Maribel Gonzalez Vasco
Maribel Gonzalez Vasco
Asssociate Professor of Mathematics, U.Rey Juan Carlos
Verified email at
Cited by
Cited by
Secure group key establishment revisited
JM Bohli, MIG Vasco, R Steinwandt
International Journal of Information Security 6 (4), 243-254, 2007
On the security of Diffie-Hellman bits
MIG Vasco, IE Shparlinski
Cryptography and computational number theory, 257-268, 2001
(Password) authenticated key establishment: from 2-party to group
M Abdalla, JM Bohli, MIG Vasco, R Steinwandt
Theory of Cryptography Conference, 499-514, 2007
Obstacles in two public key cryptosystems based on group factorizations
MIG Vasco, R Steinwandt
Tatra Mt. Math. Publ 25 (23), 23-37, 2002
Security of the most significant bits of the Shamir message passing scheme
M González Vasco, I Shparlinski
Mathematics of computation 71 (237), 333-342, 2002
On minimal length factorizations of finite groups
MIG Vasco, M Rötteler, R Steinwandt
Experimental Mathematics 12 (1), 1-12, 2003
A survey of hard core functions
MIG Vasco, M Näslund
Cryptography and Computational Number Theory, 227-255, 2001
Group theoretic cryptography
MIG Vasco, R Steinwandt
CRC Press, 2015
Password-Authenticated Constant-Round Group Key Establishment with a Common Reference String.
JM Bohli, MIG Vasco, R Steinwandt
IACR Cryptol. ePrint Arch. 2006, 214, 2006
Towards a uniform description of several group based cryptographic primitives
MIG Vasco, C Martínez, R Steinwandt
Designs, Codes and Cryptography 33 (3), 215-226, 2004
Weak Keys in MST1
JM Bohli, R Steinwandt, MIG Vasco, C Martínez
Designs, Codes and Cryptography 37 (3), 509-524, 2005
Combined (identity-based) public key schemes.
MIG Vasco, F Hess, R Steinwandt
IACR Cryptol. ePrint Arch. 2008, 466, 2008
A note on the security of MST 3
MIG Vasco, ALP Del Pozo, PT Duarte
Designs, Codes and Cryptography 55 (2-3), 189-200, 2010
Choosing a leader on a complex network
R Criado, J Flores, MI González-Vasco, J Pello
Journal of computational and applied mathematics 204 (1), 10-17, 2007
A reaction attack on a public key cryptosystem based on the word problem
MIG Vasco, R Steinwandt
Applicable Algebra in Engineering, Communication and Computing 14 (5), 335-340, 2004
A subliminal-free variant of ECDSA
JM Bohli, MIG Vasco, R Steinwandt
International Workshop on Information Hiding, 375-387, 2006
The hidden number problem in extension fields and its applications
MIG Vasco, M Näslund, IE Shparlinski
Latin American Symposium on Theoretical Informatics, 105-117, 2002
New results on the hardness of Diffie-Hellman bits
MIG Vasco, M Näslund, IE Shparlinski
International Workshop on Public Key Cryptography, 159-172, 2004
A new cramer-shoup like methodology for group based provably secure encryption schemes
MIG Vasco, C Martínez, R Steinwandt, JL Villar
Theory of Cryptography Conference, 495-509, 2005
Cryptanalysis of a key exchange scheme based on block matrices
MIG Vasco, ALP del Pozo, PT Duarte, JL Villar
Information Sciences 276, 319-331, 2014
The system can't perform the operation now. Try again later.
Articles 1–20