This page has only limited features, please log in for full access.
Víctor Gayoso Martínez was born in Madrid (Spain) in 1975. He obtained his Degree in Telecommunication Engineering from the Polytechnic University of Madrid in 2002, and his Ph.D. from the same university in 2010. Since 1998, he has been working in topics related to cryptography, smart cards and Java technology in private companies, universities, and public research institutions. He has published more than 25 papers in international journals and contributed to more than 45 international conferences. He is currently working at the Department of Information Processing and Cryptography (TIC) located at the Institute of Physical and Information Technologies (ITEFI), which belongs to the Spanish National Research Council (CSIC). His main topics of interest are public-key cryptography, elliptic curves, post-quantum cryptography, smart cards, biometrics, similarity search techniques, and Java and C++ programming. He is coauthor of a book about elliptic curves (Criptografía con curvas elípticas, ISBN 978-8400104320).
Traceability and monitoring of industrial processes are becoming more important to assure the value of final products. Blockchain technology emerged as part of a movement linked to criptocurrencies and the Internet of Things, providing nice-to-have features such as traceability, authenticity and security to sectors willing to use this technology. In the retail industry, blockchain offers users the possibility to monitor details about time and place of elaboration, the origin of raw materials, the quality of materials involved in the manufacturing processes, information on the people or companies that work on it, etc. It allows to control and monitor textile articles, from their production or importing initial steps, up to their acquisition by the end consumer, using the blockchain as a means of tracking and identification during the whole process. This technology can also be used by the apparel industry in general and, more specifically, for ready-to-wear clothing, for tracing suppliers and customers along the entire logistics chain. The goal of this paper is to introduce the more recent traceability schemes for the apparel industry together with the proposal of a framework for ready-to-wear clothing which allows to ensure the transparency in the supply chain, clothing authenticity, reliability and integrity, and validity of the retail final products, and of the elements that compose the whole supply chain. In order to illustrate the proposal, a case study on a women’s shirt from an apparel and fashion company, where a private and open blockchain is used for tracing the product, is included. Blockchain actors are proposed for each product stage.
Juan Bullón Pérez; Araceli Queiruga-Dios; Víctor Gayoso Martínez; Ángel Martín Del Rey. Traceability of Ready-to-Wear Clothing through Blockchain Technology. Sustainability 2020, 12, 7491 .
AMA StyleJuan Bullón Pérez, Araceli Queiruga-Dios, Víctor Gayoso Martínez, Ángel Martín Del Rey. Traceability of Ready-to-Wear Clothing through Blockchain Technology. Sustainability. 2020; 12 (18):7491.
Chicago/Turabian StyleJuan Bullón Pérez; Araceli Queiruga-Dios; Víctor Gayoso Martínez; Ángel Martín Del Rey. 2020. "Traceability of Ready-to-Wear Clothing through Blockchain Technology." Sustainability 12, no. 18: 7491.
Blockchain technology is one of the greatest innovations of the last decade as it allows new possibilities for the development of projects in fields such as services, industry, arts, economy, and logistics, among others. In the area of education, blockchain technology is still in its early stages. A large part of existing implementations focus on certificate management, leaving aside other scenarios. This document explores some possible applications of blockchain technology to the field of education, analyzing not only the benefits that blockchain could bring but also its risks and challenges. Through the review of the most interesting experiences completed so far, conclusions and predictions about the paths where this technology can take us are offered to the reader.
Wilson Rojas; Víctor Gayoso Martínez; Araceli Queiruga-Dios. Blockchain in Education: New Challenges. Proceedings of the 2nd International Conference on Data Engineering and Communication Technology 2020, 380 -389.
AMA StyleWilson Rojas, Víctor Gayoso Martínez, Araceli Queiruga-Dios. Blockchain in Education: New Challenges. Proceedings of the 2nd International Conference on Data Engineering and Communication Technology. 2020; ():380-389.
Chicago/Turabian StyleWilson Rojas; Víctor Gayoso Martínez; Araceli Queiruga-Dios. 2020. "Blockchain in Education: New Challenges." Proceedings of the 2nd International Conference on Data Engineering and Communication Technology , no. : 380-389.
