ETS Ingeniería de Telecomunicación

Contact Information

Call: +34952131305

Email: apeinado(at)

Alberto Peinado Domínguez

Associate Professor

Department of Communications Engineering

Alberto Peinado is Associate Professor at Communications Engineering Department at University of Malaga (UMA, Málaga, Spain), since 2002. He is Ms Sc Telecommunication Engineering (UMA, 1993) and PhD in Computer Science from the Polytechnic University of Madrid, Spain, since 1997. He is an active collaborator of the National Spanish Council for Scientific Research (CSIC) since 1995, and the head of Cryptography and Information Security Lab (L-CSI) at UMA.

His research interests include Cryptography; Security in wireless and mobile communications, specially focused on RFID systems; and Development of new wireless services and applications.

Selected publications


G. Avoine, M. A. Bingol, I. Boureanu, S. Capkun, G. Hancke, S. Kardas, C. H. Kim, C. Lauradoux, B. Martin, J. Munilla, A. Peinado, K. B. Rasmussen, D. Singelee, A. Tchamkerten, R. Trujillo-Rasua, S. Vaudenay,
Security of Distance-Bounding: A Survey“,
ACM Computing Surveys, 51 (5) (2018), 94:1-33, doi: 10.1145/3264628

J. Munilla, M. Burmester, A. Peinado, G. Yang, W. Susilo,
RFID ownership transfer with positive secrecy capacity“,
Sensors, 17 (2017), num 53. doi:10.3390/s17010053

J. Munilla, M. Burmester, A. Peinado,
Attacks on ownership transfer scheme for multi-tag multi-owner passive RFID environments“,
Computer Communications, 88, pp 84-88 (2016) doi: 10.1016/j.comcom.2016.05.007

A. Peinado, J. Munilla, A. Fuster-Sabater,
Revision of J3Gen and validity of the attacks by Peinado et al.“,
Sensors (2015), 15, pp. 11988-11992, doi:10.3390/s150511988

A.Peinado, J. Munilla, A. Fúster,
EPCGen2 Pseudorandom Number Generators: Analysis of J3Gen“,
Sensors (2014), 14, pp. 6500-6515 doi:10.3390/s140406500

J. Munilla, A. Peinado,
Enhanced Low-Cost RFID Protocol to Detect Relay Attacks“,
Wireless Communications and Mobile Computing, (2009), doi:10.1002/wcm.769

M. Burmester, B. de Medeiros, J. Munilla, A. Peinado,
Secure EPC Gen2 Compliant Radio Frequency Identification“,
Lecture Notes in Computer Science, 5793, (2009), pp. 227-240 8th International Conference on ADHOC-NOW2009, 22-25 sept-2009, Murcia, España

J. Munilla, A. Peinado,
Distance Bounding Protocols for RFID enhanced by using void-challenges and analysis in noisy channels“,
Wireless Communications and Mobile Computing, 8 (2008), pp. 1227-1232. DOI: 10.1002/wcm.590

J. Munilla, A. Peinado,
HB-MP: A further step in the HB-family of Lightweight Authentication Protocols“,
Computer Networks, 51 (2007), pp. 2262-2267


A. Peinado,
Reconstruction of a 1940 Spanish Strip Cipher by means of a cyclic rotation model applied to encrypted telegrams“, Cryptologia, (2019), DOI: 10.1080/01611194.2018.1522678

A. Peinado, A. Ortiz,
Cryptanalysis of a Key Refreshment Scheme for Multicast protocols by means of Genetic Algorithm“,
Logic Journal of the IGP, veol 21 (4), (2013), pp. 671-679. doi: 10.1093/jigpal/jzs031

A. Peinado, A. Ortiz,
Cryptanalysis of Multicast protocols with Key Refreshment based on the Extended Euclidean Algorithm“,
Lecture Notes in Computer Science, 6694, (2011), pp.177-182 4th International Conference on Computational Intelligent in Security for Information Systems, (CISIS2011) Torremolinos, Málaga, España, 8-10 junio, 2011 Springer, ISBN: 978-3-642-21322-9

J.Munilla, A.Peinado,
Attacks on a Distance Bounding Protocol“,
Computer Communications (2010), 33, pp. 884-889 DOI: 10.1016/j.comcom.2010.01.002

J. Munilla, A. Peinado,
Security flaw in Holbl et al.’s protocol“,
Computer Communications, 32 (2009), pp. 736-739 DOI:10.1016/j.comcom.2008.11.034

J. Munilla, A. Peinado,
Off-line password-guessing attack of Peyravian-Jeffries’s remote user authentication protocol“,
Computer Communications, 30 (2006), pp. 52-54

L.Hernández Encinas, A. Peinado Domínguez,
Comment on ‘A technique for image encryption using digital signature’“,
Optics Communications, 268 (2006), pp. 261-265

A. Peinado,
Cryptanalysis of Park’s Authentication Protocol in Wireless Mobile Communication Systems
International Journal of Network Security, 3 (3), (2006), pp. 279-282. ISSN 1816-353X

J.Muñoz, A. Peinado,
Cryptanalysis of improved Liaw’s Broadcasting Cryptosystem
Journal of Information Science and Engineering, 22 (2006), pp. 391-399

Privacy and Authentication Protocol providing Anonymous Channels in GSM“,
Computer Communications, 27 (2004), pp. 1709-1715

A. Peinado,
Cryptanalysis of LHL-key authentication scheme“,
Applied Mathematics and Computation, 152 (2004), pp 721-724

A.M. Barbancho, A. Peinado,
Cryptanalysis of anonymous channel protocol for large scale area in wireless communications“,
Computer Networks, 43, (6), (2003), pp 777-785


A.Peinado, J. Munilla, A.Fuster-Sabater,
Optimal Modes of Operation of Pseudorandom Sequence Generators based on DLFSRs“,
Logic Journal of the IGPL, 24, pp 933-943 (2016)

A.Peinado, A. Fúster-Sabater.
Generation of pseudorandom binary sequences by means of LFSRs with dynamic feedback“.
Mathematical and Computer Modelling, vol. 57,(2013) no. 11-12, pp. 2596-2604, June 2013, doi:10.1016/j.mcm.2011.07.023

R.Durán Díaz, J. Muñoz Masqué, A. Peinado Domínguez,
A twin for Euler’s phi function in F2[X]“,
Cl. Claret, B. Sunar (eds.), Artihmetic of Finite Fields, Proceedings of the First International Workshop, WAIFI 2007 Lecture Notes in Computer Science, 4547 (2007), pp. 318-332 Springer-Verlag, Berlin, ISBN: 978-3-540-73073-6

J. Muñoz, R. Durán, A. Peinado,
Clasifying Quadratic Maps from Plane to Plane“,
Linear Algebra and its Applications, 364 (2003), pp. 1-12

F. Montoya, J. Muñoz, A. Peinado, A.J. Yuste,
Maximal Periods of x2 + c in Fq“,
Lecture Notes in Computer Science, 2227, (2001), pp. 219-228.

F.Montoya, J.Muñoz, A. Peinado,
Iterated Quadratic functions in F2n“,
International Journal of Applied Mathematics, vol. 5, (1), (2001), pp 65-83 ISSN: 1311-1728

F. Montoya, J. Muñoz, A. Peinado,
Linear complexity of x2 mod p orbits“,
Information Processing Letters, 72 (1999), pp. 3-7

F. Montoya, J. Muñoz, A. Peinado,
Bound for linear complexity of BBS sequences“,
Electronics Letters, 34 (5), (1998), pp. 450-451.

F. Montoya, J. Muñoz, A. Peinado,
“Ciclos máximos de las funciones cuadráticas en GF(2^n)“,
Revista Aportaciones Matemáticas. Serie Comunicaciones, 22, (1998), pp. 125-130.


F. Lozano , A. Ortiz,  J. Munilla , A. Peinado,
Automatic computation of regions of interest by Robust Principal Component Analysis. Application to automatic dementia diagnosis“ ,
Knowledge-Based Systems (2017), Volume 123 Issue C, May 2017, pp 229-237,

A. Peinado, A. Ortiz, G. Cotrina,
Content-based image authentication using sparse features and SOM trajectories“,
Logic Journal of the IGPL, 24 (1), 4-15 (2016) doi: 10.1093/jigpal/jzv039

A.Ortiz, A.Peinado, J.Munilla,
“A scaled test bench for vanets with RFID signalling“,
Computational Intelligence in Security for Information Systems, Advances in intelligent and soft computing, 63 (2009), Springer-Verlag, pp 53-59