{"id":108,"date":"2016-11-07T12:03:06","date_gmt":"2016-11-07T12:03:06","guid":{"rendered":"http:\/\/congresos.unileon.es\/plantilla\/?page_id=108"},"modified":"2025-04-01T10:14:52","modified_gmt":"2025-04-01T10:14:52","slug":"programa","status":"publish","type":"page","link":"https:\/\/congresos.unileon.es\/recsi2024\/programa\/","title":{"rendered":"Programa"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Secci\u00f3n&#8221; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row admin_label=&#8221;Fila&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221; width=&#8221;89.5%&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.17.6&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Nunito||||||||&#8221; text_font_size=&#8221;18px&#8221; custom_padding=&#8221;||0px|||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p class=\"comunicaciones\">Actas<\/p>\n<h2><\/h2>\n<p><span>Las actas de RECSI 2024 est\u00e1n publicadas por el Servicio de Publicaciones de la Universidad de Le\u00f3n.<br \/><\/span><span>Puedes descargarlas en este enlace: <\/span><a href=\"https:\/\/buleria.unileon.es\/handle\/10612\/24551\" target=\"_blank\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/buleria.unileon.es\/handle\/10612\/24551&amp;source=gmail&amp;ust=1743583631064000&amp;usg=AOvVaw0IGZS64LBNSLxmnMlx4KIx\" rel=\"noopener\">https:\/\/buleria.unileon.es\/handle\/10612\/24551<\/a><span>.<\/span>\u00a0<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.17.6&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Nunito||||||||&#8221; text_font_size=&#8221;18px&#8221; custom_padding=&#8221;||0px|||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p class=\"comunicaciones\">Localizaci\u00f3n<strong>\u00a0<\/strong><\/p>\n<p>Accede al mapa completo <a href=\"https:\/\/www.google.com\/maps\/d\/viewer?mid=1lyuqfFVPrW5L4TVTjUURsia3MVJtZzY&amp;ll=42.59750834192539%2C-5.574722450000009&amp;z=17\">aqu\u00ed<\/a><\/p>\n<p>[\/et_pb_text][et_pb_post_title meta=&#8221;off&#8221; admin_label=&#8221;T\u00edtulo de publicaci\u00f3n&#8221; module_class=&#8221;entry-title main_title&#8221; _builder_version=&#8221;4.16&#8243; title_all_caps=&#8221;off&#8221; background_color=&#8221;rgba(255,255,255,0)&#8221; parallax=&#8221;on&#8221; parallax_method=&#8221;off&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221; parallax_effect=&#8221;on&#8221; module_bg_color=&#8221;rgba(255,255,255,0)&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_post_title][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;Fila&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Texto&#8221; _builder_version=&#8221;4.17.6&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>Mi\u00e9rcoles 23 de Octubre<\/h1>\n<table border=\"1\" cellpadding=\"10\" cellspacing=\"0\" width=\"100%\" style=\"border-collapse: collapse;width: 100%;height: 3244px\">\n<tbody>\n<tr style=\"background-color: #f9e6e6\">\n<td width=\"25%\" style=\"width: 25%;text-align: center;height: 24px\">08:30-09:00<\/td>\n<td style=\"width: 74.9046%;height: 24px;text-align: center\">Registro<\/td>\n<\/tr>\n<tr style=\"background-color: #fdf2f2\">\n<td style=\"width: 25%;text-align: center;height: 24px\">09:00-09:30<\/td>\n<td style=\"width: 74.9046%;height: 24px;text-align: center\">Inauguraci\u00f3n<br \/><strong style=\"font-family: inherit;font-size: inherit;color: #ff0000\">Sal\u00f3n de Actos<\/strong><\/td>\n<\/tr>\n<tr style=\"background-color: #f9e6e6\">\n<td style=\"width: 25%;text-align: center;height: 120px\">09:30-10:30<\/td>\n<td style=\"width: 74.9046%;height: 120px;text-align: center\">Conferencia Plenaria<br \/><strong><strong><span style=\"font-family: inherit;font-size: inherit\">Sof\u00eda Cel\u00ed<br \/><\/span><\/strong><\/strong><strong style=\"font-family: inherit;font-size: inherit;color: #ff0000\">Sal\u00f3n de Actos<\/strong><\/td>\n<\/tr>\n<tr style=\"background-color: #fdf2f2\">\n<td style=\"width: 25%;text-align: center;height: 672px\">10:30-11:30<\/td>\n<td style=\"width: 74.9046%;height: 672px\">\n<table width=\"100%\" style=\"height: 388px;border: 3px solid #cccccc;border-collapse: collapse;width: 100%\">\n<tbody>\n<tr style=\"border-bottom: 2px solid #f5b7b7\">\n<td style=\"border-right: 2px solid #f5b7b7;height: 52px;text-align: center;width: 210.797px\"><b style=\"font-size: 1.1em\">X1 \u2013 Inteligencia artificial para la ciberseguridad<br \/><\/b><b style=\"color: #ff0000;font-family: inherit;font-size: 1.1em\">Sal\u00f3n de Actos<br \/><\/b>Chair: Miguel Carriegos<\/td>\n<td style=\"height: 52px;text-align: center;width: 210.812px\"><b style=\"font-size: 1.1em\">X2 \u2013 Blockchain<br \/><\/b><b style=\"color: #ff0000;font-family: inherit;font-size: 1.1em\">Aula A<br \/><\/b>Chair: Vanesa Daza<\/td>\n<\/tr>\n<tr style=\"border-bottom: 2px solid #f5b7b7\">\n<td style=\"border-right: 2px solid #f5b7b7;height: 120px;width: 210.797px\"><span style=\"font-size: 1em;font-weight: 500\">A summary of An effectiveness analysis of transfer learning for the concept drift problem in malware detection<\/span><br \/><small style=\"font-size: 0.85em;font-style: italic\"><span style=\"text-decoration: underline\">\u00c1ngel Luis Mu\u00f1oz Casta\u00f1eda<\/span>, David Escudero Garc\u00eda and Noem\u00ed DeCastro-Garc\u00eda<\/small><\/td>\n<td style=\"height: 120px;width: 210.812px\"><span style=\"font-size: 1em;font-weight: 500\">Identifying digital certificate revocation using Bitcoin<\/span><br \/><small style=\"font-size: 0.85em;font-style: italic\">Crist\u00f2fol Daud\u00e9n-Esmel, Jordi Castell\u00e0-Roca, <span style=\"text-decoration: underline\">Jordi Herrera-Joancomart\u00ed<\/span> and Alexandre Viejo<\/small><\/td>\n<\/tr>\n<tr style=\"border-bottom: 2px solid #f5b7b7\">\n<td style=\"border-right: 2px solid #f5b7b7;height: 120px;width: 210.797px\"><span style=\"font-size: 1em;font-weight: 500\">T\u00e9cnicas de Machine Learning para la detecci\u00f3n de ciberataques en redes IoT m\u00e9dicas<\/span><br \/><small style=\"font-size: 0.85em;font-style: italic\">Antonio Alarc\u00f3n, Olga Le\u00f3n, Josep Pegueroles and <span style=\"text-decoration: underline\">Jordi Dom\u00e9nech<\/span><\/small><\/td>\n<td style=\"height: 120px;width: 210.812px\"><span style=\"font-size: 1em;font-weight: 500\">Confidential Certified Notification Protocol using RejSBTs and Identity-based Cryptography<\/span><br \/><small style=\"font-size: 0.85em;font-style: italic\">Miquel \u00c0. Cabot-Nadal, Maci\u00e0 Mut-Puigserver, Maria Magdalena Payeras-Capell\u00e0, Rosa Peric\u00e0s-Gornals and <span style=\"text-decoration: underline\">Jaume Ramis-Bibiloni<\/span><\/small><\/td>\n<\/tr>\n<tr style=\"border-bottom: 2px solid #f5b7b7\">\n<td style=\"border-right: 2px solid #f5b7b7;height: 96px;width: 210.797px\"><span style=\"font-size: 1em;font-weight: 500\">Confiabilidad en sistemas AIoT<\/span><br \/><small style=\"font-size: 0.85em;font-style: italic\"><span style=\"text-decoration: underline\">Carlos Mario Braga Ortu\u00f1o<\/span>, Manuel A. Serrano and Eduardo Fern\u00e1ndez-Medina<\/small><\/td>\n<td style=\"height: 96px;width: 210.812px\"><span style=\"font-size: 1em;font-weight: 500\">DA2Wa: Un protocolo de emparejamiento seguro entre DApp y wallet para el escenario blockchain<\/span><br \/><small style=\"font-size: 0.85em;font-style: italic\">Fernando Rom\u00e1n-Garc\u00eda, <span style=\"text-decoration: underline\">Antonio Alarc\u00f3n<\/span>, Juan Hern\u00e1ndez-Serrano and Oscar Esparza<\/small><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<tr style=\"background-color: #f9e6e6\">\n<td style=\"width: 25%;text-align: center;height: 24px\">11:30-12:00<\/td>\n<td style=\"width: 74.9046%;text-align: center;height: 24px\">Coffee Break<\/td>\n<\/tr>\n<tr style=\"background-color: #fdf2f2\">\n<td style=\"width: 25%;text-align: center;height: 1044px\">12:00-14:00<\/td>\n<td style=\"width: 74.9046%;height: 1044px\">\n<table width=\"100%\" style=\"height: 676px;border: 3px solid #cccccc;border-collapse: collapse;width: 100%\">\n<tbody>\n<tr style=\"border-bottom: 2px solid #f5b7b7\">\n<td style=\"border-right: 2px solid #f5b7b7;height: 52px;width: 49.2647%;text-align: center\"><b style=\"font-size: 1.1em\">X3 \u2013 Secuencias y c\u00f3digos<br \/><\/b><b style=\"font-size: 1.1em\"><span style=\"color: #ff0000\">Sal\u00f3n de Actos<br \/><\/span><\/b><span style=\"color: #ff0000\"><\/span>Chair: Noem\u00ed de Castro<\/td>\n<td style=\"height: 52px;width: 50.2451%;text-align: center\"><b style=\"font-size: 1.1em\">X4- Regulaci\u00f3n y Ciberseguridad<br \/><\/b><b style=\"font-size: 1.1em\"><span style=\"color: #ff0000\">Aula A<br \/><\/span><\/b>Chair: Jordi Herrera-Joancomart\u00ed<\/td>\n<\/tr>\n<tr style=\"border-bottom: 2px solid #f5b7b7\">\n<td style=\"border-right: 2px solid #f5b7b7;height: 120px;width: 49.2647%\"><span style=\"font-size: 1em;font-weight: 500\">Clasificaci\u00f3n de c\u00f3digos grupo binarios de longitud menor que 24<br \/><small style=\"font-size: 0.85em;font-style: italic\"><em>Beatriz Garc\u00eda Garc\u00eda <\/em>and <span style=\"text-decoration: underline\">Ignacio Fern\u00e1ndez R\u00faa<\/span><\/small><\/span><\/td>\n<td style=\"height: 120px;width: 50.2451%\"><span style=\"font-size: 1em;font-weight: 500\">Dise\u00f1o de una Estrategia Probabil\u00edstica de Defensa de Objetivo M\u00f3vil para Manejar Ataques contra Nodos de Red con M\u00faltiples Recursos<\/span><br \/><small style=\"font-size: 0.85em;font-style: italic\"><span style=\"text-decoration: underline\">Jamil Ahmad Kassem<\/span>, Helena Rif\u00e0-Pous and Joaquin Garcia-Alfaro<\/small><\/td>\n<\/tr>\n<tr style=\"border-bottom: 2px solid #f5b7b7\">\n<td style=\"border-right: 2px solid #f5b7b7;height: 120px;width: 49.2647%\"><span style=\"font-size: 1em;font-weight: 500\">Descodificaci\u00f3n por permutaci\u00f3n en c\u00f3digos grupos<br \/><span style=\"text-decoration: underline\"><small style=\"font-size: 0.85em;font-style: italic\">Fabi\u00e1n Molina<\/small><\/span><\/span><\/td>\n<td style=\"height: 120px;width: 50.2451%\"><span style=\"font-size: 1em;font-weight: 500\">Leveraging a Smart Grid Framework for Interoperability with a Distributed Ecosystem<\/span><br \/><small style=\"font-size: 0.85em;font-style: italic\">Joan Ferr\u00e9-Queralt, <span style=\"text-decoration: underline\">Farzana Kabir<\/span>, David Meg\u00edas, Alexandre Viejo and Jordi Castell\u00e0-Roca<\/small><\/td>\n<\/tr>\n<tr style=\"border-bottom: 2px solid #f5b7b7\">\n<td style=\"border-right: 2px solid #f5b7b7;height: 96px;width: 49.2647%\"><span style=\"font-size: 1em;font-weight: 500\">A toolbox for the design of non-binary pseudorandom sequence generators for IoT<\/span><br \/><span style=\"text-decoration: underline\"><small style=\"font-size: 0.85em;font-style: italic\">Slobodan Petrovic<\/small><\/span><\/td>\n<td style=\"height: 96px;width: 50.2451%\">Open Source API for a Hardware Root-of-Trust<br \/><small style=\"font-size: 0.85em;font-style: italic\"><span style=\"text-decoration: underline\">Eros Camacho Ruiz<\/span>, Felipe Rojas, Apurba Karmakar, Pablo Navarro Torrero, Piedad Brox and Macarena C. Mart\u00ednez-Rodr\u00edguez<\/small><\/td>\n<\/tr>\n<tr style=\"border-bottom: 2px solid #f5b7b7\">\n<td style=\"border-right: 2px solid #f5b7b7;height: 96px;width: 49.2647%\">Almost Bent functions for Hadamard matrices and APN functions<br \/><span style=\"text-decoration: underline\"><small style=\"font-size: 0.85em;font-style: italic\">Jos\u00e9 Andr\u00e9s Armario<\/small><\/span><\/td>\n<td style=\"height: 96px;width: 50.2451%\">Herramienta web para evaluar cualquier modelo y un nuevo modelo con enfoque DevSecOps<br \/><small style=\"font-size: 0.85em;font-style: italic\">Javier Alonso, Mohammadhossein Homaei, Agust\u00edn Di Bartolo, Mar\u00eda Mar \u00c1vlia Vegas and <span style=\"text-decoration: underline\">Andres Caro<\/span><\/small><\/td>\n<\/tr>\n<tr style=\"border-bottom: 2px solid #f5b7b7\">\n<td style=\"border-right: 2px solid #f5b7b7;height: 96px;width: 49.2647%\"><span style=\"font-size: 1em;font-weight: 500\">Representaci\u00f3n booleana de secuencias binarias<\/span><br \/><small style=\"font-size: 0.85em;font-style: italic\">Sara D. Cardell, Amparo F\u00faster-Sabater and <span style=\"text-decoration: underline\">Ver\u00f3nica Requena<\/span><\/small><\/td>\n<td style=\"height: 96px;width: 50.2451%\">Raspberry Robin: Desenmascarando al Threat Actor a trav\u00e9s del an\u00e1lisis de su infraestructura<br \/><small style=\"font-size: 0.85em;font-style: italic\"><span style=\"text-decoration: underline\">Alejandro Garc\u00eda Mu\u00f1oz<\/span> and Alberto Peinado Dom\u00ednguez<\/small><\/td>\n<\/tr>\n<tr style=\"border-bottom: 2px solid #f5b7b7\">\n<td style=\"border-right: 2px solid #f5b7b7;height: 96px;width: 49.2647%\">Secuencias binarias y c\u00f3digos lineales<br \/><small style=\"font-size: 0.85em;font-style: italic\">Sara D. Cardell, Joan-Josep Climent and <span style=\"text-decoration: underline\">Ver\u00f3nica Requena<\/span><\/small><\/td>\n<td style=\"height: 96px;width: 50.2451%\">C\u00f3mo votar electr\u00f3nicamente sin una autoridad central: papeletas distribuidas y seguridad por suspicacia<br \/><small style=\"font-size: 0.85em;font-style: italic\"><span style=\"text-decoration: underline\">Jos\u00e9 Luis Martin-Navarro<\/span>, Antonio M. Larriba and Dami\u00e1n L\u00f3pez<\/small><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<tr style=\"background-color: #f9e6e6\">\n<td style=\"width: 25%;text-align: center;height: 120px\">14:00-16:00<\/td>\n<td style=\"width: 74.9046%;text-align: center;height: 120px\">Comida<br \/><span style=\"color: #ff0000\"><strong>Restaurante El Modernista<br \/><\/strong>Plaza de San Marcelo, 5<\/span><\/td>\n<\/tr>\n<tr style=\"background-color: #fdf2f2\">\n<td style=\"width: 25%;text-align: center;height: 928px\">16:00-18:30<\/td>\n<td style=\"width: 74.9046%;height: 928px\">\n<table width=\"100%\" style=\"border: 3px solid #cccccc;border-collapse: collapse;width: 100%\">\n<tbody>\n<tr style=\"border-bottom: 2px solid #f5b7b7\">\n<td style=\"border-right: 2px solid #f5b7b7;width: 378.125px;text-align: center\"><b style=\"font-size: 1.1em\">X5 \u2013 Protocolos criptogr\u00e1ficos<br \/><\/b><b style=\"font-size: 1.1em\"><span style=\"color: #ff0000\">Sal\u00f3n de Actos<br \/><\/span><\/b>Chair: Ver\u00f3nica Requena<\/td>\n<td style=\"width: 378.125px;text-align: center\"><b style=\"font-size: 1.1em\">X6 \u2013 Blockchain<br \/><\/b><b style=\"font-size: 1.1em\"><span style=\"color: #ff0000\">Aula A<br \/><\/span><\/b><span style=\"color: #ff0000\"><\/span>Chair: Maribel Gonz\u00e1lez Vasco<\/td>\n<\/tr>\n<tr style=\"border-bottom: 2px solid #f5b7b7\">\n<td style=\"border-right: 2px solid #f5b7b7;width: 378.125px\"><span style=\"font-size: 1em;font-weight: 500\">Subgroup membership testing on elliptic curves via the Tate pairing<\/span><br \/><span style=\"text-decoration: underline\"><small style=\"font-size: 0.85em;font-style: italic\">Dmitrii Koshelev<\/small><\/span><\/td>\n<td style=\"width: 378.125px\"><span style=\"font-size: 1em;font-weight: 500\">Implementaci\u00f3n de un sistema de gesti\u00f3n segura de campa\u00f1as de cupones<\/span><br \/><small style=\"font-size: 0.85em;font-style: italic\"><span style=\"text-decoration: underline\">Gerardo-Francisco Ch\u00e9vez-Alvarado<\/span>, M. Francisca Hinarejos, Josep Lluis Ferrer Gomila and Andreu Pere Isern Dey\u00e0<\/small><\/td>\n<\/tr>\n<tr style=\"border-bottom: 2px solid #f5b7b7\">\n<td style=\"border-right: 2px solid #f5b7b7;width: 378.125px\"><span style=\"font-size: 1em;font-weight: 500\">On Sigma Protocols and (packed) Black-Box Secret Sharing Schemes<br \/><small style=\"font-size: 0.85em;font-style: italic;line-height: 1.1\"><i>Claudia Bartoli and <span style=\"text-decoration: underline\">Ignacio Cascudo<\/span><\/i><\/small><\/span><\/td>\n<td style=\"width: 378.125px\"><span style=\"font-size: 1em;font-weight: 500\">Protocolo de firma de contratos en dos pasos<\/span><br \/><small style=\"font-size: 0.85em;font-style: italic\"><span style=\"text-decoration: underline\">Rosa Peric\u00e0s Gornals<\/span>, M. Magdalena Payeras-Capell\u00e0, Maci\u00e0 Mut-Puigserver and Jaume Ramis Bibiloni<\/small><\/td>\n<\/tr>\n<tr style=\"border-bottom: 2px solid #f5b7b7\">\n<td style=\"border-right: 2px solid #f5b7b7;width: 378.125px\"><span style=\"font-size: 1em;font-weight: 500\">Un esquema de autenticaci\u00f3n gr\u00e1fica basado en cuadrados latinos<\/span><br \/><small style=\"font-size: 0.85em;font-style: italic\"><span style=\"text-decoration: underline\">Ra\u00fal M. Falc\u00f3n<\/span>, V\u00edctor \u00c1lvarez, J. Andr\u00e9s Armario, M. Dolores Frau, Manuel Gonz\u00e1lez-Regadera, F\u00e9lix Gudiel and M. Bel\u00e9n G\u00fcemes<\/small><\/td>\n<td style=\"width: 378.125px\"><span style=\"font-size: 1em;font-weight: 500\">Ataques de incumplimiento de contrato en la Lightning Network<br \/><small style=\"font-size: 0.85em;font-style: italic\"><span style=\"text-decoration: underline\">Pol Espinasa-Vilarrasa<\/span> and Cristina P\u00e9rez-Sol\u00e0<\/small><\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<tr style=\"background-color: #f9e6e6;height: 24px\">\n<td style=\"width: 25%;text-align: center;height: 24px\">17:00-17:30<\/td>\n<td style=\"width: 74.9046%;text-align: center;height: 24px\">Coffee Break<\/td>\n<\/tr>\n<tr style=\"background-color: #fdf2f2\">\n<td style=\"width: 25%;text-align: center;height: 928px\">17:30-18:10<\/td>\n<td style=\"width: 74.9046%;height: 928px\">\n<table width=\"100%\" style=\"border: 3px solid #cccccc;border-collapse: collapse;width: 100%\">\n<tbody>\n<tr style=\"border-bottom: 2px solid #f5b7b7\">\n<td style=\"border-right: 2px solid #f5b7b7;width: 378.125px;text-align: center\"><b style=\"font-size: 1.1em\">X5 \u2013 Protocolos criptogr\u00e1ficos<br \/><\/b><b style=\"font-size: 1.1em\"><span style=\"color: #ff0000\">Sal\u00f3n de Actos<br \/><\/span><\/b>Chair: Ver\u00f3nica Requena<\/td>\n<td style=\"width: 378.125px;text-align: center\"><b style=\"font-size: 1.1em\">X6 \u2013 Blockchain<br \/><\/b><b style=\"font-size: 1.1em\"><span style=\"color: #ff0000\">Aula A<br \/><\/span><\/b><span style=\"color: #ff0000\"><\/span>Chair: Maribel Gonz\u00e1lez Vasco<\/td>\n<\/tr>\n<tr style=\"border-bottom: 2px solid #f5b7b7\">\n<td style=\"border-right: 2px solid #f5b7b7;width: 378.125px\">Finding secure communication channels via rainbow antimagic coloring of m-splitting graphs of paths<br \/><small style=\"font-size: 0.85em;font-style: italic\"><span style=\"text-decoration: underline\">Ra\u00fal Falc\u00f3n<\/span>, K. Abirami, Nagaraj Mohanapriya and Dafik Dafik<\/small><\/td>\n<td style=\"width: 378.125px\">Un Marketplace Descentralizado de Datos Privados usando Blockchain y Computaci\u00f3n Multi-Parte Segura<br \/><small style=\"font-size: 0.85em;font-style: italic\"><span style=\"text-decoration: underline\">Julen Bernab\u00e9 Rodr\u00edguez<\/span>, Albert Garreta and Oscar Lage<\/small><\/td>\n<\/tr>\n<tr style=\"border-bottom: 2px solid #f5b7b7\">\n<td style=\"border-right: 2px solid #f5b7b7;width: 378.125px\">Disclosure of attacking coalition cardinality in multimedia fingerprinting<br \/><small style=\"font-size: 0.85em;font-style: italic\"><span style=\"text-decoration: underline\">Marcel Fern\u00e1ndez Mu\u00f1oz<\/span>, Grigory Kabatiansky and Sebasti\u00e0 Mart\u00edn Mollev\u00ed<\/small><\/td>\n<td style=\"width: 378.125px\">Cryptographic protocols for Digital Rights Management using Proof of Download Blockchains<br \/><small style=\"font-size: 0.85em;font-style: italic\">Jo\u00e3o Tito Do Nascimento Silva, Felipe Z. da N. Costa and <span style=\"text-decoration: underline\">Jo\u00e3o Gondim<\/span><\/small><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<tr style=\"background-color: #f9e6e6\">\n<td style=\"width: 25%;text-align: center;height: 24px\">18:15-20:00<\/td>\n<td style=\"width: 74.9046%;text-align: center;height: 24px\">Visita a Le\u00f3n y Catedral<\/td>\n<\/tr>\n<tr style=\"background-color: #fdf2f2\">\n<td style=\"width: 25%;text-align: center;height: 120px\">21:00<\/td>\n<td style=\"width: 74.9046%;text-align: center;height: 120px\">Cocktail de bienvenida<br \/><span style=\"color: #ff0000\"><strong>Restaurante Real Colegiata de San Isidoro<br \/><\/strong>Plaza San Martino, 5<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h1>Jueves 24 de Octubre<\/h1>\n<table border=\"1\" cellpadding=\"10\" cellspacing=\"0\" width=\"100%\" style=\"border-collapse: collapse;height: 2656px;width: 100%\">\n<tbody>\n<tr style=\"background-color: #f9e6e6\">\n<td width=\"25%\" style=\"text-align: center;height: 120px;width: 25%\">09:00-10:00<\/td>\n<td style=\"text-align: center;height: 120px;width: 74.9169%\">Conferencia Plenaria<br \/><strong>Javier Lopez<br \/><\/strong><strong style=\"color: #ff0000;font-family: inherit;font-size: inherit\">Sal\u00f3n de Actos<\/strong><\/td>\n<\/tr>\n<tr style=\"background-color: #fdf2f2\">\n<td style=\"text-align: center;height: 820px;width: 25%\">10:00-11:30<\/td>\n<td style=\"height: 820px;width: 74.9169%\">\n<table width=\"100%\" style=\"height: 751px;border: 3px solid #cccccc;border-collapse: collapse;width: 100%\">\n<tbody>\n<tr style=\"border-bottom: 2px solid #f5b7b7\">\n<td width=\"50%\" style=\"border-right: 2px solid #f5b7b7;text-align: center;height: 79px\"><b style=\"font-size: 1.1em\">J1 \u2013 Criptograf\u00eda Post-cu\u00e1ntica<br \/><\/b><b style=\"font-size: 1.1em\"><span style=\"color: #ff0000\"><strong>Sal\u00f3n de Actos<br \/><\/strong><\/span><\/b>Chair: Mar\u00eda Isabel Gonzalez Vasco<\/td>\n<td width=\"50%\" style=\"text-align: center;height: 79px\"><b style=\"font-size: 1.1em\">J2 \u2013 IoT<br \/><\/b><b style=\"font-size: 1.1em\"><span style=\"color: #ff0000\"><strong>Aula A<br \/><\/strong><\/span><\/b>Chair: Urko Zurutuza<\/td>\n<\/tr>\n<tr style=\"border-bottom: 2px solid #f5b7b7\">\n<td style=\"border-right: 2px solid #f5b7b7;height: 192px\"><span style=\"font-size: 1em;font-weight: 500;font-family: 'Arial', sans-serif\">A Comprehensive Journey throughout the Development of Post-Quantum Cryptography<\/span><br \/><small style=\"font-size: 0.85em;font-style: italic;line-height: 1.1\"><i><span style=\"text-decoration: underline\">Rodrigo Mart\u00edn S\u00e1nchez-Ledesma<\/span>, Iv\u00e1n Blanco Chac\u00f3n and Ra\u00fal Dur\u00e1n D\u00edaz<\/i><\/small><\/td>\n<td style=\"height: 192px\"><span style=\"font-size: 1em;font-weight: 500;font-family: 'Arial', sans-serif\">Generaci\u00f3n de claves compartidas basadas en propiedades f\u00edsicas para dispositivos IoT: una prueba de concepto<\/span><br \/><small style=\"font-size: 0.85em;font-style: italic;line-height: 1.1\"><i><span style=\"text-decoration: underline\">Lamine Syne<\/span>, Maria Candeleria Hernandez Goya, Pino Caballero-Gil and Hector Reboso Morales<\/i><\/small><\/td>\n<\/tr>\n<tr style=\"border-bottom: 2px solid #f5b7b7\">\n<td style=\"border-right: 2px solid #f5b7b7;height: 144px\"><span style=\"font-size: 1em;font-weight: 500;font-family: 'Arial', sans-serif\">Ataque de puerta trasera cleptogr\u00e1fica contra CRYSTALS-Dilithium<\/span><br \/><small style=\"font-size: 0.85em;font-style: italic;line-height: 1.1\"><i><span style=\"text-decoration: underline\">\u00c9dgar P\u00e9rez-Ramos<\/span>, Pino Caballero-Gil and H\u00e9ctor Reboso-Morales<\/i><\/small><\/td>\n<td style=\"height: 144px\"><span style=\"font-size: 1em;font-weight: 500;font-family: 'Arial', sans-serif\">Leveraging the Resources of Modern FPGAs in the Design of High-Performance Masked Architectures<\/span><br \/><small style=\"font-size: 0.85em;font-style: italic;line-height: 1.1\"><i>Vincent Grosso and <span style=\"text-decoration: underline\">Carlos Andres Lara Nino<\/span><\/i><\/small><\/td>\n<\/tr>\n<tr style=\"border-bottom: 2px solid #f5b7b7\">\n<td style=\"border-right: 2px solid #f5b7b7;height: 168px\"><span style=\"font-size: 1em;font-weight: 500;font-family: 'Arial', sans-serif\">A Quantum-Resistant Implementation of a Digital Cash System with Valued and no-Valued e-Coins<\/span><br \/><small style=\"font-size: 0.85em;font-style: italic;line-height: 1.1\"><i>Josep M. Miret, Francesc Sebe and <span style=\"text-decoration: underline\">Sergi Sim\u00f3n<\/span><\/i><\/small><\/td>\n<td style=\"height: 168px\"><span style=\"font-size: 1em;font-weight: 500;font-family: 'Arial', sans-serif\">Desarrollo de una plataforma para la evaluaci\u00f3n de protocolos de seguridad descentralizados en IoT<\/span><br \/><small style=\"font-size: 0.85em;font-style: italic;line-height: 1.1\"><i>Ana Isabel G\u00f3mez, Santiago Arias Paniagua, Cristian Gonz\u00e1lez Garc\u00eda and <span style=\"text-decoration: underline\">Domingo G\u00f3mez P\u00e9rez<\/span><\/i><\/small><\/td>\n<\/tr>\n<tr style=\"border-bottom: 2px solid #f5b7b7\">\n<td style=\"border-right: 2px solid #f5b7b7;height: 168px\"><span style=\"font-size: 1em;font-weight: 500;font-family: 'Arial', sans-serif\">Intercambio de clave poscu\u00e1ntico autenticado en entornos IoT mediante LoRa\/LoRaWAN<\/span><br \/><small style=\"font-size: 0.85em;font-style: italic;line-height: 1.1\"><i>Rodolfo Sumoza Matos, Esteban Eduardo Mocskos and <span style=\"text-decoration: underline\">Ra\u00fal Dur\u00e1n D\u00edaz<\/span><\/i><\/small><\/td>\n<td style=\"height: 168px\"><span style=\"font-size: 1em;font-weight: 500;font-family: 'Arial', sans-serif\">Evaluaci\u00f3n del rendimiento de la familia ASCON en dispositivos de bajos recursos<\/span><br \/><small style=\"font-size: 0.85em;font-style: italic;line-height: 1.1\"><i><span style=\"text-decoration: underline\">Diego Jos\u00e9 Abeng\u00f3zar Vilar<\/span> and Carmen S\u00e1nchez \u00c1vila<\/i><\/small><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<tr style=\"background-color: #f9e6e6\">\n<td style=\"text-align: center;height: 24px;width: 25%\">11:30-12:00<\/td>\n<td style=\"text-align: center;height: 24px;width: 74.9169%\">Coffee Break<\/td>\n<\/tr>\n<tr style=\"background-color: #fdf2f2\">\n<td style=\"text-align: center;height: 1236px;width: 25%\">12:00-14:00<\/td>\n<td style=\"height: 1236px;width: 74.9169%\">\n<table style=\"border: 3px solid #ccc;border-collapse: collapse\">\n<tbody>\n<tr style=\"border-bottom: 2px solid #f5b7b7\">\n<td style=\"border-right: 2px solid #f5b7b7;text-align: center;width: 163.475px\"><b style=\"font-size: 1.1em\">J3 \u2013 Protocolos criptogr\u00e1ficos<br \/><\/b><b style=\"font-size: 1.1em\"><span style=\"color: #ff0000\"><strong>Sal\u00f3n de Actos<br \/><\/strong><\/span><\/b>Chair: Ra\u00fal Dur\u00e1n<\/td>\n<td style=\"text-align: center;width: 162.525px\"><b style=\"font-size: 1.1em\">J4 \u2013 Privacidad<br \/><\/b><b style=\"font-size: 1.1em\"><span style=\"color: #ff0000\"><strong>Aula A<br \/><\/strong><\/span><\/b>Chair: Margarita Robles<\/td>\n<\/tr>\n<tr style=\"border-bottom: 2px solid #f5b7b7\">\n<td style=\"border-right: 2px solid #f5b7b7;width: 163.475px\"><span style=\"font-size: 1em;font-weight: 500;font-family: 'Arial', sans-serif\">Unmasking the Illusion: The Shortcomings of &#8220;Zero-Knowledge&#8221; Rollups in Achieving Scalability<\/span><br \/><small style=\"font-size: 0.85em;font-style: italic;line-height: 1.1\"><i><span style=\"text-decoration: underline\">Adri\u00e0 Torralba-Agell<\/span>, Ghazaleh Keshavarzkalhori, Cristina P\u00e9rez-Sol\u00e0, David Meg\u00edas and Jordi Herrera-Joancomart\u00ed<\/i><\/small><\/td>\n<td style=\"width: 162.525px\"><span style=\"font-size: 1em;font-weight: 500;font-family: 'Arial', sans-serif\">Enhanced Security and Privacy via Fragmented Federated Learning<\/span><br \/><small style=\"font-size: 0.85em;font-style: italic;line-height: 1.1\"><i><span style=\"text-decoration: underline\">Najeeb Jebreel<\/span>, Josep Domingo-Ferrer, Alberto Blanco-Justicia and David Sanchez<\/i><\/small><\/td>\n<\/tr>\n<tr style=\"border-bottom: 2px solid #f5b7b7\">\n<td style=\"border-right: 2px solid #f5b7b7;width: 163.475px\"><span style=\"font-size: 1em;font-weight: 500;font-family: 'Arial', sans-serif\">Verifiable Fully Homomorphic Encryption: Achievements and Hurdles Ahead<\/span><br \/><small style=\"font-size: 0.85em;font-style: italic;line-height: 1.1\"><i>Vanesa Daza, <span style=\"text-decoration: underline\">\u00c1lvaro Montes<\/span>, Zaira Pindado, Carla R\u00e0fols and Sergi Rovira<\/i><\/small><\/td>\n<td style=\"width: 162.525px\"><span style=\"font-size: 1em;font-weight: 500;font-family: 'Arial', sans-serif\">Armonizando Privacidad y Utilidad en la Publicaci\u00f3n de Datos mediante Privacidad Diferencial y Microagregaci\u00f3n<\/span><br \/><small style=\"font-size: 0.85em;font-style: italic;line-height: 1.1\"><i>Jordi Soria-Comas, David S\u00e1nchez Ruenes, Josep Domingo-Ferrer, Sergio Martinez and <span style=\"text-decoration: underline\">Luis Del Vasto Terrientes<\/span><\/i><\/small><\/td>\n<\/tr>\n<tr style=\"border-bottom: 2px solid #f5b7b7\">\n<td style=\"border-right: 2px solid #f5b7b7;width: 163.475px\"><span style=\"font-size: 1em;font-weight: 500;font-family: 'Arial', sans-serif\">Publicly Verifiable Secret Sharing over Class Groups and Applications to DKG and YOSO<\/span><br \/><small style=\"font-size: 0.85em;font-style: italic;line-height: 1.1\"><i><span style=\"text-decoration: underline\">Ignacio Cascudo<\/span> and Bernardo David<\/i><\/small><\/td>\n<td style=\"width: 162.525px\"><span style=\"font-size: 1em;font-weight: 500;font-family: 'Arial', sans-serif\">Privacidad en Smart Grid mediante Smart Contract y agregaci\u00f3n de datos<\/span><br \/><small style=\"font-size: 0.85em;font-style: italic;line-height: 1.1\"><i><span style=\"text-decoration: underline\">Joan Ferr\u00e9-Queralt<\/span>, Carles Angl\u00e9s-Tafalla, Alexandre Viejo, Jordi Castell\u00e0-Roca, Juli\u00e1n Salas, David Meg\u00edas and Guillermo Navarro-Arribas<\/i><\/small><\/td>\n<\/tr>\n<tr style=\"border-bottom: 2px solid #f5b7b7\">\n<td style=\"border-right: 2px solid #f5b7b7;width: 163.475px\"><span style=\"font-size: 1em;font-weight: 500\">Visualizaci\u00f3n e Implementaci\u00f3n de Ataques a Sistemas Criptogr\u00e1ficos de Curva El\u00edptica<\/span><br \/><small style=\"font-size: 0.85em;font-style: italic\"><span style=\"text-decoration: underline\">\u00d3scar Cigala \u00c1lvarez<\/span>, Luis Chinea Rangel and Pino Caballero Gil<\/small><\/td>\n<td style=\"width: 162.525px\"><span style=\"font-size: 1em;font-weight: 500;font-family: 'Arial', sans-serif\">Unveiling Privacy Risks: Property Inference Attacks in Federated Learning Environments<\/span><br \/><small style=\"font-size: 0.85em;font-style: italic;line-height: 1.1\"><i><span style=\"text-decoration: underline\">Antonina Serebriakova<\/span>, <span style=\"text-decoration: underline\">Gorka Pineda Burgue\u00f1o<\/span>, Victor Garcia-Font and Cristina P\u00e9rez-Sol\u00e0<\/i><\/small><\/td>\n<\/tr>\n<tr style=\"border-bottom: 2px solid #f5b7b7\">\n<td style=\"border-right: 2px solid #f5b7b7;width: 163.475px\"><span style=\"font-size: 1em;font-weight: 500;font-family: 'Arial', sans-serif\">Comparing Pseudo, Classical True and Quantum Random Number Generators Using Standard Quality Assessments<\/span><br \/><small style=\"font-size: 0.85em;font-style: italic;line-height: 1.1\"><i>Vicente Lorenzo, <span style=\"text-decoration: underline\">Javier Blanco-Romero<\/span>, Florina Almenares, Daniel D\u00edaz-S\u00e1nchez, Carlos Garc\u00eda Rubio, Celeste Campo and Andr\u00e9s Mar\u00edn<\/i><\/small><\/td>\n<td style=\"width: 162.525px\"><span style=\"font-size: 1em;font-weight: 500;font-family: 'Arial', sans-serif\">Unlocking the Potential of Composition for General Neighborhood Definitions<\/span><br \/><small style=\"font-size: 0.85em;font-style: italic;line-height: 1.1\"><i><span style=\"text-decoration: underline\">\u00c0lex Miranda-Pascual<\/span>, Patricia Guerra-Balboa, Javier Parra-Arnau and Thorsten Strufe<\/i><\/small><\/td>\n<\/tr>\n<tr style=\"border-bottom: 2px solid #f5b7b7\">\n<td style=\"border-right: 2px solid #f5b7b7;width: 163.475px\"><span style=\"font-size: 1em;font-weight: 500;font-family: 'Arial', sans-serif\">Integraci\u00f3n de un sistema de autenticaci\u00f3n optimizado basado en PUF en OSCORE<\/span><br \/><small style=\"font-size: 0.85em;font-style: italic;line-height: 1.1\"><i><span style=\"text-decoration: underline\">Jaime P\u00e9rez D\u00edaz<\/span> and Florina Almenares Mendoza<\/i><\/small><\/td>\n<td style=\"width: 162.525px\"><span style=\"font-size: 1em;font-weight: 500;font-family: 'Arial', sans-serif\">Vulnerabilidades del mecanismo de<br \/>posicionamiento Wi-Fi RTT<\/span><br \/><small style=\"font-size: 0.85em;font-style: italic;line-height: 1.1\"><i><span style=\"text-decoration: underline\">Olga Le\u00f3n Abarca<\/span> and Enrica Zola<\/i><\/small><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<tr style=\"background-color: #f9e6e6\">\n<td style=\"text-align: center;height: 120px;width: 25%\">14:00-16:00<\/td>\n<td style=\"text-align: center;height: 120px;width: 74.9169%\">Comida<br \/><span style=\"color: #ff0000\"><strong>Restaurante Ezequiel Calle Ancha<br \/><\/strong>Calle Ancha, 20<\/span><\/td>\n<\/tr>\n<tr style=\"background-color: #fdf2f2\">\n<td style=\"text-align: center;width: 25%;height: 24px\">15:45-16:00<\/td>\n<td style=\"text-align: center;width: 74.9169%;height: 24px\">Foto de Grupo<\/td>\n<\/tr>\n<tr style=\"background-color: #f9e6e6\">\n<td style=\"height: 24px;width: 25%;text-align: center\">16:00-17:00<\/td>\n<td style=\"height: 24px;width: 74.9169%;text-align: center\">Conferencia Plenaria<br \/><strong>\u00c1ngela Robinson<\/strong><br \/><strong style=\"color: #ff0000;font-family: inherit;font-size: inherit\">Sal\u00f3n de Actos<\/strong><\/td>\n<\/tr>\n<tr style=\"background-color: #fdf2f2\">\n<td style=\"text-align: center;width: 25%;height: 96px\">17:00-18:00<\/td>\n<td style=\"text-align: center;width: 74.9169%;height: 96px\">Mesa Redonda<br \/><strong><em>&#8220;Criptolog\u00eda y Seguridad de la Informaci\u00f3n: Desaf\u00edos y oportunidades en un mundo digital e hiperconectado&#8221;<br \/><\/em><\/strong><em style=\"font-family: inherit;font-size: inherit\"><span style=\"color: #ff0000\"><strong>Sal\u00f3n de Actos<\/strong><\/span><\/em><\/td>\n<\/tr>\n<tr style=\"background-color: #f9e6e6\">\n<td style=\"text-align: center;height: 24px;width: 25%\">18:00-18:30<\/td>\n<td style=\"text-align: center;height: 24px;width: 74.9169%\">Coffee Break<\/td>\n<\/tr>\n<tr style=\"background-color: #fdf2f2\">\n<td style=\"text-align: center;height: 120px;width: 25%\">18:30-20:00<\/td>\n<td style=\"text-align: center;height: 120px;width: 74.9169%\"><span style=\"text-decoration: underline;color: #3366ff\"><a href=\"https:\/\/www.youtube.com\/watch?v=AjxQ3azwS3E\" style=\"color: #3366ff;text-decoration: underline\">Proyecci\u00f3n del documental \u201cEquipo D. Los c\u00f3digos olvidados\u201d<\/a><\/span><br \/><span style=\"color: #ff0000\"><strong>Teatro El Albeitar<br \/><\/strong>Av. Facultad de Veterinaria, 25<\/span><\/td>\n<\/tr>\n<tr style=\"background-color: #f9e6e6\">\n<td style=\"text-align: center;height: 24px;width: 25%\">21:00<\/td>\n<td style=\"text-align: center;height: 24px;width: 74.9169%\">Cena de Gala<br \/><span style=\"color: #ff0000\"><strong>Parador San Marcos<br \/><\/strong>Plaza de San Marcos, 7<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h1>Viernes 25 de Octubre<\/h1>\n<table border=\"1\" cellpadding=\"10\" cellspacing=\"0\" width=\"100%\" style=\"border-collapse: collapse\">\n<tbody>\n<tr style=\"background-color: #f9e6e6\">\n<td width=\"25%\" style=\"text-align: center\">09:00-10:00<\/td>\n<td style=\"text-align: center\">Conferencia Plenaria<br \/><strong>Rainer Steinwandt<\/strong><strong><br \/><\/strong><strong style=\"color: #ff0000;font-family: inherit;font-size: inherit\">Sal\u00f3n de Actos<\/strong><\/td>\n<\/tr>\n<tr style=\"background-color: #fdf2f2\">\n<td style=\"text-align: center\">10:00-11:30<\/td>\n<td>\n<table style=\"border: 3px solid #ccc;border-collapse: collapse\">\n<tbody>\n<tr style=\"border-bottom: 2px solid #f5b7b7\">\n<td width=\"50%\" style=\"border-right: 2px solid #f5b7b7;text-align: center\"><b style=\"font-size: 1.1em\">V1 \u2013 Herramientas Cu\u00e1nticas<br \/><\/b><b style=\"font-size: 1.1em\"><span style=\"color: #ff0000\"><strong>Sal\u00f3n de Actos<br \/><\/strong><\/span><\/b>Chair: Ignacio Cascudo<\/td>\n<td width=\"50%\" style=\"text-align: center\"><b style=\"font-size: 1.1em\">V2 \u2013 Inteligencia artificial para ciberseguridad<br \/><\/b><b style=\"font-size: 1.1em\"><span style=\"color: #ff0000\"><strong>Aula A<br \/><\/strong><\/span><\/b>Chair: Mar\u00eda Teresa Trobajo<b style=\"font-size: 1.1em\"><strong><\/strong><span style=\"color: #ff0000\"><strong><br \/><\/strong><\/span><\/b><\/td>\n<\/tr>\n<tr style=\"border-bottom: 2px solid #f5b7b7\">\n<td style=\"border-right: 2px solid #f5b7b7\"><span style=\"font-size: 1em;font-weight: 500;font-family: 'Arial', sans-serif\">Herramientas Algebraicas para el Algoritmo de Grover<\/span><br \/><small style=\"font-size: 0.85em;font-style: italic;line-height: 1.1\"><i><span style=\"text-decoration: underline\">Jorge Garc\u00eda-D\u00edaz<\/span>, Francisco Costa-Cano, Daniel Esc\u00e1nez-Exp\u00f3sito and Pino Caballero-Gil<\/i><\/small><\/td>\n<td><span style=\"font-size: 1em;font-weight: 500;font-family: 'Arial', sans-serif\">Opciones de dise\u00f1o de redes neuronales para la verificaci\u00f3n de RNG\u2019s<\/span><br \/><small style=\"font-size: 0.85em;font-style: italic;line-height: 1.1\"><i><span style=\"text-decoration: underline\">Jos\u00e9 Crespo<\/span>, Javier Gonz\u00e1lez, Jaime Guti\u00e9rrez and \u00c1ngel Valle<\/i><\/small><\/td>\n<\/tr>\n<tr style=\"border-bottom: 2px solid #f5b7b7\">\n<td style=\"border-right: 2px solid #f5b7b7\"><span style=\"font-size: 1em;font-weight: 500;font-family: 'Arial', sans-serif\">Cifrado homol\u00f3gico para problemas QUBO<\/span><br \/><small style=\"font-size: 0.85em;font-style: italic;line-height: 1.1\"><i><span style=\"text-decoration: underline\">Mariano Caruso<\/span>, Daniel Esc\u00e1nez-Exp\u00f3sito, Pino Caballero-Gil and Carlos Kuchkovsky<\/i><\/small><\/td>\n<td><span style=\"font-size: 1em;font-weight: 500;font-family: 'Arial', sans-serif\">Uso de Redes Neuronales Recurrentes para el An\u00e1lisis de C\u00f3digo Est\u00e1tico<\/span><br \/><small style=\"font-size: 0.85em;font-style: italic;line-height: 1.1\"><i>Sergio Mu\u00f1oz Mart\u00edn, <span style=\"text-decoration: underline\">Luis Alberto Mart\u00ednez Hern\u00e1ndez<\/span>, Sandra P\u00e9rez Arteaga, Ana Lucila Sandoval Orozco and Luis Javier Garc\u00eda Villalba<\/i><\/small><\/td>\n<\/tr>\n<tr style=\"border-bottom: 2px solid #f5b7b7\">\n<td style=\"border-right: 2px solid #f5b7b7\"><span style=\"font-size: 1em;font-weight: 500;font-family: 'Arial', sans-serif\">Implementaci\u00f3n del algoritmo de Shor para la factorizaci\u00f3n de N=21<\/span><br \/><small style=\"font-size: 0.85em;font-style: italic;line-height: 1.1\"><i><span style=\"text-decoration: underline\">Ventura Sarasa Laborda<\/span>, Luis Hern\u00e1ndez Encinas, Miguel \u00c1ngel Gonz\u00e1lez de la Torre and Luis Hern\u00e1ndez \u00c1lvarez<\/i><\/small><\/td>\n<td><span style=\"font-size: 1em;font-weight: 500;font-family: 'Arial', sans-serif\">An\u00e1lisis en tiempo real del flujo de pasajeros en las estaciones de tranv\u00eda mediante IA y visi\u00f3n por computador<\/span><br \/><small style=\"font-size: 0.85em;font-style: italic;line-height: 1.1\"><i><span style=\"text-decoration: underline\">Sonia D\u00edaz-Santos<\/span>, Jaime Oliva-Garc\u00eda, Pino Caballero-Gil and C\u00e1ndido Caballero-Gil<\/i><\/small><\/td>\n<\/tr>\n<tr style=\"border-bottom: 2px solid #f5b7b7\">\n<td style=\"border-right: 2px solid #f5b7b7\"><span style=\"font-size: 1em;font-weight: 500;font-family: 'Arial', sans-serif\">Aprendizaje sobre Computaci\u00f3n y Criptograf\u00eda Cu\u00e1nticas a trav\u00e9s de un Juego de Mesa<\/span><br \/><small style=\"font-size: 0.85em;font-style: italic;line-height: 1.1\"><i><span style=\"text-decoration: underline\">Daniel Esc\u00e1nez-Exp\u00f3sito<\/span>, Pino Caballero-Gil and Javier Correa-Marichal<\/i><\/small><\/td>\n<td><span style=\"font-size: 1em;font-weight: 500;font-family: 'Arial', sans-serif\">M\u00e9todo para identificar buffer overflow en c\u00f3digo C mediante T\u00e9cnicas de Procesamiento de Lenguaje Natural<\/span><br \/><small style=\"font-size: 0.85em;font-style: italic;line-height: 1.1\"><i>Bruce William Percilio Azevedo, Robson de Oliveira Albuquerque, Luis Javier Garc\u00eda Villalba and <span style=\"text-decoration: underline\">Luis Alberto Mart\u00ednez Hern\u00e1ndez<\/span><\/i><\/small><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<tr style=\"background-color: #f9e6e6\">\n<td style=\"text-align: center\">11:30-12:00<\/td>\n<td style=\"text-align: center\">Coffee Break<\/td>\n<\/tr>\n<tr style=\"background-color: #fdf2f2\">\n<td style=\"text-align: center\">12:00-14:00<\/td>\n<td>\n<table width=\"100%\" style=\"border: 3px solid #cccccc;border-collapse: collapse;width: 100%\">\n<tbody>\n<tr style=\"border-bottom: 2px solid #f5b7b7\">\n<td width=\"50%\" style=\"border-right: 2px solid #f5b7b7;text-align: center;width: 50%\"><b style=\"font-size: 1.1em\">V3 \u2013 Privacidad y autenticaci\u00f3n<br \/><\/b><b style=\"font-size: 1.1em\"><span style=\"color: #ff0000\"><strong>Sal\u00f3n de Actos<br \/><\/strong><\/span><\/b>Chair: Pino Caballero<\/td>\n<td width=\"50%\" style=\"text-align: center;width: 50%\"><b style=\"font-size: 1.1em\">V4 \u2013 Regulaci\u00f3n y ciberseguridad<br \/><\/b><b style=\"font-size: 1.1em\"><span style=\"color: #ff0000\"><strong>Aula A<br \/><\/strong><\/span><\/b>Chair: Daniel Sadomil<\/td>\n<\/tr>\n<tr style=\"border-bottom: 2px solid #f5b7b7\">\n<td style=\"border-right: 2px solid #f5b7b7;width: 50%\"><span style=\"font-size: 1em;font-weight: 500;font-family: 'Arial', sans-serif\">Ataque de inferencia de membres\u00eda a trayectorias<\/span><br \/><small style=\"font-size: 0.85em;font-style: italic;line-height: 1.1\"><i><span style=\"text-decoration: underline\">V\u00edctor Rubio Jornet<\/span>, Pol Irurre Mart\u00ednez, Ram\u00f3n Roca Oliver, Jordi Forn\u00e9 Mu\u00f1oz and Javier Parra Arnau<\/i><\/small><\/td>\n<td style=\"width: 50%\"><span style=\"font-size: 1em;font-weight: 500;font-family: 'Arial', sans-serif\">Hacia un marco de gobierno de la seguridad para ciudades inteligentes<\/span><br \/><small style=\"font-size: 0.85em;font-style: italic;line-height: 1.1\"><i>David G Rosado, Luis Enrique S\u00e1nchez Crespo,\u00a0<span style=\"text-decoration: underline\">Ferney Mart\u00ednez<\/span>,\u00a0Carlos Blanco Bueno, Manuel A. Serrano and Eduardo Fern\u00e1ndez-Medina<\/i><\/small><\/td>\n<\/tr>\n<tr style=\"border-bottom: 2px solid #f5b7b7\">\n<td style=\"border-right: 2px solid #f5b7b7;width: 50%\"><span style=\"font-size: 1em;font-weight: 500;font-family: 'Arial', sans-serif\">Uso de Smart Contracts e IPFS para la Gesti\u00f3n Segura de Datos de Acceso a Zonas Restringidas Vehiculares<\/span><br \/><small style=\"font-size: 0.85em;font-style: italic;line-height: 1.1\"><i><span style=\"text-decoration: underline\">Carles Angl\u00e9s-Tafalla<\/span>, Alexandre Viejo and Jordi Castell\u00e0-Roca<\/i><\/small><\/td>\n<td style=\"width: 50%\"><span style=\"font-size: 1em;font-weight: 500;font-family: 'Arial', sans-serif\">Propuesta de ontolog\u00eda para la gesti\u00f3n y tratamiento din\u00e1mico del riesgo frente ataques internos<\/span><br \/><small style=\"font-size: 0.85em;font-style: italic;line-height: 1.1\"><i><span style=\"text-decoration: underline\">Luis P\u00e9rez Miguel<\/span>, Xavier Larriva-Novo, Manuel \u00c1lvarez-Campana, Carmen S\u00e1nchez-Zas and V\u00edctor Abraham Villagr\u00e1 Gonz\u00e1lez<\/i><\/small><\/td>\n<\/tr>\n<tr style=\"border-bottom: 2px solid #f5b7b7\">\n<td style=\"border-right: 2px solid #f5b7b7;width: 50%\"><span style=\"font-size: 1em;font-weight: 500;font-family: 'Arial', sans-serif\">Evaluaci\u00f3n de rostros faciales para la expedici\u00f3n de documentos de identificaci\u00f3n<\/span><br \/><small style=\"font-size: 0.85em;font-style: italic;line-height: 1.1\"><i>Fernando Broncano Morgado, Victoria Amores Chaparro, \u00d3scar Mogoll\u00f3n Guti\u00e9rrez, Alberto L\u00f3pez Trigo and <span style=\"text-decoration: underline\">Jos\u00e9 Carlos Sancho N\u00fa\u00f1ez<\/span><\/i><\/small><\/td>\n<td style=\"width: 50%\"><span style=\"font-size: 1em;font-weight: 500;font-family: 'Arial', sans-serif\">Aplicando An\u00e1lisis de Riesgos a un entorno de Hogar Inteligente: Caso de Estudio MARISMA-CPS<\/span><br \/><small style=\"font-size: 0.85em;font-style: italic;line-height: 1.1\"><i>Jos\u00e9 Luis Ruiz Catal\u00e1n, Carlos Pedraza Antona, <span style=\"text-decoration: underline\">David G. Rosado<\/span>, Luis Enrique S\u00e1nchez Crespo, Antonio Santos-Olmo Parra and Carlos Blanco Bueno<\/i><\/small><\/td>\n<\/tr>\n<tr style=\"border-bottom: 2px solid #f5b7b7\">\n<td style=\"border-right: 2px solid #f5b7b7;width: 50%\"><span style=\"font-size: 1em;font-weight: 500;font-family: 'Arial', sans-serif\">Aplicaci\u00f3n web para sistema de control de accesos basado en c\u00f3digos \u00f3pticos<\/span><br \/><small style=\"font-size: 0.85em;font-style: italic;line-height: 1.1\"><i><span style=\"text-decoration: underline\">C\u00e1ndido Caballero-Gil<\/span>, Laura Dorta-Marrero and Julio Francisco Rufo Torres<\/i><\/small><\/td>\n<td style=\"width: 50%\"><span style=\"font-size: 1em;font-weight: 500;font-family: 'Arial', sans-serif\">Hacia un Framework de Ciberseguridad Personal y Dom\u00e9stica<\/span><br \/><small style=\"font-size: 0.85em;font-style: italic;line-height: 1.1\"><i><span style=\"text-decoration: underline\">\u00c1ngel Suarez-B\u00e1rcena<\/span>, Carlos Mario Braga, Antonio Santos-Olmo Parra and Eduardo Fern\u00e1ndez-Medina<\/i><\/small><\/td>\n<\/tr>\n<tr style=\"border-bottom: 2px solid #f5b7b7\">\n<td style=\"border-right: 2px solid #f5b7b7;width: 50%\"><span style=\"font-size: 1em;font-weight: 500;font-family: 'Arial', sans-serif\">Marco para una autoprotecci\u00f3n eficaz de la<br \/>privacidad en entornos m\u00f3viles<\/span><br \/><small style=\"font-size: 0.85em;font-style: italic;line-height: 1.1\"><i><span style=\"text-decoration: underline\">M. Mercedes Mart\u00ednez-Gonz\u00e1lez<\/span>, Amador Aparicio, Alejandro P\u00e9rez-Fuente, Pablo Abel Criado, Margarita Gonzalo Tasis and Quiliano Isaac Moro<\/i><\/small><\/td>\n<td style=\"width: 50%\"><span style=\"font-size: 1em;font-weight: 500;font-family: 'Arial', sans-serif\">El modelo de gesti\u00f3n de la identidad digital en la Uni\u00f3n Europea: el Reglamento 2024\/1183<\/span><br \/><small style=\"font-size: 0.85em;font-style: italic;line-height: 1.1\"><i><span style=\"text-decoration: underline\">Margarita Robles-Carrillo<\/span>, Pedro Garc\u00eda-Teodoro and Gabriel Maci\u00e1 Fern\u00e1ndez<\/i><\/small><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<tr style=\"background-color: #f9e6e6\">\n<td style=\"text-align: center\">14:00-14:15<\/td>\n<td style=\"text-align: center\">Clausura<br \/><strong style=\"font-family: inherit;font-size: inherit;color: #ff0000\">Sal\u00f3n de Actos<\/strong><\/td>\n<\/tr>\n<tr style=\"background-color: #fdf2f2\">\n<td style=\"text-align: center\">14:00-16:00<\/td>\n<td style=\"text-align: center\">Comida<br \/><b style=\"font-size: 1.1em\"><span style=\"color: #ff0000\"><strong>Hotel Conde Luna<br \/><\/strong><\/span><\/b><span style=\"color: #ff0000\">Av. Independencia, 7<\/span><\/td>\n<\/tr>\n<tr style=\"background-color: #f9e6e6\">\n<td style=\"text-align: center\">16:00<\/td>\n<td style=\"text-align: center\">Visita<br \/><b style=\"font-size: 1.1em\"><span style=\"color: #ff0000\"><strong>Museo de San Isidoro<\/strong><\/span><\/b><br \/><span style=\"color: #ff0000\">Plaza de San Isidoro, 4<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][et_pb_text admin_label=&#8221;Texto&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h5><\/h5>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;Fila&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Texto&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1 class=\"entry-title2\">Ponentes<\/h1>\n<p>[\/et_pb_text][et_pb_text admin_label=&#8221;Nombre Apellido Apellido&#8221; _builder_version=&#8221;4.17.6&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; custom_padding=&#8221;|0px||||&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<div class=\"divponentes\">\n<div class=\"pponentes2\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/congresos.unileon.es\/recsi2024\/wp-content\/uploads\/sites\/16\/2024\/06\/Sofia_Celi_.png\" width=\"150\" height=\"149\" alt=\"\" class=\"wp-image-1201 alignnone size-full\" \/><\/div>\n<div class=\"pponentes\">\n<h5 class=\"et_pb_toggle_title tituloponentes\">Sof\u00eda Celi<\/h5>\n<p><span style=\"font-weight: 400\">Brave<\/span><\/p>\n<p><span>Sof\u00eda Celi is a cryptography researcher at Brave. She researches<\/span><span> <\/span><span>around privacy-preserving technologies and post-quantum cryptography.<\/span><span> <\/span><span>She is also the co-chair of hprc at IRTF, pquip at IETF, and anti-fraud<\/span><span> <\/span><span>at W3C. She won the IEEE S&amp;P Distinguished paper award in 2023, and is part of the Steering Comittee of LatinCrypt.<\/span><\/p>\n<p><span><\/span><\/p>\n<table border=\"3\" style=\"width: 100%;border: 3px solid #cccccc;border-collapse: collapse\">\n<tbody>\n<tr>\n<td style=\"width: 797px;text-align: center\"><span style=\"text-decoration: underline\"><strong><span>La criptograf\u00eda en el futuro<\/span><\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 797px\">\n<p style=\"text-align: justify\"><span>En esta charla, vamos a explorar qu\u00e9 tendencias actuales hay <\/span><span>en la criptograf\u00eda y como evolucionar\u00e1n en el futuro. Vamos a explorar <\/span><span>cu\u00e1les caminos emocionantes tiene la investigaci\u00f3n en criptograf\u00eda en el <\/span><span>futuro: desde PIR, ZKP aplicado, a post-qu\u00e1ntico.<\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_text admin_label=&#8221;Nombre Apellido Apellido&#8221; _builder_version=&#8221;4.17.6&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; custom_padding=&#8221;|0px||||&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<div class=\"divponentes\">\n<div class=\"pponentes2\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/congresos.unileon.es\/recsi2024\/wp-content\/uploads\/sites\/16\/2024\/07\/javier.png\" width=\"150\" height=\"149\" alt=\"\" class=\"wp-image-1215 alignnone size-full\" \/><\/div>\n<div class=\"pponentes\">\n<h5 class=\"et_pb_toggle_title tituloponentes\">Javier Lopez<\/h5>\n<h5>Universidad de M\u00e1laga<\/h5>\n<p style=\"font-weight: 400\">Javier L\u00f3pez es Catedr\u00e1tico de Ingenier\u00eda Telem\u00e1tica en\u00a0la Universidad de M\u00e1laga, as\u00ed\u00a0como Director del Grupo de Investigaci\u00f3n \u201cNetwork, Information and Computer Security (NICS) Lab\u201d, y\u00a0centra su actividad investigadora principalmente en las \u00e1reas de Servicios y Protocolos de Seguridad en Redes y Protecci\u00f3n de Infraestructuras Cr\u00edticas, \u00e1reas en las que ha dirigido m\u00e1s de medio centenar de proyectos y contratos de investigaci\u00f3n, entre ellos quince proyectos financiados por la Comisi\u00f3n Europea.<\/p>\n<p style=\"font-weight: 400\">Actualmente, es Consejero del\u00a0<em>International Security Advisory Board\u00a0<\/em> de Huawei, y Vice-Chair del Comit\u00e9 IFIP TC11 (Security and Privacy Protection in Information Processing Systems), habiendo sido el representante espa\u00f1ol en el mismo durante quince a\u00f1os. Con anterioridad, ha sido Presidente de la\u00a0<em>Red de Excelencia Nacional de Investigaci\u00f3n en Ciberseguridad<\/em>\u00a0(RENIC), as\u00ed como Presidente del Subcomit\u00e9 de estandarizaci\u00f3n en\u00a0<em>Protecci\u00f3n de Datos, Privacidad y Gesti\u00f3n de la Identidad<\/em>\u00a0de UNE\/AENOR.\u00a0Igualmente,\u00a0Chair del ERCIM WG on Security and Trust Management y Chair del IFIP WG on Trust Management.<\/p>\n<p style=\"font-weight: 400\">Adicionalmente, tambi\u00e9n ha sido\u00a0co-Editor in Chief del \u201cInternational Journal of Information Security\u201d desde 2004 a 2021, y miembro de los Consejos Editoriales de otra decena de revistas internacionales, entre las que destacan \u201cIEEE Transactions on Dependable and Secure Computing\u201d, \u201cIEEE Wireless Communications\u201d, \u201cComputers &amp; Security\u201d y \u201cIEEE Internet of Things Journal\u201d.<\/p>\n<p style=\"font-weight: 400\">\n<p>&nbsp;<\/p>\n<table border=\"3\" style=\"width: 100%;border: 3px solid #cccccc;border-collapse: collapse\">\n<tbody>\n<tr>\n<td style=\"width: 797px;text-align: center\"><span style=\"text-decoration: underline\"><strong>Gemelos Digitales \u2013 una perspectiva de seguridad sobre arquitecturas y est\u00e1ndares<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 797px\">\n<p style=\"text-align: justify\"><span>La aparici\u00f3n de los Gemelos Digitales (Digital Twins, DTs) y su aplicaci\u00f3n en la mejora de muchos modelos de negocio est\u00e1 atrayendo cada vez m\u00e1s la atenci\u00f3n de multitud de empresas. Esta tecnolog\u00eda est\u00e1 demostrando un alto valor en la predicci\u00f3n de fallos, la detecci\u00f3n de situaciones anormales y, por tanto, la mejora de los entornos industriales. Adem\u00e1s, son capaces de virtualizar y simular activos del mundo f\u00edsico, lo cual optimiza procesos en muchos dominios de aplicaci\u00f3n, a la vez que ofrecen servicios de inter\u00e9s como mantenimiento predictivo, monitorizaci\u00f3n en tiempo real y gesti\u00f3n de seguridad. De hecho, las capacidades de simulaci\u00f3n de los DTs se pueden utilizar como un recurso para soluciones de seguridad, mientras que al mismo tiempo la virtualizaci\u00f3n se puede utilizar para probar y validar los enfoques de esas soluciones. Al igual que con muchas otras tecnolog\u00edas, el despliegue completo de los DTs de manera segura y coherente depende en gran medida de los esfuerzos de estandarizaci\u00f3n de los organismos internacionales. En esta presentaci\u00f3n profundizaremos en estas cuestiones, considerando y analizando tambi\u00e9n el esfuerzo realizado por esos organismos y los problemas que a\u00fan tienen que resolver.<\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_text admin_label=&#8221;Nombre Apellido Apellido&#8221; _builder_version=&#8221;4.17.6&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; custom_padding=&#8221;|0px||||&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<div class=\"divponentes\">\n<div class=\"pponentes2\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/congresos.unileon.es\/recsi2024\/wp-content\/uploads\/sites\/16\/2024\/06\/RobinsonAngela.png\" width=\"150\" height=\"150\" alt=\"\" class=\"wp-image-1196 alignnone size-full\" \/><\/div>\n<div class=\"pponentes\">\n<h5 class=\"et_pb_toggle_title tituloponentes\">Angela Robinson<\/h5>\n<p>NIST<\/p>\n<p>Angela Robinson is a mathematician in the Computer Security Division of the National Institute of Standards and Technology (NIST). Her research focuses on code-based cryptography and cryptanalysis in the hamming metric and privacy-enhancing cryptography. She has participated in the NIST Post Quantum Cryptography Standardization project since joining NIST in October 2018. She has contributed to cryptographic standards development and standards updates in FIPS 186-5, NIST SP800-186, FIPS 203, NIST SP800-227, and several NISTIR\u2019s.<\/p>\n<p>Dr. Robinson currently serves as the co-chair for the Privacy R&amp;D Interagency Working Group, one of 13 coordination areas of the United States&#8217; Networking and Information Technology R&amp;D program. She helped develop the United States&#8217; National Strategy to Advance Privacy-Preserving Data Sharing and Analytics which was released at the 2023 White House Summit for Democracy. She is now helping lead the development of the 2024 National Privacy R&amp;D Strategy. Dr. Robinson received the 2023 Women in Technology Rising Star Award which honors a woman in the beginning stages of her career who has demonstrated exemplary leadership traits and mentorship.<\/p>\n<p>&nbsp;<\/p>\n<table border=\"3\" style=\"width: 100%;border: 3px solid #cccccc;border-collapse: collapse\">\n<tbody>\n<tr>\n<td style=\"width: 797px;text-align: center\"><strong><span style=\"text-decoration: underline\">The NIST Post-Quantum Cryptography Standards<\/span><\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 797px\">\n<p style=\"font-weight: 400;text-align: justify\">Advances in quantum computing and technology pose a threat to some widely-deployed digital signature and key establishment algorithms standardized by the National Institute of Standards and Technology (NIST).\u00a0 A public process was initiated by NIST in 2016 to identify, select, and standardize quantum-resistant algorithms to mitigate the looming quantum threat.\u00a0 NIST announced the selection of four algorithms to be standardized in 2022 and released the first three standards in August 2024, with the fourth standard expected to be released in early 2025.\u00a0 In addition to the four selected algorithms, four additional key establishment algorithms remain under consideration while forty digital signature algorithms are newly under consideration for future standardization.<\/p>\n<p style=\"text-align: justify\">In this talk we explore the history and current activities of the NIST Post-Quantum Standardization project.\u00a0 We will discuss lessons learned and current approaches to develop a robust and secure set of public-key quantum-resistant standards that will support the United States Federal Government\u2019s goal to transition to quantum-resistant cryptography by 2035.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span>\u00a0<\/span><\/p>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_text admin_label=&#8221;Nombre Apellido Apellido&#8221; _builder_version=&#8221;4.17.6&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; custom_padding=&#8221;|0px||||&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<div class=\"divponentes\">\n<div class=\"pponentes2\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/congresos.unileon.es\/recsi2024\/wp-content\/uploads\/sites\/16\/2024\/06\/Rainer_Steinwandt.png\" width=\"150\" height=\"150\" alt=\"\" class=\"wp-image-1198 alignnone size-full\" \/><\/div>\n<div class=\"pponentes\">\n<h5 class=\"et_pb_toggle_title tituloponentes\">Rainer Steinwandt<\/h5>\n<p><span>University of Alabama in Huntsville<\/span><\/p>\n<p style=\"font-weight: 400\"><span>Rainer Steinwandt is with The University of Alabama in Huntsville in the United States, where he serves as Dean of the College of Science and as Professor in the Department of Mathematical Sciences. Before that, he served as Chair of the Department of Mathematical Sciences at Florida Atlantic University (FAU) and Director of FAU&#8217;s Center for Cryptology &amp; Information Security. His primary research interest is in quantum-resistant cryptography. For a multi-year project in this area, funded through the NATO Science for Peace and Security Programme, he received a\u00a02018 NATO\u00a0SPS Partnership\u00a0Prize. Currently, he serves as NATO country Project Director for a multi-year project devoted to &#8220;Secure Communication via Classical and Quantum Technologies&#8221; with partners from Finland, Slovakia, and Spain.<\/span><\/p>\n<p style=\"font-weight: 400\"><span><\/span><\/p>\n<p style=\"font-weight: 400\"><span><\/span><\/p>\n<table border=\"1\" style=\"width: 100%;border: 3px solid #cccccc;border-collapse: collapse\">\n<tbody>\n<tr>\n<td style=\"width: 100%;text-align: center\"><em><span style=\"text-decoration: underline\"><strong>Quantum-resistant cryptography &#8212; an interdisciplinary opportunity<\/strong><\/span><\/em><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 100%\"><span>Post-quantum and quantum cryptography\u00a0use different avenues to contribute to a quantum-resistant cryptographic infrastructure. Both approaches experience challenges, and effective collaboration across the two research communities seems underdeveloped. At the same time, continuing progress in the development of scalable quantum hardware underscores the need for reliable quantum-resistant cryptography. Using efforts supported by the NATO Science for Peace and Security program as an example, the talk discusses some collaboration opportunities for multidisciplinary research offered by quantum-resistant cryptography.<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Secci\u00f3n&#8221; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row admin_label=&#8221;Fila&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Texto&#8221; module_class=&#8221;entry-title main_title&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>Colaboradores<\/h1>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.17.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.17.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/congresos.unileon.es\/recsi2024\/wp-content\/uploads\/sites\/16\/2024\/07\/unnamed-scaled.jpg&#8221; title_text=&#8221;unnamed&#8221; _builder_version=&#8221;4.17.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_5,1_5,1_5,1_5,1_5&#8243; _builder_version=&#8221;4.17.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_5&#8243; _builder_version=&#8221;4.17.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/congresos.unileon.es\/recsi2024\/wp-content\/uploads\/sites\/16\/2024\/04\/catedra.png&#8221; title_text=&#8221;catedra&#8221; _builder_version=&#8221;4.17.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.17.6&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;|-759px||||&#8221; custom_padding=&#8221;|0px||||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"font-weight: 400\"><span>La C\u00e1tedra de Ciberseguridad de la Universidad de Le\u00f3n, en colaboraci\u00f3n con el\u00a0<\/span><span><a href=\"https:\/\/www.incibe.es\/\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/www.incibe.es\/&amp;source=gmail&amp;ust=1722428381183000&amp;usg=AOvVaw3k57gZIkB8rhlJVQE_a_Qn\">Instituto Nacional de Ciberseguridad (INCIBE)<\/a><\/span><span>, entidad dependiente del Ministerio para la Transformaci\u00f3n Digital y de la Funci\u00f3n P\u00fablica, a trav\u00e9s de la Secretar\u00eda de Estado de Digitalizaci\u00f3n e Inteligencia Artificial\u00a0organiza RECSI 2024.<\/span><\/p>\n<p style=\"font-weight: 400\">Esta actividad es<span>\u00a0<\/span>parte del convenio entre INCIBE y la Universidad de Le\u00f3n incluido en el<span>\u00a0<\/span><a href=\"https:\/\/www.incibe.es\/ed2026\/ciberinnova\/catedras\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/www.incibe.es\/ed2026\/ciberinnova\/catedras&amp;source=gmail&amp;ust=1722428381183000&amp;usg=AOvVaw3Nud_AmIht41_ih9uAijgs\">programa de C\u00e1tedras de Ciberseguridad<\/a><span>\u00a0<\/span>en Espa\u00f1a,<span>\u00a0<\/span>en el marco del<span>\u00a0<\/span><a href=\"https:\/\/planderecuperacion.gob.es\/\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/planderecuperacion.gob.es\/&amp;source=gmail&amp;ust=1722428381183000&amp;usg=AOvVaw3m0DYqWb7yKG4CLysWIjRS\">Plan de Recuperaci\u00f3n, Transformaci\u00f3n y Resiliencia<\/a>, con la financiaci\u00f3n de los<span>\u00a0<\/span><a href=\"https:\/\/commission.europa.eu\/strategy-and-policy\/recovery-plan-europe_es\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/commission.europa.eu\/strategy-and-policy\/recovery-plan-europe_es&amp;source=gmail&amp;ust=1722428381183000&amp;usg=AOvVaw0tVY7O4rkHdwMfOjIttAVx\">Fondos\u00a0<em>Next Generation-EU<\/em><\/a>.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_5&#8243; _builder_version=&#8221;4.17.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/congresos.unileon.es\/recsi2024\/wp-content\/uploads\/sites\/16\/2016\/11\/universidad-de-leon.png&#8221; title_text=&#8221;universidad-de-leon&#8221; _builder_version=&#8221;4.17.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_5&#8243; _builder_version=&#8221;4.17.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/congresos.unileon.es\/recsi2024\/wp-content\/uploads\/sites\/16\/2024\/04\/LOGO_RIASC-2048&#215;1510-1.png&#8221; title_text=&#8221;LOGO_RIASC-2048&#215;1510&#8243; _builder_version=&#8221;4.17.6&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;58%&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_5&#8243; _builder_version=&#8221;4.17.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/congresos.unileon.es\/recsi2024\/wp-content\/uploads\/sites\/16\/2024\/10\/RENIC.png&#8221; title_text=&#8221;RENIC&#8221; _builder_version=&#8221;4.17.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_5&#8243; _builder_version=&#8221;4.17.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/congresos.unileon.es\/recsi2024\/wp-content\/uploads\/sites\/16\/2024\/10\/Actividades-ULE_page-0001-scaled.jpg&#8221; title_text=&#8221;Actividades ULE_page-0001&#8243; _builder_version=&#8221;4.17.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Actas Las actas de RECSI 2024 est\u00e1n publicadas por el Servicio de Publicaciones de la Universidad de Le\u00f3n.Puedes descargarlas en este enlace: https:\/\/buleria.unileon.es\/handle\/10612\/24551.\u00a0Localizaci\u00f3n\u00a0 Accede al mapa completo aqu\u00edMi\u00e9rcoles 23 de Octubre 08:30-09:00 Registro 09:00-09:30 Inauguraci\u00f3nSal\u00f3n de Actos 09:30-10:30 Conferencia PlenariaSof\u00eda Cel\u00edSal\u00f3n de Actos 10:30-11:30 X1 \u2013 Inteligencia artificial para la ciberseguridadSal\u00f3n de ActosChair: Miguel Carriegos [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-108","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/congresos.unileon.es\/recsi2024\/wp-json\/wp\/v2\/pages\/108","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/congresos.unileon.es\/recsi2024\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/congresos.unileon.es\/recsi2024\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/congresos.unileon.es\/recsi2024\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/congresos.unileon.es\/recsi2024\/wp-json\/wp\/v2\/comments?post=108"}],"version-history":[{"count":210,"href":"https:\/\/congresos.unileon.es\/recsi2024\/wp-json\/wp\/v2\/pages\/108\/revisions"}],"predecessor-version":[{"id":1322,"href":"https:\/\/congresos.unileon.es\/recsi2024\/wp-json\/wp\/v2\/pages\/108\/revisions\/1322"}],"wp:attachment":[{"href":"https:\/\/congresos.unileon.es\/recsi2024\/wp-json\/wp\/v2\/media?parent=108"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}