Obserwuj
Maribel Gonzalez Vasco
Maribel Gonzalez Vasco
Professor of Applied Mathematics, U.Rey Juan Carlos
Zweryfikowany adres z urjc.es
Tytuł
Cytowane przez
Cytowane przez
Rok
Secure group key establishment revisited
JM Bohli, MI González Vasco, R Steinwandt
International Journal of Information Security 6, 243-254, 2007
1022007
On the security of Diffie-Hellman bits
MIG Vasco, IE Shparlinski
Cryptography and computational number theory, 257-268, 2001
642001
(Password) authenticated key establishment: From 2-party to group
M Abdalla, JM Bohli, MIG Vasco, R Steinwandt
Theory of Cryptography: 4th Theory of Cryptography Conference, TCC 2007 …, 2007
502007
Obstacles in two public key cryptosystems based on group factorizations
MIG Vasco, R Steinwandt
Tatra Mt. Math. Publ 25 (23), 23-37, 2002
392002
Security of the most significant bits of the Shamir message passing scheme
M González Vasco, I Shparlinski
Mathematics of computation 71 (237), 333-342, 2002
362002
On minimal length factorizations of finite groups
MIG Vasco, M Rötteler, R Steinwandt
Experimental Mathematics 12 (1), 1-12, 2003
352003
Group Theoretic Cryptography
MIG Vasco, R Steinwandt
CRC Press, 2015
342015
Weak Keys in MST1
JM Bohli, R Steinwandt, MIG Vasco, C Martinez
Designs, Codes and Cryptography 37, 509-524, 2005
312005
Password-Authenticated Constant-Round Group Key Establishment with a Common Reference String.
JM Bohli, MIG Vasco, R Steinwandt
IACR Cryptol. ePrint Arch. 2006, 214, 2006
282006
A survey of hard core functions
MIG Vasco, M Näslund
Cryptography and Computational Number Theory, 227-255, 2001
282001
Towards a uniform description of several group based cryptographic primitives
MI González Vasco, C Martínez, R Steinwandt
Designs, Codes and Cryptography 33 (3), 215-226, 2004
262004
A reaction attack on a public key cryptosystem based on the word problem
MIG Vasco, R Steinwandt
Applicable Algebra in Engineering, Communication and Computing 14 (5), 335-340, 2004
232004
A note on the security of MST 3
MIG Vasco, ALP del Pozo, PT Duarte
Designs, Codes and Cryptography 55, 189-200, 2010
222010
Combined (identity-based) public key schemes
MIG Vasco, F Hess, R Steinwandt
Cryptology ePrint Archive, 2008
222008
A subliminal-free variant of ECDSA
JM Bohli, MI González Vasco, R Steinwandt
Information Hiding: 8th International Workshop, IH 2006, Alexandria, VA, USA …, 2007
222007
Choosing a leader on a complex network
R Criado, J Flores, MI González-Vasco, J Pello
Journal of computational and applied mathematics 204 (1), 10-17, 2007
212007
New results on the hardness of Diffie-Hellman bits
MIG Vasco, M Näslund, IE Shparlinski
Lecture notes in computer science 2947, 159-172, 2004
162004
The hidden number problem in extension fields and its applications
MIG Vasco, M Näslund, IE Shparlinski
Lecture notes in computer science, 105-117, 2002
162002
A new cramer-shoup like methodology for group based provably secure encryption schemes
MIG Vasco, C Martínez, R Steinwandt, JL Villar
Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005 …, 2005
142005
Cryptanalysis of a key exchange scheme based on block matrices
MIG Vasco, ALP del Pozo, PT Duarte, JL Villar
Information Sciences 276, 319-331, 2014
122014
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20