This page has only limited features, please log in for full access.

Dr. Víctor Gayoso Martínez
Spanish National Research Council (CSIC)

Basic Info


Research Keywords & Expertise

0 Biometrics
0 C++
0 Cryptography
0 Encryption
0 Java

Fingerprints

Java
Cryptography
Elliptic curve
Encryption
Smart Cards
Programming
C++

Honors and Awards

The user has no records in this section


Career Timeline

The user has no records in this section.


Short Biography

Víctor Gayoso Martínez was born in Madrid (Spain) in 1975. He obtained his Degree in Telecommunication Engineering from the Polytechnic University of Madrid in 2002, and his Ph.D. from the same university in 2010. Since 1998, he has been working in topics related to cryptography, smart cards and Java technology in private companies, universities, and public research institutions. He has published more than 25 papers in international journals and contributed to more than 45 international conferences. He is currently working at the Department of Information Processing and Cryptography (TIC) located at the Institute of Physical and Information Technologies (ITEFI), which belongs to the Spanish National Research Council (CSIC). His main topics of interest are public-key cryptography, elliptic curves, post-quantum cryptography, smart cards, biometrics, similarity search techniques, and Java and C++ programming. He is coauthor of a book about elliptic curves (Criptografía con curvas elípticas, ISBN 978-8400104320).

Following
Followers
Co Authors
The list of users this user is following is empty.
Following: 0 users

Feed

Journal article
Published: 11 September 2020 in Sustainability
Reads 0
Downloads 0

Traceability and monitoring of industrial processes are becoming more important to assure the value of final products. Blockchain technology emerged as part of a movement linked to criptocurrencies and the Internet of Things, providing nice-to-have features such as traceability, authenticity and security to sectors willing to use this technology. In the retail industry, blockchain offers users the possibility to monitor details about time and place of elaboration, the origin of raw materials, the quality of materials involved in the manufacturing processes, information on the people or companies that work on it, etc. It allows to control and monitor textile articles, from their production or importing initial steps, up to their acquisition by the end consumer, using the blockchain as a means of tracking and identification during the whole process. This technology can also be used by the apparel industry in general and, more specifically, for ready-to-wear clothing, for tracing suppliers and customers along the entire logistics chain. The goal of this paper is to introduce the more recent traceability schemes for the apparel industry together with the proposal of a framework for ready-to-wear clothing which allows to ensure the transparency in the supply chain, clothing authenticity, reliability and integrity, and validity of the retail final products, and of the elements that compose the whole supply chain. In order to illustrate the proposal, a case study on a women’s shirt from an apparel and fashion company, where a private and open blockchain is used for tracing the product, is included. Blockchain actors are proposed for each product stage.

ACS Style

Juan Bullón Pérez; Araceli Queiruga-Dios; Víctor Gayoso Martínez; Ángel Martín Del Rey. Traceability of Ready-to-Wear Clothing through Blockchain Technology. Sustainability 2020, 12, 7491 .

AMA Style

Juan Bullón Pérez, Araceli Queiruga-Dios, Víctor Gayoso Martínez, Ángel Martín Del Rey. Traceability of Ready-to-Wear Clothing through Blockchain Technology. Sustainability. 2020; 12 (18):7491.

Chicago/Turabian Style

Juan Bullón Pérez; Araceli Queiruga-Dios; Víctor Gayoso Martínez; Ángel Martín Del Rey. 2020. "Traceability of Ready-to-Wear Clothing through Blockchain Technology." Sustainability 12, no. 18: 7491.

Conference paper
Published: 28 August 2020 in Proceedings of the 2nd International Conference on Data Engineering and Communication Technology
Reads 0
Downloads 0

Blockchain technology is one of the greatest innovations of the last decade as it allows new possibilities for the development of projects in fields such as services, industry, arts, economy, and logistics, among others. In the area of education, blockchain technology is still in its early stages. A large part of existing implementations focus on certificate management, leaving aside other scenarios. This document explores some possible applications of blockchain technology to the field of education, analyzing not only the benefits that blockchain could bring but also its risks and challenges. Through the review of the most interesting experiences completed so far, conclusions and predictions about the paths where this technology can take us are offered to the reader.

