default search action
María Isabel González Vasco
Person information
- affiliation: King Juan Carlos University, MACIMTE, Madrid, Spain
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j28]José Ignacio Escribano Pablos, María Isabel González Vasco:
Secure post-quantum group key exchange: Implementing a solution based on Kyber. IET Commun. 17(6): 758-773 (2023) - [c11]David Balbás, Dario Fiore, María Isabel González Vasco, Damien Robissout, Claudio Soriente:
Modular Sumcheck Proofs with Applications to Machine Learning and Image Processing. CCS 2023: 1437-1451 - [i24]María Isabel González Vasco, Delaram Kahrobaei, Eilidh McKemmie:
Applications of Finite non-Abelian Simple Groups to Cryptography in the Quantum Era. CoRR abs/2308.14725 (2023) - [i23]María Isabel González Vasco, Delaram Kahrobaei, Eilidh McKemmie:
Applications of Finite non-Abelian Simple Groups to Cryptography in the Quantum Era. IACR Cryptol. ePrint Arch. 2023: 1293 (2023) - [i22]David Balbás, Dario Fiore, María Isabel González Vasco, Damien Robissout, Claudio Soriente:
Modular Sumcheck Proofs with Applications to Machine Learning and Image Processing. IACR Cryptol. ePrint Arch. 2023: 1342 (2023) - 2022
- [c10]Antonio Faonio, María Isabel González Vasco, Claudio Soriente, Hien Thi Thu Truong:
Auditable Asymmetric Password Authenticated Public Key Establishment. CANS 2022: 122-142 - 2021
- [j27]Carlos E. González-Guillén, María Isabel González Vasco, Floyd Johnson, Angel L. Pérez del Pozo:
An Attack on Zawadzki's Quantum Authentication Scheme. Entropy 23(4): 389 (2021) - [j26]María Isabel González Vasco, Angel L. Pérez del Pozo, Claudio Soriente:
A Key for John Doe: Modeling and Designing Anonymous Password-Authenticated Key Exchange Protocols. IEEE Trans. Dependable Secur. Comput. 18(3): 1336-1353 (2021) - [c9]Antonio Russo, Antonio Fernández Anta, María Isabel González Vasco, Simon Pietro Romano:
Chirotonia: A Scalable and Secure e-Voting Framework based on Blockchains and Linkable Ring Signatures. Blockchain 2021: 417-424 - [i21]Antonio Russo, Antonio Fernández Anta, María Isabel González Vasco, Simon Pietro Romano:
Chirotonia: A Scalable and Secure e-Voting Framework based on Blockchains and Linkable Ring Signatures. CoRR abs/2111.02257 (2021) - 2020
- [j25]María Isabel González Vasco, Angel L. Pérez del Pozo, Rainer Steinwandt:
Group Key Establishment in a Quantum-Future Scenario. Informatica 31(4): 751-768 (2020) - [j24]Jens-Matthias Bohli, María Isabel González Vasco, Rainer Steinwandt:
Building Group Key Establishment on Group Theory: A Modular Approach. Symmetry 12(2): 197 (2020) - [i20]Carlos E. González-Guillén, María Isabel González Vasco, Floyd Johnson, Angel L. Pérez del Pozo:
Concerning Quantum Identification Without Entanglement. CoRR abs/2003.12095 (2020) - [i19]Antonio Faonio, María Isabel González Vasco, Claudio Soriente, Hien Thi Thu Truong:
Auditable Asymmetric Password Authenticated Public Key Establishment. IACR Cryptol. ePrint Arch. 2020: 60 (2020)
2010 – 2019
- 2019
- [j23]Jens-Matthias Bohli, María Isabel González Vasco, Rainer Steinwandt:
Password-Authenticated Group Key Establishment from Smooth Projective Hash Functions. Int. J. Appl. Math. Comput. Sci. 29(4): 797-815 (2019) - [j22]José Ignacio Escribano Pablos, María Isabel González Vasco, Misael Enrique Marriaga, Angel L. Pérez del Pozo:
The Cracking of WalnutDSA: A Survey. Symmetry 11(9): 1072 (2019) - 2018
- [j21]María Isabel González Vasco, Angela Robinson, Rainer Steinwandt:
Cryptanalysis of a Proposal Based on the Discrete Logarithm Problem Inside Sn. Cryptogr. 2(3): 16 (2018) - [j20]María Isabel González Vasco, Angel L. Pérez del Pozo, Adriana Suárez Corona:
Group key exchange protocols withstanding ephemeral-key reveals. IET Inf. Secur. 12(1): 79-86 (2018) - 2017
- [j19]Paolo D'Arco, María Isabel González Vasco, Angel L. Pérez del Pozo, Claudio Soriente, Rainer Steinwandt:
Private set intersection: New generic constructions and feasibility results. Adv. Math. Commun. 11(3): 481-502 (2017) - [j18]Dario Fiore, María Isabel González Vasco, Claudio Soriente:
