Grupo de Investigación en Criptografía y Seguridad de la Información (GiCSI)
Investigation areas
Attack and defence against threats
Critical infrastructures
Data processing
Identity management
Others
Reliable and upgradeable systems
Lines of investigation
Authentication protocols
Biometric authentication
Complexity theory
Cryptanalysis of continuous and discrete chaotic cryptosystems
Cryptographic authentication
Cryptographic mechanisms for attribution, legitimacy and transparency in systems
Cryptographic protocols: authentication, signing, secret sharing, e-votation, etc.
Cryptography and cryptanalysis of symmetric and asymmetric cipher systems
Development of tool protection
Experimental systems for encryption and key exchange by quantum methods
Information filtering
Information network security
Information systems risk management
Linear complexity of pseudorandom binary sequences
Methods and development of protection tools
Pseudo-random bit generators
Regulatory security compliance
Secure data processing
Secure processing of encrypted data and signals
Security in communications and web applications
Vulnerability analysis of physical cryptographic devices using side channels