Instituto Universitario de Estudios de las Mujeres
Instituto de investigación
Amparo
Fúster Sabater
Publicaciones en las que colabora con Amparo Fúster Sabater (51)
2014
-
Analysis and implementation of the SNOW 3G generator used in 4G/LTE systems
Advances in Intelligent Systems and Computing
-
Análisis e implementación del generador SNOW 3G utilizado en las comunicaciones 4G
RECSI XIII: actas de la XIII Reunión Española sobre Criptología y Seguridad de la Información. Alicante, 2-5 de septiembre de 2014
-
Calculando equivalentes débiles de filtrados no lineales
RECSI XIII: actas de la XIII Reunión Española sobre Criptología y Seguridad de la Información. Alicante, 2-5 de septiembre de 2014
-
Software implementation of the SNOW 3G generator on iOS and android platforms
Logic Journal of the IGPL, Vol. 24, Núm. 1, pp. 29-41
-
Weak equivalents for nonlinear filtering functions
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2012
-
Pseudorandom generator to strengthen cooperation in VANETs
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2011
-
Analysis of the generalized self-shrinking generator
Computers and Mathematics with Applications, Vol. 61, Núm. 4, pp. 871-880
-
Chaotic modelling of the generalized self-shrinking generator
Applied Soft Computing Journal
-
Generación de secuencias criptográficas mediante ecuaciones en diferencias
XXII CEDYA Congreso de Ecuaciones Diferenciales y Aplicaciones: XII CMA Congreso de Matemática Aplicada : Palma de Mallorca, 5-9 septiembre de 2011: programa y resúmenes
2010
-
A simple linearization of the self-shrinking generator by means of cellular automata
Neural Networks
-
Chaotic cellular automata with cryptographic application
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
-
Graph-based approach to the edit distance cryptanalysis of irregularly clocked linear feedback shift registers
Journal of Universal Computer Science, Vol. 15, Núm. 15, pp. 2981-2998
-
Using linear difference equations to model nonlinear cryptographic sequences
International Journal of Nonlinear Sciences and Numerical Simulation, Vol. 11, Núm. 3, pp. 165-172
2009
-
A simple attack on some clock-controlled generators
Computers and Mathematics with Applications, Vol. 58, Núm. 1, pp. 179-188
-
Deterministic computation of pseudorandomness in sequences of cryptographic application
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
-
Deterministic cryptanalysis of some stream ciphers
Security in Information Systems - Proceedings of the 7th International Workshop on Security in Information Systems - WOSIS 2009 In Conjunction with ICEIS 2009
-
New attack strategy for the shrinking generator
Journal of Research and Practice in Information Technology, Vol. 41, Núm. 2, pp. 181-190
-
Rethinking self-organized public-key management for mobile ad-hoc networks
Security in Information Systems - Proceedings of the 7th International Workshop on Security in Information Systems - WOSIS 2009 In Conjunction with ICEIS 2009
-
Synthesis of cryptographic interleaved sequences by means of linear cellular automata
Applied Mathematics Letters, Vol. 22, Núm. 10, pp. 1518-1524
2008
-
A cellular automata based method for predicting binary sequences
Proceedings of the IASTED International Conference on Artificial Intelligence and Applications, AIA 2008