| Teaching | Course | Subject |
|---|---|---|
| PARS Enginyeria Informàtica | 1 | COMPUTER ORGANIZATION I |
| PARS Enginyeria Informàtica | 1 | COMPUTER ORGANIZATION II |
| Master's Degree in Informatics Engineering | 1 | HIGH PERFORMANCE COMPUTING |
| Double degree: Degree in Computer Engineering and Degree in BAM | 1 | COMPUTER ORGANIZATION I |
| Double degree: Degree in Computer Engineering and Degree in BAM | 1 | COMPUTER ORGANIZATION II |
| Degree in Computer Engineering | 1 | COMPUTER ORGANIZATION I |
| Degree in Computer Engineering | 1 | COMPUTER ORGANIZATION II |
| PARS Enginyeries Industrials | 3 | INDUSTRIAL COMPUTING |
| Degree in Industrial Electronic and Automation Engineering | 3 | INDUSTRIAL COMPUTING |
| Degree in Computer Engineering | 4 | BACHELOR'S THESIS |
| Double degree: Degree in Computer Engineering and Degree in BAM | 5 | BACHELOR'S THESIS |
| Research projects | Start date | End date | Main researchers |
|---|---|---|---|
| Técnicas criptográficas con curvas elípticas e hiperelípticas | 01/01/2011 | 30/09/2014 | JOSEP MARIA MIRET BIOSCA |
| Algoritmos y protocolos criptográficos con curvas elípticas e hiperelípticas | 01/10/2007 | 03/08/2010 | JOSEP MARIA MIRET BIOSCA |
| Thesis | Year | Direction |
|---|---|---|
| Volcans d'isogènies de corbes el·líptiques: aplicacions criptogràfiques en targetes intel·ligents (codirección Daniel Sadornil) | 2011 | Josep M. Miret; Daniel Sadornil |
| Publications | Year | Authors | Type |
|---|---|---|---|
| Securing databases by using diagonal-based order preserving symmetric encryption | 2014 | Martínez S, Miret JM, Tomàs R, Valls M. | Article d'investigació |
| Security analysis of order preserving symmetric cryptography | 2013 | Martínez S, Miret JM, Tomàs R, Valls M. | Article d'investigació |
| On Edwards curves and ZVP-attacks | 2013 | Martínez S, Sadornil D, Tena J, Tomàs R, Valls M. | Article d'investigació |
| A Non-reducible Meyer-Müller's like elliptic curve cryptosystem | 2012 | Martínez S, Miret JM, Sebé F, Tomàs R. | Article d'investigació |
| On avoiding ZVP-attacks using Isogeny Volcanoes | 2009 | Miret JM, Sadornil D, Tena J, Tomás R, Valls M. | Article d'investigació |
| Exploiting Isogeny Cordillera Structure to Obtain Cryptographically Good Elliptic Curves | 2008 | Miret JM, Sadornil D, Tena J, Tomás R, Valls M. | Article d'investigació |
| Volcanoes of l-isogenies of elliptic curves over finite fields: the case l=3 | 2007 | Miret JM, Sadornil D, Tena J, Tomás R, Valls M. | Article d'investigació |