The latest advances in quantum computing forced the NIST to launch an initiative for selecting quantum-resistant cryptographic algorithms. One of the best-known proposals is NewHope, an algorithm that was initially designed as a key-exchange algorithm. In its original design, NewHope presented a reconciliation mechanism that is complex and represents an entry barrier for potential implementers. This contribution presents equivalent schemes in one, two, and three dimensions, which allow anyone to make the transition to the four-dimension NewHope algorithm easier to undertake.
Víctor Gayoso Martínez; Luis Hernández Encinas; Agustín Martín Muñoz. Study of the Reconciliation Mechanism of NewHope. Proceedings of the 2nd International Conference on Data Engineering and Communication Technology 2020, 361 -370.
AMA StyleVíctor Gayoso Martínez, Luis Hernández Encinas, Agustín Martín Muñoz. Study of the Reconciliation Mechanism of NewHope. Proceedings of the 2nd International Conference on Data Engineering and Communication Technology. 2020; ():361-370.
Chicago/Turabian StyleVíctor Gayoso Martínez; Luis Hernández Encinas; Agustín Martín Muñoz. 2020. "Study of the Reconciliation Mechanism of NewHope." Proceedings of the 2nd International Conference on Data Engineering and Communication Technology , no. : 361-370.
A method is presented that allows one to compute the maximum number of functionally- independent invariant functions under the action of a linear algebraic group as long as its Lie algebra admits a basis of square-zero matrices even on a field of positive characteristic. The class of such Lie algebras is studied in the framework of the classical Lie algebras of arbitrary characteristic. Some examples and applications are also given.
Raúl Durán Díaz; Víctor Gayoso Martínez; Luis Hernández Encinas; Jaime Muñoz Masqué. The Square-Zero Basis of Matrix Lie Algebras. Mathematics 2020, 8, 1032 .
AMA StyleRaúl Durán Díaz, Víctor Gayoso Martínez, Luis Hernández Encinas, Jaime Muñoz Masqué. The Square-Zero Basis of Matrix Lie Algebras. Mathematics. 2020; 8 (6):1032.
Chicago/Turabian StyleRaúl Durán Díaz; Víctor Gayoso Martínez; Luis Hernández Encinas; Jaime Muñoz Masqué. 2020. "The Square-Zero Basis of Matrix Lie Algebras." Mathematics 8, no. 6: 1032.
The goal of digital forensics is to recover and investigate pieces of data found on digital devices, analysing in the process their relationship with other fragments of data from the same device or from different ones. Approximate matching functions, also called similarity preserving or fuzzy hashing functions, try to achieve that goal by comparing files and determining their resemblance. In this regard, ssdeep, sdhash, and LZJD are nowadays some of the best-known functions dealing with this problem. However, even though those applications are useful and trustworthy, they also have important limitations (mainly, the inability to compare files of very different sizes in the case of ssdeep and LZJD, the excessive size of sdhash and LZJD signatures, and the occasional scarce relationship between the comparison score obtained and the actual content of the files when using the three applications). In this article, we propose a new signature generation procedure and an algorithm for comparing two files through their digital signatures. Although our design is based on ssdeep, it improves some of its limitations and satisfies the requirements that approximate matching applications should fulfil. Through a set of ad-hoc and standard tests based on the FRASH framework, it is possible to state that the proposed algorithm presents remarkable overall detection strengths and is suitable for comparing files of very different sizes. A full description of the multi-thread implementation of the algorithm is included, along with all the tests employed for comparing this proposal with ssdeep, sdhash, and LZJD.
Víctor Gayoso Martínez; Fernando Hernández-Álvarez; Luis Hernández Encinas. An Improved Bytewise Approximate Matching Algorithm Suitable for Files of Dissimilar Sizes. Mathematics 2020, 8, 503 .
AMA StyleVíctor Gayoso Martínez, Fernando Hernández-Álvarez, Luis Hernández Encinas. An Improved Bytewise Approximate Matching Algorithm Suitable for Files of Dissimilar Sizes. Mathematics. 2020; 8 (4):503.