ACS Style

Wilson Rojas; Víctor Gayoso Martínez; Araceli Queiruga-Dios. Blockchain in Education: New Challenges. Proceedings of the 2nd International Conference on Data Engineering and Communication Technology 2020, 380 -389.

AMA Style

Wilson Rojas, Víctor Gayoso Martínez, Araceli Queiruga-Dios. Blockchain in Education: New Challenges. Proceedings of the 2nd International Conference on Data Engineering and Communication Technology. 2020; ():380-389.

Chicago/Turabian Style

Wilson Rojas; Víctor Gayoso Martínez; Araceli Queiruga-Dios. 2020. "Blockchain in Education: New Challenges." Proceedings of the 2nd International Conference on Data Engineering and Communication Technology , no. : 380-389.

Conference paper
Published: 28 August 2020 in Proceedings of the 2nd International Conference on Data Engineering and Communication Technology
Reads 0
Downloads 0

The latest advances in quantum computing forced the NIST to launch an initiative for selecting quantum-resistant cryptographic algorithms. One of the best-known proposals is NewHope, an algorithm that was initially designed as a key-exchange algorithm. In its original design, NewHope presented a reconciliation mechanism that is complex and represents an entry barrier for potential implementers. This contribution presents equivalent schemes in one, two, and three dimensions, which allow anyone to make the transition to the four-dimension NewHope algorithm easier to undertake.

ACS Style

Víctor Gayoso Martínez; Luis Hernández Encinas; Agustín Martín Muñoz. Study of the Reconciliation Mechanism of NewHope. Proceedings of the 2nd International Conference on Data Engineering and Communication Technology 2020, 361 -370.

AMA Style

Víctor Gayoso Martínez, Luis Hernández Encinas, Agustín Martín Muñoz. Study of the Reconciliation Mechanism of NewHope. Proceedings of the 2nd International Conference on Data Engineering and Communication Technology. 2020; ():361-370.

Chicago/Turabian Style

Víctor Gayoso Martínez; Luis Hernández Encinas; Agustín Martín Muñoz. 2020. "Study of the Reconciliation Mechanism of NewHope." Proceedings of the 2nd International Conference on Data Engineering and Communication Technology , no. : 361-370.

Journal article
Published: 24 June 2020 in Mathematics
Reads 0
Downloads 0

A method is presented that allows one to compute the maximum number of functionally- independent invariant functions under the action of a linear algebraic group as long as its Lie algebra admits a basis of square-zero matrices even on a field of positive characteristic. The class of such Lie algebras is studied in the framework of the classical Lie algebras of arbitrary characteristic. Some examples and applications are also given.

ACS Style

Raúl Durán Díaz; Víctor Gayoso Martínez; Luis Hernández Encinas; Jaime Muñoz Masqué. The Square-Zero Basis of Matrix Lie Algebras. Mathematics 2020, 8, 1032 .

AMA Style

Raúl Durán Díaz, Víctor Gayoso Martínez, Luis Hernández Encinas, Jaime Muñoz Masqué. The Square-Zero Basis of Matrix Lie Algebras. Mathematics. 2020; 8 (6):1032.

Chicago/Turabian Style

Raúl Durán Díaz; Víctor Gayoso Martínez; Luis Hernández Encinas; Jaime Muñoz Masqué. 2020. "The Square-Zero Basis of Matrix Lie Algebras." Mathematics 8, no. 6: 1032.

Journal article
Published: 02 April 2020 in Mathematics
Reads 0
Downloads 0

The goal of digital forensics is to recover and investigate pieces of data found on digital devices, analysing in the process their relationship with other fragments of data from the same device or from different ones. Approximate matching functions, also called similarity preserving or fuzzy hashing functions, try to achieve that goal by comparing files and determining their resemblance. In this regard, ssdeep, sdhash, and LZJD are nowadays some of the best-known functions dealing with this problem. However, even though those applications are useful and trustworthy, they also have important limitations (mainly, the inability to compare files of very different sizes in the case of ssdeep and LZJD, the excessive size of sdhash and LZJD signatures, and the occasional scarce relationship between the comparison score obtained and the actual content of the files when using the three applications). In this article, we propose a new signature generation procedure and an algorithm for comparing two files through their digital signatures. Although our design is based on ssdeep, it improves some of its limitations and satisfies the requirements that approximate matching applications should fulfil. Through a set of ad-hoc and standard tests based on the FRASH framework, it is possible to state that the proposed algorithm presents remarkable overall detection strengths and is suitable for comparing files of very different sizes. A full description of the multi-thread implementation of the algorithm is included, along with all the tests employed for comparing this proposal with ssdeep, sdhash, and LZJD.

ACS Style

Víctor Gayoso Martínez; Fernando Hernández-Álvarez; Luis Hernández Encinas. An Improved Bytewise Approximate Matching Algorithm Suitable for Files of Dissimilar Sizes. Mathematics 2020, 8, 503 .

AMA Style

Víctor Gayoso Martínez, Fernando Hernández-Álvarez, Luis Hernández Encinas. An Improved Bytewise Approximate Matching Algorithm Suitable for Files of Dissimilar Sizes. Mathematics. 2020; 8 (4):503.

Chicago/Turabian Style

Víctor Gayoso Martínez; Fernando Hernández-Álvarez; Luis Hernández Encinas. 2020. "An Improved Bytewise Approximate Matching Algorithm Suitable for Files of Dissimilar Sizes." Mathematics 8, no. 4: 503.

Journal article
Published: 29 January 2020 in Mathematics
Reads 0
Downloads 0

Have you ever thought what would happen if a ransomware infected your laptop? This type of virus kidnaps files and encrypts them, and the only way to recover the data is by paying in bitcoin or some other cryptocurrency. This situation is undoubtedly terrible. All of your work, projects, and personal files will not be available (unless you pay the ransom). The first time students watched a video that contextualizes this stressful situation, they thought that they had been attacked by a computer virus. Fortunately, the panic only lasted a few seconds. This is the way to start a game called breakout or escape room. The difference between these two words is that, in the first case, the goal is to open a padlocked box, while the objective of an escape room is to find the key that allows to get out of a room. Both games are similar, containing riddles, puzzles, problems and some clues that would help the players to find the solution. This study analyses the use of a breakout game for educational purposes, more specifically in a university context. The experiment conducted mixes game–based learning methodologies with engineering students learning Linear Algebra, Calculus or Cryptography, which has allowed us to obtain promising results about the usage of this methodology.

ACS Style

Araceli Queiruga-Dios; María Jesús Santos Sánchez; Marián Queiruga Dios; Víctor Gayoso Martínez; Ascensión Hernández Encinas. A Virus Infected Your Laptop. Let’s Play an Escape Game. Mathematics 2020, 8, 166 .

AMA Style

Araceli Queiruga-Dios, María Jesús Santos Sánchez, Marián Queiruga Dios, Víctor Gayoso Martínez, Ascensión Hernández Encinas. A Virus Infected Your Laptop. Let’s Play an Escape Game. Mathematics. 2020; 8 (2):166.

Chicago/Turabian Style

Araceli Queiruga-Dios; María Jesús Santos Sánchez; Marián Queiruga Dios; Víctor Gayoso Martínez; Ascensión Hernández Encinas. 2020. "A Virus Infected Your Laptop. Let’s Play an Escape Game." Mathematics 8, no. 2: 166.

