Julio Hernandez-Castro
Julio Hernandez-Castro
Professor of Computer Security, University of Kent
Verified email at kent.ac.uk - Homepage
TitleCited byYear
LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags
P Peris-Lopez, JC Hernandez-Castro, JM Estévez-Tapiador, A Ribagorda
Proc. of 2nd Workshop on RFID Security 6, 2006
3942006
M2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags
P Peris-Lopez, JC Hernandez-Castro, JM Estevez-Tapiador, A Ribagorda
International conference on ubiquitous intelligence and computing, 912-923, 2006
3672006
EMAP: An efficient mutual-authentication protocol for low-cost RFID tags
P Peris-Lopez, JC Hernandez-Castro, JM Estevez-Tapiador, A Ribagorda
OTM Confederated International Conferences" On the Move to Meaningful …, 2006
3572006
Advances in ultralightweight cryptography for low-cost RFID tags: Gossamer protocol
P Peris-Lopez, JC Hernandez-Castro, JME Tapiador, A Ribagorda
International Workshop on Information Security Applications, 56-68, 2008
2222008
RFID systems: A survey on security threats and proposed solutions
P Peris-Lopez, JC Hernandez-Castro, JM Estevez-Tapiador, A Ribagorda
IFIP international conference on personal wireless communications, 159-170, 2006
2082006
LAMED—a PRNG for EPC class-1 generation-2 RFID specification
P Peris-Lopez, JC Hernandez-Castro, JM Estevez-Tapiador, A Ribagorda
Computer Standards & Interfaces 31 (1), 88-97, 2009
1182009
Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard
P Peris-Lopez, JC Hernandez-Castro, JM Estevez-Tapiador, A Ribagorda
Computer Standards & Interfaces 31 (2), 372-380, 2009
992009
Flaws on RFID grouping-proofs. Guidelines for future sound protocols
P Peris-Lopez, A Orfila, JC Hernandez-Castro, JCA Van der Lubbe
Journal of Network and Computer Applications 34 (3), 833-845, 2011
852011
Solving the simultaneous scanning problem anonymously: clumping proofs for RFID tags
P Peris-Lopez, JC Hernandez-Castro, JM Estevez-Tapiador, A Ribagorda
Third International Workshop on Security, Privacy and Trust in Pervasive and …, 2007
652007
Steganography in games: A general methodology and its application to the game of Go
JC Hernandez-Castro, I Blasco-Lopez, JM Estevez-Tapiador, ...
computers & security 25 (1), 64-71, 2006
622006
The strict avalanche criterion randomness test
JCH Castro, JM Sierra, A Seznec, A Izquierdo, A Ribagorda
Mathematics and Computers in Simulation 68 (1), 1-7, 2005
562005
Vulnerability analysis of RFID protocols for tag ownership transfer
P Peris-Lopez, JC Hernandez-Castro, JME Tapiador, T Li, Y Li
Computer Networks 54 (9), 1502-1508, 2010
512010
Cryptanalysis of the SASI ultralightweight RFID authentication protocol with modular rotations
JC Hernandez-Castro, JME Tapiador, P Peris-Lopez, JJ Quisquater
arXiv preprint arXiv:0811.4257, 2008
512008
Lightweight Cryptography in Radio Frequency Identification (RFID) Systems
PP López, DDJCH Castro, DDAR Garnacho
Computer Science Department, Carlos III University of Madrid, 2008
48*2008
Cryptanalysis of the David-Prasad RFID ultralightweight authentication protocol
JC Hernandez-Castro, P Peris-Lopez, RCW Phan, JME Tapiador
International Workshop on Radio Frequency Identification: Security and …, 2010
432010
No bot expects the DeepCAPTCHA! Introducing immutable adversarial examples, with applications to CAPTCHA generation
M Osadchy, J Hernandez-Castro, S Gibson, O Dunkelman, D Pérez-Cabo
IEEE Transactions on Information Forensics and Security 12 (11), 2640-2653, 2017
42*2017
Cryptanalysis of an EPC class-1 generation-2 standard compliant authentication protocol
P Peris-Lopez, JC Hernandez-Castro, JME Tapiador, JCA Van der Lubbe
Engineering Applications of Artificial Intelligence 24 (6), 1061-1069, 2011
412011
AKARI-X: A pseudorandom number generator for secure lightweight systems
H Martín, E San Millán, L Entrena, JCH Castro, PP López
2011 IEEE 17th International On-Line Testing Symposium, 228-233, 2011
402011
Finding efficient distinguishers for cryptographic mappings, with an application to the block cipher TEA
JC Hernandez, P Isasi
Computational Intelligence 20 (3), 517-525, 2004
37*2004
Vulnerability analysis of a mutual authentication scheme under the EPC class-1 generation-2 standard
P Peris-Lopez, T Li, TL Lim, JC Hernandez-Castro, JM Estevez-Tapiador
Workshop on RFID Security 9, 11, 2008
362008
The system can't perform the operation now. Try again later.
Articles 1–20