Chicago/Turabian StyleVíctor Gayoso Martínez; Fernando Hernández-Álvarez; Luis Hernández Encinas. 2020. "An Improved Bytewise Approximate Matching Algorithm Suitable for Files of Dissimilar Sizes." Mathematics 8, no. 4: 503.
Have you ever thought what would happen if a ransomware infected your laptop? This type of virus kidnaps files and encrypts them, and the only way to recover the data is by paying in bitcoin or some other cryptocurrency. This situation is undoubtedly terrible. All of your work, projects, and personal files will not be available (unless you pay the ransom). The first time students watched a video that contextualizes this stressful situation, they thought that they had been attacked by a computer virus. Fortunately, the panic only lasted a few seconds. This is the way to start a game called breakout or escape room. The difference between these two words is that, in the first case, the goal is to open a padlocked box, while the objective of an escape room is to find the key that allows to get out of a room. Both games are similar, containing riddles, puzzles, problems and some clues that would help the players to find the solution. This study analyses the use of a breakout game for educational purposes, more specifically in a university context. The experiment conducted mixes game–based learning methodologies with engineering students learning Linear Algebra, Calculus or Cryptography, which has allowed us to obtain promising results about the usage of this methodology.
Araceli Queiruga-Dios; María Jesús Santos Sánchez; Marián Queiruga Dios; Víctor Gayoso Martínez; Ascensión Hernández Encinas. A Virus Infected Your Laptop. Let’s Play an Escape Game. Mathematics 2020, 8, 166 .
AMA StyleAraceli Queiruga-Dios, María Jesús Santos Sánchez, Marián Queiruga Dios, Víctor Gayoso Martínez, Ascensión Hernández Encinas. A Virus Infected Your Laptop. Let’s Play an Escape Game. Mathematics. 2020; 8 (2):166.
Chicago/Turabian StyleAraceli Queiruga-Dios; María Jesús Santos Sánchez; Marián Queiruga Dios; Víctor Gayoso Martínez; Ascensión Hernández Encinas. 2020. "A Virus Infected Your Laptop. Let’s Play an Escape Game." Mathematics 8, no. 2: 166.
Blockchain is one of the most interesting emerging technologies nowadays, with applications ranging from cryptocurrencies to smart contracts. This paper presents a review of the cryptographic tools necessary to understand the fundamentals of this technology and the foundations of its security. Among other elements, hash functions, digital signatures, elliptic curves, and Merkle trees are reviewed in the scope of their usage as building blocks of this technology.
Víctor Gayoso Martínez; Luis Hernández-Álvarez; Luis Hernández Encinas. Analysis of the Cryptographic Tools for Blockchain and Bitcoin. Mathematics 2020, 8, 131 .
AMA StyleVíctor Gayoso Martínez, Luis Hernández-Álvarez, Luis Hernández Encinas. Analysis of the Cryptographic Tools for Blockchain and Bitcoin. Mathematics. 2020; 8 (1):131.
Chicago/Turabian StyleVíctor Gayoso Martínez; Luis Hernández-Álvarez; Luis Hernández Encinas. 2020. "Analysis of the Cryptographic Tools for Blockchain and Bitcoin." Mathematics 8, no. 1: 131.
Initially developed for tasks related to computer graphics, graphics processing units are increasingly being used for general purpose processing, including scientific and engineering applications. In this contribution, we have compared the performance of two graphics cards that belong to the parallel computing Compute Unified Device Architecture (CUDA) platform with two C++ and Java multi-threading implementations, using as an example of computation a brute-force attack on Hitag2, a well-known remote keyless entry application. The results allow us to provide valuable information regarding the compared capabilities of the tested platforms and to confirm that such a weak encryption system could be broken in less than a day with medium cost equipment.
V Gayoso Martínez; L Hernández Encinas; A Martín Muñoz; O Martínez-Graullera. Comparing low and medium cost computer-based technologies suitable for cryptographic attacks. Logic Journal of the IGPL 2018, 27, 177 -188.
AMA StyleV Gayoso Martínez, L Hernández Encinas, A Martín Muñoz, O Martínez-Graullera. Comparing low and medium cost computer-based technologies suitable for cryptographic attacks. Logic Journal of the IGPL. 2018; 27 (2):177-188.
Chicago/Turabian StyleV Gayoso Martínez; L Hernández Encinas; A Martín Muñoz; O Martínez-Graullera. 2018. "Comparing low and medium cost computer-based technologies suitable for cryptographic attacks." Logic Journal of the IGPL 27, no. 2: 177-188.
R. Durán Díaz; V. Gayoso Martínez; L. Hernández Encinas; J. Muñoz Masqué. Square-Zero Basis of Matrix Lie Algebras. 2018, 1 .
AMA StyleR. Durán Díaz, V. Gayoso Martínez, L. Hernández Encinas, J. Muñoz Masqué. Square-Zero Basis of Matrix Lie Algebras. . 2018; ():1.
Chicago/Turabian StyleR. Durán Díaz; V. Gayoso Martínez; L. Hernández Encinas; J. Muñoz Masqué. 2018. "Square-Zero Basis of Matrix Lie Algebras." , no. : 1.
As a result of the Bologna Accord and the creation of a European area of higher education, computers and other information technologies have been increasingly used in academic studies with the aim of improving the performance of students. This paper presents the results of a teaching experience using mobile phones and gamification services in engineering degrees as a tool for leveraging the comprehension of mathematical concepts.
Juan Jose Bullon; Ascensión Hernández Encinas; M. Jesus Santos Sanchez; Victor Gayoso Martinez. Analysis of student feedback when using gamification tools in math subjects. 2018 IEEE Global Engineering Education Conference (EDUCON) 2018, 1818 -1823.
AMA StyleJuan Jose Bullon, Ascensión Hernández Encinas, M. Jesus Santos Sanchez, Victor Gayoso Martinez. Analysis of student feedback when using gamification tools in math subjects. 2018 IEEE Global Engineering Education Conference (EDUCON). 2018; ():1818-1823.
Chicago/Turabian StyleJuan Jose Bullon; Ascensión Hernández Encinas; M. Jesus Santos Sanchez; Victor Gayoso Martinez. 2018. "Analysis of student feedback when using gamification tools in math subjects." 2018 IEEE Global Engineering Education Conference (EDUCON) , no. : 1818-1823.
The team that has developed this project is part of a consortium of several European institutions that have joined with a common goal: to help the current engineering teaching-learning system, so that to make possible a competencies-based assessment. Moreover advocacy and networking will be part of the consortium activities during the whole project. RULES_MATH acronym corresponds to `New rules for assessing mathematical competencies', and that is exactly what we propose: to work with the mathematical competencies, specifically try to incorporate them into the assessment process. We focus on science and engineering degrees, since in all these studies several Mathematics courses are part of their curriculum, mainly in the first couple of years. In this paper we present one of our first activities that we want to achieve under the project: the selection of several tools and rules that will make possible an assessment and evaluation according to our high education common European space. These ideas are part of the objectives of promoting and institutionalizing good teaching practices and the enhancement of teaching materials. Other goals are to improve the dissemination of academic activities to the business world, administrations and society in general.
Araceli Queiruga-Dios; Víctor Gayoso-Martínez; M. Jesus Santos Sanchez; Juan José Bullón Pérez; Jesus Martín-Vaquero; Ascensión Hernández Encinas; Snezhana Gocheva-Ilieva; Marie Demlová; Deolinda Dias Rasteiro; Cristina Caridade. Evaluating engineering competencies: A new paradigm. 2018 IEEE Global Engineering Education Conference (EDUCON) 2018, 2052 -2055.
AMA StyleAraceli Queiruga-Dios, Víctor Gayoso-Martínez, M. Jesus Santos Sanchez, Juan José Bullón Pérez, Jesus Martín-Vaquero, Ascensión Hernández Encinas, Snezhana Gocheva-Ilieva, Marie Demlová, Deolinda Dias Rasteiro, Cristina Caridade. Evaluating engineering competencies: A new paradigm. 2018 IEEE Global Engineering Education Conference (EDUCON). 2018; ():2052-2055.
