Instituto Universitario de Estudios de las Mujeres
Instituto de investigación
Centro de Tecnologías Físicas y de la Información Leonardo Torres Quevedo
Madrid, EspañaPublicaciones en colaboración con investigadores/as de Centro de Tecnologías Físicas y de la Información Leonardo Torres Quevedo (41)
2014
-
Analysis and implementation of the SNOW 3G generator used in 4G/LTE systems
Advances in Intelligent Systems and Computing
2012
-
Pseudorandom generator to strengthen cooperation in VANETs
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2011
-
Analysis of the generalized self-shrinking generator
Computers and Mathematics with Applications, Vol. 61, Núm. 4, pp. 871-880
-
Chaotic modelling of the generalized self-shrinking generator
Applied Soft Computing Journal
2010
-
A simple linearization of the self-shrinking generator by means of cellular automata
Neural Networks
-
Chaotic cellular automata with cryptographic application
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
-
Graph-based approach to the edit distance cryptanalysis of irregularly clocked linear feedback shift registers
Journal of Universal Computer Science, Vol. 15, Núm. 15, pp. 2981-2998
-
Using linear difference equations to model nonlinear cryptographic sequences
International Journal of Nonlinear Sciences and Numerical Simulation, Vol. 11, Núm. 3, pp. 165-172
2009
-
A simple attack on some clock-controlled generators
Computers and Mathematics with Applications, Vol. 58, Núm. 1, pp. 179-188
-
Deterministic computation of pseudorandomness in sequences of cryptographic application
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
-
Deterministic cryptanalysis of some stream ciphers
Security in Information Systems - Proceedings of the 7th International Workshop on Security in Information Systems - WOSIS 2009 In Conjunction with ICEIS 2009
-
New attack strategy for the shrinking generator
Journal of Research and Practice in Information Technology, Vol. 41, Núm. 2, pp. 181-190
-
Rethinking self-organized public-key management for mobile ad-hoc networks
Security in Information Systems - Proceedings of the 7th International Workshop on Security in Information Systems - WOSIS 2009 In Conjunction with ICEIS 2009
-
Synthesis of cryptographic interleaved sequences by means of linear cellular automata
Applied Mathematics Letters, Vol. 22, Núm. 10, pp. 1518-1524
2008
-
A cellular automata based method for predicting binary sequences
Proceedings of the IASTED International Conference on Artificial Intelligence and Applications, AIA 2008
-
Cellular automata-based structures to compute the solutions of linear difference equations
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
-
Cryptanalytic attack on cryptographic sequence generators: The class of clock-controlled shrinking generators
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
-
Linear cellular automata as discrete models for generating cryptographic sequences
Journal of Research and Practice in Information Technology, Vol. 40, Núm. 4, pp. 255-262
-
Linear cellular automata as discrete models for generating cryptographic sequences
Conferences in Research and Practice in Information Technology Series, Vol. 81, pp. 47-52
-
New attack strategy for the shrinking generator
Security in Information Systems - Proceedings of the 6th International Workshop on Security in Information Systems, WOSIS 2008; In Conjunction with ICEIS 2008