Víctor Gayoso Martínez

Víctor Gayoso Martínez
  • Spanish National Research Council

About

61
Publications
72,392
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
547
Citations
Current institution
Spanish National Research Council

Publications

Publications (61)
Poster
Full-text available
V International Conference on Mathematics and its Applications in Science and Engineering 16-18 September 2024 will be organized by Polytechnical Institute of Coimbra in Coimbra/Portugal. The ICMASE 2024 offers a variety of scientific sessions designed to appeal to a wide range of participants. It is a blended conference. All the sessions will be a...
Article
Cooperative, connected and automated mobility technologies have the potential to revolutionize transportation systems and enhance safety, efficiency and sustainability. However, the increasing reliance on digital technologies also introduces new cybersecurity risks that can compromise the safety and privacy of passengers and the integrity of transp...
Poster
Full-text available
IV International Conference on Mathematics and its Applications in Science and Engineering 12-14 July 2023 will be organized by U-Tad (University Center for Technology and Digital Art) in Madrid/ Spain. The ICMASE 2023 offers a variety of scientific sessions designed to appeal to a wide range of participants. It is a blended conference. All the ses...
Chapter
In recent years, mobility systems have been steadily improving their performance in terms of connectivity, allowing road users to communicate among them and with the road infrastructure either directly or through internet cloud-based services. The aim of this contribution is to provide an overview of inter-vehicle communications cybersecurity chall...
Article
Full-text available
The latest advances in quantum computing forced the National Institute of Standards and Technology (NIST) to launch an initiative for selecting quantum-resistant cryptographic algorithms. One of the best-known proposals is NewHope, an algorithm that was initially designed as a key exchange algorithm. In its original design, NewHope presented a reco...
Article
Full-text available
There are many computational applications and engines used in mathematics, with some of the best-known arguably being Maple, Mathematica, MATLAB, and Mathcad. However, although they are very complete and powerful, they demand the use of commercial licences, which can be a problem for some education institutions or in cases where students desire to...
Chapter
Blockchain technology is one of the greatest innovations of the last decade as it allows new possibilities for the development of projects in fields such as services, industry, arts, economy, and logistics, among others. In the area of education, blockchain technology is still in its early stages. A large part of existing implementations focus on c...
Chapter
The latest advances in quantum computing forced the NIST to launch an initiative for selecting quantum-resistant cryptographic algorithms. One of the best-known proposals is NewHope, an algorithm that was initially designed as a key-exchange algorithm. In its original design, NewHope presented a reconciliation mechanism that is complex and represen...
Article
Full-text available
Traceability and monitoring of industrial processes are becoming more important to assure the value of final products. Blockchain technology emerged as part of a movement linked to criptocurrencies and the Internet of Things, providing nice-to-have features such as traceability, authenticity and security to sectors willing to use this technology. I...
Article
The distinctive security features of the Spanish electronic national identity card, known as Documento Nacional de Identidad electrónico, allow us to propose the usage of this cryptographic smart card in an authentication framework that can be used during the registration and login phases of internet services where the validation of the user’s age...
Article
Full-text available
A method is presented that allows one to compute the maximum number of functionally-independent invariant functions under the action of a linear algebraic group as long as its Lie algebra admits a basis of square-zero matrices even on a field of positive characteristic. The class of such Lie algebras is studied in the framework of the classical Lie...
Article
Full-text available
The goal of digital forensics is to recover and investigate pieces of data found on digital devices, analysing in the process their relationship with other fragments of data from the same device or from different ones. Approximate matching functions, also called similarity preserving or fuzzy hashing functions, try to achieve that goal by comparing...
Article
Full-text available
Have you ever thought what would happen if a ransomware infected your laptop? This type of virus kidnaps files and encrypts them, and the only way to recover the data is by paying in bitcoin or some other cryptocurrency. This situation is undoubtedly terrible. All of your work, projects, and personal files will not be available (unless you pay the...
Article
Full-text available
Blockchain is one of the most interesting emerging technologies nowadays, with applications ranging from cryptocurrencies to smart contracts. This paper presents a review of the cryptographic tools necessary to understand the fundamentals of this technology and the foundations of its security. Among other elements, hash functions, digital signature...
Chapter
This paper proposes an approach of teaching centered on students which emphasizes the creative and effective use of technology. This approach meets students learning objectives using concept maps and shows how they can be used as an instructional tool to enhance the learning of Cryptography. The use of concept maps allows students to acquire a set...
Chapter
This work proposes a LabVIEW framework suitable for simulating and on-the-fly testing a hardware implementation of the Arrow lightweight pseudorandom generator. Its aim is twofold. The first objective is to provide a framework to simulate the pseudorandom generator behavior in a personal computer, allowing to modify dynamically the configuration pa...
Chapter
