Mathematics
Subject discipline
Centro de Tecnologías Físicas y de la Información Leonardo Torres Quevedo
Madrid, EspañaPublications in collaboration with researchers from Centro de Tecnologías Físicas y de la Información Leonardo Torres Quevedo (21)
2021
-
Chor-Rivest Knapsack Cryptosystem in a Post-quantum World
Advances in Security, Networks, and Internet of Things (Springer), pp. 67-83
2009
-
Analysis of the efficiency of the Chor-Rivest cryptosystem implementation in a safe-parameter range
Information Sciences, Vol. 179, Núm. 24, pp. 4219-4226
-
Dimension of the intersection of a pair of orthogonal groups
International Journal of Computer Mathematics
2008
-
A multisecret sharing scheme for color images based on cellular automata
Information Sciences, Vol. 178, Núm. 22, pp. 4382-4395
-
Cryptography adapted to the new european area of higher education
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2007
-
Higher-order Utiyama-Yang-Mills Lagrangians
Journal of Geometry and Physics, Vol. 57, Núm. 3, pp. 1089-1097
-
Inverse rules of ECA with rule number 150
Applied Mathematics and Computation, Vol. 189, Núm. 2, pp. 1782-1786
-
Modelling forest fire spread using hexagonal cellular automata
Applied Mathematical Modelling, Vol. 31, Núm. 6, pp. 1213-1227
-
Simulation of forest fire fronts using cellular automata
Advances in Engineering Software, Vol. 38, Núm. 6, pp. 372-378
2006
-
Maple implementation of the chor-rivest cryptosystem
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2005
-
A new graphic cryptosystem based on one-dimensional memory cellular automata
Proceedings - International Carnahan Conference on Security Technology
-
A new secret sharing scheme for images based on additive 2-dimensional cellular automata
Lecture Notes in Computer Science
-
A secure scheme to share secret color images
Computer Physics Communications, Vol. 173, Núm. 1-2, pp. 9-16
-
Computing the differential invariants for second-order ODEs
Recent Advances in Multidisciplinary Applied Physics (Elsevier Ltd), pp. 645-649
-
Faà di Bruno's formula, lattices, and partitions
Discrete Applied Mathematics, Vol. 148, Núm. 3, pp. 246-255
2004
-
Non-degenerate bilinear alternating maps f : V × V → V, dim(V) = 3, over an algebraically closed field
Linear Algebra and Its Applications, Vol. 387, Núm. 1-3 SUPPL., pp. 69-82
-
The use of linear hybrid cellular automata as pseudorandom bit generators in cryptography
Neural, Parallel and Scientific Computations, Vol. 12, Núm. 2, pp. 175-192
2003
-
Graphic cryptography with pseudorandom bit generators and cellular automata
Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science)
-
Large decryption exponents in RSA
Applied Mathematics Letters, Vol. 16, Núm. 3, pp. 293-295
-
Reducing y″ = F(x, y, y′) to first order
Journal of Computational and Applied Mathematics, Vol. 155, Núm. 2, pp. 389-404