


default search action
Julio César Hernández Castro
Person information
- affiliation: University of Kent, Canterbury, UK
- affiliation (former): Charles III University of Madrid, Madrid, Spain
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j76]Constantinos Patsakis, Eugenia A. Politou, Efthimios Alepis, Julio C. Hernandez-Castro:
Cashing out crypto: state of practice in ransom payments. Int. J. Inf. Sec. 23(2): 699-712 (2024) - [j75]Orçun Çetin, Emre Ekmekcioglu
, Budi Arief
, Julio C. Hernandez-Castro
:
An Empirical Evaluation of Large Language Models in Static Code Analysis for PHP Vulnerability Detection. J. Univers. Comput. Sci. 30(9): 1163-1183 (2024) - [c89]Yichao Wang
, Budi Arief
, Julio C. Hernandez-Castro
:
Analysis of Security Mechanisms of Dark Web Markets. EICC 2024: 120-127 - [c88]Meryem Berfin Ozkok
, Baturay Birinci
, Orçun Çetin
, Budi Arief
, Julio C. Hernandez-Castro
:
Honeypot's Best Friend? Investigating ChatGPT's Ability to Evaluate Honeypot Logs. EICC 2024: 128-135 - [c87]Yonas Leguesse
, Mark Vella
, Christian Colombo
, Julio C. Hernandez-Castro
:
A Metric to Assess the Reliability of Crowd-sourced SUS Scores: A Case Study on the PoPLar Authentication Tool. EuroUSEC 2024: 309-321 - 2023
- [j74]Elena Almaraz Luengo, Bittor Alaña Olivares, Luis Javier García-Villalba
, Julio César Hernández Castro:
Further analysis of the statistical independence of the NIST SP 800-22 randomness tests. Appl. Math. Comput. 459: 128222 (2023) - [j73]Budi Arief, Lena Yuryna Connolly, Julio C. Hernandez-Castro, Allan Liska, Peter Y. A. Ryan
:
Introduction to the Special Issue on Ransomware. DTRAP 4(4): 51:1-51:3 (2023) - [j72]Yagiz Yilmaz, Orçun Çetin, Claudia Grigore, Budi Arief, Julio C. Hernandez-Castro:
Personality Types and Ransomware Victimisation. DTRAP 4(4): 53:1-53:25 (2023) - [c86]Alpesh Bhudia
, Anna Cartwright
, Edward J. Cartwright
, Darren Hurley-Smith
, Julio C. Hernandez-Castro
:
Game Theoretic Modelling of a Ransom and Extortion Attack on Ethereum Validators. ARES 2023: 105:1-105:11 - [c85]Omer Said Ozturk
, Emre Ekmekcioglu
, Orçun Çetin
, Budi Arief
, Julio C. Hernandez-Castro
:
New Tricks to Old Codes: Can AI Chatbots Replace Static Code Analysis Tools? EICC 2023: 13-18 - [c84]Yichao Wang
, Budi Arief, Julio C. Hernandez-Castro:
Dark Ending: What Happens when a Dark Web Market Closes down. ICISSP 2023: 106-117 - [c83]Jennifer Bellizzi, Mark Vella, Christian Colombo, Julio C. Hernandez-Castro:
Using Infrastructure-Based Agents to Enhance Forensic Logging of Third-Party Applications. ICISSP 2023: 389-401 - [i13]Alpesh Bhudia, Anna Cartwright, Edward J. Cartwright, Darren Hurley-Smith, Julio C. Hernandez-Castro:
Game Theoretic Modelling of a Ransom and Extortion Attack on Ethereum Validators. CoRR abs/2308.00590 (2023) - 2022
- [j71]Jennifer Bellizzi
, Mark Vella
, Christian Colombo, Julio César Hernández Castro:
Responding to Targeted Stealthy Attacks on Android Using Timely-Captured Memory Dumps. IEEE Access 10: 35172-35218 (2022) - [j70]Elena Almaraz Luengo
, Marcos Brian Leiva Cerna, Luis Javier García-Villalba
, Julio C. Hernandez-Castro:
A new approach to analyze the independence of statistical tests of randomness. Appl. Math. Comput. 426: 127116 (2022) - [j69]Elena Almaraz Luengo
, Marcos Brian Leiva Cerna, Luis Javier García-Villalba
, Julio C. Hernandez-Castro, Darren Hurley-Smith
:
Critical Analysis of Hypothesis Tests in Federal Information Processing Standard (140-2). Entropy 24(5): 613 (2022) - [j68]Elena Almaraz Luengo
, Marcos Brian Leiva Cerna, Luis Javier García-Villalba
, Darren Hurley-Smith
, Julio César Hernández Castro
:
Sensitivity and uniformity in statistical randomness tests. J. Inf. Secur. Appl. 70: 103322 (2022) - [j67]Darren Hurley-Smith
, Constantinos Patsakis
, Julio C. Hernandez-Castro:
On the Unbearable Lightness of FIPS 140-2 Randomness Tests. IEEE Trans. Inf. Forensics Secur. 17: 3946-3958 (2022) - [c82]Alpesh Bhudia, Anna Cartwright
, Edward J. Cartwright, Julio C. Hernandez-Castro, Darren Hurley-Smith
:
Extortion of a Staking Pool in a Proof-of-Stake Consensus Mechanism. COINS 2022: 1-6 - [c81]Alpesh Bhudia, Anna Cartwright
, Edward J. Cartwright, Julio C. Hernandez-Castro, Darren Hurley-Smith
:
Identifying Incentives for Extortion in Proof of Stake Consensus Protocols. DBB 2022: 109-118 - [p2]Luca Mariot, Domagoj Jakobovic, Thomas Bäck
, Julio C. Hernandez-Castro:
Artificial Intelligence for the Design of Symmetric Cryptographic Primitives. Security and Artificial Intelligence 2022: 3-24 - 2021
