Victor Gayoso Martínez

Orcid: 0000-0002-1513-6029

Affiliations:
  • Institute of Physical and Information Technologies, CSIC, Madrid, Spain


According to our database1, Victor Gayoso Martínez authored at least 32 papers between 2010 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
A modification proposal for the reconciliation mechanism of the key exchange algorithm NewHope.
Log. J. IGPL, 2022

State of the Art of Cybersecurity in Cooperative, Connected and Automated Mobility.
Proceedings of the International Joint Conference 15th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2022) 13th International Conference on EUropean Transnational Education (ICEUTE 2022), 2022

2021
Using Free Mathematical Software in Engineering Classes.
Axioms, 2021

2020
Using the Spanish national identity card in social networks.
Log. J. IGPL, 2020

Blockchain in Education: New Challenges.
Proceedings of the 13th International Conference on Computational Intelligence in Security for Information Systems, 2020

Study of the Reconciliation Mechanism of NewHope.
Proceedings of the 13th International Conference on Computational Intelligence in Security for Information Systems, 2020

2019
Comparing low and medium cost computer-based technologies suitable for cryptographic attacks.
Log. J. IGPL, 2019

Secure elliptic curves and their performance.
Log. J. IGPL, 2019

Enhancing the Learning of Cryptography Through Concept Maps.
Proceedings of the International Joint Conference: 12th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2019) and 10th International Conference on EUropean Transnational Education (ICEUTE 2019), 2019

On-the-Fly Testing an Implementation of Arrow Lightweight PRNG Using a LabVIEW Framework.
Proceedings of the International Joint Conference: 12th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2019) and 10th International Conference on EUropean Transnational Education (ICEUTE 2019), 2019

2018
A group law for PKC purposes.
CoRR, 2018

Changing teaching: Competencies versus contents.
Proceedings of the 2018 IEEE Global Engineering Education Conference, 2018

Analysis of student feedback when using gamification tools in math subjects.
Proceedings of the 2018 IEEE Global Engineering Education Conference, 2018


Secure Elliptic Curves in Cryptography.
Proceedings of the Computer and Network Security Essentials., 2018

2017
A comparative study of three Spanish eGoverment smart cards.
Log. J. IGPL, 2017

A Proposal for Using a Cryptographic National Identity Card in Social Networks.
Proceedings of the International Joint Conference SOCO'17-CISIS'17-ICEUTE'17, 2017

Breaking a Hitag2 Protocol with Low Cost Technology.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

2016
A Comparison of Computer-Based Technologies Suitable for Cryptographic Attacks.
Proceedings of the International Joint Conference SOCO'16-CISIS'16-ICEUTE'16, 2016

A Study on the Performance of Secure Elliptic Curves for Cryptographic Purposes.
Proceedings of the International Joint Conference SOCO'16-CISIS'16-ICEUTE'16, 2016

2015
Security and Practical Considerations When Implementing the Elliptic Curve Integrated Encryption Scheme.
Cryptologia, 2015

Group Signatures in Practice.
Proceedings of the International Joint Conference, 2015

Using Smart Cards for Authenticating in Public Services: A Comparative Study.
Proceedings of the International Joint Conference, 2015

On the Difficult Tradeoff Between Security and Privacy: Challenges for the Management of Digital Identities.
Proceedings of the International Joint Conference, 2015

2013
Identification by means of a national ID card for wireless services.
Proceedings of the 16th International Symposium on Wireless Personal Multimedia Communications, 2013

Disclosure of Sensitive Information in the Virtual Learning Environment Moodle.
Proceedings of the International Joint Conference SOCO'13-CISIS'13-ICEUTE'13, 2013

Developing ECC applications in Java Card.
Proceedings of the 9th International Conference on Information Assurance and Security, 2013

2011
Java Card Implementation of the Elliptic Curve Integrated Encryption Scheme Using Prime and Binary Finite Fields.
Proceedings of the Computational Intelligence in Security for Information Systems, 2011

2010
Implementación en tarjetas inteligentes Java Card de protocolos de cifrado y descifrado basados en curvas elípticas.
PhD thesis, 2010

Development of Capstone Projects on Secure Communications for Engineering Students.
Proceedings of the 2010 International Conference on Security & Management, 2010

A Java Implementation of the Elliptic Curve Integrated Encryption Scheme.
Proceedings of the 2010 International Conference on Security & Management, 2010

A comparison of the standardized versions of ECIES.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010


  Loading...