Adriana Remedios
Suárez Corona
Publicaciones (20) Publicaciones de Adriana Remedios Suárez Corona
2024
2023
-
VI Congreso de Jóvenes Investigadores, León 2023
Gaceta de la Real Sociedad Matematica Española, Vol. 26, Núm. 2, pp. 235-246
2022
-
Análisis estadístico seguro para ensayos clínicos
Investigación en Ciberseguridad Actas de las VII Jornadas Nacionales (7º.2022.Bilbao) (Fundación Tecnalia Research and Innovation), pp. 233-236
-
Diseño, implementación y análisis de vídeos educativos para cursos online de Matemáticas instrumentales
Avances en Ciencias de la Educación y Aplicaciones en otra áreas (Dykinson), pp. 65
-
Eight Become One: the EURECA-PRO University Network
BHM Berg- und Hüttenmännische Monatshefte, Vol. 167, Núm. 10, pp. 462-471
-
Soft Skills and STEM Education: Vision of the European University EURECA-PRO
BHM Berg- und Hüttenmännische Monatshefte, Vol. 167, Núm. 10, pp. 485-488
2021
-
Cryptanalysis of a group key establishment protocol
Symmetry, Vol. 13, Núm. 2, pp. 1-10
2019
-
A generic solution for authenticated group key establishment from key encapsulation-a compiler for post-quantum primitives
Actas de las V Jornadas Nacionales de Ciberseguridad: junio 5-7, 2019. Cáceres
-
Algebraic properties of the block cipher DESL
Symmetry, Vol. 11, Núm. 11
-
From key encapsulation to authenticated group key establishment-A compiler for post-quantum primitives
Entropy, Vol. 21, Núm. 12
-
Integrating classical preprocessing into an optical encryption scheme
Entropy, Vol. 21, Núm. 9
2018
-
Group key exchange protocols withstanding ephemeral-key reveals
IET Information Security, Vol. 12, Núm. 1
-
Simulación computacional como herramienta metodológica en criptografía
6th International Congress of Educational Sciences and Development: proceedings
2016
-
Pairing-friendly curves with discrete logarithm trapdoor could be useful
Applied Mathematics and Information Sciences, Vol. 10, Núm. 6, pp. 2015-2023
2015
-
Modelling ephemeral leakage in group key exchange protocols
Actas de las primeras Jornadas Nacionales de Investigación en Ciberseguridad: León, 14, 15, 16 de septiembre de 2015. I JNIC2015
2014
-
Narrow bandwidth is not inherent in reverse public-key encryption
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
-
Scalable attribute-based group key establishment: From passive to active and deniable
Applicable Algebra in Engineering, Communications and Computing, Vol. 25, Núm. 1-2, pp. 1-20
2012
-
Group key establishment: Adding perfect forward secrecy at the cost of one round
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2011
-
Cryptanalysis of a 2-party key establishment based on a semigroup action problem
Advances in Mathematics of Communications, Vol. 5, Núm. 1, pp. 87-92
2010
-
Attribute-based group key establishment
Advances in Mathematics of Communications, Vol. 4, Núm. 3, pp. 381-398