Review
Published: 15 January 2020 in Mathematics
Reads 0
Downloads 0

Blockchain is one of the most interesting emerging technologies nowadays, with applications ranging from cryptocurrencies to smart contracts. This paper presents a review of the cryptographic tools necessary to understand the fundamentals of this technology and the foundations of its security. Among other elements, hash functions, digital signatures, elliptic curves, and Merkle trees are reviewed in the scope of their usage as building blocks of this technology.

ACS Style

Víctor Gayoso Martínez; Luis Hernández-Álvarez; Luis Hernández Encinas. Analysis of the Cryptographic Tools for Blockchain and Bitcoin. Mathematics 2020, 8, 131 .

AMA Style

Víctor Gayoso Martínez, Luis Hernández-Álvarez, Luis Hernández Encinas. Analysis of the Cryptographic Tools for Blockchain and Bitcoin. Mathematics. 2020; 8 (1):131.

Chicago/Turabian Style

Víctor Gayoso Martínez; Luis Hernández-Álvarez; Luis Hernández Encinas. 2020. "Analysis of the Cryptographic Tools for Blockchain and Bitcoin." Mathematics 8, no. 1: 131.

Journal article
Published: 17 September 2018 in Logic Journal of the IGPL
Reads 0
Downloads 0

Initially developed for tasks related to computer graphics, graphics processing units are increasingly being used for general purpose processing, including scientific and engineering applications. In this contribution, we have compared the performance of two graphics cards that belong to the parallel computing Compute Unified Device Architecture (CUDA) platform with two C++ and Java multi-threading implementations, using as an example of computation a brute-force attack on Hitag2, a well-known remote keyless entry application. The results allow us to provide valuable information regarding the compared capabilities of the tested platforms and to confirm that such a weak encryption system could be broken in less than a day with medium cost equipment.

ACS Style

V Gayoso Martínez; L Hernández Encinas; A Martín Muñoz; O Martínez-Graullera. Comparing low and medium cost computer-based technologies suitable for cryptographic attacks. Logic Journal of the IGPL 2018, 27, 177 -188.

AMA Style

V Gayoso Martínez, L Hernández Encinas, A Martín Muñoz, O Martínez-Graullera. Comparing low and medium cost computer-based technologies suitable for cryptographic attacks. Logic Journal of the IGPL. 2018; 27 (2):177-188.

Chicago/Turabian Style

V Gayoso Martínez; L Hernández Encinas; A Martín Muñoz; O Martínez-Graullera. 2018. "Comparing low and medium cost computer-based technologies suitable for cryptographic attacks." Logic Journal of the IGPL 27, no. 2: 177-188.

Preprint
Published: 17 July 2018
Reads 0
Downloads 0
ACS Style

R. Durán Díaz; V. Gayoso Martínez; L. Hernández Encinas; J. Muñoz Masqué. Square-Zero Basis of Matrix Lie Algebras. 2018, 1 .

AMA Style

R. Durán Díaz, V. Gayoso Martínez, L. Hernández Encinas, J. Muñoz Masqué. Square-Zero Basis of Matrix Lie Algebras. . 2018; ():1.

Chicago/Turabian Style

R. Durán Díaz; V. Gayoso Martínez; L. Hernández Encinas; J. Muñoz Masqué. 2018. "Square-Zero Basis of Matrix Lie Algebras." , no. : 1.

Conference paper
Published: 01 April 2018 in 2018 IEEE Global Engineering Education Conference (EDUCON)
Reads 0
Downloads 0

As a result of the Bologna Accord and the creation of a European area of higher education, computers and other information technologies have been increasingly used in academic studies with the aim of improving the performance of students. This paper presents the results of a teaching experience using mobile phones and gamification services in engineering degrees as a tool for leveraging the comprehension of mathematical concepts.

ACS Style

Juan Jose Bullon; Ascensión Hernández Encinas; M. Jesus Santos Sanchez; Victor Gayoso Martinez. Analysis of student feedback when using gamification tools in math subjects. 2018 IEEE Global Engineering Education Conference (EDUCON) 2018, 1818 -1823.

