Evolving nonlinear S-boxes with improved theoretical resilience to power attacks A Freyre-Echevarría, I Martínez-Díaz, CML Pérez, G Sosa-Gómez, ... IEEE Access 8, 202728-202737, 2020 | 28 | 2020 |
Measuring independence between statistical randomness tests by mutual information JA Karell-Albo, CM Legón-Pérez, EJ Madarro-Capó, O Rojas, ... Entropy 22 (7), 741, 2020 | 23 | 2020 |
Seguridad y usabilidad de los esquemas y técnicas de autenticación gráfica. O Rodriguez Valdés, CM Legón, R Socorro Llanes Revista Cubana de Ciencias Informáticas 12, 13-27, 2018 | 20 | 2018 |
Selecting an effective entropy estimator for short sequences of bits and bytes with maximum entropy L Contreras Rodríguez, EJ Madarro-Capó, CM Legón-Pérez, O Rojas, ... Entropy 23 (5), 561, 2021 | 11 | 2021 |
Evaluation of input—Output statistical dependence PRNGs by SAC EJM Capó, OJ Cuellar, CML Pérez, GS Gómez 2016 International Conference on Software Process Improvement (CIMPS), 1-6, 2016 | 8 | 2016 |
Measuring Avalanche Properties on RC4 Stream Cipher Variants EJ Madarro-Capó, CM Legón-Pérez, O Rojas, G Sosa-Gómez Applied Sciences 11 (20), 9646, 2021 | 7 | 2021 |
Bit independence criterion extended to stream ciphers EJ Madarro-Capó, CM Legón-Pérez, O Rojas, G Sosa-Gómez, ... Applied Sciences 10 (21), 7668, 2020 | 7 | 2020 |
Information theory based evaluation of the RC4 stream cipher outputs EJ Madarro-Capó, CM Legón-Pérez, O Rojas, G Sosa-Gómez Entropy 23 (7), 896, 2021 | 6 | 2021 |
Patrones en el orden de los clics y su influencia en la debilidad de las claves en la técnica de autenticacion gráfica passpoints OR Valdés, CM Legón, R Socorro, P Navarro Serie Científica de la Universidad de las Ciencias Informáticas 12 (7), 37-47, 2019 | 5 | 2019 |
Test for detection of weak graphic passwords in passpoint based on the mean distance between points JA Herrera-Macías, CM Legón-Pérez, L Suárez-Plasencia, ... Symmetry 13 (5), 777, 2021 | 4 | 2021 |
‘Acelerando el cálculo del orden de transparencia IM Díaz, CM Legón COMPUMAT. Sociedad Cubana de Matemática y Computación, 2017 | 4 | 2017 |
Detection of DIAG and LINE Patterns in PassPoints Graphical Passwords Based on the Maximum Angles of Their Delaunay Triangles L Suárez-Plasencia, JA Herrera-Macías, CM Legón-Pérez, ... Sensors 22 (5), 1987, 2022 | 3 | 2022 |
Improved objective functions to search for 8× 8 bijective S-boxes with theoretical resistance against power attacks under hamming leakage models I Martínez-Díaz, A Freyre-Echevarría, O Rojas, G Sosa-Gómez, ... IEEE Access 10, 11886-11891, 2022 | 3 | 2022 |
Analysis of the number of sides of voronoi polygons in passpoint L Suárez-Plasencia, JA Herrera-Macías, CM Legón-Pérez, ... International Conference on Computer Science and Health Engineering, 184-200, 2020 | 3 | 2020 |
Effectiveness of Some Tests of Spatial Randomness in the Detection of Weak Graphical Passwords in Passpoint JA Herrera-Macías, L Suárez-Plasencia, CM Legón-Pérez, ... International Conference on Computer Science and Health Engineering, 173-183, 2020 | 2 | 2020 |
Análisis comparativo de variantes de AES dinámico HR Caballero, WR Gutiérrez, Y Bardagi, CM Legón Facultad de Matemática y Computación, 2016 | 2 | 2016 |
Ataques a la caché y su aplicación al AES CD González, CCML Pérez, CJAS Reyes Facultad de Ingeniería Informática, 2014 | 2 | 2014 |
Local Search Trajectories over S-box space I Martínez-Díaz, CM Legón-Pérez, O Rojas, G Sosa-Gómez, D Oliva Journal of Information Security and Applications 69, 103272, 2022 | 1 | 2022 |
Probabilistic Evaluation of the Exploration–Exploitation Balance during the Search, Using the Swap Operator, for Nonlinear Bijective S-Boxes, Resistant to Power Attacks CM Legón-Pérez, JA Menéndez-Verdecía, I Martínez-Díaz, ... Information 12 (12), 509, 2021 | 1 | 2021 |
Search-Space Reduction for S-Boxes Resilient to Power Attacks CM Legón-Pérez, R Sánchez-Muiña, D Miyares-Moreno, Y Bardaji-López, ... Applied Sciences 11 (11), 4815, 2021 | 1 | 2021 |