Sitemap

A list of all the posts and pages found on the site. For you robots out there is an XML version available for digesting as well.

Pages

About me

Research statement

Posts

Research Assistant (predoc)

3 minute read

Published:

The Research group on Cryptology and Information Security (GiCSI) of the Spanish National Research Council is seeking highly motivated professionals in conducting research in the area of cryptographic privacy-enhancing technologies, blockchain-based protocols and security protocols.

Iniciación a la investigación–> becas JAE-INTRO del CSIC

less than 1 minute read

Published:

¿Eres alumno de Máster o de último año de Grado?¿Tienes interés por iniciarte en la investigación en ciberseguridad? Desde el Grupo de Criptología y Seguridad de la Información del CSIC, ofertamos 3 planes de formación dentro de la convocatoria JAE-INTRO y orientados al desarrollo de competencias en blockchain y ciberseguridad (https://lnkd.in/gUPxcX3):

Juan de la Cierva Grants 2018 for Young Doctors – Call for Expression of Interest

less than 1 minute read

Published:

The Research group on Cryptology and Information Security (GiCSI) of the Spanish National Research Council is seeking highly motivated professionals in conducting research in the area of blockchain-based protocols, security protocols and cryptographic privacy-enhancing technologies.

A Comprehensive Privacy-Respecting Mechanism for Global E-Commerce

less than 1 minute read

Published:

Complexity is inherent in end-to-end e-commerce mechanisms that are currently deployed in the real world. These mechanisms have to deal with various important and diversified aspects of sales and payment processes. While some aspects of e-commerce have been dealt with from a privacy point of view, other aspects have not been addressed, and therefore the complexity of the complete global e-commerce cycle has been ignored. In this talk, we look at the entire transaction flow and support procedures for e-commerce and payments, including all parties and processes within the e-commerce ecosystem. This analysis is intented to designing a comprehensive system by means of privacy-preserving cryptographic tools. Simultaneously, our efforts are on promoting a high flexible methodology by leveraging functionality of existing processes.

Blockchain Day

less than 1 minute read

Published:

Moderador de la mesa redonda sobre la tecnología blockchain

Time series characterization by means of applied symbolic dynamics

less than 1 minute read

Published:

The relationship between the dynamical systems theory and the principles of cryptography was underlined by Shannon in his seminal work about perfect secrecy. Indeed, it is possible to interpret the main requirements of encryption systems by means of general concepts of dynamical systems theory, as the sensitivity to initial conditions/control parameters and the ergodicity property. However, this relationship could imply security flaws when an attacker can link partial information extracted from the encryption process to a subset of the secret keys of the related cryptosystem. In this work we highlight the outcomes of the applied theory of symbolic dynamics as a tool to detect such a vulnerability.

portfolio

publications

talks

Time series characterization by means of applied symbolic dynamics

Published:

The relationship between the dynamical systems theory and the principles of cryptography was underlined by Shannon in his seminal work about perfect secrecy. Indeed, it is possible to interpret the main requirements of encryption systems by means of general concepts of dynamical systems theory, as the sensitivity to initial conditions/control parameters and the ergodicity property. However, this relationship could imply security flaws when an attacker can link partial information extracted from the encryption process to a subset of the secret keys of the related cryptosystem. In this work we highlight the outcomes of the applied theory of symbolic dynamics as a tool to detect such a vulnerability.

Blockchain Day

Published:

Moderador de la mesa redonda sobre la tecnología blockchain

A Comprehensive Privacy-Respecting Mechanism for Global E-Commerce

Published:

Complexity is inherent in end-to-end e-commerce mechanisms that are currently deployed in the real world. These mechanisms have to deal with various important and diversified aspects of sales and payment processes. While some aspects of e-commerce have been dealt with from a privacy point of view, other aspects have not been addressed, and therefore the complexity of the complete global e-commerce cycle has been ignored. In this talk, we look at the entire transaction flow and support procedures for e-commerce and payments, including all parties and processes within the e-commerce ecosystem. This analysis is intented to designing a comprehensive system by means of privacy-preserving cryptographic tools. Simultaneously, our efforts are on promoting a high flexible methodology by leveraging functionality of existing processes.

teaching

Information security

Undergraduate course, University Antonio de Nebrija, School of Computer Engineering , 2006

drawing

Programming Project

Undergraduate course, Autonomous University of Madrid (UAM), School of Computer Engineering , 2010

drawing

Introduction to Python

Postgraduate course, Autonomous University of Madrid, Forensic and Security Sciences Institute, 2016

drawing drawing2

Android forensics

Postgraduate course, Autonomous University of Madrid, Forensic and Security Sciences Institute, 2016

drawing drawing2

Android Forensics

Postgraduate course, Autonomous University of Madrid, Forensic and Security Sciences Institute, 2016

drawing

Clustering

Postgraduate course, Autonomous University of Madrid, Institute of Health Carlos III, 2017

drawing drawing2

Clustering

Postgraduate course, Autonomous University of Madrid, UAM-IBM Chair, 2022

drawing drawing2