•  3
    Cooperative, connected and automated mobility technologies have the potential to revolutionize transportation systems and enhance safety, efficiency and sustainability. However, the increasing reliance on digital technologies also introduces new cybersecurity risks that can compromise the safety and privacy of passengers and the integrity of transportation systems. The purpose of this article is to examine the most important threats, vulnerabilities, risks and challenges related to automated mob…Read more
  •  11
    Comparing low and medium cost computer-based technologies suitable for cryptographic attacks
    with L. Hernández Encinas, A. Martín Muñoz, and O. Martínez-Graullera
    Logic Journal of the IGPL. forthcoming.
  •  8
    Modification proposal for the reconciliation mechanism of the key exchange algorithm NewHope
    with L. Hernández Encinas and A. Martín Muñoz
    Logic Journal of the IGPL 30 (6): 1028-1040. 2022.
    The latest advances in quantum computing forced the National Institute of Standards and Technology (NIST) to launch an initiative for selecting quantum-resistant cryptographic algorithms. One of the best-known proposals is NewHope, an algorithm that was initially designed as a key exchange algorithm. In its original design, NewHope presented a reconciliation mechanism that is complex and represents an entry barrier for potential implementers. This contribution presents equivalent schemes in one,…Read more
  •  18
    The distinctive security features of the Spanish electronic national identity card, known as Documento Nacional de Identidad electrónico, allow us to propose the usage of this cryptographic smart card in an authentication framework that can be used during the registration and login phases of internet services where the validation of the user’s age and real identity are key elements, as it is the case for example of the so-called social networks. Using this mechanism with NFC-capable devices, the…Read more