Chicago/Turabian StyleAraceli Queiruga-Dios; Víctor Gayoso-Martínez; M. Jesus Santos Sanchez; Juan José Bullón Pérez; Jesus Martín-Vaquero; Ascensión Hernández Encinas; Snezhana Gocheva-Ilieva; Marie Demlová; Deolinda Dias Rasteiro; Cristina Caridade. 2018. "Evaluating engineering competencies: A new paradigm." 2018 IEEE Global Engineering Education Conference (EDUCON) , no. : 2052-2055.
Let $\mathbb{F}$ be a field, let $V=\mathbb{F}^3$, and let $A\colon V\to V$ a linear map. The polynomial $P(x)=\det (x_1I+x_2A+x_3A^2)$ does not depend on $A$ but only on its characteristic polynomial $\chi(X)$. A law of composition $\oplus \colon V\times V \to V$ is defined and it induces an Abelian group law on $\mathbb{F}P^2\setminus P^{-1}(0)$. The cubic $P^{-1}(0)$ is irreducible if and only if $\chi $ is irreducible in $\mathbb{F}[X]$, and in this case the group law $\oplus $ is cyclic.
R. Durán Díaz; V. Gayoso Martinez; L. Hernández Encinas; J. Muñoz Masqué. A group law for PKC purposes. 2018, 1 .
AMA StyleR. Durán Díaz, V. Gayoso Martinez, L. Hernández Encinas, J. Muñoz Masqué. A group law for PKC purposes. . 2018; ():1.
Chicago/Turabian StyleR. Durán Díaz; V. Gayoso Martinez; L. Hernández Encinas; J. Muñoz Masqué. 2018. "A group law for PKC purposes." , no. : 1.
Jesús Martín-Vaquero; University of Salamanca; Ascensión Hernández Encinas; Araceli Queiruga-Dios; Víctor Gayoso-Martínez; Ángel Martín Del Rey. Numerical schemes for general Klein–Gordon equations with Dirichlet and nonlocal boundary conditions. Nonlinear Analysis: Modelling and Control 2018, 50 -62.
AMA StyleJesús Martín-Vaquero, University of Salamanca, Ascensión Hernández Encinas, Araceli Queiruga-Dios, Víctor Gayoso-Martínez, Ángel Martín Del Rey. Numerical schemes for general Klein–Gordon equations with Dirichlet and nonlocal boundary conditions. Nonlinear Analysis: Modelling and Control. 2018; ():50-62.
Chicago/Turabian StyleJesús Martín-Vaquero; University of Salamanca; Ascensión Hernández Encinas; Araceli Queiruga-Dios; Víctor Gayoso-Martínez; Ángel Martín Del Rey. 2018. "Numerical schemes for general Klein–Gordon equations with Dirichlet and nonlocal boundary conditions." Nonlinear Analysis: Modelling and Control , no. : 50-62.
The distinctive security features of the Spanish electronic national identity card allow us to propose the usage of this cryptographic smart card in an authentication framework that can be used during the registration and login phases of certain internet services, including popular social networks. Using this mechanism with NFC-capable devices, the identity and age of the potential user can be determined, allowing or denying the access to the service based on that information.
Víctor Gayoso Martínez; Luis Hernández Encinas; Agustin Martín Muñoz; Raúl Durán Díaz. A Proposal for Using a Cryptographic National Identity Card in Social Networks. Advances in Intelligent Systems and Computing 2017, 651 -660.
AMA StyleVíctor Gayoso Martínez, Luis Hernández Encinas, Agustin Martín Muñoz, Raúl Durán Díaz. A Proposal for Using a Cryptographic National Identity Card in Social Networks. Advances in Intelligent Systems and Computing. 2017; ():651-660.
