default search action
Luis Hernández Encinas
Person information
- affiliation: Consejo Superior de Investigaciones Cientificas, Madrid, Spain
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j37]Luis Hernández-Álvarez, Elena Barbierato, Stefano Caputo, José María de Fuentes, Lorena González-Manzano, Luis Hernández Encinas, Lorenzo Mucchi:
KeyEncoder: A secure and usable EEG-based cryptographic key generation mechanism. Pattern Recognit. Lett. 173: 1-9 (2023) - [j36]Luis Hernández-Álvarez, Elena Barbierato, Stefano Caputo, Lorenzo Mucchi, Luis Hernández Encinas:
EEG Authentication System Based on One- and Multi-Class Machine Learning Classifiers. Sensors 23(1): 186 (2023) - 2022
- [j35]V. Gayoso Martínez, Luis Hernández Encinas, Agustín Martín Muñoz:
A modification proposal for the reconciliation mechanism of the key exchange algorithm NewHope. Log. J. IGPL 30(6): 1028-1040 (2022) - [c38]Miguel Ángel González de la Torre, Luis Hernández Encinas:
About the Fujisaki-Okamoto Transformation in the Code-Based Algorithms of the NIST Post-quantum Call. CISIS-ICEUTE 2022: 75-85 - [c37]Óscar Castillo Campo, Victor Gayoso Martínez, Luis Hernández Encinas, Agustín Martín Muñoz, Roberto Álvarez Fernández:
State of the Art of Cybersecurity in Cooperative, Connected and Automated Mobility. CISIS-ICEUTE 2022: 104-113 - [c36]Araceli Queiruga Dios, Juan José Bullón Pérez, Luis Hernández Encinas:
Self-Sovereign Identity in University Context. FRUCT 2022: 1-6 - 2021
- [j34]Victor Gayoso Martínez, Luis Hernández Encinas, Agustín Martín Muñoz, Araceli Queiruga Dios:
Using Free Mathematical Software in Engineering Classes. Axioms 10(4): 253 (2021) - [j33]Luis Hernández-Álvarez, José María de Fuentes, Lorena González-Manzano, Luis Hernández Encinas:
SmartCAMPP - Smartphone-based continuous authentication leveraging motion sensors with privacy preservation. Pattern Recognit. Lett. 147: 189-196 (2021) - [j32]Luis Hernández-Álvarez, José María de Fuentes, Lorena González-Manzano, Luis Hernández Encinas:
Privacy-Preserving Sensor-Based Continuous Authentication and User Profiling: A Review. Sensors 21(1): 92 (2021) - [c35]Javier Espinosa García, Luis Hernández Encinas, Alberto Peinado Domínguez:
Challenges and Competences in Master Degrees from a Comprehensive Security Perspective. CISIS-ICEUTE 2021: 402-414 - 2020
- [j31]V. Gayoso Martínez, Luis Hernández Encinas, Agustín Martín, Raúl Durán Díaz:
Using the Spanish national identity card in social networks. Log. J. IGPL 28(4): 519-530 (2020) - [c34]Victor Gayoso Martínez, Luis Hernández Encinas, Agustín Martín Muñoz:
Study of the Reconciliation Mechanism of NewHope. CISIS 2020: 361-370
2010 – 2019
- 2019
- [j30]Alberto Fuentes Rodríguez, Luis Hernández Encinas, Agustín Martín Muñoz, Bernardo Alarcos Alcázar:
A Modular and Optimized Toolbox for Side-Channel Analysis. IEEE Access 7: 21889-21903 (2019) - [j29]Marta Conde Pena, Raúl Durán Díaz, Jean-Charles Faugère, Luis Hernández Encinas, Ludovic Perret:
Non-quantum cryptanalysis of the noisy version of Aaronson-Christiano's quantum money scheme. IET Inf. Secur. 13(4): 362-366 (2019) - [j28]V. Gayoso Martínez, Luis Hernández Encinas, Agustín Martín Muñoz, Oscar Martinez-Graullera:
Comparing low and medium cost computer-based technologies suitable for cryptographic attacks. Log. J. IGPL 27(2): 177-188 (2019) - [j27]V. Gayoso Martínez, Luis Hernández Encinas, Agustín Martín Muñoz, Raúl Durán Díaz:
Secure elliptic curves and their performance. Log. J. IGPL 27(2): 277 (2019) - [c33]Iñigo Querejeta-Azurmendi, Luis Hernández Encinas, David Arroyo Guardeño, Jorge L. Hernandez-Ardieta:
An Internet Voting Proposal Towards Improving Usability and Coercion Resistance. CISIS-ICEUTE 2019: 155-164 - [c32]Alfonso Blanco Blanco, Amalia Beatriz Orúe López, Agustín Martín Muñoz, Victor Gayoso Martínez, Luis Hernández Encinas, Óscar Martínez-Graullera, Fausto Montoya Vitini:
On-the-Fly Testing an Implementation of Arrow Lightweight PRNG Using a LabVIEW Framework. CISIS-ICEUTE 2019: 175-184 - 2018
- [j26]M. Romera, G. Pastor, Marius-F. Danca, Agustín Martín, A. B. Orue, Fausto Montoya Vitini, Luis Hernández Encinas, E. Tundrea:
Bifurcation Diagram of a Map with Multiple Critical Points. Int. J. Bifurc. Chaos 28(5): 1850065:1-1850065:17 (2018) - [p2]José María de Fuentes, Luis Hernández Encinas, Arturo Ribagorda:
Security Protocols for Networks and Internet: A Global Vision. Computer and Network Security Essentials 2018: 135-151 - [p1]Alejandro Sanchez-Gomez, Jesus Diaz, Luis Hernández Encinas, David Arroyo:
Review of the Main Security Threats and Challenges in Free-Access Public Cloud Storage Servers. Computer and Network Security Essentials 2018: 263-281 - [i3]Raúl Durán Díaz, V. Gayoso Martínez, Luis Hernández Encinas, Jaime Muñoz Masqué:
A group law for PKC purposes. CoRR abs/1802.00246 (2018) - 2017
- [j25]Amalia Beatriz Orúe López, Luis Hernández Encinas, Agustín Martín Muñoz, Fausto Montoya Vitini:
A Lightweight Pseudorandom Number Generator for Securing the Internet of Things. IEEE Access 5: 27800-27806 (2017) - [j24]V. Gayoso Martínez, Luis Hernández Encinas, Agustín Martín Muñoz, M. A. Álvarez Mariño, D. Arroyo Guardeño:
A comparative study of three Spanish eGoverment smart cards. Log. J. IGPL 25(1): 42-53 (2017) - [c31]V. Gayoso Martínez, Luis Hernández Encinas, Agustín Martín Muñoz, J. Zhang:
Breaking a Hitag2 Protocol with Low Cost Technology. ICISSP 2017: 579-584 - [c30]Alfonso Blanco Blanco, José María de Fuentes, Lorena González-Manzano, Luis Hernández Encinas, Agustín Martín Muñoz, José Luis Rodrigo Oliva, J. Ignacio Sánchez García:
A Framework for Acquiring and Analyzing Traces from Cryptographic Devices. ATCS/SePrIoT@SecureComm 2017: 283-300 - [c29]José Diamantino Hernández Guillén, Ángel Martín del Rey, Luis Hernández Encinas:
New Approaches of Epidemic Models to Simulate Malware Propagation. SOCO-CISIS-ICEUTE 2017: 631-640 - [c28]Victor Gayoso Martínez, Luis Hernández Encinas, Agustín Martín Muñoz, Raúl Durán Díaz:
A Proposal for Using a Cryptographic National Identity Card in Social Networks. SOCO-CISIS-ICEUTE 2017: 651-660 - [c27]Amalia Beatriz Orúe López, Luis Hernández Encinas, Veronica Fernandez, Fausto Montoya Vitini:
A Review of Cryptographically Secure PRNGs in Constrained Devices for the IoT. SOCO-CISIS-ICEUTE 2017: 672-682 - 2016
- [j23]Alberto Fuentes Rodríguez, Luis Hernández Encinas, Agustín Martín Muñoz, Bernardo Alarcos Alcázar:
Design and optimization of the input modules of a DPA toolbox. Log. J. IGPL 24(1): 16-28 (2016) - [j22]G. Pastor, M. Romera, Marius-F. Danca, Agustín Martín, A. B. Orue, Fausto Montoya Vitini, Luis Hernández Encinas:
Hidden and Nonstandard Bifurcation Diagram of an Alternate Quadratic System. Int. J. Bifurc. Chaos 26(2): 1650036:1-1650036:14 (2016) - [j21]Lorena González-Manzano, José María de Fuentes, Sergio Pastrana, Pedro Peris-Lopez, Luis Hernández Encinas:
PAgIoT - Privacy-preserving Aggregation protocol for Internet of Things. J. Netw. Comput. Appl. 71: 59-71 (2016) - [c26]Victor Gayoso Martínez, Luis Hernández Encinas, Agustín Martín Muñoz, Óscar Martínez-Graullera, Javier Villazón-Terrazas:
A Comparison of Computer-Based Technologies Suitable for Cryptographic Attacks. SOCO-CISIS-ICEUTE 2016: 621-630 - [c25]Araceli Queiruga Dios, Ascensión Hernández Encinas, Jesús Martín-Vaquero, Luis Hernández Encinas:
Malware Propagation Models in Wireless Sensor Networks: A Review. SOCO-CISIS-ICEUTE 2016: 648-657 - [c24]Raúl Durán Díaz, Victor Gayoso Martínez, Luis Hernández Encinas, Agustín Martín Muñoz:
A Study on the Performance of Secure Elliptic Curves for Cryptographic Purposes. SOCO-CISIS-ICEUTE 2016: 658-667 - [c23]Araceli Queiruga Dios, Ascensión Hernández Encinas, Gerardo Rodríguez Sánchez, Ángel Martín del Rey, Jesús Martín-Vaquero, Luis Hernández Encinas:
Case study: Malware propagation models for undergraduate engineering students. TEEM 2016: 931-935 - 2015
- [j20]Victor Gayoso Martínez, Luis Hernández Encinas, A. Queiruga Dios:
Security and Practical Considerations When Implementing the Elliptic Curve Integrated Encryption Scheme. Cryptologia 39(3): 244-269 (2015) - [j19]Raúl Durán Díaz, Luis Hernández Encinas, Jaime Muñoz Masqué:
Cryptanalysis of two combinatorial public key cryptosystems. Log. J. IGPL 23(1): 4-16 (2015) - [c22]V. Gayoso Martínez, Luis Hernández Encinas, Seok-Zun Song:
Group Signatures in Practice. CISIS-ICEUTE 2015: 413-423 - [c21]D. Arroyo Guardeño, V. Gayoso Martínez, Luis Hernández Encinas, Agustín Martín Muñoz:
Using Smart Cards for Authenticating in Public Services: A Comparative Study. CISIS-ICEUTE 2015: 437-446 - 2013
- [j18]Raúl Durán Díaz, Luis Hernández Encinas, Jaime Muñoz Masqué:
Two proposals for group signature schemes based on number theory problems. Log. J. IGPL 21(4): 648-658 (2013) - [c20]V. Gayoso Martínez, Luis Hernández Encinas:
Developing ECC applications in Java Card. IAS 2013: 114-120 - [c19]Alberto Fuentes Rodríguez, Luis Hernández Encinas, Agustín Martín Muñoz, Bernardo Alarcos Alcázar:
A Toolbox for DPA Attacks to Smart Cards. SOCO-CISIS-ICEUTE 2013: 399-408 - [c18]Victor Gayoso Martínez, Luis Hernández Encinas, Ascensión Hernández Encinas, Araceli Queiruga Dios:
Disclosure of Sensitive Information in the Virtual Learning Environment Moodle. SOCO-CISIS-ICEUTE 2013: 517-526 - [c17]Marta Conde Pena, Raúl Durán Díaz, Luis Hernández Encinas, Jaime Muñoz Masqué:
The Isomorphism of Polynomials Problem Applied to Multivariate Quadratic Cryptography. SOCO-CISIS-ICEUTE 2013: 567-576 - [c16]V. Gayoso Martínez, Luis Hernández Encinas, Agustín Martín Muñoz, J. Ignacio Sánchez García:
Identification by means of a national ID card for wireless services. WPMC 2013: 1-5 - 2012
- [j17]R. Álvarez Mariño, Fernando Hernández Álvarez, Luis Hernández Encinas:
A crypto-biometric scheme based on iris-templates with fuzzy extractors. Inf. Sci. 195: 91-102 (2012) - [c15]Raúl Durán Díaz, Luis Hernández Encinas, Jaime Muñoz Masqué:
Comments on a Cryptosystem Proposed by Wang and Hu. CISIS/ICEUTE/SOCO Special Sessions 2012: 57-65 - 2011
- [c14]Raúl Durán Díaz, Luis Hernández Encinas, Jaime Muñoz Masqué:
A Multisignature Scheme Based on the SDLP and on the IFP. CISIS 2011: 135-142 - [c13]Raúl Durán Díaz, Luis Hernández Encinas, Jaime Muñoz Masqué:
A Group Signature Scheme Based on the Integer Factorization and the Subgroup Discrete Logarithm Problems. CISIS 2011: 143-150 - [c12]Victor Gayoso Martínez, Luis Hernández Encinas, Carmen Sánchez Ávila:
Java Card Implementation of the Elliptic Curve Integrated Encryption Scheme Using Prime and Binary Finite Fields. CISIS 2011: 160-167 - 2010
- [c11]Victor Gayoso Martínez, Fernando Hernández Álvarez, Luis Hernández Encinas, Carmen Sánchez Ávila:
A comparison of the standardized versions of ECIES. IAS 2010: 1-4 - [c10]Victor Gayoso Martínez, Luis Hernández Encinas, Carmen Sanchez-Avila:
A Java Implementation of the Elliptic Curve Integrated Encryption Scheme. Security and Management 2010: 495-504 - [c9]Victor Gayoso Martínez, Ascensión Hernández Encinas, Luis Hernández Encinas, Araceli Queiruga Dios, Isabel Visus Ruiz:
Development of Capstone Projects on Secure Communications for Engineering Students. Security and Management 2010: 516-522
2000 – 2009
- 2009
- [j16]Seok-Zun Song, Raúl Durán Díaz, Luis Hernández Encinas, Jaime Muñoz Masqué, A. Queiruga Dios:
Dimension of the intersection of a pair of orthogonal groups. Int. J. Comput. Math. 86(10&11): 1678-1683 (2009) - [j15]Luis Hernández Encinas, Jaime Muñoz Masqué, A. Queiruga Dios:
Analysis of the efficiency of the Chor-Rivest cryptosystem implementation in a safe-parameter range. Inf. Sci. 179(24): 4219-4226 (2009) - [c8]Fernando Hernández Álvarez, Luis Hernández Encinas:
Security Efficiency Analysis of a Biometric Fuzzy Extractor for Iris Templates. CISIS 2009: 163-170 - [c7]Fernando Hernández Álvarez, Luis Hernández Encinas, Carmen Sanchez-Avila:
Biometric Fuzzy Extractor Scheme for Iris Templates. Security and Management 2009: 563-569 - [c6]Raúl Durán Díaz, Fernando Hernández Álvarez, Luis Hernández Encinas:
Graphic Multisecret Sharing Schemes with One-Dimensional Cellular Automata. Security and Management 2009: 576-582 - 2008
- [j14]Luis Hernández Encinas, Jaime Muñoz Masqué, A. Queiruga Dios:
Safer parameters for the Chor-Rivest cryptosystem. Comput. Math. Appl. 56(11): 2883-2886 (2008) - [j13]Luis Hernández Encinas, Ángel Martín del Rey, Jaime Muñoz Masqué:
A Weakness in Authenticated Encryption Schemes Based on Tseng et al.'s Schemes. Int. J. Netw. Secur. 7(2): 157-159 (2008) - [j12]Gonzalo Álvarez Marañón, Luis Hernández Encinas, Ángel Martín del Rey:
A multisecret sharing scheme for color images based on cellular automata. Inf. Sci. 178(22): 4382-4395 (2008) - [j11]Gonzalo Álvarez Marañón, Luis Hernández Encinas, Jaime Muñoz Masqué:
Known-Plaintext Attack to Two Cryptosystems Based on the BB Equation. IEEE Trans. Circuits Syst. II Express Briefs 55-II(5): 423-426 (2008) - [c5]A. Queiruga Dios, Luis Hernández Encinas, D. Queiruga:
