Publicaciones en las que colabora con Rosana Tomàs Cuñat (7)

2014

  1. Securing databases by using diagonal-based order preserving symmetric encryption

    Applied Mathematics and Information Sciences, Vol. 8, Núm. 5, pp. 2085-2094

2013

  1. Security analysis of order preserving symmetric cryptography

    Applied Mathematics and Information Sciences, Vol. 7, Núm. 4, pp. 1285-1295

2012

  1. A non-reducible meyer-Müller's like elliptic curve cryptosystem

    IEEE Latin America Transactions, Vol. 10, Núm. 3, pp. 1730-1733

2009

  1. On avoiding ZVP-attacks using isogeny volcanoes

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

2008

  1. Exploiting isogeny cordillera structure to obtain cryptographically good elliptic curves

    Journal of Research and Practice in Information Technology, Vol. 40, Núm. 4, pp. 263-273

2007

  1. Isogeny cordillera algorithm to obtain cryptographically good elliptic curves

    Conferences in Research and Practice in Information Technology Series, Vol. 68, pp. 153-157

  2. Volcanoes of l-isogenies of elliptic curves over finite fields: the case l=3

    Publicacions matematiques, Vol. 51, Núm. 1, pp. 165-180