Page Not Found
Page not found. Your pixels are in another canvas.
A list of all the posts and pages found on the site. For you robots out there is an XML version available for digesting as well.
Page not found. Your pixels are in another canvas.
This is a page not in th emain menu
Published:
The Research group on Cryptology and Information Security (GiCSI) of the Spanish National Research Council is seeking highly motivated professionals in conducting research in the area of cryptographic privacy-enhancing technologies, blockchain-based protocols and security protocols.
Published:
https://editorial.csic.es/publicaciones/libros/13181/0/blockchain.html
Published:
¿Eres alumno de Máster o de último año de Grado?¿Tienes interés por iniciarte en la investigación en ciberseguridad? Desde el Grupo de Criptología y Seguridad de la Información del CSIC, ofertamos 3 planes de formación dentro de la convocatoria JAE-INTRO y orientados al desarrollo de competencias en blockchain y ciberseguridad (https://lnkd.in/gUPxcX3):
Published:
The Research group on Cryptology and Information Security (GiCSI) of the Spanish National Research Council is seeking highly motivated professionals in conducting research in the area of blockchain-based protocols, security protocols and cryptographic privacy-enhancing technologies.
Published:
Autores: David Arroyo; Álvaro Rezola; Luis Hernández. Disponible en: https://www.ccn-cert.cni.es/xiijornadas-ponencias.html
Published:
Complexity is inherent in end-to-end e-commerce mechanisms that are currently deployed in the real world. These mechanisms have to deal with various important and diversified aspects of sales and payment processes. While some aspects of e-commerce have been dealt with from a privacy point of view, other aspects have not been addressed, and therefore the complexity of the complete global e-commerce cycle has been ignored. In this talk, we look at the entire transaction flow and support procedures for e-commerce and payments, including all parties and processes within the e-commerce ecosystem. This analysis is intented to designing a comprehensive system by means of privacy-preserving cryptographic tools. Simultaneously, our efforts are on promoting a high flexible methodology by leveraging functionality of existing processes.
Published:
Published:
Published:
Autores: Luis Hernández Encinas; Víctor Gayoso Martínez; David Arroyo. Disponible en: https://www.ccn-cert.cni.es/documentos-publicos/xi-jornadas-stic-ccn-cert/2599-m31-02-frente-al-computador-cuantico/file.html
Published:
http://catedrauamibm.com/wp-content/uploads/2017/10/intro_blockchain.pdf
Published:
Autores: Oscar Delgado; David Arroyo; Jesus Diaz; Luis Hernandez. Disponible en Internet en: https://www.ccn-cert.cni.es/documentos-publicos/x-jornadas-stic-ccn-cert/1921-m2-05-blockchains-csic/file.html
Published:
Published:
The relationship between the dynamical systems theory and the principles of cryptography was underlined by Shannon in his seminal work about perfect secrecy. Indeed, it is possible to interpret the main requirements of encryption systems by means of general concepts of dynamical systems theory, as the sensitivity to initial conditions/control parameters and the ergodicity property. However, this relationship could imply security flaws when an attacker can link partial information extracted from the encryption process to a subset of the secret keys of the related cryptosystem. In this work we highlight the outcomes of the applied theory of symbolic dynamics as a tool to detect such a vulnerability.
Published:
Short description of portfolio item number 1
Published:
Short description of portfolio item number 2
Published:
The relationship between the dynamical systems theory and the principles of cryptography was underlined by Shannon in his seminal work about perfect secrecy. Indeed, it is possible to interpret the main requirements of encryption systems by means of general concepts of dynamical systems theory, as the sensitivity to initial conditions/control parameters and the ergodicity property. However, this relationship could imply security flaws when an attacker can link partial information extracted from the encryption process to a subset of the secret keys of the related cryptosystem. In this work we highlight the outcomes of the applied theory of symbolic dynamics as a tool to detect such a vulnerability.
