- Coding theory and cryptography
- Cryptography and Residue Arithmetic
- Metaheuristic Optimization Algorithms Research
- Evolutionary Algorithms and Applications
- Advanced Multi-Objective Optimization Algorithms
- Artificial Immune Systems Applications
- Cryptography and Data Security
- Cryptographic Implementations and Security
- Adaptive Control of Nonlinear Systems
- graph theory and CDMA systems
- Image Processing and 3D Reconstruction
- Fuzzy Logic and Control Systems
- Immune Cell Function and Interaction
- Advanced Optimization Algorithms Research
- VLSI and FPGA Design Techniques
- Control and Stability of Dynamical Systems
- Cellular Automata and Applications
- Neural Networks and Applications
- T-cell and B-cell Immunology
- Stability and Control of Uncertain Systems
- Image and Object Detection Techniques
- Interconnection Networks and Systems
- Advanced Measurement and Metrology Techniques
- Algorithms and Data Compression
- Advanced Memory and Neural Computing
Instituto Politécnico Nacional
2011-2020
Tecnológico Nacional de México
2008-2013
CIUDAD
2012
National Polytechnic School
2009
Laboratoire d'Informatique de Paris-Nord
2007
Center for Research and Advanced Studies of the National Polytechnic Institute
2005-2007
National University of Sciences and Technology
2005
This paper deals with the optimal computation of finite field exponentiation, which is a well-studied problem many important applications in areas error-correcting codes and cryptography. It has been shown that exponentiation closely related to finding suitable addition chain shortest possible length. However, it also known obtaining for given arbitrary exponent an NP-hard problem. As consequence, heuristics are obvious choice compute semi-optimal number underlying arithmetic operations. In...
This paper reports a constant-time CPU and GPU software implementation of the RSA exponentiation by using algorithms that offer first-line defense against timing cache attacks. In case platforms modular arithmetic layer was implemented Residue Number System (RNS) representation. We also present an RNS-based takes advantage parallelism provided Advanced Vector Extensions 2 (AVX2) instructions. Moreover, we carefully analyze performance two popular RNS reduction when on many- multi-core...
In this paper, an efficient architecture for multiplicative inversion in GF(2/sup m/) using addition chains is presented. The approach followed was based on the Itoh-Tsujii algorithm targeting a fast implementation reconfigurable hardware devices. We give design details of proposed whose main building blocks are field multi-squarer block, polynomial multiplier and BRAM two-port memory. Our able to compute 193/) about 1.33/spl mu/S only 27 clock cycles.
In this paper, we present an improved Genetic Algorithm (GA) that is able to find the shortest addition chains for a given exponent e. Two new variation operators (special two-point crossover and local-search-like mutation) are proposed as means improve GA search capabilities. Furthermore, usage of repair mechanism applied process generating initial population algorithm. The approach compared on set test problems with two state-of-the-art evolutionary heuristic-based approaches recently...
This article presents a novel method to compute averaged Hausdorff () approximations of the Pareto fronts multi-objective optimization problems. The underlying idea is utilize directly scalar problem that induced by performance indicator. can be viewed as certain set based scalarization approach and addressed both mathematical programming techniques evolutionary algorithms (EAs). In this work, focus on latter where first single objective EA for such proposed. Finally, strength demonstrated...
Steganography is a hiding information technique heavily used nowadays. Though initially it was to establish hidden communication channels, modern steganography has been found useful hide code inside multimedia objects, mostly images. Its goal infiltrate malware into organizations or personal devices. This kind of called stegomalware. As countermeasure, steganalysis methods employing different Computational Intelligence techniques such as Support Vector Machine, Machine Learning, Fisher...
The Particle Swarm Optimization (PSO) algorithm is a well known alternative for global optimization based on bio‐inspired heuristic. PSO has good performance, low computational complexity and few parameters. Heuristic techniques have been widely studied in the last twenty years scientific community still interested technological alternatives that accelerate these algorithms order to apply them bigger more complex problems. This article presents an empirical study of some parallel variants...
In recent years, advances in miniaturization, low-power circuit design, simple, low power, yet reasonably efficient wireless communication equipment, and improved small-scale energy supplies have combined with reduced manufacturing costs to make a new technological vision possible, Wireless Sensor Networks (WSN). As WSN are still young research field, much activity is on-going solve many open issues. One the data routing problem. size of network increases, this problem becomes more complex...
Some spiking neuron models have proved to solve different linear and non-linear pattern recognition problems. Indeed, only one can generate comparable results as classical artificial neural network. However, depending on the classification problem, model could be better or less efficient than other. In this paper we propose a methodology create using Gene Expression Programming. The new created are applied in eight obtained compared with previous generated adopting Izhikevich model. This...