Cryptography Adapted to the New European Area of Higher Education. ICCS (2) 2008: 706-714 - 2007
- [j10]Ascensión Hernández Encinas, Luis Hernández Encinas, S. Hoya White, Ángel Martín del Rey, Gerardo Rodríguez Sánchez:
Simulation of forest fire fronts using cellular automata. Adv. Eng. Softw. 38(6): 372-378 (2007) - [j9]Luis Hernández Encinas, Ángel Martín del Rey:
Inverse rules of ECA with rule number 150. Appl. Math. Comput. 189(2): 1782-1786 (2007) - [j8]Gonzalo Álvarez, Shujun Li, Luis Hernández Encinas:
Analysis of security problems in a medical image encryption system. Comput. Biol. Medicine 37(3): 424-427 (2007) - 2006
- [c4]Luis Hernández Encinas, Jaime Muñoz Masqué, A. Queiruga Dios:
Maple Implementation of the Chor-Rivest Cryptosystem. International Conference on Computational Science (2) 2006: 438-445 - 2005
- [j7]Gonzalo Álvarez Marañón, Ascensión Hernández Encinas, Luis Hernández Encinas, Ángel Martín del Rey:
A secure scheme to share secret color images. Comput. Phys. Commun. 173(1-2): 9-16 (2005) - [j6]Luis Hernández Encinas, Ángel Martín del Rey, Jaime Muñoz Masqué:
Faa' di Bruno's formula, lattices, and partitions. Discret. Appl. Math. 148(3): 246-255 (2005) - [c3]Gonzalo Álvarez Marañón, Luis Hernández Encinas, Ángel Martín del Rey:
A New Secret Sharing Scheme for Images Based on Additive 2-Dimensional Cellular Automata. IbPRIA (1) 2005: 411-418 - 2004
- [j5]C. Fraile Rubio, Luis Hernández Encinas, S. Hoya White, Ángel Martín del Rey, Gerardo Rodríguez Sánchez:
The Use of Linear Hybrid Cellular Automata as Pseudo Random Bit Generators in Cryptography. Neural Parallel Sci. Comput. 12(2): 175-192 (2004) - 2003
- [j4]Luis Hernández Encinas, Jaime Muñoz Masqué, A. Queiruga Dios:
Large decryption exponents in RSA. Appl. Math. Lett. 16(3): 293-295 (2003) - [j3]Luis Hernández Encinas, Jaime Muñoz Masqué:
A short proof of the generalized Faàdi Bruno's formula. Appl. Math. Lett. 16(6): 975-979 (2003) - [c2]Gonzalo Álvarez Marañón, Luis Hernández Encinas, Ascensión Hernández Encinas, Ángel Martín del Rey, Gerardo Rodríguez Sánchez:
Graphic Cryptography with Pseudorandom Bit Generators and Cellular Automata. KES 2003: 1207-1214 - [i2]Gonzalo Álvarez Marañón, Luis Hernández Encinas, Ángel Martín del Rey:
Sharing secret color images using cellular automata with memory. CoRR cs.CR/0312034 (2003) - [i1]Luis Hernández Encinas, Jaime Muñoz Masqué, A. Queiruga Dios:
An algorithm to obtain an RSA modulus with a large private key. IACR Cryptol. ePrint Arch. 2003: 45 (2003) - 2002
- [j2]Luis Hernández Encinas, Alfred Menezes, Jaime Muñoz Masqué:
Isomorphism Classes of Genus-2 Hyperelliptic Curves Over Finite Fields. Appl. Algebra Eng. Commun. Comput. 13(1): 57-65 (2002) - [j1]José Chamoso Sánchez, Luis Hernández Encinas, Ricardo López Fernández, Mercedes Rodríguez Sánchez:
Designing hypermedia tools for solving problems in mathematics. Comput. Educ. 38(4): 303-317 (2002)
1990 – 1999
- 1998
- [c1]Luis Hernández Encinas, Fausto Montoya Vitini, Jaime Muñoz Masqué, Alberto Peinado Domínguez:
Maximal period of orbits of the BBS generator. ICISC 1998: 71-80
Coauthor Index
aka: A. Queiruga Dios
aka: Agustín Martín Muñoz
aka: V. Gayoso Martínez
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:41 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint