Journal Articles


    1. (with J.I. Escribano Pablos) Secure post-quantum group key exchange: Implementing a solution based on Kyber, IET Communications, 1--16, 2023.

    2. (with A.L. Pérez del Pozo and C. Soriente) A key for John Doe: modeling and designing Anonymous Password-Authenticated Key Exchange protocols . IEEE Transactions on Dependable and Secure Computing, Volume 18, Issue 3, 2021.

    3. ( with C. González, F. Johnson, and A.L. Pérez del Pozo). An Attack on Zawadzki's Quantum Authentication Scheme. Entropy, 23(4), 38, 2021.

    4. (with A.I. González Tablas, I. Cascos and A. Planet Palomino) Shuffle, Cut, and Learn: Crypto Go, a Card Game for Teaching Cryptography Mathematics, 8.,(11), 1993, 2020.

    5. (with Escribano Pablos, J.I., M.I.; Marriaga, M.E.; Pérez del Pozo, Á.L. Compiled Constructions towards Post-Quantum Group Key Exchange: A Design from Kyber. Mathematics, 8, 1853, 2020.

    6. (with A. Pérez del Pozo and R. Steinwandt) Group Key Establishment in a Quantum-Future Scenario. Informatica, Vol 31, 4, pp. 751-768, 2020.

    7. (with J.-M. Bohli and R. Steinwandt) Building Group Key Establishment on Group Theory: A Modular Approach. Symmetry, 12(2), 197, 2020.

    8. (with J. I. Escribano Pablos, M. E. Marriaga and A. L. Pérez del Pozo) The Cracking of WalnutDSA: A Survey, Symmetry 2019, 11(9), 1072, 2019.

    9. (with J.M. Bohli and R. Steinwandt) Password Authenticated Group Key Establishment from Smooth Projective Hash Functions. International Journal of Applied Mathematics and Computer Science (AMCS), Vol. 29, No. 4, 797–815, 2019.

    10. (with A. Robinson and R. Steinwandt) Cryptanalysis of a proposal based on the discrete logarithm problem inside Sn. Cryptography 2, 16, 2018.

    11. (with E.P. Fernández-Manzano) Analytic Surveillance: Big Data Business Models in the Time of Privacy Awareness. Vigilancia analítica: modelos comerciales de datos masivos y concienciación sobre la privacidad, El Profesional de la Información (EPI), Vol 27, núm 2, 2018.

    12. (with A.L. Pérez del Pozo y A. Suarez Corona) Group key exchange protocols withstanding ephemeral key reveals. IET Information Security, Vol 12, Num. 1, pp. 79-86, 2018.

    13. (with D. Fiore y C. Soriente) Partitioned Group Password-Based Authenticated Key Exchange. The Computer Journal, Volume 60, No. 12, pp. 1912-1922, 2017.

    14. (with P. D'Arco, A. Pérez del Pozo, C. Soriente and R. Steinwandt) Private Set Intersection: New Generic Constructions and Feasability Results. Advances in Mathematics of Communications, Volume 11, No. 3, 481–502, 2017.

    15. (with A.L. Pérez del Pozo y A. Suarez Corona) Pitfalls in a Server-Aided Authenticated Group Key Establishment. Information Sciences, Vol. 363, 1-7, 2016.

    16. (with F. Hess and R. Steinwandt) Combined schemes for signature and encryption: the public-key and the identity-based setting. Information and Computation, 246. pp. 1-10, 2016.

    17. (with A.L. Pérez del Pozo , P. Taborda Duarte and J.L. Villar) Cryptanalysis of a key exchange scheme based on block matrices. Information Sciences, Vol. 276, pp.319–331, 2014.

    18. (with A.L. Pérez del Pozo y P. Taborda Duarte) A note on the security of MST3. Designs, Codes and Cryptography, Vol. 55, pp.189--200, 2010.

    19. (with J. Villar) In search of mathematical primitives for deriving universal projective hash families. Applicable Algebra in Engineering, communication and Computing, Vol. 19 (2), pp. 161—173, 2008.

    20. (with J.M. Bohli and R. Steinwandt) Secure Group Key Establishment Revisited. International Journal of Information Security, Vol 6 (4), pp. 243--254, 2007.

    21. (with R. Steinwandt) On ideal and subalgebra coefficients in a class of k-algebras. Note di Matematica, Vol 27 (1), pp. 77--83, 2007.

    22. (with D. Pérez) Attacking a Public Key Cryptosystem Based on Tree Replacement. Discrete Applied Mathematics, 155, pp 61-67, 2007.

    23. (with R. Criado, J. Flores and J. Pello) Locating a leader node on a complex network: a trade-off between robustness and efficiency. Journal of Computational and Applied Mathematics, 204, pp 10—17, 2007.

    24. (with R. Steinwandt, and Jorge L. Villar) Towards Provable Security for Cryptographic Constructions Arising from Combinatorial Group Theory. Algebraic methods in cryptography, L.Gerritzen, D. Goldfeld, M. Kreuzer, G. Rosenberger, and V. Shpilrain, eds., Contemporary Mathematics, vol. 418 , pp. 89 – 101, American Mathematical Society, 2006.

    25. (with W. Geiselmann and R. Steinwandt) Entwurf asymmetrischer Kryptographischer Verfahren unter Berücksichtigung von Quantenalgorithmen. IT- Information Technology, special issue "Cryptography and Quantum Informatics-- dedicated to Thomas Beth, Vol 48, (6) pp 327—331, 2006.

    26. (with R. Steinwandt) Pitfalls in public key cryptosystems based on free partially commutative monoids and groups. Applied Mathematics Letters, vol. 19, no. 10, pp. 1037-1041, 2006.

    27. (with R. Steinwandt) Chosen ciphertext attacks as common vulnerability of some group- and polynomial-based encryption schemes. Tatra Mountains Mathematical Publications, Vol33, 149—158, 2006.

    28. (with J-M. Bohli, C. Martínez, and R. Steinwandt) Weak Keys in MST1 . Designs, Codes and Cryptography, vol. 37, no. 3, pp. 509-524, 2005.

    29. (with D. Hoffheinz, C. Martínez y R. Steinwandt) On the Security of Two Public Key Cryptosystems using non-abelian groups. Designs, Codes and Cryptography, vol. 32, pp. 207-216 (Special Issue: Proceedings of the Third Pythagorean Conference), 2004.

    30. (with C. Martínez, R. Steinwandt) Towards a Uniform Description of Several Group Based Cryptographic Primitives. Designs, Codes and Cryptography Kluwer, 33, 215—226, 2004.

    31. (with R. Steinwandt ) A Reaction Attack on a Public Key Cryptosystem Based on the Word Problem. Applicable Algebra in Engineering, Communication and Computing, 14(5): 335-340, 2004.

    32. (with M. Rötteler and R. Steinwandt) On Minimal Length Factorizations of Finite Groups. Experimental Mathematics ,Vol 12, Num 1. 1---12, 2003.

    33. (with R. Steinwandt) Obstacles in two public key cryptosystems based on group factorizations. Cryptology , Vol 25, 23--37, Tatra Mt. Mathemathical Publications, 2002.

    34. (with R. Steinwandt) Clouds over a public key cryptosystem based on Lyndon words. Information Processing Letters, Vol.80, 239--242, Elsevier Science, 2001.

    35. (with Igor E. Shparlinski) Security of the Most Significant Bits of the Shamir Message Passing Scheme. Mathematics of Computation, Vol 71, Num. 237, 333--342, AMS, 2001.