Luis Hernández Encinas
Orcid: 0000-0001-6980-2683Affiliations:
- Consejo Superior de Investigaciones Cientificas, Madrid, Spain
According to our database1,
Luis Hernández Encinas
authored at least 80 papers
between 1998 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on scopus.com
-
on orcid.org
On csauthors.net:
Bibliography
2023
Pattern Recognit. Lett., September, 2023
EEG Authentication System Based on One- and Multi-Class Machine Learning Classifiers.
Sensors, 2023
2022
A modification proposal for the reconciliation mechanism of the key exchange algorithm NewHope.
Log. J. IGPL, 2022
Proceedings of the 31st Conference of Open Innovations Association, 2022
About the Fujisaki-Okamoto Transformation in the Code-Based Algorithms of the NIST Post-quantum Call.
Proceedings of the International Joint Conference 15th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2022) 13th International Conference on EUropean Transnational Education (ICEUTE 2022), 2022
Proceedings of the International Joint Conference 15th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2022) 13th International Conference on EUropean Transnational Education (ICEUTE 2022), 2022
2021
Privacy-Preserving Sensor-Based Continuous Authentication and User Profiling: A Review.
Sensors, 2021
SmartCAMPP - Smartphone-based continuous authentication leveraging motion sensors with privacy preservation.
Pattern Recognit. Lett., 2021
Challenges and Competences in Master Degrees from a Comprehensive Security Perspective.
Proceedings of the 14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021), 2021
2020
Proceedings of the 13th International Conference on Computational Intelligence in Security for Information Systems, 2020
2019
Comparing low and medium cost computer-based technologies suitable for cryptographic attacks.
Log. J. IGPL, 2019
Non-quantum cryptanalysis of the noisy version of Aaronson-Christiano's quantum money scheme.
IET Inf. Secur., 2019
Proceedings of the International Joint Conference: 12th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2019) and 10th International Conference on EUropean Transnational Education (ICEUTE 2019), 2019
On-the-Fly Testing an Implementation of Arrow Lightweight PRNG Using a LabVIEW Framework.
Proceedings of the International Joint Conference: 12th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2019) and 10th International Conference on EUropean Transnational Education (ICEUTE 2019), 2019
2018
Int. J. Bifurc. Chaos, 2018
Review of the Main Security Threats and Challenges in Free-Access Public Cloud Storage Servers.
Proceedings of the Computer and Network Security Essentials., 2018
Proceedings of the Computer and Network Security Essentials., 2018
2017
IEEE Access, 2017
Proceedings of the International Joint Conference SOCO'17-CISIS'17-ICEUTE'17, 2017
Proceedings of the International Joint Conference SOCO'17-CISIS'17-ICEUTE'17, 2017
Proceedings of the International Joint Conference SOCO'17-CISIS'17-ICEUTE'17, 2017
Proceedings of the Security and Privacy in Communication Networks, 2017
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017
2016
J. Netw. Comput. Appl., 2016
Int. J. Bifurc. Chaos, 2016
Proceedings of the Fourth International Conference on Technological Ecosystems for Enhancing Multiculturality, Salamanca, Spain, November 02, 2016
Proceedings of the International Joint Conference SOCO'16-CISIS'16-ICEUTE'16, 2016
Proceedings of the International Joint Conference SOCO'16-CISIS'16-ICEUTE'16, 2016
Proceedings of the International Joint Conference SOCO'16-CISIS'16-ICEUTE'16, 2016
2015
Security and Practical Considerations When Implementing the Elliptic Curve Integrated Encryption Scheme.
Cryptologia, 2015
Proceedings of the International Joint Conference, 2015
Proceedings of the International Joint Conference, 2015
2013
Log. J. IGPL, 2013
Proceedings of the 16th International Symposium on Wireless Personal Multimedia Communications, 2013
Proceedings of the International Joint Conference SOCO'13-CISIS'13-ICEUTE'13, 2013
The Isomorphism of Polynomials Problem Applied to Multivariate Quadratic Cryptography.
Proceedings of the International Joint Conference SOCO'13-CISIS'13-ICEUTE'13, 2013
Proceedings of the International Joint Conference SOCO'13-CISIS'13-ICEUTE'13, 2013
Proceedings of the 9th International Conference on Information Assurance and Security, 2013
2012
Inf. Sci., 2012
Proceedings of the International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions, 2012
2011
Java Card Implementation of the Elliptic Curve Integrated Encryption Scheme Using Prime and Binary Finite Fields.
Proceedings of the Computational Intelligence in Security for Information Systems, 2011
A Group Signature Scheme Based on the Integer Factorization and the Subgroup Discrete Logarithm Problems.
Proceedings of the Computational Intelligence in Security for Information Systems, 2011
Proceedings of the Computational Intelligence in Security for Information Systems, 2011
2010
Development of Capstone Projects on Secure Communications for Engineering Students.
Proceedings of the 2010 International Conference on Security & Management, 2010
A Java Implementation of the Elliptic Curve Integrated Encryption Scheme.
Proceedings of the 2010 International Conference on Security & Management, 2010
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010
2009
Analysis of the efficiency of the Chor-Rivest cryptosystem implementation in a safe-parameter range.
Inf. Sci., 2009
Int. J. Comput. Math., 2009
Graphic Multisecret Sharing Schemes with One-Dimensional Cellular Automata.
Proceedings of the 2009 International Conference on Security & Management, 2009
Biometric Fuzzy Extractor Scheme for Iris Templates.
Proceedings of the 2009 International Conference on Security & Management, 2009
Proceedings of the Computational Intelligence in Security for Information Systems, 2009
2008
IEEE Trans. Circuits Syst. II Express Briefs, 2008
Inf. Sci., 2008
Int. J. Netw. Secur., 2008
Proceedings of the Computational Science, 2008
2007
Comput. Biol. Medicine, 2007
2006
Proceedings of the Computational Science, 2006
2005
A New Secret Sharing Scheme for Images Based on Additive 2-Dimensional Cellular Automata.
Proceedings of the Pattern Recognition and Image Analysis, Second Iberian Conference, 2005
2004
The Use of Linear Hybrid Cellular Automata as Pseudo Random Bit Generators in Cryptography.
Neural Parallel Sci. Comput., 2004
2003
IACR Cryptol. ePrint Arch., 2003
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2003
2002
Appl. Algebra Eng. Commun. Comput., 2002
1998
Maximal period of orbits of the BBS generator.
Proceedings of the 1st International Conference on Information Security and Cryptology, 1998