Publikationen in Zusammenarbeit mit Forschern von Centro de Tecnologías Físicas y de la Información Leonardo Torres Quevedo (42)

2012

  1. Pseudorandom generator to strengthen cooperation in VANETs

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

2011

  1. Analysis of the generalized self-shrinking generator

    Computers and Mathematics with Applications, Vol. 61, Núm. 4, pp. 871-880

  2. Chaotic modelling of the generalized self-shrinking generator

    Applied Soft Computing Journal

2010

  1. A simple linearization of the self-shrinking generator by means of cellular automata

    Neural Networks

  2. Chaotic cellular automata with cryptographic application

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

  3. Graph-based approach to the edit distance cryptanalysis of irregularly clocked linear feedback shift registers

    Journal of Universal Computer Science, Vol. 15, Núm. 15, pp. 2981-2998

  4. Using linear difference equations to model nonlinear cryptographic sequences

    International Journal of Nonlinear Sciences and Numerical Simulation, Vol. 11, Núm. 3, pp. 165-172

2009

  1. A simple attack on some clock-controlled generators

    Computers and Mathematics with Applications, Vol. 58, Núm. 1, pp. 179-188

  2. Deterministic computation of pseudorandomness in sequences of cryptographic application

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

  3. Deterministic cryptanalysis of some stream ciphers

    Security in Information Systems - Proceedings of the 7th International Workshop on Security in Information Systems - WOSIS 2009 In Conjunction with ICEIS 2009

  4. New attack strategy for the shrinking generator

    Journal of Research and Practice in Information Technology, Vol. 41, Núm. 2, pp. 181-190

  5. Rethinking self-organized public-key management for mobile ad-hoc networks

    Security in Information Systems - Proceedings of the 7th International Workshop on Security in Information Systems - WOSIS 2009 In Conjunction with ICEIS 2009

  6. Synthesis of cryptographic interleaved sequences by means of linear cellular automata

    Applied Mathematics Letters, Vol. 22, Núm. 10, pp. 1518-1524

2008

  1. A cellular automata based method for predicting binary sequences

    Proceedings of the IASTED International Conference on Artificial Intelligence and Applications, AIA 2008

  2. Cellular automata-based structures to compute the solutions of linear difference equations

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

  3. Cryptanalytic attack on cryptographic sequence generators: The class of clock-controlled shrinking generators

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

  4. Linear cellular automata as discrete models for generating cryptographic sequences

    Conferences in Research and Practice in Information Technology Series, Vol. 81, pp. 47-52

  5. Linear cellular automata as discrete models for generating cryptographic sequences

    Journal of Research and Practice in Information Technology, Vol. 40, Núm. 4, pp. 255-262

  6. New attack strategy for the shrinking generator

    Security in Information Systems - Proceedings of the 6th International Workshop on Security in Information Systems, WOSIS 2008; In Conjunction with ICEIS 2008