AMA Style

Juan Jose Bullon, Ascensión Hernández Encinas, M. Jesus Santos Sanchez, Victor Gayoso Martinez. Analysis of student feedback when using gamification tools in math subjects. 2018 IEEE Global Engineering Education Conference (EDUCON). 2018; ():1818-1823.

Chicago/Turabian Style

Juan Jose Bullon; Ascensión Hernández Encinas; M. Jesus Santos Sanchez; Victor Gayoso Martinez. 2018. "Analysis of student feedback when using gamification tools in math subjects." 2018 IEEE Global Engineering Education Conference (EDUCON) , no. : 1818-1823.

Conference paper
Published: 01 April 2018 in 2018 IEEE Global Engineering Education Conference (EDUCON)
Reads 0
Downloads 0

The team that has developed this project is part of a consortium of several European institutions that have joined with a common goal: to help the current engineering teaching-learning system, so that to make possible a competencies-based assessment. Moreover advocacy and networking will be part of the consortium activities during the whole project. RULES_MATH acronym corresponds to `New rules for assessing mathematical competencies', and that is exactly what we propose: to work with the mathematical competencies, specifically try to incorporate them into the assessment process. We focus on science and engineering degrees, since in all these studies several Mathematics courses are part of their curriculum, mainly in the first couple of years. In this paper we present one of our first activities that we want to achieve under the project: the selection of several tools and rules that will make possible an assessment and evaluation according to our high education common European space. These ideas are part of the objectives of promoting and institutionalizing good teaching practices and the enhancement of teaching materials. Other goals are to improve the dissemination of academic activities to the business world, administrations and society in general.

ACS Style

Araceli Queiruga-Dios; Víctor Gayoso-Martínez; M. Jesus Santos Sanchez; Juan José Bullón Pérez; Jesus Martín-Vaquero; Ascensión Hernández Encinas; Snezhana Gocheva-Ilieva; Marie Demlová; Deolinda Dias Rasteiro; Cristina Caridade. Evaluating engineering competencies: A new paradigm. 2018 IEEE Global Engineering Education Conference (EDUCON) 2018, 2052 -2055.

AMA Style

Araceli Queiruga-Dios, Víctor Gayoso-Martínez, M. Jesus Santos Sanchez, Juan José Bullón Pérez, Jesus Martín-Vaquero, Ascensión Hernández Encinas, Snezhana Gocheva-Ilieva, Marie Demlová, Deolinda Dias Rasteiro, Cristina Caridade. Evaluating engineering competencies: A new paradigm. 2018 IEEE Global Engineering Education Conference (EDUCON). 2018; ():2052-2055.

Chicago/Turabian Style

Araceli Queiruga-Dios; Víctor Gayoso-Martínez; M. Jesus Santos Sanchez; Juan José Bullón Pérez; Jesus Martín-Vaquero; Ascensión Hernández Encinas; Snezhana Gocheva-Ilieva; Marie Demlová; Deolinda Dias Rasteiro; Cristina Caridade. 2018. "Evaluating engineering competencies: A new paradigm." 2018 IEEE Global Engineering Education Conference (EDUCON) , no. : 2052-2055.

Preprint
Published: 01 February 2018
Reads 0
Downloads 0

Let $\mathbb{F}$ be a field, let $V=\mathbb{F}^3$, and let $A\colon V\to V$ a linear map. The polynomial $P(x)=\det (x_1I+x_2A+x_3A^2)$ does not depend on $A$ but only on its characteristic polynomial $\chi(X)$. A law of composition $\oplus \colon V\times V \to V$ is defined and it induces an Abelian group law on $\mathbb{F}P^2\setminus P^{-1}(0)$. The cubic $P^{-1}(0)$ is irreducible if and only if $\chi $ is irreducible in $\mathbb{F}[X]$, and in this case the group law $\oplus $ is cyclic.

