Остановите войну!
for scientists:
default search action
Pedro Peris-Lopez
- > Home > Persons > Pedro Peris-Lopez
Publications
- 2014
- [j28]David F. Barrero, Julio César Hernández Castro, Pedro Peris-Lopez, David Camacho, María Dolores Rodríguez-Moreno:
A genetic tango attack against the David-Prasad RFID ultra-lightweight authentication protocol. Expert Syst. J. Knowl. Eng. 31(1): 9-19 (2014) - [j26]Masoumeh Safkhani, Pedro Peris-Lopez, Julio César Hernández Castro, Nasour Bagheri:
Cryptanalysis of the Cho et al. protocol: A hash-based RFID tag mutual authentication protocol. J. Comput. Appl. Math. 259: 571-577 (2014) - 2013
- [j17]Pablo Picazo-Sanchez, Lara Ortiz-Martin, Pedro Peris-Lopez, Julio César Hernández Castro:
Cryptanalysis of the RNTS system. J. Supercomput. 65(2): 949-960 (2013) - 2012
- [j16]Julio César Hernández Castro, Juan M. Estévez-Tapiador, Pedro Peris-Lopez, John A. Clark, El-Ghazali Talbi:
Metaheuristic Traceability Attack against SLMAP, an RFID Lightweight Authentication Protocol. Int. J. Found. Comput. Sci. 23(2): 543-553 (2012) - [j15]Juan E. Tapiador, Julio C. Hernandez-Castro, Pedro Peris-Lopez:
Online Randomization Strategies to Obfuscate User Behavioral Patterns. J. Netw. Syst. Manag. 20(4): 561-578 (2012) - [j13]Pedro Peris-Lopez, Agustín Orfila, Esther Palomar, Julio C. Hernandez-Castro:
A secure distance-based RFID identification protocol with an off-line back-end database. Pers. Ubiquitous Comput. 16(3): 351-365 (2012) - [c21]Masoumeh Safkhani, Pedro Peris-Lopez, Nasour Bagheri, Majid Naderi, Julio César Hernández Castro:
On the Security of Tan et al. Serverless RFID Authentication and Search Protocols. RFIDSec 2012: 1-19 - [c20]Masoumeh Safkhani, Nasour Bagheri, Pedro Peris-Lopez, Aikaterini Mitrokotsa, Julio C. Hernandez-Castro:
Weaknesses in another Gen2-based RFID authentication protocol. RFID-TA 2012: 80-84 - [c18]Julio César Hernández Castro, Pedro Peris-Lopez, Masoumeh Safkhani, Nasour Bagheri, Majid Naderi:
Another Fallen Hash-Based RFID Authentication Protocol. WISTP 2012: 29-37 - 2011
- [j11]Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan E. Tapiador, Jan C. A. van der Lubbe:
Cryptanalysis of an EPC Class-1 Generation-2 standard compliant authentication protocol. Eng. Appl. Artif. Intell. 24(6): 1061-1069 (2011) - [j9]Pedro Peris-Lopez, Agustín Orfila, Julio C. Hernandez-Castro, Jan C. A. van der Lubbe:
Flaws on RFID grouping-proofs. Guidelines for future sound protocols. J. Netw. Comput. Appl. 34(3): 833-845 (2011) - [c17]Julio César Hernández Castro, Pedro Peris-Lopez, Jean-Philippe Aumasson:
On the Key Schedule Strength of PRESENT. DPM/SETOP 2011: 253-263 - [c15]Honorio Martín, Enrique San Millán, Luis Entrena, Julio César Hernández Castro, Pedro Peris-Lopez:
AKARI-X: A pseudorandom number generator for secure lightweight systems. IOLTS 2011: 228-233 - [c14]Mohamad Merhi, Julio César Hernández Castro, Pedro Peris-Lopez:
Studying the pseudo random number generator of a low-cost RFID tag. RFID-TA 2011: 381-385 - [i6]Juan E. Tapiador, Julio C. Hernandez-Castro, Pedro Peris-Lopez, John A. Clark:
Cryptanalysis of Song's advanced smart card based password authentication protocol. CoRR abs/1111.2744 (2011) - [i5]Masoumeh Safkhani, Pedro Peris-Lopez, Julio César Hernández Castro, Nasour Bagheri, Majid Naderi:
Cryptanalysis of Cho et al.'s Protocol, A Hash-Based Mutual Authentication Protocol for RFID Systems. IACR Cryptol. ePrint Arch. 2011: 331 (2011) - 2010
- [j8]Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan E. Tapiador, Tieyan Li, Yingjiu Li:
Vulnerability analysis of RFID protocols for tag ownership transfer. Comput. Networks 54(9): 1502-1508 (2010) - [j7]Aikaterini Mitrokotsa, Christos Dimitrakakis, Pedro Peris-Lopez, Julio César Hernández Castro:
Reid et al.'s distance bounding protocol and mafia fraud attacks over noisy channels. IEEE Commun. Lett. 14(2): 121-123 (2010) - [j6]Pedro Peris-Lopez, Tieyan Li, Julio C. Hernandez-Castro:
Lightweight Props on the Weak Security of EPC Class-1 Generation-2 Standard. IEICE Trans. Inf. Syst. 93-D(3): 518-527 (2010) - [c13]Pedro Peris-Lopez, Julio César Hernández Castro, Raphael C.-W. Phan, Juan M. Estévez-Tapiador, Tieyan Li:
Quasi-Linear Cryptanalysis of a Secure RFID Ultralightweight Authentication Protocol. Inscrypt 2010: 427-442 - [c11]Julio César Hernández Castro, Pedro Peris-Lopez, Raphael C.-W. Phan, Juan M. Estévez-Tapiador:
Cryptanalysis of the David-Prasad RFID Ultralightweight Authentication Protocol. RFIDSec 2010: 22-34 - 2009
- [j5]Pedro Peris-Lopez, Tieyan Li, Julio C. Hernandez-Castro, Juan E. Tapiador:
Practical attacks on a mutual authentication scheme under the EPC Class-1 Generation-2 standard. Comput. Commun. 32(7-10): 1185-1193 (2009) - [j4]Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda:
LAMED - A PRNG for EPC Class-1 Generation-2 RFID specification. Comput. Stand. Interfaces 31(1): 88-97 (2009) - [j3]Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda:
Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard. Comput. Stand. Interfaces 31(2): 372-380 (2009) - [j2]Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda:
An Ultra Light Authentication Protocol Resistant to Passive Attacks under the Gen-2 Specification. J. Inf. Sci. Eng. 25(1): 33-57 (2009) - [c10]Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan E. Tapiador, Tieyan Li, Jan C. A. van der Lubbe:
Weaknesses in Two Recent Lightweight RFID Authentication Protocols. Inscrypt 2009: 383-392 - [c9]Julio C. Hernandez-Castro, Juan E. Tapiador, Pedro Peris-Lopez, John A. Clark, El-Ghazali Talbi:
Metaheuristic traceability attack against SLMAP, an RFID lightweight authentication protocol. IPDPS 2009: 1-5 - [c8]Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan M. Estévez-Tapiador, Enrique San Millán, Jan C. A. van der Lubbe:
Security Flaws in an Efficient Pseudo-Random Number Generator for Low-Power Environments. SEWCN 2009: 25-35 - [i3]Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Jan C. A. van der Lubbe:
Shedding Some Light on RFID Distance Bounding Protocols and Terrorist Attacks. CoRR abs/0906.4618 (2009) - [i2]Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan M. Estévez-Tapiador, Jan C. A. van der Lubbe:
Security Flaws in a Recent Ultralightweight RFID Protocol. CoRR abs/0910.2115 (2009) - 2008
- [j1]Juan M. Estévez-Tapiador, Julio César Hernández Castro, Pedro Peris-Lopez, Arturo Ribagorda:
Automated Design of Cryptographic Hash Schemes by Evolving Highly-Nonlinear Functions. J. Inf. Sci. Eng. 24(5): 1485-1504 (2008) - [c6]Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda:
Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol. WISA 2008: 56-68 - [i1]Julio César Hernández Castro, Juan M. Estévez-Tapiador, Pedro Peris-Lopez, Jean-Jacques Quisquater:
Cryptanalysis of the SASI Ultralightweight RFID Authentication Protocol with Modular Rotations. CoRR abs/0811.4257 (2008) - 2007
- [c5]Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda:
An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks. EUC Workshops 2007: 781-794 - [c4]Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda:
Solving the Simultaneous Scanning Problem Anonymously: Clumping Proofs for RFID Tags. SECPerU 2007: 55-60 - 2006
- [c3]Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda:
RFID Systems: A Survey on Security Threats and Proposed Solutions. PWC 2006: 159-170 - [c2]Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda:
EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags. OTM Workshops (1) 2006: 352-361 - [c1]Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda:
M2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags. UIC 2006: 912-923
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:59 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint