Publicaciones en las que colabora con Amparo Fúster Sabater (53)

2014

  1. Analysis and implementation of the SNOW 3G generator used in 4G/LTE systems

    Advances in Intelligent Systems and Computing

  2. Análisis e implementación del generador SNOW 3G utilizado en las comunicaciones 4G

    RECSI XIII: actas de la XIII Reunión Española sobre Criptología y Seguridad de la Información. Alicante, 2-5 de septiembre de 2014

  3. Calculando equivalentes débiles de filtrados no lineales

    RECSI XIII: actas de la XIII Reunión Española sobre Criptología y Seguridad de la Información. Alicante, 2-5 de septiembre de 2014

  4. Software implementation of the SNOW 3G generator on iOS and android platforms

    Logic Journal of the IGPL, Vol. 24, Núm. 1, pp. 29-41

  5. Weak equivalents for nonlinear filtering functions

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

2012

  1. Pseudorandom generator to strengthen cooperation in VANETs

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

2011

  1. Analysis of the generalized self-shrinking generator

    Computers and Mathematics with Applications, Vol. 61, Núm. 4, pp. 871-880

  2. Chaotic modelling of the generalized self-shrinking generator

    Applied Soft Computing Journal

  3. Generación de secuencias criptográficas mediante ecuaciones en diferencias

    XXII CEDYA Congreso de Ecuaciones Diferenciales y Aplicaciones: XII CMA Congreso de Matemática Aplicada : Palma de Mallorca, 5-9 septiembre de 2011: programa y resúmenes

2010

  1. A simple linearization of the self-shrinking generator by means of cellular automata

    Neural Networks

  2. Chaotic cellular automata with cryptographic application

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

  3. Graph-based approach to the edit distance cryptanalysis of irregularly clocked linear feedback shift registers

    Journal of Universal Computer Science, Vol. 15, Núm. 15, pp. 2981-2998

  4. Using linear difference equations to model nonlinear cryptographic sequences

    International Journal of Nonlinear Sciences and Numerical Simulation, Vol. 11, Núm. 3, pp. 165-172

2009

  1. A simple attack on some clock-controlled generators

    Computers and Mathematics with Applications, Vol. 58, Núm. 1, pp. 179-188

  2. Deterministic computation of pseudorandomness in sequences of cryptographic application

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

  3. Deterministic cryptanalysis of some stream ciphers

    Security in Information Systems - Proceedings of the 7th International Workshop on Security in Information Systems - WOSIS 2009 In Conjunction with ICEIS 2009

  4. New attack strategy for the shrinking generator

    Journal of Research and Practice in Information Technology, Vol. 41, Núm. 2, pp. 181-190

  5. Rethinking self-organized public-key management for mobile ad-hoc networks

    Security in Information Systems - Proceedings of the 7th International Workshop on Security in Information Systems - WOSIS 2009 In Conjunction with ICEIS 2009

  6. Synthesis of cryptographic interleaved sequences by means of linear cellular automata

    Applied Mathematics Letters, Vol. 22, Núm. 10, pp. 1518-1524

2008

  1. A cellular automata based method for predicting binary sequences

    Proceedings of the IASTED International Conference on Artificial Intelligence and Applications, AIA 2008