Address

E.T.S. Ingeniería de Telecomunicación
Communications Engineering Department
Room 1.2.10
Campus de Teatinos s/n

Contact Information

Call: +34952131305

Email: apeinado(at)ic.uma.es

Alberto Peinado Domínguez

Associate Professor
(Profesor Titular)

Department of Communications Engineering
Head of Cryptography and Information Security Lab

Alberto Peinado is Associate Professor at Communications Engineering Department at University of Malaga (UMA, Málaga, Spain), since 2002. He is Ms Sc Telecommunication Engineering (UMA, 1993) and PhD in Computer Science from the Polytechnic University of Madrid, Spain, since 1997. He is an active collaborator of the National Spanish Council for Scientific Research (CSIC) since 1995, and the head of Cryptography and Information Security Lab (L-CSI) at UMA.

His research interests include Cryptography; Security in wireless and mobile communications, specially focused on RFID systems; and Development of new wireless services and applications.

Books

A. Peinado,
«La Clave PILAR. Los telegramas secretos del Gobierno Civil de Málaga«,
UMA Editorial (2023), ISBN: 978-84-1335-230-5.
(Link to the book site)

Current Ph.D. Students

  1. Francisco Lozano. Neuroimage processing for dementia diagnosis using multimodal sparse representation
  2. Meena Musadawq Alshawi. Securing Internet of Underwater Things applications.

Previous Ph.D. Students

  1. Miguel López. Thesis: «SIR Epidemic Models to Study the Propagation of Jamming in Wireless Sensor Networks». Ph.D. 2022
  2. Javier Espinosa García. Thesis: «Proposal of a comprehensive security framework: beyond the physical and logical security. Use cases in SME». Ph.D. 2022
  3. Guillermo Cotrina. Thesis: «Generación de secuencias pseudoaleatorias Gaussianas mediante registros de desplazamiento con realimentación lineal en cuerpos extendidos». Ph.D. 2021
  4. Jorge Munilla Fajardo. Thesis: «Advances in RFID authentication protocols». Ph.D. 2010.

Selected publications (JCR indexed journals)

RFID SECURITY

G. Avoine, M. A. Bingol, I. Boureanu, S. Capkun, G. Hancke, S. Kardas, C. H. Kim, C. Lauradoux, B. Martin, J. Munilla, A. Peinado, K. B. Rasmussen, D. Singelee, A. Tchamkerten, R. Trujillo-Rasua, S. Vaudenay,
«Security of Distance-Bounding: A Survey«,
ACM Computing Surveys, 51 (5) (2018), 94:1-33, doi: 10.1145/3264628

J. Munilla, M. Burmester, A. Peinado, G. Yang, W. Susilo,
«RFID ownership transfer with positive secrecy capacity«,
Sensors, 17 (2017), num 53. doi:10.3390/s17010053

J. Munilla, M. Burmester, A. Peinado,
«Attacks on ownership transfer scheme for multi-tag multi-owner passive RFID environments«,
Computer Communications, 88, pp 84-88 (2016) doi: 10.1016/j.comcom.2016.05.007

A. Peinado, J. Munilla, A. Fuster-Sabater,
«Revision of J3Gen and validity of the attacks by Peinado et al.«,
Sensors (2015), 15, pp. 11988-11992, doi:10.3390/s150511988

A.Peinado, J. Munilla, A. Fúster,
«EPCGen2 Pseudorandom Number Generators: Analysis of J3Gen«,
Sensors (2014), 14, pp. 6500-6515 doi:10.3390/s140406500

J. Munilla, A. Peinado,
«Enhanced Low-Cost RFID Protocol to Detect Relay Attacks«,
Wireless Communications and Mobile Computing, (2009), doi:10.1002/wcm.769

M. Burmester, B. de Medeiros, J. Munilla, A. Peinado,
«Secure EPC Gen2 Compliant Radio Frequency Identification«,
Lecture Notes in Computer Science, 5793, (2009), pp. 227-240 8th International Conference on ADHOC-NOW2009, 22-25 sept-2009, Murcia, España

