Amparo Fúster-Sabater
Orcid: 0000-0002-8261-3550Affiliations:
- Spanish National Research Council, CSIC, Spain
According to our database1,
Amparo Fúster-Sabater
authored at least 123 papers
between 1994 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on iec.csic.es
On csauthors.net:
Bibliography
2024
2023
Reducing the Security Margin Against a Differential Attack in the TinyJambu Cryptosystem.
Proceedings of the International Joint Conference 16th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2023) 14th International Conference on EUropean Transnational Education (ICEUTE 2023), 2023
2022
Cryptogr., 2022
Proceedings of the Computational Science - ICCS 2022, 2022
2021
Proceedings of the Computational Science and Its Applications - ICCSA 2021, 2021
2020
Log. J. IGPL, 2020
Proceedings of the 13th International Conference on Computational Intelligence in Security for Information Systems, 2020
Proceedings of the 13th International Conference on Computational Intelligence in Security for Information Systems, 2020
2019
Binomial Representation of Cryptographic Binary Sequences and Its Relation to Cellular Automata.
Complex., 2019
Proceedings of the Computational Science and Its Applications - ICCSA 2019, 2019
Proceedings of the International Joint Conference: 12th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2019) and 10th International Conference on EUropean Transnational Education (ICEUTE 2019), 2019
2018
CoRR, 2018
Proceedings of the Computational Science and Its Applications - ICCSA 2018, 2018
Proceedings of the Computational Science - ICCS 2018, 2018
2017
Finite Fields Their Appl., 2017
Proceedings of the International Joint Conference SOCO'17-CISIS'17-ICEUTE'17, 2017
Proceedings of the Computational Science and Its Applications - ICCSA 2017, 2017
2016
Log. J. IGPL, 2016
Log. J. IGPL, 2016
Proceedings of the Computational Science and Its Applications - ICCSA 2016, 2016
Proceedings of the International Conference on Computational Science 2016, 2016
Proceedings of the International Conference on Computational Science 2016, 2016
2015
Log. J. IGPL, 2015
Proceedings of the International Conference on Computational Science, 2015
Proceedings of the Computer Aided Systems Theory - EUROCAST 2015, 2015
Proceedings of the International Joint Conference, 2015
2014
Proceedings of the International Joint Conference SOCO'14-CISIS'14-ICEUTE'14, 2014
Proceedings of the Computational Science and Its Applications - ICCSA 2014 - 14th International Conference, Guimarães, Portugal, June 30, 2014
Proceedings of the International Conference on Computational Science, 2014
2013
Generation of pseudorandom binary sequences by means of linear feedback shift registers (LFSRs) with dynamic feedback.
Math. Comput. Model., 2013
CoRR, 2013
Proceedings of the International Joint Conference SOCO'13-CISIS'13-ICEUTE'13, 2013
Proceedings of the International Joint Conference SOCO'13-CISIS'13-ICEUTE'13, 2013
Proceedings of the International Joint Conference SOCO'13-CISIS'13-ICEUTE'13, 2013
Proceedings of the Computational Science and Its Applications - ICCSA 2013, 2013
Proceedings of the Computational Science and Its Applications - ICCSA 2013, 2013
Proceedings of the International Conference on Computational Science, 2013
Proceedings of the Computer Aided Systems Theory - EUROCAST 2013, 2013
2012
Proceedings of the International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions, 2012
Proceedings of the Information Systems Security, 8th International Conference, 2012
2011
Performance evaluation of highly efficient techniques for software implementation of LFSR.
Comput. Electr. Eng., 2011
Appl. Soft Comput., 2011
Ad Hoc Networks, 2011
Generation of Pseudorandom Binary Sequences with Controllable Cryptographic Parameters.
Proceedings of the Computational Science and Its Applications - ICCSA 2011, 2011
Proceedings of the Adaptive and Natural Computing Algorithms, 2011
Proceedings of EUROCON 2011, 2011
Proceedings of the Computer Aided Systems Theory - EUROCAST 2011, 2011
Proceedings of the Computational Intelligence in Security for Information Systems, 2011
2010
A simple linearization of the self-shrinking generator by means of cellular automata.
