default search action
Victor Gayoso Martínez
Person information
- affiliation: Institute of Physical and Information Technologies, CSIC, Madrid, Spain
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j7]V. Gayoso Martínez, Luis Hernández Encinas
, Agustín Martín Muñoz:
A modification proposal for the reconciliation mechanism of the key exchange algorithm NewHope. Log. J. IGPL 30(6): 1028-1040 (2022) - [c22]Óscar Castillo Campo
, Victor Gayoso Martínez, Luis Hernández Encinas, Agustín Martín Muñoz, Roberto Álvarez Fernández:
State of the Art of Cybersecurity in Cooperative, Connected and Automated Mobility. CISIS-ICEUTE 2022: 104-113 - 2021
- [j6]Victor Gayoso Martínez
, Luis Hernández Encinas
, Agustín Martín Muñoz
, Araceli Queiruga Dios
:
Using Free Mathematical Software in Engineering Classes. Axioms 10(4): 253 (2021) - 2020
- [j5]V. Gayoso Martínez, Luis Hernández Encinas
, Agustín Martín
, Raúl Durán Díaz:
Using the Spanish national identity card in social networks. Log. J. IGPL 28(4): 519-530 (2020) - [c21]Victor Gayoso Martínez, Luis Hernández Encinas
, Agustín Martín Muñoz
:
Study of the Reconciliation Mechanism of NewHope. CISIS 2020: 361-370 - [c20]Wilson Rojas, Victor Gayoso Martínez, Araceli Queiruga Dios:
Blockchain in Education: New Challenges. CISIS 2020: 380-389
2010 – 2019
- 2019
- [j4]V. Gayoso Martínez, Luis Hernández Encinas
, Agustín Martín Muñoz
, Oscar Martinez-Graullera
:
Comparing low and medium cost computer-based technologies suitable for cryptographic attacks. Log. J. IGPL 27(2): 177-188 (2019) - [j3]V. Gayoso Martínez, Luis Hernández Encinas
, Agustín Martín Muñoz
, Raúl Durán Díaz:
Secure elliptic curves and their performance. Log. J. IGPL 27(2): 277 (2019) - [c19]Alfonso Blanco Blanco
, Amalia Beatriz Orúe López
, Agustín Martín Muñoz, Victor Gayoso Martínez, Luis Hernández Encinas
, Óscar Martínez-Graullera
, Fausto Montoya Vitini:
On-the-Fly Testing an Implementation of Arrow Lightweight PRNG Using a LabVIEW Framework. CISIS-ICEUTE 2019: 175-184 - [c18]Amalia Beatriz Orúe López
, Alina Maria Orúe, Liliana Montoya, Víctor Gayoso, Agustín Martín Muñoz:
Enhancing the Learning of Cryptography Through Concept Maps. CISIS-ICEUTE 2019: 263-272 - 2018
- [c17]Deolinda Dias Rasteiro
, V. Gayoso Martínez, Cristina M. R. Caridade
, J. Martín-Vaquero
, Araceli Queiruga Dios:
Changing teaching: Competencies versus contents. EDUCON 2018: 1761-1765 - [c16]Juan José Bullón Pérez, Ascensión Hernández Encinas, María Jesús Santos Sánchez, Victor Gayoso Martínez:
Analysis of student feedback when using gamification tools in math subjects. EDUCON 2018: 1818-1823 - [c15]Araceli Queiruga Dios, María Jesús Santos Sánchez, Juan José Bullón Pérez, Jesús Martín-Vaquero
, Ascensión Hernández Encinas, Snezhana Georgieva Gocheva-Ilieva, Marie Demlová, Deolinda Dias Rasteiro
, Cristina M. T. Caridade, Victor Gayoso Martínez:
Evaluating engineering competencies: A new paradigm. EDUCON 2018: 2052-2055 - [p1]Victor Gayoso Martínez, Lorena González-Manzano, Agustín Martín Muñoz
:
Secure Elliptic Curves in Cryptography. Computer and Network Security Essentials 2018: 283-298 - [i1]Raúl Durán Díaz, V. Gayoso Martínez, Luis Hernández Encinas, Jaime Muñoz Masqué:
A group law for PKC purposes. CoRR abs/1802.00246 (2018) - 2017
- [j2]V. Gayoso Martínez, Luis Hernández Encinas
, Agustín Martín Muñoz
, M. A. Álvarez Mariño, D. Arroyo Guardeño:
A comparative study of three Spanish eGoverment smart cards. Log. J. IGPL 25(1): 42-53 (2017) - [c14]V. Gayoso Martínez, Luis Hernández Encinas
, Agustín Martín Muñoz, J. Zhang:
Breaking a Hitag2 Protocol with Low Cost Technology. ICISSP 2017: 579-584 - [c13]Victor Gayoso Martínez, Luis Hernández Encinas
, Agustín Martín Muñoz
, Raúl Durán Díaz:
A Proposal for Using a Cryptographic National Identity Card in Social Networks. SOCO-CISIS-ICEUTE 2017: 651-660 - 2016
- [c12]Victor Gayoso Martínez, Luis Hernández Encinas
, Agustín Martín Muñoz
, Óscar Martínez-Graullera
, Javier Villazón-Terrazas:
A Comparison of Computer-Based Technologies Suitable for Cryptographic Attacks. SOCO-CISIS-ICEUTE 2016: 621-630 - [c11]Raúl Durán Díaz, Victor Gayoso Martínez, Luis Hernández Encinas
, Agustín Martín Muñoz
:
A Study on the Performance of Secure Elliptic Curves for Cryptographic Purposes. SOCO-CISIS-ICEUTE 2016: 658-667 - 2015
- [j1]Victor Gayoso Martínez, Luis Hernández Encinas
, A. Queiruga Dios
:
Security and Practical Considerations When Implementing the Elliptic Curve Integrated Encryption Scheme. Cryptologia 39(3): 244-269 (2015) - [c10]V. Gayoso Martínez, Luis Hernández Encinas
, Seok-Zun Song:
Group Signatures in Practice. CISIS-ICEUTE 2015: 413-423 - [c9]D. Arroyo Guardeño, V. Gayoso Martínez, Luis Hernández Encinas
, Agustín Martín Muñoz
:
Using Smart Cards for Authenticating in Public Services: A Comparative Study. CISIS-ICEUTE 2015: 437-446 - [c8]David Arroyo, Jesus Diaz
, Víctor Gayoso:
On the Difficult Tradeoff Between Security and Privacy: Challenges for the Management of Digital Identities. CISIS-ICEUTE 2015: 455-462 - 2013
- [c7]V. Gayoso Martínez
, Luis Hernández Encinas
:
Developing ECC applications in Java Card. IAS 2013: 114-120 - [c6]Victor Gayoso Martínez, Luis Hernández Encinas
, Ascensión Hernández Encinas, Araceli Queiruga Dios
:
Disclosure of Sensitive Information in the Virtual Learning Environment Moodle. SOCO-CISIS-ICEUTE 2013: 517-526 - [c5]V. Gayoso Martínez, Luis Hernández Encinas, Agustín Martín Muñoz, J. Ignacio Sánchez García:
Identification by means of a national ID card for wireless services. WPMC 2013: 1-5 - 2011
- [c4]Victor Gayoso Martínez
, Luis Hernández Encinas
, Carmen Sánchez Ávila
:
Java Card Implementation of the Elliptic Curve Integrated Encryption Scheme Using Prime and Binary Finite Fields. CISIS 2011: 160-167 - 2010
- [b1]Victor Gayoso Martínez:
Implementación en tarjetas inteligentes Java Card de protocolos de cifrado y descifrado basados en curvas elípticas. Technical University of Madrid, Spain, 2010 - [c3]Victor Gayoso Martínez
, Fernando Hernández Álvarez, Luis Hernández Encinas
, Carmen Sánchez Ávila
:
A comparison of the standardized versions of ECIES. IAS 2010: 1-4 - [c2]Victor Gayoso Martínez, Luis Hernández Encinas, Carmen Sanchez-Avila:
A Java Implementation of the Elliptic Curve Integrated Encryption Scheme. Security and Management 2010: 495-504 - [c1]Victor Gayoso Martínez, Ascensión Hernández Encinas, Luis Hernández Encinas, Araceli Queiruga Dios, Isabel Visus Ruiz:
Development of Capstone Projects on Secure Communications for Engineering Students. Security and Management 2010: 516-522
Coauthor Index
aka: Agustín Martín Muñoz
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-04-03 00:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint