Security Analysis of Order Preserving Symmetric Cryptography S Martínez, JM Miret, R Tomàs, M Valls Applied Mathematics & Information Sciences (AMIS) 7 (4), 1285-1295, 2013 | 13 | 2013 |
Isogeny cordillera algorithm to obtain cryptographically good elliptic curves JM Miret, D Sadornil, J Tena, R Tomàs, M Valls Fifth Australasian symposium on ACSW frontiers - Volume 68, 153-157, 2007 | 11 | 2007 |
Volcanoes of l-isogenies of elliptic curves over finite fields: the case l=3 JM Miret, D Sadornil, J Tena, R Tomàs, M Valls Publicacions Matemàtiques. Vol. EXTRA, 165-180, 2007 | 11* | 2007 |
Revisiting the effect of foundation embedment on elastic settlement: A new approach E Díaz, R Tomás Computers and Geotechnics 62, 283-292, 2014 | 10 | 2014 |
A simple method to predict elastic settlements in foundations resting on two soils of differing deformability E Díaz, R Tomás European Journal of Environmental and Civil Engineering 20 (3), 263-281, 2016 | 8 | 2016 |
On Edwards curves and ZVP-attacks S Martínez, D Sadornil, J Tena, R Tomàs, M Valls Applicable Algebra in Engineering, Communication and Computing 24, 507-517, 2013 | 8 | 2013 |
On Avoiding ZVP-Attacks Using Isogeny Volcanoes JM Miret, D Sadornil, J Tena, R Tomàs, M Valls Workshop on Information Security Applications (WISA'08) - LNCS, 266-277, 2009 | 8 | 2009 |
Parallel Calculation of Volcanoes for Cryptographic Uses S Martínez, R Tomàs, C Roig, M Valls, R Moreno 20th IEEE International Parallel & Distributed Processing Symposium (IPDPS …, 2006 | 7 | 2006 |
Cálculo del asiento elástico tridimensional de cimentaciones de rigidez variable en terrenos con una capa rígida inclinada E Díaz, R Tomás Informes de la Construcción 68 (542), e144-e144, 2016 | 6 | 2016 |
Securing databases by using diagonal-based order preserving symmetric encryption S Martinez, JM Miret, R Tomas, M Valls Applied Mathematics & Information Sciences 8 (5), 2085, 2014 | 5 | 2014 |
Exploiting Isogeny Cordillera Structure to Obtain Cryptographically Good Elliptic Curves JM Miret, D Sadornil, J Tena, R Tomàs, M Valls Journal of Research and Practice in Information Technology 40 (4), 255-265, 2008 | 5 | 2008 |
Evitando ataques Side-Channel mediante el cálculo de curvas isógenas e isomorfas R Abarzúa, S Martínez, JM Miret, R Tomàs, J Valera Proceedings of VII CIBSI, 173-180, 2013 | 1 | 2013 |
Criptografía ordenable para bases de datos S Martínez, V Mateu, R Tomàs, M Valls XII Reunión Española sobre Criptología y Seguridad de la Información (RECSI …, 2012 | 1* | 2012 |
Securing Databases by using Diagonal-based Order Preserving Symmetric Encryption S Martínez Rodríguez, JM Miret, M Valls Marsal, R Tomàs Natural Sciences Publishing, 2014 | | 2014 |
Mejorando la seguridad de un criptosistema OPE mediante la uniformizacion de los datos S Martínez, D Sadornil, J Conde, M Valls, R Tomas Universidad de Alicante, 2014 | | 2014 |
A non-reducible Meyer-Müller's like elliptic curve cryptosystem S Martínez, JM Miret, F Sebé, R Tomàs IEEE Latin America Transactions (Revista IEEE América Latina) 10 (3), 1730-1733, 2012 | | 2012 |
A non-reducible Meyer-Müller's like elliptic curve cryptosystem S Martínez, JM Miret, F Sebé, R Tomàs VI Congreso Iberoamericano de Seguridad Informática (CIBSI), 2011 | | 2011 |
Volcans d'isogènies de corbes el·líptiques: aplicacions criptogràfiques en targetes intel·ligents R Tomàs Cuñat Universitat de Lleida, Escola Politècnica Superior, 2011 | | 2011 |
Curvas de Edwards y ataques basados en puntos de valor cero (ZVP) S Martínez, D Sadornil, J Tena, R Tomàs, M Valls XI Reunión Española sobre Criptología y Seguridad de la Información (RECSI …, 2010 | | 2010 |
Volcanoes of ℓ-isogenies of elliptic curves over finite fields JM Miret, D Sadornil, J Tena, R Tomàs, M Valls | | 2007 |