Portfolio item number 1
Published:
Short description of portfolio item number 1
Published:
Short description of portfolio item number 1
Published:
Short description of portfolio item number 2 
Published:
The relationship between the dynamical systems theory and the principles of cryptography was underlined by Shannon in his seminal work about perfect secrecy. Indeed, it is possible to interpret the main requirements of encryption systems by means of general concepts of dynamical systems theory, as the sensitivity to initial conditions/control parameters and the ergodicity property. However, this relationship could imply security flaws when an attacker can link partial information extracted from the encryption process to a subset of the secret keys of the related cryptosystem. In this work we highlight the outcomes of the applied theory of symbolic dynamics as a tool to detect such a vulnerability.
Published:
Published:
Autores: Oscar Delgado; David Arroyo; Jesus Diaz; Luis Hernandez. Disponible en Internet en: https://www.ccn-cert.cni.es/documentos-publicos/x-jornadas-stic-ccn-cert/1921-m2-05-blockchains-csic/file.html
Published:
Autores: Luis Hernández Encinas; Víctor Gayoso Martínez; David Arroyo. Disponible en: https://www.ccn-cert.cni.es/documentos-publicos/xi-jornadas-stic-ccn-cert/2599-m31-02-frente-al-computador-cuantico/file.html
Published:
Published:
Published:
Complexity is inherent in end-to-end e-commerce mechanisms that are currently deployed in the real world. These mechanisms have to deal with various important and diversified aspects of sales and payment processes. While some aspects of e-commerce have been dealt with from a privacy point of view, other aspects have not been addressed, and therefore the complexity of the complete global e-commerce cycle has been ignored. In this talk, we look at the entire transaction flow and support procedures for e-commerce and payments, including all parties and processes within the e-commerce ecosystem. This analysis is intented to designing a comprehensive system by means of privacy-preserving cryptographic tools. Simultaneously, our efforts are on promoting a high flexible methodology by leveraging functionality of existing processes.
Published:
Autores: David Arroyo; Álvaro Rezola; Luis Hernández. Disponible en: https://www.ccn-cert.cni.es/xiijornadas-ponencias.html
Published:
Published:
Conferencia sobre el papel de los smart contracts en el internet de las cosas.
Published:
Published:

Published:
Undergraduate course, University Antonio de Nebrija, School of Computer Engineering , 2005

Undergraduate course, University Antonio de Nebrija, School of Computer Engineering , 2006

Postgraduate course, Deusto University, School of Computer Engineering , 2007

Postgraduate course, Complutense University, Faculty of Mathematics, 2007

Undergraduate course, Autonomous University of Madrid (UAM), School of Computer Engineering , 2010

Undergraduate course, Autonomous University of Madrid (UAM), School of Computer Engineering , 2010

Undergraduate course, Autonomous University of Madrid (UAM), School of Computer Engineering , 2012

Postgraduate course, Autonomous University of Madrid, Computer Science Engineering, 2012

Undergraduate course, Autonomous University of Madrid (UAM), School of Computer Engineering , 2013

Postgraduate course, Autonomous University of Madrid, Computer Science Engineering, 2013

Undergraduate course, Autonomous University of Madrid, Computer Science Engineering, 2014

Undergraduate course, Autonomous University of Madrid, Computer Science Engineering, 2014

Postgraduate course, Autonomous University of Madrid, Computer Science Engineering, 2014

Postgraduate course, Autonomous University of Madrid, Computer Science Engineering, 2014

Postgraduate course, Autonomous University of Madrid, Forensic and Security Sciences Institute, 2014
![]() |
![]() |
Postgraduate course, Autonomous University of Madrid, Forensic and Security Sciences Institute, 2016
![]() |
![]() |
Postgraduate course, Autonomous University of Madrid, Forensic and Security Sciences Institute, 2016
![]() |
![]() |
Postgraduate course, Autonomous University of Madrid, Forensic and Security Sciences Institute, 2016

Postgraduate course, Autonomous University of Madrid, Institute of Health Carlos III, 2017
![]() |
![]() |
Postgraduate course, Autonomous University of Madrid, Computer Science Engineering, 2018

Postgraduate course, Autonomous University of Madrid, Faculty of Economics and Business Studies, 2019
![]() |
![]() |
Postgraduate course, Curso de Especialidades Criptológicas, INAP, 2019

Postgraduate course, Autonomous University of Madrid, Forensic and Security Sciences Institute, 2019

Postgraduate course, Autonomous University of Madrid, Faculty of Economics and Business Studies, 2019
![]() |
![]() |
Postgraduate course, Curso de Especialidades Criptológicas, INAP, 2021

Postgraduate course, Autonomous University of Madrid, UAM-IBM Chair, 2022
![]() |
![]() |
Postgraduate course, Curso de Especialidades Criptológicas, INAP, 2022

Postgraduate course, Autonomous University of Madrid, UAM-IBM Chair, 2022
![]() |
![]() |