ACS Style

R. Durán Díaz; V. Gayoso Martinez; L. Hernández Encinas; J. Muñoz Masqué. A group law for PKC purposes. 2018, 1 .

AMA Style

R. Durán Díaz, V. Gayoso Martinez, L. Hernández Encinas, J. Muñoz Masqué. A group law for PKC purposes. . 2018; ():1.

Chicago/Turabian Style

R. Durán Díaz; V. Gayoso Martinez; L. Hernández Encinas; J. Muñoz Masqué. 2018. "A group law for PKC purposes." , no. : 1.

Journal article
Published: 10 January 2018 in Nonlinear Analysis: Modelling and Control
Reads 0
Downloads 0
ACS Style

Jesús Martín-Vaquero; University of Salamanca; Ascensión Hernández Encinas; Araceli Queiruga-Dios; Víctor Gayoso-Martínez; Ángel Martín Del Rey. Numerical schemes for general Klein–Gordon equations with Dirichlet and nonlocal boundary conditions. Nonlinear Analysis: Modelling and Control 2018, 50 -62.

AMA Style

Jesús Martín-Vaquero, University of Salamanca, Ascensión Hernández Encinas, Araceli Queiruga-Dios, Víctor Gayoso-Martínez, Ángel Martín Del Rey. Numerical schemes for general Klein–Gordon equations with Dirichlet and nonlocal boundary conditions. Nonlinear Analysis: Modelling and Control. 2018; ():50-62.

Chicago/Turabian Style

Jesús Martín-Vaquero; University of Salamanca; Ascensión Hernández Encinas; Araceli Queiruga-Dios; Víctor Gayoso-Martínez; Ángel Martín Del Rey. 2018. "Numerical schemes for general Klein–Gordon equations with Dirichlet and nonlocal boundary conditions." Nonlinear Analysis: Modelling and Control , no. : 50-62.

Conference paper
Published: 23 August 2017 in Advances in Intelligent Systems and Computing
Reads 0
Downloads 0

The distinctive security features of the Spanish electronic national identity card allow us to propose the usage of this cryptographic smart card in an authentication framework that can be used during the registration and login phases of certain internet services, including popular social networks. Using this mechanism with NFC-capable devices, the identity and age of the potential user can be determined, allowing or denying the access to the service based on that information.

ACS Style

Víctor Gayoso Martínez; Luis Hernández Encinas; Agustin Martín Muñoz; Raúl Durán Díaz. A Proposal for Using a Cryptographic National Identity Card in Social Networks. Advances in Intelligent Systems and Computing 2017, 651 -660.

AMA Style

Víctor Gayoso Martínez, Luis Hernández Encinas, Agustin Martín Muñoz, Raúl Durán Díaz. A Proposal for Using a Cryptographic National Identity Card in Social Networks. Advances in Intelligent Systems and Computing. 2017; ():651-660.

Chicago/Turabian Style

Víctor Gayoso Martínez; Luis Hernández Encinas; Agustin Martín Muñoz; Raúl Durán Díaz. 2017. "A Proposal for Using a Cryptographic National Identity Card in Social Networks." Advances in Intelligent Systems and Computing , no. : 651-660.

Conference paper
Published: 01 October 2016 in Proceedings of the 2nd International Conference on Data Engineering and Communication Technology
Reads 0
Downloads 0

Elliptic Curve Cryptography (ECC) is a branch of public-key cryptography based on the arithmetic of elliptic curves. In the short life of ECC, most standards have proposed curves defined over prime finite fields satisfying the curve equation in the short Weierstrass form. However, some researchers have started to propose as a more secure alternative the use of Edwards and Montgomery elliptic curves, which could have an impact in current ECC deployments. This contribution evaluates the performance of the three types of elliptic curves using some of the examples provided by the initiative SafeCurves and a Java implementation developed by the authors, which allows us to offer some conclusions about this topic.

