of the efficiency of the Chor-Rivest cryptosystem implementation in a safe-parameter range.
Inf. Sci., 2009

Dimension of the intersection of a pair of orthogonal groups.
Int. J. Comput. Math., 2009

Graphic Multisecret Sharing Schemes with One-Dimensional Cellular Automata.
Proceedings of the 2009 International Conference on Security & Management, 2009

Biometric Fuzzy Extractor Scheme for Iris Templates.
Proceedings of the 2009 International Conference on Security & Management, 2009

Security Efficiency Analysis of a Biometric Fuzzy Extractor for Iris Templates.
Proceedings of the Computational Intelligence in Security for Information Systems, 2009

2008
Known-Plaintext Attack to Two Cryptosystems Based on the BB Equation.
IEEE Trans. Circuits Syst. II Express Briefs, 2008

A multisecret sharing scheme for color images based on cellular automata.
Inf. Sci., 2008

A Weakness in Authenticated Encryption Schemes Based on Tseng et al.'s Schemes.
Int. J. Netw. Secur., 2008

Safer parameters for the Chor-Rivest cryptosystem.
Comput. Math. Appl., 2008

Cryptography Adapted to the New European Area of Higher Education.
Proceedings of the Computational Science, 2008

2007
Analysis of security problems in a medical image encryption system.
Comput. Biol. Medicine, 2007

Inverse rules of ECA with rule number 150.
Appl. Math. Comput., 2007

Simulation of forest fire fronts using cellular automata.
Adv. Eng. Softw., 2007

2006
Maple Implementation of the Chor-Rivest Cryptosystem.
Proceedings of the Computational Science, 2006

2005
Faa' di Bruno's formula, lattices, and partitions.
Discret. Appl. Math., 2005

A secure scheme to share secret color images.
Comput. Phys. Commun., 2005

A New Secret Sharing Scheme for Images Based on Additive 2-Dimensional Cellular Automata.
Proceedings of the Pattern Recognition and Image Analysis, Second Iberian Conference, 2005

2004
The Use of Linear Hybrid Cellular Automata as Pseudo Random Bit Generators in Cryptography.
Neural Parallel Sci. Comput., 2004

2003
An algorithm to obtain an RSA modulus with a large private key.
IACR Cryptol. ePrint Arch., 2003

Sharing secret color images using cellular automata with memory
CoRR, 2003

Large decryption exponents in RSA.
Appl. Math. Lett., 2003

A short proof of the generalized Faàdi Bruno's formula.
Appl. Math. Lett., 2003

Graphic Cryptography with Pseudorandom Bit Generators and Cellular Automata.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2003

2002
Designing hypermedia tools for solving problems in mathematics.
Comput. Educ., 2002

Isomorphism Classes of Genus-2 Hyperelliptic Curves Over Finite Fields.
Appl. Algebra Eng. Commun. Comput., 2002

1998
Maximal period of orbits of the BBS generator.
Proceedings of the 1st International Conference on Information Security and Cryptology, 1998


  Loading...