Código Científico Revista de Investigación Vol. 5 – Núm. 1 / Enero – Junio – 2024
646
Referencias bibliográficas
Abdelwahab, Osama F., Aziza I. Hussein, Hesham F. A. Hamed, Hamdy M. Kelash, and
Ashraf A. M. Khalaf. 2021. “Efficient Combination of RSA Cryptography, Lossy, and
Lossless Compression Steganography Techniques to Hide Data.” Procedia Computer
Science 182:5–12. doi: 10.1016/j.procs.2021.02.002.
Abu-Faraj, Mua’Ad, Abeer Al-Hyari, Khaled Aldebei, Ziad A. Alqadi, and Bilal Al-Ahmad.
2022. “Rotation Left Digits to Enhance the Security Level of Message Blocks
Cryptography.” IEEE Access 10(July):69388–97. doi:
10.1109/ACCESS.2022.3187317.
Ahmad, Khaleel, Afsar Kamal, Khairol Amali Bin Ahmad, Manju Khari, and Rubén González
Crespo. 2021. “Fast Hybrid-MixNet for Security and Privacy Using NTRU Algorithm.”
Journal of Information Security and Applications 60(June). doi:
10.1016/j.jisa.2021.102872.
Alberts, Garrelt J. N., M. Adriaan Rol, Thorsten Last, Benno W. Broer, Cornelis C. Bultink,
Matthijs S. C. Rijlaarsdam, and Amber E. Van Hauwermeiren. 2021. “Accelerating
Quantum Computer Developments.” EPJ Quantum Technology 8(1). doi:
10.1140/epjqt/s40507-021-00107-w.
Alexander, Thomas, Naoki Kanazawa, Daniel J, Egger, Lauren Capelluto, Christopher J,
Wood, Ali Javadi-Abhari, and David C McKay. 2020. “Qiskit Pulse: Programming
Quantum Computers through the Cloud with Pulses.” Quantum Science and
Technology 5(4). doi: 10.1088/2058-9565/aba404.
Allard Guérin, Philippe, Veronika Baumann, Flavio Del Santo, and Časlav Brukner. 2021. “A
No-Go Theorem for the Persistent Reality of Wigner’s Friend’s Perception.”
Communications Physics 4(1). doi: 10.1038/s42005-021-00589-1.
Alotaibi, Majid. 2021. “Improved Blowfish Algorithm-Based Secure Routing Technique in
IoT-Based WSN.” IEEE Access 9:159187–97. doi: 10.1109/ACCESS.2021.3130005.
Altigani, Abdelrahman, Shafaatunnur Hasan, Bazara Barry, Shiraz Naserelden, Muawia A.
Elsadig, and Huwaida T. Elshoush. 2021. “A Polymorphic Advanced Encryption
Standard - A Novel Approach.” IEEE Access 9:20191–207. doi:
10.1109/ACCESS.2021.3051556.
Anon. n.d. “CA5350: No Usar Algoritmos Criptográficos No Seguros (Análisis de Código) -
.NET | Microsoft Learn.” Retrieved March 23, 2024 (https://learn.microsoft.com/es-
es/dotnet/fundamentals/code-analysis/quality-rules/ca5350).
Bastos, Daniel Chicayban, and Luis Antonio Brasil Kowada. 2021. “How to Detect Whether
Shor’s Algorithm Succeeds against Large Integers without a Quantum Computer.”
Procedia Computer Science 195:145–51. doi: 10.1016/j.procs.2021.11.020.
Bayerstadler, Andreas, Guillaume Becquin, Julia Binder, Thierry Botter, Hans Ehm, Thomas
Ehmer, Marvin Erdmann, Norbert Gaus, Philipp Harbach, Maximilian Hess, Johannes
Klepsch, Martin Leib, Sebastian Luber, Andre Luckow, Maximilian Mansky, Wolfgang
Mauerer, Florian Neukart, Christoph Niedermeier, Lilly Palackal, Ruben Pfeiffer,
Carsten Polenz, Johanna Sepulveda, Tammo Sievers, Brian Standen, Michael Streif,
Thomas Strohm, Clemens Utschig-Utschig, Daniel Volz, Horst Weiss, and Fabian
Winter. 2021. “Industry Quantum Computing Applications.” EPJ Quantum Technology
8(1). doi: 10.1140/epjqt/s40507-021-00114-x.
BBVA. 2023. Mapa Mundial de La Computación Cuantica.
Bühler, Heiko, Andreas Walz, and Axel Sikora. 2022. “Benchmarking of Symmetric
Cryptographic Algorithms on a Deeply Embedded System.” Pp. 266–71 in IFAC-
PapersOnLine. Vol. 55. Elsevier B.V.