This chapter provides an introduction to limits and the analytical methods typically used for calculating them. Even though limits are a powerful tool of mathematics employed in more elaborated concepts such as derivatives, they are also useful when solving many problems where the results can be counterintuitive.
Article
Initially developed for tasks related to computer graphics, graphics processing units are increasingly being used for general purpose processing, including scientific and engineering applications. In this contribution, we have compared the performance of two graphics cards that belong to the parallel computing Compute Unified Device Architecture (C...
Article
Full-text available
Elliptic Curve Cryptography (ECC) is a branch of public-key cryptography based on the arithmetic of elliptic curves. In the short life of ECC, most standards have proposed curves defined over prime finite fields satisfying the curve equation in the short Weierstrass form. However, some researchers have started to propose as a securer alternative th...
Conference Paper
The distinctive security features of the Spanish electronic national identity card allow us to propose the usage of this cryptographic smart card in an authentication framework that can be used during the registration and login phases of certain internet services, including popular social networks. Using this mechanism with NFC-capable devices, the...
Preprint
A method is obtained to compute the maximum number of functionally independent invariant functions under the action of a linear algebraic group as long as its Lie algebra admits a base of square-zero matrices. Some applications are also given.
Article
We present a new group law defined on a subset of the projective plane $\mathbb{F}P^2$ over an arbitrary field $\mathbb{F}$, which lends itself to applications in Public Key Cryptography, in particular to a Diffie-Hellman-like key agreement protocol. We analyze the computational difficulty of solving the mathematical problem underlying the proposed...
Article
Full-text available
In this work, we address the problem of solving nonlinear general Klein–Gordon equations (nlKGEs). Different fourth- and sixth-order, stable explicit and implicit, finite difference schemes are derived. These new methods can be considered to approximate all type of Klein–Gordon equations (KGEs) including phi-four, forms I, II, and III, sine-Gordon,...
Chapter
Elliptic Curve Cryptography (ECC) is a branch of public-key cryptography based on the arithmetic of elliptic curves. In the short life of ECC, most standards have proposed curves defined over prime finite fields using the short Weierstrass form. However, some researchers have started to propose as a more secure alternative the use of Edwards and Mo...
Conference Paper
Full-text available
Elliptic Curve Cryptography (ECC) is a branch of public-key cryptography based on the arithmetic of elliptic curves. In the short life of ECC, most standards have proposed curves defined over prime finite fields satisfying the curve equation in the short Weierstrass form. However, some researchers have started to propose as a more secure alternativ...
Conference Paper
Developed initially for tasks related to computer graphics, GPUs are increasingly being used for general purpose processing, including scientific and engineering applications. In this contribution, we have analysed the performance of three graphics cards that belong to the parallel computing CUDA platform with two C++ and Java multi-threading imple...
Article
Smart cards are well-known tamper-resistant devices, and due to their portability and security they represent an excellent platform for implementing strong authentication services. This contribution analyses three Spanish smart card deployments intended to be used for eGoverment services, comparing their respective contents and capabilities. As a r...
Chapter
The development of side-channel and fault injection attacks against the implementation of algorithms used in elliptic curve cryptography (ECC), has pointed out that it is not enough to implement efficient algorithms that are secure from a theoretical point of view. In this sense, it is necessary to design algorithms that do not leak information whi...
Article
In this paper, we discuss the problem of solving nonlinear Klein–Gordon equations (KGEs), which are especially useful to model nonlinear phenomena. In order to obtain more exact solutions, we have derived different fourth- and sixth-order, stable explicit and implicit finite difference schemes for some of the best known nonlinear KGEs. These new hi...
Conference Paper
Full-text available
The deployment of security measures can lead in many occasions to an infringement of users’ privacy. Indeed, nowadays we have many examples about surveillance programs or personal data breaches in online service providers. In order to avoid the latter problem, we need to establish security measures that do not involve a violation of privacy rights....
Article
Full-text available
The most popular encryption scheme based on elliptic curves is the Elliptic Curve Integrated Encryption Scheme (ECIES), which is included in ANSI X9.63, IEEE 1363a, ISO/IEC 18033-2, and SECG SEC 1. These standards offer many ECIES options, not always compatible, making it difficult to decide what parameters and cryptographic elements to use in a sp...
Article
Full-text available
Group signature schemes allow a user to sign a message in an anonymous way on behalf of a group. In general, these schemes need the collaboration of a Key Generation Center or a Trusted Third Party, which can disclose the identity of the actual signer if necessary (for example, in order to settle a dispute). This paper presents the results obtained...
Chapter
Full-text available
Smart cards are well-known tamper-resistant devices, and as such they represent an excellent platform for implementing strong authentication. Many services requesting high levels of security rely on smart cards, which provide a convenient security token due to their portability. This contribution analyses two Spanish smart card deployments intended...
Article
Full-text available
