Grupo de Investigación en Criptografía y Seguridad de la Información (GiCSI)

Investigation areas

Attack and defence against threats

Critical infrastructures

Data processing

Identity management

Others

Reliable and upgradeable systems

Lines of investigation

Authentication protocols

Biometric authentication

Complexity theory

Cryptanalysis of continuous and discrete chaotic cryptosystems

Cryptographic authentication

Cryptographic mechanisms for attribution, legitimacy and transparency in systems

Cryptographic protocols: authentication, signing, secret sharing, e-votation, etc.

Cryptography and cryptanalysis of symmetric and asymmetric cipher systems

Development of tool protection

Experimental systems for encryption and key exchange by quantum methods

Information filtering

Information network security

Information systems risk management

Linear complexity of pseudorandom binary sequences

Methods and development of protection tools

Pseudo-random bit generators

Regulatory security compliance

Secure data processing

Secure processing of encrypted data and signals

Security in communications and web applications

Vulnerability analysis of physical cryptographic devices using side channels