Follow
Carlos-Miguel Legon-Perez
Carlos-Miguel Legon-Perez
Other namesC.M.Legon-Perez
University of Havana. Faculty of Mathematics and Computer Science. Researcher at the Cryptography
No verified email
Title
Cited by
Cited by
Year
Evolving nonlinear S-boxes with improved theoretical resilience to power attacks
A Freyre-Echevarría, I Martínez-Díaz, CML Pérez, G Sosa-Gómez, ...
IEEE Access 8, 202728-202737, 2020
312020
Measuring independence between statistical randomness tests by mutual information
JA Karell-Albo, CM Legón-Pérez, EJ Madarro-Capó, O Rojas, ...
Entropy 22 (7), 741, 2020
232020
Seguridad y usabilidad de los esquemas y técnicas de autenticación gráfica.
O Rodriguez Valdés, CM Legón, R Socorro Llanes
Revista Cubana de Ciencias Informáticas 12, 13-27, 2018
222018
Selecting an effective entropy estimator for short sequences of bits and bytes with maximum entropy
L Contreras Rodríguez, EJ Madarro-Capó, CM Legón-Pérez, O Rojas, ...
Entropy 23 (5), 561, 2021
122021
Evaluation of input—Output statistical dependence PRNGs by SAC
EJM Capó, OJ Cuellar, CML Pérez, GS Gómez
2016 International Conference on Software Process Improvement (CIMPS), 1-6, 2016
92016
Measuring Avalanche Properties on RC4 Stream Cipher Variants
EJ Madarro-Capó, CM Legón-Pérez, O Rojas, G Sosa-Gómez
Applied Sciences 11 (20), 9646, 2021
82021
Bit independence criterion extended to stream ciphers
EJ Madarro-Capó, CM Legón-Pérez, O Rojas, G Sosa-Gómez, ...
Applied Sciences 10 (21), 7668, 2020
82020
Patrones en el orden de los clics y su influencia en la debilidad de las claves en la técnica de autenticacion gráfica passpoints
OR Valdés, CM Legón, R Socorro, P Navarro
Serie Científica de la Universidad de las Ciencias Informáticas 12 (7), 37-47, 2019
72019
Information theory based evaluation of the RC4 stream cipher outputs
EJ Madarro-Capó, CM Legón-Pérez, O Rojas, G Sosa-Gómez
Entropy 23 (7), 896, 2021
62021
Test for detection of weak graphic passwords in passpoint based on the mean distance between points
JA Herrera-Macías, CM Legón-Pérez, L Suárez-Plasencia, ...
Symmetry 13 (5), 777, 2021
62021
Improved objective functions to search for 8× 8 bijective S-boxes with theoretical resistance against power attacks under hamming leakage models
I Martínez-Díaz, A Freyre-Echevarría, O Rojas, G Sosa-Gómez, ...
IEEE Access 10, 11886-11891, 2022
42022
Analysis of the number of sides of voronoi polygons in passpoint
L Suárez-Plasencia, JA Herrera-Macías, CM Legón-Pérez, ...
International Conference on Computer Science and Health Engineering, 184-200, 2020
42020
‘Acelerando el cálculo del orden de transparencia
IM Díaz, CM Legón
COMPUMAT. Sociedad Cubana de Matemática y Computación, 2017
42017
Detection of DIAG and LINE Patterns in PassPoints Graphical Passwords Based on the Maximum Angles of Their Delaunay Triangles
L Suárez-Plasencia, JA Herrera-Macías, CM Legón-Pérez, ...
Sensors 22 (5), 1987, 2022
32022
Effectiveness of Some Tests of Spatial Randomness in the Detection of Weak Graphical Passwords in Passpoint
JA Herrera-Macías, L Suárez-Plasencia, CM Legón-Pérez, ...
International Conference on Computer Science and Health Engineering, 173-183, 2020
32020
Search-Space Reduction for S-Boxes Resilient to Power Attacks
CM Legón-Pérez, R Sánchez-Muiña, D Miyares-Moreno, Y Bardaji-López, ...
Applied Sciences 11 (11), 4815, 2021
22021
Análisis comparativo de variantes de AES dinámico
HR Caballero, WR Gutiérrez, Y Bardagi, CM Legón
Facultad de Matemática y Computación, 2016
22016
Ataques a la caché y su aplicación al AES
CD González, CCML Pérez, CJAS Reyes
Facultad de Ingeniería Informática, 2014
22014
Local Search Trajectories over S-box space
I Martínez-Díaz, CM Legón-Pérez, O Rojas, G Sosa-Gómez, D Oliva
Journal of Information Security and Applications 69, 103272, 2022
12022
Probabilistic Evaluation of the Exploration–Exploitation Balance during the Search, Using the Swap Operator, for Nonlinear Bijective S-Boxes, Resistant to Power Attacks
CM Legón-Pérez, JA Menéndez-Verdecía, I Martínez-Díaz, ...
Information 12 (12), 509, 2021
12021
The system can't perform the operation now. Try again later.
Articles 1–20