Follow
Rosana Tomàs
Title
Cited by
Cited by
Year
Security Analysis of Order Preserving Symmetric Cryptography
S Martínez, JM Miret, R Tomàs, M Valls
Applied Mathematics & Information Sciences (AMIS) 7 (4), 1285-1295, 2013
132013
Isogeny cordillera algorithm to obtain cryptographically good elliptic curves
JM Miret, D Sadornil, J Tena, R Tomàs, M Valls
Fifth Australasian symposium on ACSW frontiers - Volume 68, 153-157, 2007
102007
Volcanoes of l-isogenies of elliptic curves over finite fields: the case l=3
JM Miret, D Sadornil, J Tena, R Tomàs, M Valls
Publicacions Matemàtiques. Vol. EXTRA, 165-180, 2007
10*2007
Revisiting the effect of foundation embedment on elastic settlement: A new approach
E Díaz, R Tomás
Computers and Geotechnics 62, 283-292, 2014
92014
A simple method to predict elastic settlements in foundations resting on two soils of differing deformability
E Díaz, R Tomás
European Journal of Environmental and Civil Engineering 20 (3), 263-281, 2016
82016
On Avoiding ZVP-Attacks Using Isogeny Volcanoes
JM Miret, D Sadornil, J Tena, R Tomàs, M Valls
Workshop on Information Security Applications (WISA'08) - LNCS, 266-277, 2009
82009
Parallel Calculation of Volcanoes for Cryptographic Uses
S Martínez, R Tomàs, C Roig, M Valls, R Moreno
20th IEEE International Parallel & Distributed Processing Symposium (IPDPS …, 2006
72006
Securing databases by using diagonal-based order preserving symmetric encryption
S Martinez, JM Miret, R Tomas, M Valls
Applied Mathematics & Information Sciences 8 (5), 2085, 2014
62014
On Edwards curves and ZVP-attacks
S Martínez, D Sadornil, J Tena, R Tomàs, M Valls
Applicable Algebra in Engineering, Communication and Computing 24, 507-517, 2013
62013
Cálculo del asiento elástico tridimensional de cimentaciones de rigidez variable en terrenos con una capa rígida inclinada
E Díaz, R Tomás
Informes de la Construcción 68 (542), e144-e144, 2016
52016
Exploiting Isogeny Cordillera Structure to Obtain Cryptographically Good Elliptic Curves
JM Miret, D Sadornil, J Tena, R Tomàs, M Valls
Journal of Research and Practice in Information Technology 40 (4), 255-265, 2008
42008
Evitando ataques Side-Channel mediante el cálculo de curvas isógenas e isomorfas
R Abarzúa, S Martínez, JM Miret, R Tomàs, J Valera
Proceedings of VII CIBSI, 173-180, 2013
12013
Criptografía ordenable para bases de datos
S Martínez, V Mateu, R Tomàs, M Valls
XII Reunión Española sobre Criptología y Seguridad de la Información (RECSI …, 2012
1*2012
Securing Databases by using Diagonal-based Order Preserving Symmetric Encryption
S Martínez Rodríguez, JM Miret, M Valls Marsal, R Tomàs
Natural Sciences Publishing, 2014
2014
Mejorando la seguridad de un criptosistema OPE mediante la uniformizacion de los datos
S Martínez, D Sadornil, J Conde, M Valls, R Tomas
Universidad de Alicante, 2014
2014
A non-reducible Meyer-Müller's like elliptic curve cryptosystem
S Martínez, JM Miret, F Sebé, R Tomàs
IEEE Latin America Transactions (Revista IEEE América Latina) 10 (3), 1730-1733, 2012
2012
A non-reducible Meyer-Müller's like elliptic curve cryptosystem
S Martínez, JM Miret, F Sebé, R Tomàs
VI Congreso Iberoamericano de Seguridad Informática (CIBSI), 2011
2011
Volcans d'isogènies de corbes el·líptiques: aplicacions criptogràfiques en targetes intel·ligents
R Tomàs Cuñat
Universitat de Lleida, Escola Politècnica Superior, 2011
2011
Curvas de Edwards y ataques basados en puntos de valor cero (ZVP)
S Martínez, D Sadornil, J Tena, R Tomàs, M Valls
XI Reunión Española sobre Criptología y Seguridad de la Información (RECSI …, 2010
2010
Volcanoes of ℓ-isogenies of elliptic curves over finite fields
JM Miret, D Sadornil, J Tena, R Tomàs, M Valls
2007
The system can't perform the operation now. Try again later.
Articles 1–20