Luis
Hernández Encinas
Publicaciones en las que colabora con Luis Hernández Encinas (49)
2022
-
About the FrodoKEM lattice-based algorithm
Investigación en Ciberseguridad Actas de las VII Jornadas Nacionales (7º.2022.Bilbao) (Fundación Tecnalia Research and Innovation), pp. 253-256
-
Analysis of the FO Transformation in the Lattice-Based Post-Quantum Algorithms
Mathematics, Vol. 10, Núm. 16
-
Self-Sovereign Identity in University Context
Conference of Open Innovation Association, FRUCT
2021
-
Using free mathematical software in engineering classes
Axioms, Vol. 10, Núm. 4
2020
-
Elliptic curves as a basic tool for the security of blockchain
19th Conference on Applied Mathematics, APLIMAT 2020 Proceedings
-
Mathematics and physics in side-channel and fault attacks to cryptosystems
19th Conference on Applied Mathematics, APLIMAT 2020 Proceedings
2018
-
Boolean differential operators
Turkish Journal of Mathematics, Vol. 42, Núm. 1, pp. 57-68
-
New approaches of epidemic models to simulate malware propagation
Advances in Intelligent Systems and Computing
2017
-
Malware propagation models in wireless sensor networks: A review
Advances in Intelligent Systems and Computing
-
Study of the stability of a SEIRS model for computer worm propagation
Physica A: Statistical Mechanics and its Applications, Vol. 479, pp. 411-421
2016
-
Análisis de los métodos de generación de curvas elípticas seguras
Actas de la jornadas nacionales de investigación en ciberseguridad: Granada, 15, 16 y 17 de Junio de 2016 (Universidad de Granada), pp. 87-93
-
Case study: Malware propagation models for undergraduate engineering students
ACM International Conference Proceeding Series
-
Malware propagation models for undergraduate engineering students: Case study
Proceedings, TEEM '16
-
Propuesta de mejora de un modelo SEIRS para la simulación de la propagación de malware
Actas de la jornadas nacionales de investigación en ciberseguridad: Granada, 15, 16 y 17 de Junio de 2016 (Universidad de Granada), pp. 136-143
2015
-
Security and Practical Considerations When Implementing the Elliptic Curve Integrated Encryption Scheme
Cryptologia, Vol. 39, Núm. 3, pp. 244-269
2014
-
A Learning Resource to Acquire Engineering Skills Through Programming Languages
5TH WORLD CONFERENCE ON EDUCATIONAL SCIENCES
-
A New Approach For Obtaining Bachelor's Degree by Technology Professionals
5TH WORLD CONFERENCE ON EDUCATIONAL SCIENCES
-
Disclosure of sensitive information in the virtual learning environment moodle
Advances in Intelligent Systems and Computing
2009
-
Analysis of the efficiency of the Chor-Rivest cryptosystem implementation in a safe-parameter range
Information Sciences, Vol. 179, Núm. 24, pp. 4219-4226
-
Dimension of the intersection of a pair of orthogonal groups
International Journal of Computer Mathematics