Name
Affiliation
Papers
JULIO CÉSAR HERNÁNDEZ CASTRO
Univ Carlos III Madrid, Av Univ 30, Leganes 28911, Spain
41
Collaborators
Citations 
PageRank 
60
189
37.03
Referers 
Referees 
References 
422
476
264
Search Limit
100476
Title
Citations
PageRank
Year
An In-Depth Study Of The Jisut Family Of Android Ransomware00.342018
Source identification for mobile devices, based on wavelet transforms combined with sensor imperfections50.432014
A genetic tango attack against the David-Prasad RFID ultra-lightweight authentication protocol80.502014
Bypassing information leakage protection with trusted applications.40.512012
Cryptanalysis of Cho et al.'s Protocol, A Hash-Based Mutual Authentication Protocol for RFID Systems.50.512011
Prime number generation using memetic programming00.342011
On the Strength of Egglue and Other Logic CAPTCHAs.20.382011
Studying the pseudo random number generator of a low-cost RFID tag.00.342011
A Strong Authentication Protocol Based on Portable One-Time Dynamic URLs00.342010
Shedding Some Light on RFID Distance Bounding Protocols and Terrorist Attacks100.582009
Steganalysis of Hydan00.342009
An Ultra Light Authentication Protocol Resistant to Passive Attacks under the Gen-2 Specification50.452009
Cryptanalysis of Syverson's Rational Exchange Protocol10.362008
Cryptanalysis of the RSA-CEGD protocol00.342008
Automated Design of Cryptographic Hash Schemes by Evolving Highly-Nonlinear Functions20.462008
Non-standard Attacks against Cryptographic Protocols, with an Example over a Simplified Mutual Authentication Protocol00.342008
CSteg: Talking in C Code - Steganography of C Source Code in Text.00.342008
Cryptanalysis of the SASI Ultralightweight RFID Authentication Protocol with Modular Rotations200.912008
Heuristic Search For Non-Linear Cryptanalytic Approximations00.342007
Evolving hash functions by means of genetic programming70.942006
Finding state-of-the-art non-cryptographic hashes with genetic programming70.872006
Attacks on port knocking authentication mechanism40.722005
Evolutionary computation in computer security and cryptography30.392005
Security in Information Systems, Proceedings of the 3rd International Workshop on Security in Information Systems, WOSIS 2005, In conjunction with ICEIS2005, Miami, USA, May 2005318.292005
The strict avalanche criterion randomness test161.192005
Secure Communications in Multi-Agent Systems Protecting KQML00.342004
Finding Efficient Distinguishers For Cryptographic Mappings, With An Application To The Block Cipher Tea40.532004
Beware of the Security Software00.342004
Security In Information Systems, Proceedings of the 2nd International Workshop on Security In Information Systems, WOSIS 2004, In conjunction with ICEIS 2004, Porto, Portugal, April 20043610.192004
Filtering Spam at E-Mail Server Level with Improved CRM114.10.432004
Hiding Data in Games00.342004
Using Hierarchical Knowledge Structures to Implement Dynamic FAQ Systems10.372004
Forecasting Time Series by Means of Evolutionary Algorithms30.632004
New results on the genetic cryptanalysis of TEA and reduced-round versions of XTEA30.432004
Introduction To The Applications Of Evolutionary Computation In Computer Security And Cryptography30.512004
Finding Efficient Nonlinear Functions by Means of Genetic Programming00.342003
Protection of Multiagent Systems00.342003
On MAR'S s-boxes strength against linear cryptanalysis00.342003
Genetic Cryptoanalysis of Two Rounds TEA70.632002
Project WebOracle: Developing an advanced web server security assesment tool00.342001
Distinguishing TEA from a Random Permutation: Reduced Round Versions of TEA Do Not Have the SAC or Do Not Generate Random Numbers10.412001