Chicago/Turabian StyleVíctor Gayoso Martínez; Luis Hernández Encinas; Agustin Martín Muñoz; Raúl Durán Díaz. 2017. "A Proposal for Using a Cryptographic National Identity Card in Social Networks." Advances in Intelligent Systems and Computing , no. : 651-660.
Elliptic Curve Cryptography (ECC) is a branch of public-key cryptography based on the arithmetic of elliptic curves. In the short life of ECC, most standards have proposed curves defined over prime finite fields satisfying the curve equation in the short Weierstrass form. However, some researchers have started to propose as a more secure alternative the use of Edwards and Montgomery elliptic curves, which could have an impact in current ECC deployments. This contribution evaluates the performance of the three types of elliptic curves using some of the examples provided by the initiative SafeCurves and a Java implementation developed by the authors, which allows us to offer some conclusions about this topic.
Raúl Durán Díaz; Victor Gayoso Martínez; Luis Hernández Encinas; Agustin Martín Muñoz. A Study on the Performance of Secure Elliptic Curves for Cryptographic Purposes. Proceedings of the 2nd International Conference on Data Engineering and Communication Technology 2016, 658 -667.
AMA StyleRaúl Durán Díaz, Victor Gayoso Martínez, Luis Hernández Encinas, Agustin Martín Muñoz. A Study on the Performance of Secure Elliptic Curves for Cryptographic Purposes. Proceedings of the 2nd International Conference on Data Engineering and Communication Technology. 2016; ():658-667.
Chicago/Turabian StyleRaúl Durán Díaz; Victor Gayoso Martínez; Luis Hernández Encinas; Agustin Martín Muñoz. 2016. "A Study on the Performance of Secure Elliptic Curves for Cryptographic Purposes." Proceedings of the 2nd International Conference on Data Engineering and Communication Technology , no. : 658-667.
Smart cards are well-known tamper-resistant devices, and due to their portability and security they represent an excellent platform for implementing strong authentication services. This contribution analyses three Spanish smart card deployments intended to be used for eGoverment services, comparing their respective contents and capabilities. As a result of our analysis, we conclude that the current deployment of smart cards for the electronic prescription service being rolled out throughout Spain could be replaced by the use of the already consolidated Spanish National Identity card.
V. Gayoso Martínez; Luis Hernandez Encinas; A. Martín Muñoz; M. A. Álvarez Mariño; D. Arroyo Guardeño. A comparative study of three Spanish eGoverment smart cards. Logic Journal of the IGPL 2016, 25, 42 -53.
AMA StyleV. Gayoso Martínez, Luis Hernandez Encinas, A. Martín Muñoz, M. A. Álvarez Mariño, D. Arroyo Guardeño. A comparative study of three Spanish eGoverment smart cards. Logic Journal of the IGPL. 2016; 25 (1):42-53.
Chicago/Turabian StyleV. Gayoso Martínez; Luis Hernandez Encinas; A. Martín Muñoz; M. A. Álvarez Mariño; D. Arroyo Guardeño. 2016. "A comparative study of three Spanish eGoverment smart cards." Logic Journal of the IGPL 25, no. 1: 42-53.
Ascensión Hernández Encinas; Jesus Martin-Vaquero; Araceli Queiruga-Dios; Víctor Gayoso-Martínez; Higher Technical School of Industrial Engineering (ETSII) University of Salamanca; Information Security Institute (ISI) Spanish National Research Council (CSIC). Efficient high-order finite difference methods for nonlinear Klein–Gordon equations. I: Variants of the phi-four model and the form-I of the nonlinear Klein–Gordon equation. Nonlinear Analysis: Modelling and Control 2015, 20, 274 -290.
AMA StyleAscensión Hernández Encinas, Jesus Martin-Vaquero, Araceli Queiruga-Dios, Víctor Gayoso-Martínez, Higher Technical School of Industrial Engineering (ETSII) University of Salamanca, Information Security Institute (ISI) Spanish National Research Council (CSIC). Efficient high-order finite difference methods for nonlinear Klein–Gordon equations. I: Variants of the phi-four model and the form-I of the nonlinear Klein–Gordon equation. Nonlinear Analysis: Modelling and Control. 2015; 20 (2):274-290.