ACS Style

Raúl Durán Díaz; Victor Gayoso Martínez; Luis Hernández Encinas; Agustin Martín Muñoz. A Study on the Performance of Secure Elliptic Curves for Cryptographic Purposes. Proceedings of the 2nd International Conference on Data Engineering and Communication Technology 2016, 658 -667.

AMA Style

Raúl Durán Díaz, Victor Gayoso Martínez, Luis Hernández Encinas, Agustin Martín Muñoz. A Study on the Performance of Secure Elliptic Curves for Cryptographic Purposes. Proceedings of the 2nd International Conference on Data Engineering and Communication Technology. 2016; ():658-667.

Chicago/Turabian Style

Raúl Durán Díaz; Victor Gayoso Martínez; Luis Hernández Encinas; Agustin Martín Muñoz. 2016. "A Study on the Performance of Secure Elliptic Curves for Cryptographic Purposes." Proceedings of the 2nd International Conference on Data Engineering and Communication Technology , no. : 658-667.

Journal article
Published: 05 August 2016 in Logic Journal of the IGPL
Reads 0
Downloads 0

Smart cards are well-known tamper-resistant devices, and due to their portability and security they represent an excellent platform for implementing strong authentication services. This contribution analyses three Spanish smart card deployments intended to be used for eGoverment services, comparing their respective contents and capabilities. As a result of our analysis, we conclude that the current deployment of smart cards for the electronic prescription service being rolled out throughout Spain could be replaced by the use of the already consolidated Spanish National Identity card.

ACS Style

V. Gayoso Martínez; Luis Hernandez Encinas; A. Martín Muñoz; M. A. Álvarez Mariño; D. Arroyo Guardeño. A comparative study of three Spanish eGoverment smart cards. Logic Journal of the IGPL 2016, 25, 42 -53.

AMA Style

V. Gayoso Martínez, Luis Hernandez Encinas, A. Martín Muñoz, M. A. Álvarez Mariño, D. Arroyo Guardeño. A comparative study of three Spanish eGoverment smart cards. Logic Journal of the IGPL. 2016; 25 (1):42-53.

Chicago/Turabian Style

V. Gayoso Martínez; Luis Hernandez Encinas; A. Martín Muñoz; M. A. Álvarez Mariño; D. Arroyo Guardeño. 2016. "A comparative study of three Spanish eGoverment smart cards." Logic Journal of the IGPL 25, no. 1: 42-53.

Journal article
Published: 20 June 2015 in Nonlinear Analysis: Modelling and Control
Reads 0
Downloads 0
ACS Style

Ascensión Hernández Encinas; Jesus Martin-Vaquero; Araceli Queiruga-Dios; Víctor Gayoso-Martínez; Higher Technical School of Industrial Engineering (ETSII) University of Salamanca; Information Security Institute (ISI) Spanish National Research Council (CSIC). Efficient high-order finite difference methods for nonlinear Klein–Gordon equations. I: Variants of the phi-four model and the form-I of the nonlinear Klein–Gordon equation. Nonlinear Analysis: Modelling and Control 2015, 20, 274 -290.

AMA Style

Ascensión Hernández Encinas, Jesus Martin-Vaquero, Araceli Queiruga-Dios, Víctor Gayoso-Martínez, Higher Technical School of Industrial Engineering (ETSII) University of Salamanca, Information Security Institute (ISI) Spanish National Research Council (CSIC). Efficient high-order finite difference methods for nonlinear Klein–Gordon equations. I: Variants of the phi-four model and the form-I of the nonlinear Klein–Gordon equation. Nonlinear Analysis: Modelling and Control. 2015; 20 (2):274-290.

Chicago/Turabian Style

Ascensión Hernández Encinas; Jesus Martin-Vaquero; Araceli Queiruga-Dios; Víctor Gayoso-Martínez; Higher Technical School of Industrial Engineering (ETSII) University of Salamanca; Information Security Institute (ISI) Spanish National Research Council (CSIC). 2015. "Efficient high-order finite difference methods for nonlinear Klein–Gordon equations. I: Variants of the phi-four model and the form-I of the nonlinear Klein–Gordon equation." Nonlinear Analysis: Modelling and Control 20, no. 2: 274-290.

Conference paper
Published: 27 May 2015 in Advances in Intelligent Systems and Computing
Reads 0
Downloads 0
ACS Style

D. Arroyo Guardeño; V. Gayoso Martínez; Luis Hernández Encinas; A. Martín Muñoz. Using Smart Cards for Authenticating in Public Services: A Comparative Study. Advances in Intelligent Systems and Computing 2015, 437 -446.

AMA Style

D. Arroyo Guardeño, V. Gayoso Martínez, Luis Hernández Encinas, A. Martín Muñoz. Using Smart Cards for Authenticating in Public Services: A Comparative Study. Advances in Intelligent Systems and Computing. 2015; ():437-446.

Chicago/Turabian Style

D. Arroyo Guardeño; V. Gayoso Martínez; Luis Hernández Encinas; A. Martín Muñoz. 2015. "Using Smart Cards for Authenticating in Public Services: A Comparative Study." Advances in Intelligent Systems and Computing , no. : 437-446.

Original articles
Published: 26 May 2015 in Cryptologia
Reads 0
Downloads 0

The most popular encryption scheme based on elliptic curves is the Elliptic Curve Integrated Encryption Scheme (ECIES), which is included in ANSI X9.63, IEEE 1363a, ISO/IEC 18033-2, and SECG SEC 1. These standards offer many ECIES options, not always compatible, making it difficult to decide what parameters and cryptographic elements to use in a specific deployment scenario. In this work, the authors show that a secure and practical implementation of ECIES can only be compatible with two of the four previously mentioned standards. They also provide the list of functions and options that must be used in such an implementation. Finally, they present the results obtained when testing this ECIES version implemented as a Java application, which allows them to offer some comments about the performance and feasibility of their proposed solution.

ACS Style

V. Gayoso Martinez; Luis Hernandez Encinas; Araceli Queiruga Dios. Security and Practical Considerations When Implementing the Elliptic Curve Integrated Encryption Scheme. Cryptologia 2015, 39, 244 -269.

AMA Style

V. Gayoso Martinez, Luis Hernandez Encinas, Araceli Queiruga Dios. Security and Practical Considerations When Implementing the Elliptic Curve Integrated Encryption Scheme. Cryptologia. 2015; 39 (3):244-269.

Chicago/Turabian Style

V. Gayoso Martinez; Luis Hernandez Encinas; Araceli Queiruga Dios. 2015. "Security and Practical Considerations When Implementing the Elliptic Curve Integrated Encryption Scheme." Cryptologia 39, no. 3: 244-269.

Journal article
Published: 01 February 2014 in Procedia - Social and Behavioral Sciences
Reads 0
Downloads 0
ACS Style

Araceli Queiruga Dios; Ascensión Hernández Encinas; I. Visus Ruiz; Luis Hernandez Encinas; Víctor Gayoso Martínez; E. Yuste Domínguez. A Learning Resource to Acquire Engineering Skills through Programming Languages. Procedia - Social and Behavioral Sciences 2014, 116, 1305 -1308.

AMA Style

Araceli Queiruga Dios, Ascensión Hernández Encinas, I. Visus Ruiz, Luis Hernandez Encinas, Víctor Gayoso Martínez, E. Yuste Domínguez. A Learning Resource to Acquire Engineering Skills through Programming Languages. Procedia - Social and Behavioral Sciences. 2014; 116 ():1305-1308.

Chicago/Turabian Style

Araceli Queiruga Dios; Ascensión Hernández Encinas; I. Visus Ruiz; Luis Hernandez Encinas; Víctor Gayoso Martínez; E. Yuste Domínguez. 2014. "A Learning Resource to Acquire Engineering Skills through Programming Languages." Procedia - Social and Behavioral Sciences 116, no. : 1305-1308.