J. Munilla, A. Peinado,
«Distance Bounding Protocols for RFID enhanced by using void-challenges and analysis in noisy channels«,
Wireless Communications and Mobile Computing, 8 (2008), pp. 1227-1232. DOI: 10.1002/wcm.590

J. Munilla, A. Peinado,
«HB-MP: A further step in the HB-family of Lightweight Authentication Protocols«,
Computer Networks, 51 (2007), pp. 2262-2267

CRYPTANALYSIS

A. Peinado,
«Reconstruction of a 1940 Spanish Strip Cipher by means of a cyclic rotation model applied to encrypted telegrams«, Cryptologia, (2019), DOI: 10.1080/01611194.2018.1522678

A. Peinado, A. Ortiz,
«Cryptanalysis of a Key Refreshment Scheme for Multicast protocols by means of Genetic Algorithm«,
Logic Journal of the IGP, veol 21 (4), (2013), pp. 671-679. doi: 10.1093/jigpal/jzs031

A. Peinado, A. Ortiz,
«Cryptanalysis of Multicast protocols with Key Refreshment based on the Extended Euclidean Algorithm«,
Lecture Notes in Computer Science, 6694, (2011), pp.177-182 4th International Conference on Computational Intelligent in Security for Information Systems, (CISIS2011) Torremolinos, Málaga, España, 8-10 junio, 2011 Springer, ISBN: 978-3-642-21322-9

J.Munilla, A.Peinado,
«Attacks on a Distance Bounding Protocol«,
Computer Communications (2010), 33, pp. 884-889 DOI: 10.1016/j.comcom.2010.01.002

J. Munilla, A. Peinado,
«Security flaw in Holbl et al.’s protocol«,
Computer Communications, 32 (2009), pp. 736-739 DOI:10.1016/j.comcom.2008.11.034

J. Munilla, A. Peinado,
«Off-line password-guessing attack of Peyravian-Jeffries’s remote user authentication protocol«,
Computer Communications, 30 (2006), pp. 52-54

L.Hernández Encinas, A. Peinado Domínguez,
«Comment on ‘A technique for image encryption using digital signature’«,
Optics Communications, 268 (2006), pp. 261-265

A. Peinado,
«Cryptanalysis of Park’s Authentication Protocol in Wireless Mobile Communication Systems»
International Journal of Network Security, 3 (3), (2006), pp. 279-282. ISSN 1816-353X

J.Muñoz, A. Peinado,
«Cryptanalysis of improved Liaw’s Broadcasting Cryptosystem»
Journal of Information Science and Engineering, 22 (2006), pp. 391-399

A.Peinado,
«Privacy and Authentication Protocol providing Anonymous Channels in GSM«,
Computer Communications, 27 (2004), pp. 1709-1715

A. Peinado,
«Cryptanalysis of LHL-key authentication scheme«,
Applied Mathematics and Computation, 152 (2004), pp 721-724

A.M. Barbancho, A. Peinado,
«Cryptanalysis of anonymous channel protocol for large scale area in wireless communications«,
Computer Networks, 43, (6), (2003), pp 777-785

CRYPTOGRAPHY. STREAM CIPHERS. PSEUDORANDOM NUMBER GENERATION

Espinosa, J., Cotrina, A. Peinado, A. Ortiz,
Security and efficiency of linear feedback shift registers in GF(2^n) using n-bit grouped operations”,
Mathematics, 10, article 996, (2022)

Cotrina, A. Peinado, A. Ortiz,
Gaussian Pseudorandom Number Generator using Linear Feedback Shift Registers in extended fields”,
Mathematics, 9, article 556, (2021); doi:10.3390/math9050556

Cotrina, A. Peinado, A. Ortiz,
Gaussian Pseudorandom Number Generator Based on Cyclic Rotations of Linear Feedback Shift Registers”,
Sensors, 20, article 2103, (2020); doi:10.3390/s20072103

.Peinado, J. Munilla, A.Fuster-Sabater,
«Optimal Modes of Operation of Pseudorandom Sequence Generators based on DLFSRs«,
Logic Journal of the IGPL, 24, pp 933-943 (2016)

A.Peinado, A. Fúster-Sabater.
«Generation of pseudorandom binary sequences by means of LFSRs with dynamic feedback«.
Mathematical and Computer Modelling, vol. 57,(2013) no. 11-12, pp. 2596-2604, June 2013, doi:10.1016/j.mcm.2011.07.023

R.Durán Díaz, J. Muñoz Masqué, A. Peinado Domínguez,
«A twin for Euler’s phi function in F2[X]«,
Cl. Claret, B. Sunar (eds.), Artihmetic of Finite Fields, Proceedings of the First International Workshop, WAIFI 2007 Lecture Notes in Computer Science, 4547 (2007), pp. 318-332 Springer-Verlag, Berlin, ISBN: 978-3-540-73073-6

J. Muñoz, R. Durán, A. Peinado,
«Clasifying Quadratic Maps from Plane to Plane«,
Linear Algebra and its Applications, 364 (2003), pp. 1-12

F. Montoya, J. Muñoz, A. Peinado, A.J. Yuste,
«Maximal Periods of x2 + c in Fq«,
Lecture Notes in Computer Science, 2227, (2001), pp. 219-228.

F.Montoya, J.Muñoz, A. Peinado,
«Iterated Quadratic functions in F2n«,
International Journal of Applied Mathematics, vol. 5, (1), (2001), pp 65-83 ISSN: 1311-1728

F. Montoya, J. Muñoz, A. Peinado,
«Linear complexity of x2 mod p orbits«,
Information Processing Letters, 72 (1999), pp. 3-7

F. Montoya, J. Muñoz, A. Peinado,
«Bound for linear complexity of BBS sequences«,
Electronics Letters, 34 (5), (1998), pp. 450-451.

F. Montoya, J. Muñoz, A. Peinado,
«Ciclos máximos de las funciones cuadráticas en GF(2^n)«,
Revista Aportaciones Matemáticas. Serie Comunicaciones, 22, (1998), pp. 125-130.

WIRELESS SERVICES, APPLICATIONS & OTHERS

Espinosa, L. Hernández-Encinas, A. Peinado,
A Comprehensive Security Framework Proposal to Contribute to Sustainability”,
Sustainability, 2021, 13, 6901. https://doi.org/10.3390/su13126901

López, M. Peinado, A. Ortiz,
Characterizing Two Outbreak Waves of COVID-19 in Spain Using Phenomenological Epidemic Modelling”,
PLOS ONE, 2021

López, M. Peinado, A. Ortiz,
«An extensive validation of a SIR epidemic model to study the propagation of jamming attacks against IoT wireless networks«,
Computer Networks, 165 (24) (2019), 106945,  DOI: 10.1016/j.comnet.2019.106945

F. Lozano , A. Ortiz,  J. Munilla , A. Peinado,
«Automatic computation of regions of interest by Robust Principal Component Analysis. Application to automatic dementia diagnosis«,
Knowledge-Based Systems (2017), Volume 123 Issue C, May 2017, pp 229-237, doi.org/10.1016/j.knosys.2017.02.025

A. Peinado, A. Ortiz, G. Cotrina,
«Content-based image authentication using sparse features and SOM trajectories«,
Logic Journal of the IGPL, 24 (1), 4-15 (2016) doi: 10.1093/jigpal/jzv039

A.Ortiz, A.Peinado, J.Munilla,
«A scaled test bench for vanets with RFID signalling«,
Computational Intelligence in Security for Information Systems, Advances in intelligent and soft computing, 63 (2009), Springer-Verlag, pp 53-59