Published:
Published:
Autores: Oscar Delgado; David Arroyo; Jesus Diaz; Luis Hernandez. Disponible en Internet en: https://www.ccn-cert.cni.es/documentos-publicos/x-jornadas-stic-ccn-cert/1921-m2-05-blockchains-csic/file.html
Published:
Autores: Luis Hernández Encinas; Víctor Gayoso Martínez; David Arroyo. Disponible en: https://www.ccn-cert.cni.es/documentos-publicos/xi-jornadas-stic-ccn-cert/2599-m31-02-frente-al-computador-cuantico/file.html
Published:
Published:
Published:
Complexity is inherent in end-to-end e-commerce mechanisms that are currently deployed in the real world. These mechanisms have to deal with various important and diversified aspects of sales and payment processes. While some aspects of e-commerce have been dealt with from a privacy point of view, other aspects have not been addressed, and therefore the complexity of the complete global e-commerce cycle has been ignored. In this talk, we look at the entire transaction flow and support procedures for e-commerce and payments, including all parties and processes within the e-commerce ecosystem. This analysis is intented to designing a comprehensive system by means of privacy-preserving cryptographic tools. Simultaneously, our efforts are on promoting a high flexible methodology by leveraging functionality of existing processes.
Published:
Autores: David Arroyo; Álvaro Rezola; Luis Hernández. Disponible en: https://www.ccn-cert.cni.es/xiijornadas-ponencias.html
Published:
Published:
Conferencia sobre el papel de los smart contracts en el internet de las cosas.
Published:
Published:
Published:
Undergraduate course, University Antonio de Nebrija, School of Computer Engineering , 2005
Undergraduate course, University Antonio de Nebrija, School of Computer Engineering , 2006
Postgraduate course, Deusto University, School of Computer Engineering , 2007
Postgraduate course, Complutense University, Faculty of Mathematics, 2007
Undergraduate course, Autonomous University of Madrid (UAM), School of Computer Engineering , 2010
Undergraduate course, Autonomous University of Madrid (UAM), School of Computer Engineering , 2010
Undergraduate course, Autonomous University of Madrid (UAM), School of Computer Engineering , 2012
Postgraduate course, Autonomous University of Madrid, Computer Science Engineering, 2012
Undergraduate course, Autonomous University of Madrid (UAM), School of Computer Engineering , 2013
Postgraduate course, Autonomous University of Madrid, Computer Science Engineering, 2013
Undergraduate course, Autonomous University of Madrid, Computer Science Engineering, 2014
Undergraduate course, Autonomous University of Madrid, Computer Science Engineering, 2014
Postgraduate course, Autonomous University of Madrid, Computer Science Engineering, 2014
Postgraduate course, Autonomous University of Madrid, Computer Science Engineering, 2014
Postgraduate course, Autonomous University of Madrid, Forensic and Security Sciences Institute, 2014
Postgraduate course, Autonomous University of Madrid, Forensic and Security Sciences Institute, 2016
Postgraduate course, Autonomous University of Madrid, Forensic and Security Sciences Institute, 2016
Postgraduate course, Autonomous University of Madrid, Forensic and Security Sciences Institute, 2016
Postgraduate course, Autonomous University of Madrid, Institute of Health Carlos III, 2017
Postgraduate course, Autonomous University of Madrid, Computer Science Engineering, 2018
Postgraduate course, Autonomous University of Madrid, Faculty of Economics and Business Studies, 2019
Postgraduate course, Curso de Especialidades Criptológicas, INAP, 2019
Postgraduate course, Autonomous University of Madrid, Forensic and Security Sciences Institute, 2019
Postgraduate course, Autonomous University of Madrid, Faculty of Economics and Business Studies, 2019
Postgraduate course, Curso de Especialidades Criptológicas, INAP, 2021
Postgraduate course, Autonomous University of Madrid, UAM-IBM Chair, 2022
Postgraduate course, Curso de Especialidades Criptológicas, INAP, 2022
Postgraduate course, Autonomous University of Madrid, UAM-IBM Chair, 2022