Partitioned Group Password-Based Authenticated Key Exchange. Comput. J. 60(12): 1912-1922 (2017) - [i18]Dario Fiore, María Isabel González Vasco, Claudio Soriente:
Partitioned Group Password-Based Authenticated Key Exchange. IACR Cryptol. ePrint Arch. 2017: 141 (2017) - 2016
- [j17]María Isabel González Vasco, Florian Hess, Rainer Steinwandt:
Combined schemes for signature and encryption: The public-key and the identity-based setting. Inf. Comput. 247: 1-10 (2016) - [j16]María Isabel González Vasco, Angel L. Pérez del Pozo, Adriana Suárez Corona:
Pitfalls in a server-aided authenticated group key establishment. Inf. Sci. 363: 1-7 (2016) - [i17]María Isabel González Vasco, Angel L. Pérez del Pozo, Adriana Suárez Corona:
Group key exchange protocols withstanding ephemeral-key reveals. IACR Cryptol. ePrint Arch. 2016: 1166 (2016) - 2015
- [b1]María Isabel González Vasco, Rainer Steinwandt:
Group Theoretic Cryptography. Chapman and Hall / CRC cryptography and network security series, CRC Press 2015, ISBN 978-1-584-88836-9, pp. I-XVII, 1-230 - 2014
- [j15]María Isabel González Vasco, Angel L. Pérez del Pozo, Pedro Taborda Duarte, Jorge L. Villar:
Cryptanalysis of a key exchange scheme based on block matrices. Inf. Sci. 276: 319-331 (2014) - 2012
- [c8]Paolo D'Arco, María Isabel González Vasco, Angel L. Pérez del Pozo, Claudio Soriente:
Size-Hiding in Private Set Intersection: Existential Results and Constructions. AFRICACRYPT 2012: 378-394 - 2010
- [j14]María Isabel González Vasco, Angel L. Pérez del Pozo, Pedro Taborda Duarte:
A note on the security of MST3. Des. Codes Cryptogr. 55(2-3): 189-200 (2010) - [c7]María Isabel González Vasco, Somayeh Heidarvand, Jorge L. Villar:
Flexible Anonymous Subscription Schemes. ICETE (Selected Papers) 2010: 203-219 - [c6]María Isabel González Vasco, Somayeh Heidarvand, Jorge L. Villar:
Anonymous Subscription Schemes - A Flexible Construction for On-line Services Access. SECRYPT 2010: 120-131
2000 – 2009
- 2009
- [i16]María Isabel González Vasco, Angel L. Pérez del Pozo, Pedro Taborda Duarte:
A note on the security of MST3. IACR Cryptol. ePrint Arch. 2009: 96 (2009) - [i15]María Isabel González Vasco, Angel L. Pérez del Pozo:
Related Message Attacks to Public Key Encryption Schemes: Relations among Security Notions. IACR Cryptol. ePrint Arch. 2009: 205 (2009) - [i14]María Isabel González Vasco, Angel L. Pérez del Pozo, Pedro Taborda Duarte:
Cryptanalysis of a key exchange scheme based on block matrices. IACR Cryptol. ePrint Arch. 2009: 553 (2009) - 2008
- [j13]María Isabel González Vasco, Jorge Luis Villar:
In search of mathematical primitives for deriving universal projective hash families. Appl. Algebra Eng. Commun. Comput. 19(2): 161-173 (2008) - [j12]María Isabel González Vasco, Rainer Steinwandt:
Applications of algebra to cryptography. Discret. Appl. Math. 156(16): 3071 (2008) - [i13]María Isabel González Vasco, Florian Hess, Rainer Steinwandt:
Combined (identity-based) public key schemes. IACR Cryptol. ePrint Arch. 2008: 466 (2008) - 2007
- [j11]María Isabel González Vasco, David Pérez-García:
Attacking a public key cryptosystem based on tree replacement. Discret. Appl. Math. 155(1): 61-67 (2007) - [j10]Jens-Matthias Bohli, María Isabel González Vasco, Rainer Steinwandt:
Secure group key establishment revisited. Int. J. Inf. Sec. 6(4): 243-254 (2007) - [c5]Michel Abdalla, Jens-Matthias Bohli, María Isabel González Vasco, Rainer Steinwandt:
(Password) Authenticated Key Establishment: From 2-Party to Group. TCC 2007: 499-514 - 2006
- [j9]María Isabel González Vasco, Rainer Steinwandt:
Pitfalls in public key cryptosystems based on free partially commutative monoids and groups. Appl. Math. Lett. 19(10): 1037-1041 (2006) - [j8]Willi Geiselmann, María Isabel González Vasco, Rainer Steinwandt:
Entwurf asymmetrischer kryptographischer Verfahren unter Berücksichtigung von Quantenalgorithmen (Design of Asymmetric Cryptographic Schemes Taking Into Account Quantum Algorithms). it Inf. Technol. 48(6): 327- (2006) - [c4]Jens-Matthias Bohli, María Isabel González Vasco, Rainer Steinwandt:
A Subliminal-Free Variant of ECDSA. Information Hiding 2006: 375-387 - [i12]Jens-Matthias Bohli, María Isabel González Vasco, Rainer Steinwandt:
Password-Authenticated Constant-Round Group Key Establishment with a Common Reference String. IACR Cryptol. ePrint Arch. 2006: 214 (2006) - 2005
- [j7]Jens-Matthias Bohli, Rainer Steinwandt, María Isabel González Vasco, Consuelo Martínez:
Weak Keys in MST1. Des. Codes Cryptogr. 37(3): 509-524 (2005) - [c3]María Isabel González Vasco, Consuelo Martínez, Rainer Steinwandt, Jorge Luis Villar:
A New Cramer-Shoup Like Methodology for Group Based Provably Secure Encryption Schemes. TCC 2005: 495-509 - [i11]Jens-Matthias Bohli, María Isabel González Vasco, Rainer Steinwandt:
Burmester-Desmedt Tree-Based Key Transport Revisited: Provable Security. IACR Cryptol. ePrint Arch. 2005: 360 (2005) - [i10]Jens-Matthias Bohli, María Isabel González Vasco, Rainer Steinwandt:
Secure Group Key Establishment Revisited. IACR Cryptol. ePrint Arch. 2005: 395 (2005) - 2004
- [j6]María Isabel González Vasco, Rainer Steinwandt:
A Reaction Attack on a Public Key Cryptosystem Based on the Word Problem. Appl. Algebra Eng. Commun. Comput. 14(5): 335-340 (2004) - [j5]María Isabel González Vasco, Dennis Hofheinz, Consuelo Martínez, Rainer Steinwandt:
On the Security of Two Public Key Cryptosystems Using Non-Abelian Groups. Des. Codes Cryptogr. 32(1-3): 207-216 (2004) - [j4]María Isabel González Vasco, Consuelo Martínez, Rainer Steinwandt:
Towards a Uniform Description of Several Group Based Cryptographic Primitives. Des. Codes Cryptogr. 33(3): 215-226 (2004) - [c2]María Isabel González Vasco, Mats Näslund, Igor E. Shparlinski:
New Results on the Hardness of Diffie-Hellman Bits. Public Key Cryptography 2004: 159-172 - [i9]María Isabel González Vasco, Rainer Steinwandt:
Pitfalls in public key cryptosystems based on free partially commutative monoids and groups. IACR Cryptol. ePrint Arch. 2004: 12 (2004) - [i8]María Isabel González Vasco, David Pérez-García:
Attacking a Public Key Cryptosystem Based on Tree Replacement. IACR Cryptol. ePrint Arch. 2004: 98 (2004) - 2003
- [j3]María Isabel González Vasco, Martin Rötteler, Rainer Steinwandt:
On Minimal Length Factorizations of Finite Groups. Exp. Math. 12(1): 1-12 (2003) - 2002
- [j2]María Isabel González Vasco, Igor E. Shparlinski:
Security of the most significant bits of the Shamir message passing scheme. Math. Comput. 71(237): 333-342 (2002) - [c1]María Isabel González Vasco, Mats Näslund, Igor E. Shparlinski:
The Hidden Number Problem in Extension Fields and Its Applications. LATIN 2002: 105-117 - [i7]María Isabel González Vasco, Consuelo Martínez, Rainer Steinwandt:
Towards a Uniform Description of Several Group Based Cryptographic Primitives. IACR Cryptol. ePrint Arch. 2002: 48 (2002) - [i6]Jens-Matthias Bohli, María Isabel González Vasco, Consuelo Martínez, Rainer Steinwandt:
Weak Keys in MST1. IACR Cryptol. ePrint Arch. 2002: 70 (2002) - [i5]María Isabel González Vasco, Rainer Steinwandt:
Reaction Attacks on Public Key Cryptosystems Based on the Word Problem. IACR Cryptol. ePrint Arch. 2002: 139 (2002) - 2001
- [j1]María Isabel González Vasco, Rainer Steinwandt:
Clouds over a public key cryptosystem based on Lyndon words. Inf. Process. Lett. 80(5): 239-242 (2001) - 2000
- [i4]María Isabel González Vasco, Igor E. Shparlinski:
Security of the Most Significant Bits of the Shamir Message Passing Scheme. Electron. Colloquium Comput. Complex. TR00 (2000) - [i3]María Isabel González Vasco, Igor E. Shparlinski:
On the Security of Diffie-Hellman Bits. Electron. Colloquium Comput. Complex. TR00 (2000) - [i2]María Isabel González Vasco, Igor E. Shparlinski:
On the Security of Diffie-Hellman Bits. IACR Cryptol. ePrint Arch. 2000: 20 (2000) - [i1]María Isabel González Vasco, Igor E. Shparlinski:
Security of the Most Significant Bits of the Shamir Message Passing Scheme. IACR Cryptol. ePrint Arch. 2000: 24 (2000)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:40 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint