María Isabel González Vasco

Orcid: 0000-0002-7452-9121

Affiliations:
  • King Juan Carlos University, MACIMTE, Madrid, Spain


According to our database1, María Isabel González Vasco authored at least 51 papers between 2000 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Secure post-quantum group key exchange: Implementing a solution based on Kyber.
IET Commun., April, 2023

Applications of Finite non-Abelian Simple Groups to Cryptography in the Quantum Era.
IACR Cryptol. ePrint Arch., 2023

Modular Sumcheck Proofs with Applications to Machine Learning and Image Processing.
IACR Cryptol. ePrint Arch., 2023

2021
A Key for John Doe: Modeling and Designing Anonymous Password-Authenticated Key Exchange Protocols.
IEEE Trans. Dependable Secur. Comput., 2021

An Attack on Zawadzki's Quantum Authentication Scheme.
Entropy, 2021

Chirotonia: A Scalable and Secure e-Voting Framework based on Blockchains and Linkable Ring Signatures.
Proceedings of the 2021 IEEE International Conference on Blockchain, 2021

2020
Building Group Key Establishment on Group Theory: A Modular Approach.
Symmetry, 2020

Group Key Establishment in a Quantum-Future Scenario.
Informatica, 2020

Auditable Asymmetric Password Authenticated Public Key Establishment.
IACR Cryptol. ePrint Arch., 2020

Concerning Quantum Identification Without Entanglement.
CoRR, 2020

2019
The Cracking of <i>WalnutDSA</i>: A Survey.
Symmetry, 2019

Password-Authenticated Group Key Establishment from Smooth Projective Hash Functions.
Int. J. Appl. Math. Comput. Sci., 2019

2018
Group key exchange protocols withstanding ephemeral-key reveals.
IET Inf. Secur., 2018

Cryptanalysis of a Proposal Based on the Discrete Logarithm Problem Inside <i>S<sub>n</sub></i>.
Cryptogr., 2018

2017
Partitioned Group Password-Based Authenticated Key Exchange.
IACR Cryptol. ePrint Arch., 2017

Private set intersection: New generic constructions and feasibility results.
Adv. Math. Commun., 2017

2016
Pitfalls in a server-aided authenticated group key establishment.
Inf. Sci., 2016

Combined schemes for signature and encryption: The public-key and the identity-based setting.
Inf. Comput., 2016

2015
Group Theoretic Cryptography.
Chapman and Hall / CRC cryptography and network security series, CRC Press, ISBN: 978-1-584-88836-9, 2015

2014
Cryptanalysis of a key exchange scheme based on block matrices.
Inf. Sci., 2014

2012
Size-Hiding in Private Set Intersection: Existential Results and Constructions.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012

2010
A note on the security of <i>MST</i><sub>3</sub>.
Des. Codes Cryptogr., 2010

Anonymous Subscription Schemes - A Flexible Construction for On-line Services Access.
Proceedings of the SECRYPT 2010, 2010

Flexible Anonymous Subscription Schemes.
Proceedings of the e-Business and Telecommunications - 7th International Joint Conference, 2010

2009
Cryptanalysis of a key exchange scheme based on block matrices.
IACR Cryptol. ePrint Arch., 2009

A note on the security of MST3.
IACR Cryptol. ePrint Arch., 2009

Related Message Attacks to Public Key Encryption Schemes: Relations among Security Notions.
IACR Cryptol. ePrint Arch., 2009

2008
Combined (identity-based) public key schemes.
IACR Cryptol. ePrint Arch., 2008

Applications of algebra to cryptography.
Discret. Appl. Math., 2008

In search of mathematical primitives for deriving universal projective hash families.
Appl. Algebra Eng. Commun. Comput., 2008

2007
Secure group key establishment revisited.
Int. J. Inf. Sec., 2007

Attacking a public key cryptosystem based on tree replacement.
Discret. Appl. Math., 2007

(Password) Authenticated Key Establishment: From 2-Party to Group.
Proceedings of the Theory of Cryptography, 4th Theory of Cryptography Conference, 2007

2006
Entwurf asymmetrischer kryptographischer Verfahren unter Berücksichtigung von Quantenalgorithmen (Design of Asymmetric Cryptographic Schemes Taking Into Account Quantum Algorithms).
it Inf. Technol., 2006

Password-Authenticated Constant-Round Group Key Establishment with a Common Reference String.
IACR Cryptol. ePrint Arch., 2006

Pitfalls in public key cryptosystems based on free partially commutative monoids and groups.
Appl. Math. Lett., 2006

A Subliminal-Free Variant of ECDSA.
Proceedings of the Information Hiding, 8th International Workshop, 2006

2005
Burmester-Desmedt Tree-Based Key Transport Revisited: Provable Security.
IACR Cryptol. ePrint Arch., 2005

Weak Keys in <i>MST</i><sub>1</sub>.
Des. Codes Cryptogr., 2005

A New Cramer-Shoup Like Methodology for Group Based Provably Secure Encryption Schemes.
Proceedings of the Theory of Cryptography, Second Theory of Cryptography Conference, 2005

2004
Towards a Uniform Description of Several Group Based Cryptographic Primitives.
Des. Codes Cryptogr., 2004

On the Security of Two Public Key Cryptosystems Using Non-Abelian Groups.
Des. Codes Cryptogr., 2004

A Reaction Attack on a Public Key Cryptosystem Based on the Word Problem.
Appl. Algebra Eng. Commun. Comput., 2004

New Results on the Hardness of Diffie-Hellman Bits.
Proceedings of the Public Key Cryptography, 2004

2003
On Minimal Length Factorizations of Finite Groups.
Exp. Math., 2003

2002
Reaction Attacks on Public Key Cryptosystems Based on the Word Problem.
IACR Cryptol. ePrint Arch., 2002

Weak Keys in MST1.
IACR Cryptol. ePrint Arch., 2002

The Hidden Number Problem in Extension Fields and Its Applications.
Proceedings of the LATIN 2002: Theoretical Informatics, 2002

2001
Clouds over a public key cryptosystem based on Lyndon words.
Inf. Process. Lett., 2001

2000
On the Security of Diffie-Hellman Bits
Electron. Colloquium Comput. Complex., 2000

Security of the Most Significant Bits of the Shamir Message Passing Scheme
Electron. Colloquium Comput. Complex., 2000


  Loading...