- Cryptographic Implementations and Security
- Cryptography and Data Security
- Cryptography and Residue Arithmetic
- Coding theory and cryptography
- Chaos-based Image/Signal Encryption
- Cloud Data Security Solutions
- Blockchain Technology Applications and Security
- Privacy-Preserving Technologies in Data
- Advanced Steganography and Watermarking Techniques
- IoT and Edge/Fog Computing
- Business Process Modeling and Analysis
- Physical Unclonable Functions (PUFs) and Hardware Security
- Digital Media Forensic Detection
- Parallel Computing and Optimization Techniques
- Biometric Identification and Security
- Security and Verification in Computing
- Scientific Computing and Data Management
- Web Data Mining and Analysis
- Autonomous Vehicle Technology and Safety
- Quantum Computing Algorithms and Architecture
- Advanced Memory and Neural Computing
- Security in Wireless Sensor Networks
- Advanced Malware Detection Techniques
- Embedded Systems Design Techniques
- Opportunistic and Delay-Tolerant Networks
National Institute of Astrophysics, Optics and Electronics
2004-2024
Center for Research and Advanced Studies of the National Polytechnic Institute
2014-2023
Autonomous University of Tamaulipas
2021-2022
Instituto Politécnico Nacional
2015-2021
Tecnológico Nacional de México
2013
Universidad Internacional de América
2012
University of Victoria
2011-2012
Since it was invented in 1986, elliptic curve cryptography (ECC) has been studied widely industry and academy from different perspectives. Some of these aspects include mathematical foundations, protocol design, generation, security proofs, point representation, algorithms for inherent arithmetic the underlying algebraic structures, implementation strategies both software hardware, attack models, among others. The main advantage ECC is that shorter keys (less-memory requirements faster field...
In recent years, the study of lightweight symmetric ciphers has gained interest due to increasing demand for security services in constrained computing environments, such as Internet Things. However, when there are several algorithms choose from and different implementation criteria conditions, it becomes hard select most adequate primitive a specific application. This paper discusses hardware implementations Present, standardized cipher called overcome part issues extremely environments....
This paper presents a novel FPGA-based design for the lightweight block cipher PRESENT and its implementation results. The proposed allows to study area-performance trade-offs thus constructing smaller or faster implementations. When optimized by area, exhibits latency fewer FPGA resources than representative related works in literature.
Attribute-based encryption (ABE) is regarded as a powerful cryptographic approach for providing fine-grained access control and confidentiality security services, well suited cloud-based applications where one-to-many must. Revocation in ABE, the ability to revoke or cancel privileges of attribute possessors, has been critical problem practical usage ABE-based schemes. This work presents systematic literature review ABE schemes that provide revocation mechanisms published until December...
This work presents novel multipliers for Montgomery multiplication defined on binary fields GF(2m). Different to state of the art multipliers, this uses a linear feedback shift register (LFSR) as main building block. The authors studied different architectures bit-serial and digit-serial using LFSR factors xm xm−1. proposed are classes irreducible polynomials: general, all one polynomials, pentanomials trinomials. results show that use LFSRs simplifies design architecture reducing area...
One of the most cost-effective services in cloud computing is storage, used by businesses and individuals to outsource their massive data untrusted servers. Efforts have studied problems around this application scenario different fronts: efficiency, flexibility, reliability, security. In paper we address security concerns storage under where users encrypt-then-outsource data, share outsourced with other users, service provider can be queried for searching retrieval encrypted data. As main...
In this work we present a study that evaluates and compares two block ciphers, AES PRESENT, in the context of lightweight cryptography for smartphones security applications. To best our knowledge, is first comparison between these ciphers using smartphone as computing platform. standard symmetric encryption PRESENT one ultra-lightweight proposed literature included ISO/IEC 29192-2. study, consider execution time, voltage consumption memory usage metrics purposes. The were evaluated through...
The Web has become the main source of information in digital world, expanding to heterogeneous domains and continuously growing. By means a search engine, users can systematically over web for particular based on text query, basis domain-unaware tool that maintains real-time information. One type is semantic focused crawler (SFWC); it exploits semantics some ontology heuristics determine which pages belong domain defined by query. An SFWC highly dependent ontological resource, created human...
This study presents a scalable hardware architecture for modular multiplication in prime fields GF(p). A novel iterative digit–digit Montgomery (IDDMM) algorithm is proposed and two architectures that compute are described. The input operands (multiplicand, multiplier modulus) represented using as radix β = 2k. Multiplication over GF(p) possible almost the same since complexity of multiplier's kernel module depends mainly on k not p. multipliers were evaluated three Xilinx FPGA families....
Vehicular ad hoc networks have been identified as a key technology for enabling safety and infotainment applications in the context of smart connected vehicles. In this sense, diverse approaches multi-hop broadcast protocols proposed to collect disseminate information through network. However, before vehicular fulfill their expected potential connect vehicles, several issues must be addressed. Among these issues, those related security are particular importance. article, main message...
Security is a crucial requirement in the envisioned applications of Internet Things (IoT), where most underlying computing platforms are embedded systems with reduced capabilities and energy constraints. In this paper we present design evaluation scalable low-area FPGA hardware architecture that serves as building block to accelerate costly operations exponentiation multiplication GF(p), commonly required security protocols relying on public key encryption, such agreement, authentication...
The main topic of this paper is low-cost public key cryptography in wireless sensor nodes. Security embedded systems, for example, nodes based on field programmable gate array (FPGA), demands low cost but still efficient solutions. Sensor are elements the Internet Things paradigm, and their security a crucial requirement critical applications sectors such as military, health, industry. To address these requirements under restrictions imposed by available computing resources nodes, presents...
Wireless body area networks (WBANs) can enable e-health applications under Internet of Things (IoT) scenarios. However, to use WBAN technologies in practical applications, sensitive data collected by wireless sensors must be protected when transmitted across a network and until accessed authorized or end-users. Specifically, it is necessary provide confidentiality, integrity, authentication access control WBANs. This paper presents security approach these services layered system using...
We present a hardware architecture that combines elliptic curve cryptography (ECC) and lossless data compression in single chip. Input is compressed using dictionary-based compressor before encryption, then two cryptographic algorithms can be applied to the data: ECIES for encryption or ECDSA digital signature. Applying presents three advantages: first, improvement module throughput by reducing amount of encrypted; second, higher utilization available bandwidth if encrypted transmitted...
Reconfigurable architectures are important elements on the design of software radios. Nowadays, diverse platforms being developed to support multiple tasks; these designed specially for different layers OSI (Open System Interconnection) reference model. Specifically, security described in MAC sublayer should be evaluated, which based cryptographic algorithms that require high computational costs. In this work, two proposed AES-CCM hardware IEEE 802.11i-2004 and 802.16e-2005 standards...