Chicago/Turabian StyleAscensión Hernández Encinas; Jesus Martin-Vaquero; Araceli Queiruga-Dios; Víctor Gayoso-Martínez; Higher Technical School of Industrial Engineering (ETSII) University of Salamanca; Information Security Institute (ISI) Spanish National Research Council (CSIC). 2015. "Efficient high-order finite difference methods for nonlinear Klein–Gordon equations. I: Variants of the phi-four model and the form-I of the nonlinear Klein–Gordon equation." Nonlinear Analysis: Modelling and Control 20, no. 2: 274-290.
D. Arroyo Guardeño; V. Gayoso Martínez; Luis Hernández Encinas; A. Martín Muñoz. Using Smart Cards for Authenticating in Public Services: A Comparative Study. Advances in Intelligent Systems and Computing 2015, 437 -446.
AMA StyleD. Arroyo Guardeño, V. Gayoso Martínez, Luis Hernández Encinas, A. Martín Muñoz. Using Smart Cards for Authenticating in Public Services: A Comparative Study. Advances in Intelligent Systems and Computing. 2015; ():437-446.
Chicago/Turabian StyleD. Arroyo Guardeño; V. Gayoso Martínez; Luis Hernández Encinas; A. Martín Muñoz. 2015. "Using Smart Cards for Authenticating in Public Services: A Comparative Study." Advances in Intelligent Systems and Computing , no. : 437-446.
The most popular encryption scheme based on elliptic curves is the Elliptic Curve Integrated Encryption Scheme (ECIES), which is included in ANSI X9.63, IEEE 1363a, ISO/IEC 18033-2, and SECG SEC 1. These standards offer many ECIES options, not always compatible, making it difficult to decide what parameters and cryptographic elements to use in a specific deployment scenario. In this work, the authors show that a secure and practical implementation of ECIES can only be compatible with two of the four previously mentioned standards. They also provide the list of functions and options that must be used in such an implementation. Finally, they present the results obtained when testing this ECIES version implemented as a Java application, which allows them to offer some comments about the performance and feasibility of their proposed solution.
V. Gayoso Martinez; Luis Hernandez Encinas; Araceli Queiruga Dios. Security and Practical Considerations When Implementing the Elliptic Curve Integrated Encryption Scheme. Cryptologia 2015, 39, 244 -269.
AMA StyleV. Gayoso Martinez, Luis Hernandez Encinas, Araceli Queiruga Dios. Security and Practical Considerations When Implementing the Elliptic Curve Integrated Encryption Scheme. Cryptologia. 2015; 39 (3):244-269.
Chicago/Turabian StyleV. Gayoso Martinez; Luis Hernandez Encinas; Araceli Queiruga Dios. 2015. "Security and Practical Considerations When Implementing the Elliptic Curve Integrated Encryption Scheme." Cryptologia 39, no. 3: 244-269.
Araceli Queiruga Dios; Ascensión Hernández Encinas; I. Visus Ruiz; Luis Hernandez Encinas; Víctor Gayoso Martínez; E. Yuste Domínguez. A Learning Resource to Acquire Engineering Skills through Programming Languages. Procedia - Social and Behavioral Sciences 2014, 116, 1305 -1308.
AMA StyleAraceli Queiruga Dios, Ascensión Hernández Encinas, I. Visus Ruiz, Luis Hernandez Encinas, Víctor Gayoso Martínez, E. Yuste Domínguez. A Learning Resource to Acquire Engineering Skills through Programming Languages. Procedia - Social and Behavioral Sciences. 2014; 116 ():1305-1308.
Chicago/Turabian StyleAraceli Queiruga Dios; Ascensión Hernández Encinas; I. Visus Ruiz; Luis Hernandez Encinas; Víctor Gayoso Martínez; E. Yuste Domínguez. 2014. "A Learning Resource to Acquire Engineering Skills through Programming Languages." Procedia - Social and Behavioral Sciences 116, no. : 1305-1308.