Name
Papers
Collaborators
GUILLERMO MORALES-LUNA
71
90
Citations 
PageRank 
Referers 
99
28.89
176
Referees 
References 
466
325
Search Limit
100466
Title
Citations
PageRank
Year
Towards BIMAX: Binary Inclusion-MAXimal Parallel Implementation for Gene Expression Analysis Alejandra.00.342020
Conversion of Element Representations in Galois Rings00.342020
Side Attacks on Stegosystems Executing Message Encryption Previous to Embedding.00.342020
Cipher Modification Against Steganalysis Based on NIST Tests00.342019
Information theoretical secure key sharing protocol for noiseless public constant parameter channels without cryptographic assumptions00.342019
Secret Key Sharing Protocol between Units Connected by Wireless MIMO Fading Channels.00.342018
Steganalysis Based on Statistical Properties of the Encrypted Messages.00.342017
Proof of Correspondence between Keys and Encoding Maps in an Authentication Code.00.342017
Design of Audio Digital Watermarking System Resistant to Removal Attack.00.342017
Semi-Fragile Image Authentication based on CFD and 3-Bit Quantization.00.342016
Authentication codes based on resilient Boolean maps10.372016
Design of High Speed Stegosystem Based on Trellis Codes Jointly with Generalised Viterbi Algorithm.00.342016
Trajectory Graphs Appearing from the Skein Problems Trajectory Graphs Appearing from the Skein Problems at the Hypercube.00.342016
Zero Knowledge Authentication Protocols With Algebraic Geometry Techniques.00.342016
Accelerating All-Sources BFS Metrics on Multi-core Clusters for Large-Scale Complex Network Analysis.00.342016
Secret key agreement based on a communication through wireless MIMO-based fading channels.00.342016
Partitioning of complex networks for heterogeneous computing: A methodological approach00.342016
Using the generalised Viterbi algorithm to achieve a highly effective stegosystem for images00.342015
Analysis of Keyless Massive MIMO-based Cryptosystem Security.00.342015
A Linear Code and its Application into Secret Sharing.00.342015
An Authentication Code over Galois Rings with Optimal Impersonation and Substitution Probabilities10.412015
An ILP approach for the traveling repairman problem with unit time windows00.342015
Concatenated digital watermarking system robust to different removal attacks.00.342014
Authentication Schemes Based on Resilient Maps.10.372014
Wire-tap channel concept in nature and society00.342014
Audio Watermarking Based on Echo Hiding with Zero Error Probability.00.342013
A stegosystem with blind decoder based on a noisy channel00.342013
On Formal Expressions of BRW-polynomials.00.342013
The Capacity of a Stegosystem for the Noisy Attack Channel.00.342012
Optimization of key distribution protocols based on extractors for noisy channels within active adversaries10.382012
Selección aleatoria de árboles generadores en gráficas.00.342012
A Multiple Robust Digital Watermarking System for Still Images.00.342012
Secret Key Agreement Over Multipath Channels Exploiting a Variable-Directional Antenna20.392011
Stegosystems Based on Noisy Channels.20.432011
Robust Digital Watermarking System for Still Images.40.692011
Solinas primes of small weight for fixed sizes10.442010
Collusion-Resistant Fingerprints Based on Real Superimposed Codes.00.342010
A Geometric Presentation of Probabilistic Satisfiability00.342010
Two identification protocols based on Cayley graphs of Coxeter groups.00.342010
On the hamiltonian operators for adiabatic quantum reduction of SAT00.342010
Key Distribution Protocols Based on Extractors Under the Condition of Noisy Channels in the Presence of an Active Adversary10.352010
Undetectable spread-time stegosystem based on noisy channels10.702010
Cryptographic Methods During the Mexican Revolution00.342009
Collusion-resistant fingerprints based on the use of superimposed codes in real vector spaces00.342009
Searching Prime Numbers With Short Binary Signed Representation00.342009
On differences of quadratic residues.00.342008
Low-Complexity Bit-Parallel Square Root Computation over GF(2^{m}) for All Trinomials70.542008
ECA-Rule Visual Programming for Ubiquitous and Nomadic Computing00.342008
Wet Paper Coding for Watermarking of Binary Images10.402008
Key Distribution Protocols Based on Noisy Channels in Presence of an Active Adversary: Conventional and New Versions With Parameter Optimization110.722008
  • 1
  • 2