Alberto Peinado
Alberto Peinado
Verified email at ic.uma.es
Title
Cited by
Cited by
Year
HB-MP: A further step in the HB-family of lightweight authentication protocols
J Munilla, A Peinado
Computer Networks 51 (9), 2262-2267, 2007
1922007
Distance bounding protocols for RFID enhanced by using void‐challenges and analysis in noisy channels
J Munilla, A Peinado
Wireless communications and mobile computing 8 (9), 1227-1232, 2008
1462008
Distance bounding protocols with void-challenges for RFID
J Munilla, A Ortiz, A Peinado
Printed handout at the Workshop on RFID Security–RFIDSec 6, 2006
872006
Secure EPC gen2 compliant radio frequency identification
M Burmester, B De Medeiros, J Munilla, A Peinado
International Conference on Ad-Hoc Networks and Wireless, 227-240, 2009
432009
Privacy and authentication protocol providing anonymous channels in GSM
A Peinado
Computer Communications 27 (17), 1709-1715, 2004
392004
Security of distance-bounding: A survey
G Avoine, MA Bingöl, I Boureanu, S Čapkun, G Hancke, S Kardaş, ...
ACM Computing Surveys (CSUR) 51 (5), 1-33, 2018
312018
Generation of pseudorandom binary sequences by means of linear feedback shift registers (LFSRs) with dynamic feedback
A Peinado, A Fúster-Sabater
Mathematical and Computer Modelling 57 (11-12), 2596-2604, 2013
292013
EPCGen2 pseudorandom number generators: analysis of J3Gen
A Peinado, J Munilla, A Fúster-Sabater
Sensors 14 (4), 6500-6515, 2014
272014
Off-line password-guessing attack to Peyravian–Jeffries’s remote user authentication protocol
J Munilla, A Peinado
Computer Communications 30 (1), 52-54, 2006
252006
Enhanced low‐cost RFID protocol to detect relay attacks
J Munilla, A Peinado
Wireless Communications and Mobile Computing 10 (3), 361-371, 2010
232010
Maximal Periods of x2 + c in Fq
A Peinado, F Montoya, J Munoz, AJ Yuste
International Symposium on Applied Algebra, Algebraic Algorithms, and Error …, 2001
222001
Akelarre: a new block cipher algorithm
G Alvarez, D De la Guía, F Montoya, A Peinado
221996
Attacks on a distance bounding protocol
J Munilla, A Peinado
Computer Communications 33 (7), 884-889, 2010
212010
Maximal period of orbits of the BBS generator.
LH Encinas, FM Vitini, JM Masqué, AP Domínguez
ICISC, 71-80, 1998
211998
Attacks on ownership transfer scheme for multi-tag multi-owner passive RFID environments
J Munilla, M Burmester, A Peinado
Computer Communications 88, 84-88, 2016
202016
Cryptanalysis of LHL-key authentication scheme
A Peinado
Applied mathematics and computation 152 (3), 721-724, 2004
172004
Comment on ‘A technique for image encryption using digital signature’
LH Encinas, AP Domínguez
Optics communications 268 (2), 261-265, 2006
132006
Security analysis of Tu and Piramuthu's protocol
J Munilla, A Peinado
2008 New Technologies, Mobility and Security, 1-5, 2008
122008
Cryptanalysis of anonymous channel protocol for large-scale area in wireless communications
AM Barbancho, A Peinado
Computer Networks 43 (6), 777-785, 2003
122003
Improving the period and linear span of the sequences generated by dlfsrs
A Peinado, J Munilla, A Fúster-Sabater
International Joint Conference SOCO’14-CISIS’14-ICEUTE’14, 397-406, 2014
112014
The system can't perform the operation now. Try again later.
Articles 1–20