In this paper, the problem of solving some nonlinear Klein–Gordon equations (KGEs) is considered. Here, we derive different fourth- and sixth-order explicit and implicit algorithms to solve the phi-four equation and the form-I of the nonlinear Klein–Gordon equation. Stability and consistency of the proposed schemes are studied under certain conditi...
Article
Full-text available
With the advent of the Bologna Process and the creation of the new bachelor's degrees, many professionals have made the decision to get into the university in order to upgrade their technical engineer's degrees or, in some cases, to finish their formerly abandoned studies. As the main issue for these professionals is how to make compatible their jo...
Article
Full-text available
In Science and Engineering studies, MATLAB is one of the preferred tools for scientific computing. Even though the learning curve of MATLAB is moderate, students at the first courses of the new Bologna degrees usually find some difficulties when trying to apply their knowledge of this software package to other technical subjects. With that problem...
Article
Full-text available
In recent years, the use of Virtual Learning Environments (VLEs) has greatly increased. Due to the requirements stated by the Bologna process, many European universities are changing their education systems to new ones based on information and communication technologies. The use of web environments makes their security an important issue, which mus...
Article
Elliptic Curve Cryptography is one of the best options for protecting sensitive information. The lastest version of the Java platform includes a cryptographic provider, named SunEC, that implements some elliptic curve operations and protocols. However, potential users of this provider are limited by the lack of information available. In this work,...
Conference Paper
Full-text available
Elliptic Curve Cryptography (ECC) is a branch of public-key cryptography based on the arithmetic of elliptic curves. Given its mathematical characteristics, ECC is currently one of the best options for protecting sensitive information. The lastest version of the Java Card platform includes several classes related to elliptic curves. However, potent...
Article
Full-text available
During the last years, the use of virtual learning frameworks has increased in the academic community. On account of the requirements derived from the Bologna process, many European universities started to change their education systems to new ones based on information and communication technologies. Those systems are most times based on web enviro...
Article
Full-text available
Elliptic Curve Cryptography (ECC) can be used as a tool for encrypting data, creating digital signatures, and performing key exchanges. Regarding the encryption capability, the first schemes that appeared were either versions of already existing public-key algorithms (Massey-Omura and ElGamal) or new schemes specified ad hoc (Menezes-Vanstone). How...
Conference Paper
Wireless data communications have become an essential part of everyday life thanks to the ubiquity of Wi-Fi and mobile networks. Security issues are an important limitation factor in the deployment of wireless services, and to mitigate the emergence of new security weaknesses it is advisable to implement application level security on top of the sta...
Article
Full-text available
Due to the development that different techniques of data analysis have achieved in recent years, some of them applied to the particular case of climatic variables obtained from the province of Salamanca (Spain), are detailed and analyzed in this study. The analysis was performed by using R software, specifically developed for statistical computing....
Conference Paper
Full-text available
Elliptic Curve Cryptography (ECC) can be considered an approach to public-key cryptography based on the arithmetic of elliptic curves and the Elliptic Curve Discrete Logarithm Problem (ECDLP). Regarding encryption, the best-known scheme based on ECC is the Elliptic Curve Integrated Encryption Scheme (ECIES), included in standards from ANSI, IEEE, a...
Article
Full-text available
Elliptic Curve Cryptography (ECC) can be used as a tool for encrypting data, creating digital signatures or performing key exchanges. Regarding the encryption procedure, the schemes currently used are known as hybrid cryptosystems, as they use both symmetric and asymmetric techniques. Among those hybrid cryptosystems based on ECC, the Elliptic Curv...
Article
Full-text available
Elliptic Curve Cryptography (ECC) can be used as a tool for encrypting data, creating digital signatures or performing key exchanges. In relation to encryption, the Elliptic Curve Integrated Encryption Scheme (ECIES) is the best known scheme based on ECC, and as such it has been included in several cryptographic standards. In the present work, we p...
Article
Full-text available
Elliptic Curve Cryptography (ECC) is a relatively recent branch of cryptography based on the arithmetic of elliptic curves and the Elliptic Curve Discrete Logarithm Problem (ECDLP). Elliptic curve cryptographic schemes are public-key mechanisms that provide encryption, digital signature and key exchange capabilities. The best known encryption schem...
Article
Elliptic Curve Cryptography (ECC) is one of the most interesting systems for protecting sensitive information nowadays. The latest versions of the Java Platform include classes and interfaces making ECC available to programmers, but due to the nature of Java it is still necessary to employ additional third party packages in order to use cryptograph...
Conference Paper
Full-text available
Elliptic curve cryptography (ECC) is based in one of the hardest arithmetic problems, the elliptic curve discrete logarithm problem, making ECC a reliable cryptographic technique. In addition to this advantage, ECC requires shorter keys compared to other public key algorithms, which suggests its use in low-end systems such as smart cards because of...
Article
El objetivo general de la presente Tesis Doctoral consiste en implementar el protocolo de cifrado ECIES (Elliptic Curve Integrated Encryption Scheme), tanto en plataforma PC como en tarjetas inteligentes Java Card, a fin de: Analizar la viabilidad de diferentes implementaciones para determinadas combinaciones de parámetros. Comparar el rendimiento...

Network

Cited By