Neural Networks, 2010
Characterisation of observability and controllability for nonuniformly sampled discrete systems
CoRR, 2010
A Joint Criterion for Reachability and Observability of Nonuniformly Sampled Discrete Systems
CoRR, 2010
CoRR, 2010
CoRR, 2010
CoRR, 2010
An Energy-Efficient Symmetric Cryptography Based Authentication Scheme for Wireless Sensor Networks.
Proceedings of the Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 2010
On Privacy and Integrity in Vehicular Ad hoc Networks.
Proceedings of the 2010 International Conference on Wireless Networks, 2010
Proceedings of the Computational Science and Its Applications, 2010
A Linear Cellular Automata-Based Model for Generating Cryptographic Sequences.
Proceedings of the 2010 International Conference on Scientific Computing, 2010
Simple Cellular Automata-Based Linear Models for a Class of Sequence Generators.
Proceedings of the 2010 International Conference on Scientific Computing, 2010
Proceedings of the Cellular Automata, 2010
2009
Graph-Based Approach to the Edit Distance Cryptanalysis of Irregularly Clocked Linear Feedback Shift Registers.
J. Univers. Comput. Sci., 2009
Synthesis of cryptographic interleaved sequences by means of linear cellular automata.
Appl. Math. Lett., 2009
Rethinking Self-organized Public-key Management for Mobile Ad-Hoc Networks.
Proceedings of the Security in Information Systems, 2009
Deterministic Cryptanalysis of some Stream Ciphers.
Proceedings of the Security in Information Systems, 2009
Proceedings of the Computational Science and Its Applications, 2009
Deterministic Computation of Pseudorandomness in Sequences of Cryptographic Application.
Proceedings of the Computational Science, 2009
Differentiated Services to Provide Efficient Node Authentication in VANETs.
Proceedings of the 2009 International Conference on Security & Management, 2009
Linearization of the Alternating Step Generator in Terms of Cellular Automata.
Proceedings of the 2009 International Conference on Scientific Computing, 2009
2008
Proceedings of the Innovations in Hybrid Intelligent Systems, 2008
J. Res. Pract. Inf. Technol., 2008
Cryptanalytic Attack on Cryptographic Sequence Generators: The Class of Clock-Controlled Shrinking Generators.
Proceedings of the Computational Science and Its Applications - ICCSA 2008, International Conference, Perugia, Italy, June 30, 2008
Proceedings of the Hybrid Artificial Intelligence Systems, Third International Workshop, 2008
Proceedings of the Sixth Australasian Information Security Conference, 2008
Cellular Automata-Based Structures to Compute the Solutions of Linear Difference Equations.
Proceedings of the Cellular Automata, 2008
2007
Proceedings of the Parallel Processing and Applied Mathematics, 2007
Reconstruction of Suboptimal Paths in the Constrained Edit Distance Array with Application in Cryptanalysis.
Proceedings of the Computational Science and Its Applications, 2007
Proceedings of the Computational Science and Its Applications, 2007
Proceedings of the Computer Aided Systems Theory, 2007
2006
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
Proceedings of the Computer and Information Sciences, 2006
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the Computational Science, 2006
Proceedings of the Cellular Automata, 2006
2005
A Deterministic Approach to Balancedness and Run Quantification in Pseudorandom Pattern Generators.
Proceedings of the Advances in Informatics, 2005
A Simple Acceptance/Rejection Criterium for Sequence Generators in Symmetric Cryptography.
Proceedings of the Computational Science and Its Applications, 2005
Improvement of the Edit Distance Attack to Clock-Controlled LFSR-Based Stream Ciphers.
Proceedings of the Computer Aided Systems Theory, 2005
2004
Inf. Sci., 2004
Appl. Math. Lett., 2004
Proceedings of the String Processing and Information Retrieval, 2004
Proceedings of the Information and Communications Security, 6th International Conference, 2004
Proceedings of the Cellular Automata, 2004
2003
Inf. Process. Lett., 2003
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2003
Proceedings of the Proceedings 2003 IEEE Information Theory Workshop, 2003
Proceedings of the Theoretical Computer Science, 8th Italian Conference, 2003
2001
Theor. Comput. Sci., 2001
2000
Inf. Process. Lett., 2000
1999
Inf. Process. Lett., 1999
1995
Proceedings of the Cryptography and Coding, 1995
1994
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994