- [j66]Yonas Leguesse
, Christian Colombo, Mark Vella
, Julio C. Hernandez-Castro:
PoPL: Proof-of-Presence and Locality, or How to Secure Financial Transactions on Your Smartphone. IEEE Access 9: 168600-168612 (2021) - [j65]Burak Filiz
, Budi Arief
, Orçun Çetin
, Julio C. Hernandez-Castro
:
On the Effectiveness of Ransomware Decryption Tools. Comput. Secur. 111: 102469 (2021) - [j64]Yagiz Yilmaz
, Orçun Çetin
, Budi Arief
, Julio C. Hernandez-Castro:
Investigating the impact of ransomware splash screens. J. Inf. Secur. Appl. 61: 102934 (2021) - [j63]Fran Casino
, Nikolaos Lykousas
, Ivan Homoliak, Constantinos Patsakis
, Julio C. Hernandez-Castro:
Intercepting Hail Hydra: Real-time detection of Algorithmically Generated Domains. J. Netw. Comput. Appl. 190: 103135 (2021) - [c80]Yichao Wang
, Budi Arief, Julio César Hernández Castro:
Toad in the Hole or Mapo Tofu? Comparative Analysis of English and Chinese Darknet Markets. eCrime 2021: 1-13 - [c79]Calvin Brierley
, Budi Arief
, David J. Barnes
, Julio C. Hernandez-Castro
:
Industrialising Blackmail: Privacy Invasion Based IoT Ransomware. NordSec 2021: 72-92 - [c78]Jennifer Bellizzi, Mark Vella
, Christian Colombo, Julio C. Hernandez-Castro:
Responding to Living-Off-the-Land Tactics using Just-In-Time Memory Forensics (JIT-MF) for Android. SECRYPT 2021: 356-369 - [p1]Darren Hurley-Smith
, Julio C. Hernandez-Castro:
Challenges in Certifying Small-Scale (IoT) Hardware Random Number Generators. Security of Ubiquitous Computing Systems 2021: 165-181 - [i12]Jennifer Bellizzi, Mark Vella, Christian Colombo, Julio C. Hernandez-Castro:
Responding to Living-Off-the-Land Tactics using Just-in-Time Memory Forensics (JIT-MF) for Android. CoRR abs/2105.05510 (2021) - 2020
- [j62]Darren Hurley-Smith
, Julio C. Hernandez-Castro:
Quantum Leap and Crash: Searching and Finding Bias in Quantum Random Number Generators. ACM Trans. Priv. Secur. 23(3): 16:1-16:25 (2020) - [c77]Calvin Brierley, Jamie Pont, Budi Arief, David J. Barnes, Julio C. Hernandez-Castro:
PaperW8: an IoT bricking ransomware proof of concept. ARES 2020: 82:1-82:10 - [c76]Karlo Knezevic
, Stjepan Picek, Domagoj Jakobovic, Julio C. Hernandez-Castro:
What Is Your MOVE: Modeling Adversarial Network Environments. EvoApplications 2020: 260-275 - [c75]Budi Arief
, Andy Periam, Orçun Çetin, Julio C. Hernandez-Castro:
Using Eyetracker to Find Ways to Mitigate Ransomware. ICISSP 2020: 448-456 - [c74]Jamie Pont
, Budi Arief
, Julio C. Hernandez-Castro
:
Why Current Statistical Approaches to Ransomware Detection Fail. ISC 2020: 199-216 - [c73]Calvin Brierley, Jamie Pont, Budi Arief
, David J. Barnes, Julio C. Hernandez-Castro:
Persistence in Linux-Based IoT Malware. NordSec 2020: 3-19 - [c72]Jennifer Bellizzi
, Mark Vella
, Christian Colombo
, Julio C. Hernandez-Castro
:
Real-Time Triggering of Android Memory Dumps for Stealthy Attack Investigation. NordSec 2020: 20-36 - [c71]Yonas Leguesse
, Mark Vella
, Christian Colombo
, Julio C. Hernandez-Castro
:
Reducing the Forensic Footprint with Android Accessibility Attacks. STM 2020: 22-38 - [i11]Fran Casino, Nikolaos Lykousas, Ivan Homoliak, Constantinos Patsakis, Julio C. Hernandez-Castro:
Intercepting Hail Hydra: Real-Time Detection of Algorithmically Generated Domains. CoRR abs/2008.02507 (2020)
2010 – 2019
- 2019
- [j61]Edward J. Cartwright
, Julio C. Hernandez-Castro, Anna Cartwright
:
To pay or not: game theoretic models of ransomware. J. Cybersecur. 5(1): tyz009 (2019) - [c70]Jamie Pont
, Osama Abu Oun
, Calvin Brierley
, Budi Arief
, Julio C. Hernandez-Castro
:
A Roadmap for Improving the Impact of Anti-ransomware Research. NordSec 2019: 137-154 - 2018
- [j60]Alejandro Martín
, Julio César Hernández Castro, David Camacho
:
An in-Depth Study of the Jisut Family of Android Ransomware. IEEE Access 6: 57205-57218 (2018) - [j59]Thomas Sloan, Julio C. Hernandez-Castro:
Dismantling OpenPuff PDF steganography. Digit. Investig. 25: 90-96 (2018) - [j58]Edgar González Fernández
, Ana Lucila Sandoval Orozco
, Luis Javier García-Villalba
, Julio C. Hernandez-Castro
:
Digital Image Tamper Detection Technique Based on Spectrum Analysis of CFA Artifacts. Sensors 18(9): 2804 (2018) - [j57]Esteban Alejandro Armas Vega
, Ana Lucila Sandoval Orozco
, Luis Javier García-Villalba
, Julio C. Hernandez-Castro
:
Digital Images Authentication Technique Based on DWT, DCT and Local Binary Patterns. Sensors 18(10): 3372 (2018) - [j56]Darren Hurley-Smith
, Julio C. Hernandez-Castro:
Certifiably Biased: An In-Depth Analysis of a Common Criteria EAL4+ Certified TRNG. IEEE Trans. Inf. Forensics Secur. 13(4): 1031-1041 (2018) - [c69]Jack McBride, Budi Arief, Julio C. Hernandez-Castro:
Security Analysis of Contiki IoT Operating System. EWSN 2018: 278-283 - [c68]Darren Hurley-Smith
, Julio C. Hernandez-Castro:
Great Expectations: A Critique of Current Approaches to Random Number Generation Testing & Certification. SSR 2018: 143-163 - 2017
- [j55]Gema Bello Orgaz, Julio C. Hernandez-Castro
, David Camacho
:
Detecting discussion communities on vaccination in twitter. Future Gener. Comput. Syst. 66: 125-136 (2017) - [j54]Luis Javier García-Villalba, Ana Lucila Sandoval Orozco
, Jocelin Rosales Corripio, Julio C. Hernandez-Castro
:
A PRNU-based counter-forensic method to manipulate smartphone image source identification techniques. Future Gener. Comput. Syst. 76: 418-427 (2017) - [j53]Margarita Osadchy
, Julio C. Hernandez-Castro, Stuart J. Gibson, Orr Dunkelman, Daniel Pérez-Cabo:
No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples, With Applications to CAPTCHA Generation. IEEE Trans. Inf. Forensics Secur. 12(11): 2640-2653 (2017) - [c67]Julio C. Hernandez-Castro, David F. Barrero
:
Evolutionary generation and degeneration of randomness to assess the indepedence of the Ent test battery. CEC 2017: 1420-1427 - [c66]Margarita Osadchy, Yan Wang, Orr Dunkelman, Stuart J. Gibson, Julio C. Hernandez-Castro, Christopher J. Solomon:
GenFace: Improving Cyber Security Using Realistic Synthetic Face Generation. CSCML 2017: 19-33 - [c65]Thibault de Balthasar, Julio C. Hernandez-Castro:
An Analysis of Bitcoin Laundry Services. NordSec 2017: 297-312 - [c64]Jack McBride, Julio C. Hernandez-Castro, Budi Arief
:
Earworms Make Bad Passwords: An Analysis of the Nokē Smart Lock Manual Override. SIoT 2017: 30-39 - [i10]Julio C. Hernandez-Castro, Edward J. Cartwright, Anna Stepanova
:
Economic Analysis of Ransomware. CoRR abs/1703.06660 (2017) - 2016
- [j52]Ana Lucila Sandoval Orozco
, Jocelin Rosales Corripio, David Manuel Arenas González, L. Javier García-Villalba, Julio C. Hernandez-Castro
:
Theia: a tool for the forensic analysis of mobile devices pictures. Computing 98(12): 1251-1286 (2016) - [j51]Gildas Avoine, Antonin Beaujeant, Julio C. Hernandez-Castro
, Louis Demay, Philippe Teuwen:
A Survey of Security and Privacy Issues in ePassport Protocols. ACM Comput. Surv. 48(3): 47:1-47:37 (2016) - [j50]Luis Javier García-Villalba, Ana Lucila Sandoval Orozco
, Raquel Ramos López, Julio César Hernández Castro
:
Identification of smartphone brand and model via forensic video analysis. Expert Syst. Appl. 55: 59-69 (2016) - [j49]Ana Lucila Sandoval Orozco
, Jocelin Rosales Corripio, Luis Javier García-Villalba, Julio César Hernández Castro
:
Image source acquisition identification of mobile devices based on the use of features. Multim. Tools Appl. 75(12): 7087-7111 (2016) - [j48]Gildas Avoine, Xavier Carpent
, Julio C. Hernandez-Castro
:
Pitfalls in Ultralightweight Authentication Protocol Designs. IEEE Trans. Mob. Comput. 15(9): 2317-2332 (2016) - [c63]Darren Hurley-Smith
, Julio C. Hernandez-Castro:
Bias in the Mifare DESFire EV1 TRNG. RFIDSec 2016: 123-133 - [i9]Margarita Osadchy, Julio C. Hernandez-Castro, Stuart J. Gibson, Orr Dunkelman, Daniel Pérez-Cabo:
No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples with Applications to CAPTCHA. IACR Cryptol. ePrint Arch. 2016: 336 (2016) - 2015
- [j47]David J. Barnes, Julio C. Hernandez-Castro
:
On the limits of engine analysis for cheating detection in chess. Comput. Secur. 48: 58-73 (2015) - [j46]Thomas Sloan, Julio C. Hernandez-Castro
:
Steganalysis of OpenPuff through atomic concatenation of MP4 flags. Digit. Investig. 13: 15-21 (2015) - [j45]Ana Lucila Sandoval Orozco
, Luis Javier García-Villalba, David Manuel Arenas González, Jocelin Rosales Corripio, Julio C. Hernandez-Castro
, Stuart James Gibson:
Smartphone image acquisition forensics using sensor fingerprint. IET Comput. Vis. 9(5): 723-731 (2015) - [j44]Ana Lucila Sandoval Orozco
, David Manuel Arenas González, Luis Javier García-Villalba
, Julio César Hernández Castro
:
Analysis of errors in exif metadata on mobile devices. Multim. Tools Appl. 74(13): 4735-4763 (2015) - [j43]Julio C. Hernandez-Castro, David L. Roberts
:
Automatic detection of potentially illegal online sales of elephant ivory via data mining. PeerJ Comput. Sci. 1: e10 (2015) - [j42]Thomas Sloan, Julio C. Hernandez-Castro:
Forensic analysis of video steganography tools. PeerJ Comput. Sci. 1: e7 (2015) - [i8]Thomas Sloan, Julio C. Hernandez-Castro:
Forensic analysis of video steganography tools. PeerJ Prepr. 3: e1019 (2015) - 2014
- [j41]Ana Lucila Sandoval Orozco
, David Manuel Arenas González, Jocelin Rosales Corripio, Luis Javier García-Villalba
, Julio César Hernández Castro
:
Source identification for mobile devices, based on wavelet transforms combined with sensor imperfections. Computing 96(9): 829-841 (2014) - [j40]David F. Barrero
, Julio César Hernández Castro
, Pedro Peris-Lopez
, David Camacho
, María Dolores Rodríguez-Moreno
:
A genetic tango attack against the David-Prasad RFID ultra-lightweight authentication protocol. Expert Syst. J. Knowl. Eng. 31(1): 9-19 (2014) - [j39]Masoumeh Safkhani
, Pedro Peris-Lopez
, Julio César Hernández Castro
, Nasour Bagheri
:
Cryptanalysis of the Cho et al. protocol: A hash-based RFID tag mutual authentication protocol. J. Comput. Appl. Math. 259: 571-577 (2014) - [c62]Gema Bello Orgaz, Julio C. Hernandez-Castro
, David Camacho
:
A Survey of Social Web Mining Applications for Disease Outbreak Detection. IDC 2014: 345-356 - 2013
- [j38]Omed S. Khalind, Julio C. Hernandez-Castro
, Benjamin Aziz
:
A study on the false positive rate of Stegdetect. Digit. Investig. 9(3-4): 235-245 (2013) - [j37]Pablo Picazo-Sanchez
, Lara Ortiz-Martin, Pedro Peris-Lopez
, Julio César Hernández Castro
:
Cryptanalysis of the RNTS system. J. Supercomput. 65(2): 949-960 (2013) - [c61]Jocelin Rosales Corripio, David Manuel Arenas González, Ana Lucila Sandoval Orozco, Luis Javier García-Villalba, Julio C. Hernandez-Castro, Stuart James Gibson:
Source smartphone identification using sensor pattern noise and wavelet transform. ICDP 2013: 1-6 - [i7]Julio C. Hernandez-Castro, Jeremy Rossman:
Measuring Software Diversity, with Applications to Security. CoRR abs/1310.3307 (2013) - 2012
- [j36]Jorge Blasco Alís
, Julio César Hernández Castro
, Juan E. Tapiador
, Arturo Ribagorda:
Bypassing information leakage protection with trusted applications. Comput. Secur. 31(4): 557-568 (2012) - [j35]Julio César Hernández Castro
, Juan M. Estévez-Tapiador
, Pedro Peris-Lopez
, John A. Clark, El-Ghazali Talbi:
Metaheuristic Traceability Attack against SLMAP, an RFID Lightweight Authentication Protocol. Int. J. Found. Comput. Sci. 23(2): 543-553 (2012) - [j34]Jorge Blasco Alís
, Julio César Hernández Castro
, José María de Fuentes
, Benjamín Ramos:
A framework for avoiding steganography usage over HTTP. J. Netw. Comput. Appl. 35(1): 491-501 (2012) - [j33]Juan E. Tapiador
, Julio C. Hernandez-Castro
, Pedro Peris-Lopez
:
Online Randomization Strategies to Obfuscate User Behavioral Patterns. J. Netw. Syst. Manag. 20(4): 561-578 (2012) - [j32]Pedro Peris-Lopez
, Agustín Orfila, Esther Palomar
, Julio C. Hernandez-Castro
:
A secure distance-based RFID identification protocol with an off-line back-end database. Pers. Ubiquitous Comput. 16(3): 351-365 (2012) - [c60]Masoumeh Safkhani, Pedro Peris-Lopez
, Nasour Bagheri, Majid Naderi, Julio César Hernández Castro:
On the Security of Tan et al. Serverless RFID Authentication and Search Protocols. RFIDSec 2012: 1-19 - [c59]Masoumeh Safkhani
, Nasour Bagheri
, Pedro Peris-Lopez
, Aikaterini Mitrokotsa
, Julio C. Hernandez-Castro
:
Weaknesses in another Gen2-based RFID authentication protocol. RFID-TA 2012: 80-84 - [c58]Julio César Hernández Castro
, Pedro Peris-Lopez
, Masoumeh Safkhani
, Nasour Bagheri
, Majid Naderi:
Another Fallen Hash-Based RFID Authentication Protocol. WISTP 2012: 29-37 - 2011
- [j31]Emad Mabrouk
, Julio César Hernández Castro
, Masao Fukushima:
Prime number generation using memetic programming. Artif. Life Robotics 16(1): 53-56 (2011) - [j30]Pedro Peris-Lopez
, Julio C. Hernandez-Castro
, Juan E. Tapiador
, Jan C. A. van der Lubbe:
Cryptanalysis of an EPC Class-1 Generation-2 standard compliant authentication protocol. Eng. Appl. Artif. Intell. 24(6): 1061-1069 (2011) - [j29]Pedro Peris-Lopez
, Agustín Orfila, Julio C. Hernandez-Castro
, Jan C. A. van der Lubbe:
Flaws on RFID grouping-proofs. Guidelines for future sound protocols. J. Netw. Comput. Appl. 34(3): 833-845 (2011) - [c57]Julio César Hernández Castro, Pedro Peris-Lopez
, Jean-Philippe Aumasson:
On the Key Schedule Strength of PRESENT. DPM/SETOP 2011: 253-263 - [c56]Honorio Martín
, Enrique San Millán, Luis Entrena
, Julio César Hernández Castro, Pedro Peris-Lopez
:
AKARI-X: A pseudorandom number generator for secure lightweight systems. IOLTS 2011: 228-233 - [c55]Mohamad Merhi, Julio César Hernández Castro
, Pedro Peris-Lopez
:
Studying the pseudo random number generator of a low-cost RFID tag. RFID-TA 2011: 381-385 - [c54]Carlos Javier Hernández-Castro, Arturo Ribagorda, Julio César Hernández Castro:
On the Strength of Egglue and Other Logic CAPTCHAs. SECRYPT 2011: 157-167 - [i6]Juan E. Tapiador, Julio C. Hernandez-Castro, Pedro Peris-Lopez, John A. Clark:
Cryptanalysis of Song's advanced smart card based password authentication protocol. CoRR abs/1111.2744 (2011) - [i5]Masoumeh Safkhani, Pedro Peris-Lopez, Julio César Hernández Castro, Nasour Bagheri, Majid Naderi:
Cryptanalysis of Cho et al.'s Protocol, A Hash-Based Mutual Authentication Protocol for RFID Systems. IACR Cryptol. ePrint Arch. 2011: 331 (2011) - 2010
- [j28]Pedro Peris-Lopez
, Julio C. Hernandez-Castro
, Juan E. Tapiador
, Tieyan Li, Yingjiu Li:
Vulnerability analysis of RFID protocols for tag ownership transfer. Comput. Networks 54(9): 1502-1508 (2010) - [j27]Aikaterini Mitrokotsa
, Christos Dimitrakakis
, Pedro Peris-Lopez
, Julio César Hernández Castro
:
Reid et al.'s distance bounding protocol and mafia fraud attacks over noisy channels. IEEE Commun. Lett. 14(2): 121-123 (2010) - [j26]Pedro Peris-Lopez
, Tieyan Li, Julio C. Hernandez-Castro
:
Lightweight Props on the Weak Security of EPC Class-1 Generation-2 Standard. IEICE Trans. Inf. Syst. 93-D(3): 518-527 (2010) - [j25]Julio C. Hernandez-Castro, Juan E. Tapiador, Esther Palomar, Angel Romero-Gonzalex:
Blind Steganalysis of Mp3stego. J. Inf. Sci. Eng. 26(5): 1787-1799 (2010) - [c53]Pedro Peris-Lopez
, Julio César Hernández Castro
, Raphael C.-W. Phan
, Juan M. Estévez-Tapiador
, Tieyan Li:
Quasi-Linear Cryptanalysis of a Secure RFID Ultralightweight Authentication Protocol. Inscrypt 2010: 427-442 - [c52]David Robert White, Juan E. Tapiador
, Julio César Hernández Castro, John A. Clark:
Fine-Grained Timing Using Genetic Programming. EuroGP 2010: 325-336 - [c51]Carlos Javier Hernández-Castro, Jonathan D. Stainton-Ellis, Arturo Ribagorda, Julio César Hernández Castro:
Shortcomings in CAPTCHA Design and Implementation: Captcha2, a Commercial Proposal. INC 2010: 159-168 - [c50]Julio César Hernández Castro
, Pedro Peris-Lopez
, Raphael C.-W. Phan
, Juan M. Estévez-Tapiador
:
Cryptanalysis of the David-Prasad RFID Ultralightweight Authentication Protocol. RFIDSec 2010: 22-34 - [c49]Elena Castro Galán, Julio César Hernández Castro
, Almudena Alcaide, Arturo Ribagorda:
A Strong Authentication Protocol Based on Portable One-Time Dynamic URLs. Web Intelligence 2010: 682-685
2000 – 2009
- 2009
- [j24]Pedro Peris-Lopez
, Tieyan Li, Julio C. Hernandez-Castro
, Juan E. Tapiador
:
Practical attacks on a mutual authentication scheme under the EPC Class-1 Generation-2 standard. Comput. Commun. 32(7-10): 1185-1193 (2009) - [j23]Pedro Peris-Lopez
, Julio César Hernández Castro
, Juan M. Estévez-Tapiador
, Arturo Ribagorda:
LAMED - A PRNG for EPC Class-1 Generation-2 RFID specification. Comput. Stand. Interfaces 31(1): 88-97 (2009) - [j22]Pedro Peris-Lopez
, Julio César Hernández Castro
, Juan M. Estévez-Tapiador
, Arturo Ribagorda:
Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard. Comput. Stand. Interfaces 31(2): 372-380 (2009) - [j21]Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda:
An Ultra Light Authentication Protocol Resistant to Passive Attacks under the Gen-2 Specification. J. Inf. Sci. Eng. 25(1): 33-57 (2009) - [c48]Pedro Peris-Lopez
, Julio C. Hernandez-Castro
, Juan E. Tapiador
, Tieyan Li, Jan C. A. van der Lubbe:
Weaknesses in Two Recent Lightweight RFID Authentication Protocols. Inscrypt 2009: 383-392 - [c47]Julio C. Hernandez-Castro
, Juan E. Tapiador
, Pedro Peris-Lopez
, John A. Clark, El-Ghazali Talbi:
Metaheuristic traceability attack against SLMAP, an RFID lightweight authentication protocol. IPDPS 2009: 1-5 - [c46]Jorge Blasco Alís
, Julio César Hernández Castro
, Juan M. Estévez-Tapiador
, Arturo Ribagorda, Miguel A. Orellana-Quiros:
Steganalysis of Hydan. SEC 2009: 132-142 - [c45]Pedro Peris-Lopez
, Julio C. Hernandez-Castro
, Juan M. Estévez-Tapiador
, Enrique San Millán, Jan C. A. van der Lubbe:
Security Flaws in an Efficient Pseudo-Random Number Generator for Low-Power Environments. SEWCN 2009: 25-35 - [i4]Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Jan C. A. van der Lubbe:
Shedding Some Light on RFID Distance Bounding Protocols and Terrorist Attacks. CoRR abs/0906.4618 (2009) - [i3]Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan M. Estévez-Tapiador, Jan C. A. van der Lubbe:
Security Flaws in a Recent Ultralightweight RFID Protocol. CoRR abs/0910.2115 (2009) - 2008
- [j20]Esther Palomar
, Juan M. Estévez-Tapiador
, Julio César Hernández Castro
, Arturo Ribagorda:
Secure content access and replication in pure P2P networks. Comput. Commun. 31(2): 266-279 (2008) - [j19]Juan M. Estévez-Tapiador
, Almudena Alcaide, Julio César Hernández Castro
, Arturo Ribagorda:
Bayesian rational exchange. Int. J. Inf. Sec. 7(1): 85-100 (2008) - [j18]Almudena Alcaide, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda:
Cryptanalysis of Syverson's Rational Exchange Protocol. Int. J. Netw. Secur. 7(2): 151-156 (2008) - [j17]Juan M. Estévez-Tapiador, Julio César Hernández Castro, Pedro Peris-Lopez, Arturo Ribagorda:
Automated Design of Cryptographic Hash Schemes by Evolving Highly-Nonlinear Functions. J. Inf. Sci. Eng. 24(5): 1485-1504 (2008) - [j16]Javier Polimón, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda:
Automated design of a lightweight block cipher with Genetic Programming. Int. J. Knowl. Based Intell. Eng. Syst. 12(1): 3-14 (2008) - [j15]Juan M. Estévez-Tapiador
, Julio César Hernández Castro
, Almudena Alcaide, Arturo Ribagorda:
On the Distinguishability of Distance-Bounded Permutations in Ordered Channels. IEEE Trans. Inf. Forensics Secur. 3(2): 166-172 (2008) - [c44]Julio César Hernández Castro
, Juan M. Estévez-Tapiador
, Jean-Jacques Quisquater:
On the Salsa20 Core Function. FSE 2008: 462-469 - [c43]Julio César Hernández Castro
, Juan M. Estévez-Tapiador
, Arturo Ribagorda:
Non-standard Attacks against Cryptographic Protocols, with an Example over a Simplified Mutual Authentication Protocol. MCO 2008: 589-596 - [c42]Almudena Alcaide, Juan M. Estévez-Tapiador
, Julio César Hernández Castro
, Arturo Ribagorda:
Nature-Inspired Synthesis of Rational Protocols. PPSN 2008: 981-990 - [c41]Jorge Blasco Alís, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda Garnacho:
CSteg: Talking in C Code - Steganography of C Source Code in Text. SECRYPT 2008: 399-406 - [c40]Pedro Peris-Lopez
, Julio César Hernández Castro
, Juan M. Estévez-Tapiador
, Arturo Ribagorda:
Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol. WISA 2008: 56-68 - [i2]Julio César Hernández Castro, Juan M. Estévez-Tapiador, Pedro Peris-Lopez, Jean-Jacques Quisquater:
Cryptanalysis of the SASI Ultralightweight RFID Authentication Protocol with Modular Rotations. CoRR abs/0811.4257 (2008) - [i1]Juan M. Estévez-Tapiador, Almudena Alcaide, Julio César Hernández Castro, Arturo Ribagorda:
Cryptanalysis of the RSA-CEGD protocol. CoRR abs/0812.0686 (2008) - 2007
- [c39]Juan M. Estévez-Tapiador
, Julio César Hernández Castro
, John A. Clark:
Heuristic search for non-linear cryptanalytic approximations. IEEE Congress on Evolutionary Computation 2007: 3561-3568 - [c38]Esther Palomar
, Juan M. Estévez-Tapiador
, Julio César Hernández Castro
, Arturo Ribagorda:
Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security. DEXA Workshops 2007: 779-783 - [c37]Pedro Peris-Lopez
, Julio César Hernández Castro, Juan M. Estévez-Tapiador
, Arturo Ribagorda:
An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks. EUC Workshops 2007: 781-794 - [c36]Almudena Alcaide, Juan M. Estévez-Tapiador
, Julio César Hernández Castro
, Arturo Ribagorda:
Towards Automated Design of Multi-party Rational Exchange Security Protocols. Web Intelligence/IAT Workshops 2007: 387-390 - [c35]Juan M. Estévez-Tapiador
, John A. Clark, Julio César Hernández Castro:
Non-linear Cryptanalysis Revisited: Heuristic Search for Approximations to S-Boxes. IMACC 2007: 99-117 - [c34]Almudena Alcaide, Juan M. Estévez-Tapiador
, Julio César Hernández Castro, Arturo Ribagorda:
A Multi-party Rational Exchange Protocol. OTM Workshops (1) 2007: 42-43 - [c33]Esther Palomar
, Almudena Alcaide, Juan M. Estévez-Tapiador
, Julio César Hernández Castro:
Bayesian Analysis of Secure P2P Sharing Protocols. OTM Conferences (2) 2007: 1701-1717 - [c32]Pedro Peris-Lopez
, Julio C. Hernandez-Castro
, Juan M. Estévez-Tapiador
, Arturo Ribagorda:
Solving the Simultaneous Scanning Problem Anonymously: Clumping Proofs for RFID Tags. SECPerU 2007: 55-60 - 2006
- [j14]Julio César Hernández Castro:
Guest Editorial. J. Res. Pract. Inf. Technol. 38(1) (2006) - [j13]Julio César Hernández Castro, Ignacio Blasco-Lopez, Juan M. Estévez-Tapiador
, Arturo Ribagorda Garnacho:
Steganography in games: A general methodology and its application to the game of Go. Comput. Secur. 25(1): 64-71 (2006) - [c31]Julio C. Hernandez-Castro, Juan M. Estévez-Tapiador
, Arturo Ribagorda Garnacho, Benjamín Ramos Álvarez:
Wheedham: An Automatically Designed Block Cipher by means of Genetic Programming. IEEE Congress on Evolutionary Computation 2006: 192-199 - [c30]Esther Palomar, Juan M. Estévez-Tapiador
, Julio César Hernández Castro, Arturo Ribagorda:
A Protocol for Secure Content Distribution in Pure P2P Networks. DEXA Workshops 2006: 712-716 - [c29]Esther Palomar
, Juan M. Estévez-Tapiador
, Julio César Hernández Castro
, Arturo Ribagorda:
A P2P Content Authentication Protocol Based on Byzantine Agreement. ETRICS 2006: 60-72 - [c28]Almudena Alcaide, Juan M. Estévez-Tapiador
, Julio César Hernández Castro
, Arturo Ribagorda:
An Extended Model of Rational Exchange Based on Dynamic Games of Imperfect Information. ETRICS 2006: 396-408 - [c27]Esther Palomar
, Juan M. Estévez-Tapiador
, Julio César Hernández Castro, Arturo Ribagorda:
Security in P2P Networks: Survey and Research Directions. EUC Workshops 2006: 183-192 - [c26]César Estébanez, Julio César Hernández Castro, Arturo Ribagorda, Pedro Isasi
:
Evolving hash functions by means of genetic programming. GECCO 2006: 1861-1862 - [c25]Pedro Peris-Lopez
, Julio César Hernández Castro, Juan M. Estévez-Tapiador
, Arturo Ribagorda:
RFID Systems: A Survey on Security Threats and Proposed Solutions. PWC 2006: 159-170 - [c24]Pedro Peris-Lopez
, Julio César Hernández Castro, Juan M. Estévez-Tapiador
, Arturo Ribagorda:
EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags. OTM Workshops (1) 2006: 352-361 - [c23]Esther Palomar
, Juan M. Estévez-Tapiador
, Julio César Hernández Castro, Arturo Ribagorda:
Certificate-based Access Control in Pure P2P Networks. Peer-to-Peer Computing 2006: 177-184 - [c22]César Estébanez, Julio César Hernández Castro, Arturo Ribagorda, Pedro Isasi Viñuela
:
Finding State-of-the-Art Non-cryptographic Hashes with Genetic Programming. PPSN 2006: 818-827 - [c21]Carlos Lamenca-Martinez, Julio César Hernández Castro, Juan M. Estévez-Tapiador
, Arturo Ribagorda:
Lamar: A New Pseudorandom Number Generator Evolved by Means of Genetic Programming. PPSN 2006: 850-859 - [c20]Pedro Peris-Lopez
, Julio César Hernández Castro, Juan M. Estévez-Tapiador
, Arturo Ribagorda:
M2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags. UIC 2006: 912-923 - 2005
- [j12]Julio César Hernández Castro, José María Sierra, André Seznec, Antonio Izquierdo, Arturo Ribagorda:
The strict avalanche criterion randomness test. Math. Comput. Simul. 68(1): 1-7 (2005) - [j11]Yago Sáez
, Pedro Isasi Viñuela
, Javier Segovia
, Julio César Hernández Castro
:
Reference Chromosome to Overcome User Fatigue in IEC. New Gener. Comput. 23(2): 129-142 (2005) - [j10]Julio César Hernández Castro, Pedro Isasi Viñuela
:
Evolutionary Computation in Computer Security and Cryptography. New Gener. Comput. 23(3): 193-199 (2005) - [j9]Julio César Hernández Castro, Pedro Isasi Viñuela
:
New Results on the Genetic Cryptanalysis of TEA and Reduced-round Versions of XTEA. New Gener. Comput. 23(3): 233-243 (2005) - [c19]Antonio Izquierdo Manzanares, Joaquín Torres Márquez, Juan M. Estévez-Tapiador
, Julio César Hernández Castro:
Attacks on Port Knocking Authentication Mechanism. ICCSA (4) 2005: 1292-1300 - [c18]José María Sierra, Julio César Hernández Castro
, Eva Ponce, Jaime Manera:
Marketing on Internet Communications Security for Online Bank Transactions. ICCSA (4) 2005: 1301-1308 - [e2]Eduardo Fernández-Medina, Julio César Hernández Castro, Luis Javier García Castro:
Security in Information Systems, Proceedings of the 3rd International Workshop on Security in Information Systems, WOSIS 2005, In conjunction with ICEIS2005, Miami, USA, May 2005. INSTICC Press 2005, ISBN 972-8865-25-2 [contents] - 2004
- [j8]Pedro Isasi
, Julio César Hernández Castro:
Introduction to the Applications of Evolutionary Computation in Computer Security and Cryptography. Comput. Intell. 20(3): 445-449 (2004) - [j7]Julio César Hernández Castro
, Pedro Isasi
:
Finding Efficient Distinguishers for Cryptographic Mappings, with an Application to the Block Cipher TEA. Comput. Intell. 20(3): 517-525 (2004) - [j6]José María Sierra, Julio César Hernández Castro
, Narayana Jayaram, Arturo Ribagorda:
Low computational cost integrity for block ciphers. Future Gener. Comput. Syst. 20(5): 857-863 (2004) - [j5]Julio César Hernández Castro, Ignacio Blasco-Lopez, L. Javier García-Villalba:
Hiding Data in Games. J. Int. Comput. Games Assoc. 27(2): 96-101 (2004) - [j4]Julio César Hernández Castro
, José María Sierra, Arturo Ribagorda:
Beware of the Security Software. Inf. Secur. J. A Glob. Perspect. 12(6): 39-45 (2004) - [j3]Víctor Méndez Muñoz
, Julio César Hernández Castro
, Jesús Carretero
, Félix García:
Filtering Spam at E-Mail Server Level with Improved CRM114. Inf. Secur. J. A Glob. Perspect. 13(3): 48-55 (2004) - [c17]Julio César Hernández Castro, André Seznec, Pedro Isasi:
On the design of state-of-the-art pseudorandom number generators by means of genetic programming. IEEE Congress on Evolutionary Computation 2004: 1510-1516 - [c16]Julio César Hernández Castro, Pedro Isasi:
New results on the genetic cryptanalysis of TEA and reduced-round versions of XTEA. IEEE Congress on Evolutionary Computation 2004: 2124-2129 - [c15]Antonio Izquierdo, José María Sierra, Julio César Hernández Castro
, Arturo Ribagorda:
Security Issues in Network File Systems. ICCSA (1) 2004: 812-820 - [c14]José María Sierra, Julio César Hernández Castro
, Almudena Alcaide, Joaquín Torres Márquez:
Validating the Use of BAN LOGIC. ICCSA (1) 2004: 851-858 - [c13]Julio César Hernández Castro
, José María Sierra, André Seznec:
The SAC Test: A New Randomness Test, with Some Applications to PRNG Analysis. ICCSA (1) 2004: 960-967 - [c12]Cristóbal Luque del Arco-Calderón, Pedro Isasi Viñuela, Julio César Hernández Castro:
Forecasting Time Series by Means of Evolutionary Algorithms. PPSN 2004: 1061-1070 - [c11]Víctor Méndez Muñoz, Julio César Hernández Castro, Jesús Carretero, Félix García:
Filtering spam at e-mail server level with improved CRM114. WOSIS 2004: 207-216 - [c10]José María Sierra, Julio César Hernández Castro, Antonio Izquierdo, Arturo Ribagorda:
Secure Communications in Multi-Agent Systems Protecting KQML. WOSIS 2004: 305-313 - [e1]Eduardo Fernández-Medina, Julio César Hernández Castro, L. Javier García-Villalba:
Security In Information Systems, Proceedings of the 2nd International Workshop on Security In Information Systems, WOSIS 2004, In conjunction with ICEIS 2004, Porto, Portugal, April 2004. INSTICC Press 2004, ISBN 972-8865-07-4 [contents] - 2003
- [c9]Julio C. Hernandez-Castro
, Pedro Isasi
:
Finding efficient distinguishers for cryptographic mappings, with an application to the block cipher TEA. IEEE Congress on Evolutionary Computation 2003: 2189-2193 - [c8]Carlos Javier Hernández-Castro, L. Javier García-Villalba
, Julio César Hernández Castro, José María Sierra:
On MARS's s-boxes Strength against Linear Cryptanalysis. ICCSA (3) 2003: 79-83 - [c7]José María Sierra, Julio César Hernández Castro
, Eva Ponce, Arturo Ribagorda:
Protection of Multiagent Systems. ICCSA (3) 2003: 123-128 - [c6]Julio César Hernández Castro, Pedro Isasi
, Cristóbal Luque del Arco-Calderón:
Finding Efficient Nonlinear Functions by Means of Genetic Programming. KES 2003: 1192-1198 - 2002
- [c5]Julio César Hernández Castro
, José María Sierra, Pedro Isasi
, Arturo Ribagorda:
Genetic Cryptoanalysis of Two Rounds TEA. International Conference on Computational Science (3) 2002: 1024-1031 - 2001
- [j2]Julio César Hernández Castro
, José María Sierra, Arturo Ribagorda, Benjamín Ramos:
Search Engines as a Security Threat. Computer 34(10): 25-30 (2001) - [j1]Julio C. Hernandez-Castro
, Arturo Ribagorda, Pedro Isasi
, José M. Sierra:
Genetic Algorithms Can be Used to Obtain Good Linear Congruential Generators. Cryptologia 25(3): 213-229 (2001) - [c4]Julio César Hernández Castro
, José María Sierra, Arturo Ribagorda, Benjamín Ramos, J. Carlos Mex-Perera
:
Distinguishing TEA from a Random Permutation: Reduced Round Versions of TEA Do Not Have the SAC or Do Not Generate Random Numbers. IMACC 2001: 374-377 - [c3]David Sánchez, Agustín Orfila, Julio César Hernández Castro, José María Sierra:
Robust New Method in Frequency Domain Watermarking. ISC 2001: 166-182 - [c2]Julio César Hernández Castro, Eva María Cebrián, José María Sierra, Arturo Ribagorda, Benjamín Ramos:
Project WebOracle: Developing an advanced web server security assesment tool. WebNet 2001: 526-529 - [c1]Julio César Hernández Castro, José María Sierra, Arturo Ribagorda, Benjamín Ramos:
Search Engines as a security thread. WebNet 2001: 530-533
Coauthor Index
aka: Luis Javier García-Villalba
aka: Arturo Ribagorda Garnacho
aka: José M. Sierra
aka: Pedro Isasi

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:58 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint