Publicaciones en colaboración con investigadores/as de Centro de Tecnologías Físicas y de la Información Leonardo Torres Quevedo (19)

2021

  1. Chor-Rivest Knapsack Cryptosystem in a Post-quantum World

    Advances in Security, Networks, and Internet of Things (Springer), pp. 67-83

2017

  1. Malware Propagation Models in Wireless Sensor Networks: a Review

    International Joint Conference SOCO’16-CISIS’16-ICEUTE’16: San Sebastián, Spain, October 19th-21st, 2016 Proceedings

2008

  1. A multisecret sharing scheme for color images based on cellular automata

    Information Sciences, Vol. 178, Núm. 22, pp. 4382-4395

  2. Cryptography adapted to the new european area of higher education

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

2007

  1. Inverse rules of ECA with rule number 150

    Applied Mathematics and Computation, Vol. 189, Núm. 2, pp. 1782-1786

  2. Modelling forest fire spread using hexagonal cellular automata

    Applied Mathematical Modelling, Vol. 31, Núm. 6, pp. 1213-1227

  3. Simulation of forest fire fronts using cellular automata

    Advances in Engineering Software, Vol. 38, Núm. 6, pp. 372-378

2006

  1. Maple implementation of the chor-rivest cryptosystem

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

2005

  1. A new secret sharing scheme for images based on additive 2-dimensional cellular automata

    Lecture Notes in Computer Science

  2. A secure scheme to share secret color images

    Computer Physics Communications, Vol. 173, Núm. 1-2, pp. 9-16

  3. Computing the differential invariants for second-order ODEs

    Recent Advances in Multidisciplinary Applied Physics (Elsevier Ltd), pp. 645-649

  4. Faà di Bruno's formula, lattices, and partitions

    Discrete Applied Mathematics, Vol. 148, Núm. 3, pp. 246-255

2004

  1. Non-degenerate bilinear alternating maps f : V × V → V, dim(V) = 3, over an algebraically closed field

    Linear Algebra and Its Applications, Vol. 387, Núm. 1-3 SUPPL., pp. 69-82

  2. The use of linear hybrid cellular automata as pseudorandom bit generators in cryptography

    Neural, Parallel and Scientific Computations, Vol. 12, Núm. 2, pp. 175-192

2003

  1. Graphic cryptography with pseudorandom bit generators and cellular automata

    Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science)

  2. Large decryption exponents in RSA

    Applied Mathematics Letters, Vol. 16, Núm. 3, pp. 293-295

  3. Reducing y″ = F(x, y, y′) to first order

    Journal of Computational and Applied Mathematics, Vol. 155, Núm. 2, pp. 389-404