IMG_0793

Pedro Peris-Lopez has a M.Sc. in Telecommunications Engineering (2004) and Ph.D. in Computer Science (2008) from the University Carlos III of Madrid.

From October 2004 to December 2008 he hold a position as Assistant Teacher at University Carlos III of Madrid (Spain), being involved both in academic and research tasks. In January 2009, he started to work as Postdoctoral Research at Delft University of Technology (The Netherlands). In Delft he was mainly focused on research but he had the opportunity to serve as Invited Lecturer in the subject of Cryptography and Security at the Master of Computer Science and also as Field Supervisor of a PhD candidate from the Universiti Sains Malaysia (Malaysia). Moreover he enrolled in several training courses (“University Teaching Qualification”) pursuing to increase his teaching skills. In September 2011 he started to work as a Visiting Lecturer at the University Carlos III of Madrid.

Regarding international mobility, he worked three years (January 2009 to January 2012) as Postdoctoral Researcher at the University of Delft. Moreover in June 2011 he was invited for a short stay in the Ecole Federale of Lausanne (EPFL) in the programme called “Summer Research Institute”. As consequence of his international reputation, he has been invited as speaker in Universities (e.g., Radboud University Nijmegen, K. U. Leuven, Portsmouth University, EPFL, etc) and Research Centres (e.g. I2R Singapore). Furthermore he has acted as part of the assessment panel in National and International PhD defences.

He has published many articles in International Journals with impact factor and papers in International Conferences of recognized prestige (peer- reviewed; 2-4 reviewers). His works have a high impact: the whole of his works have more than 1500 cites and his h-index is 17 (08/2014 – Google Scholar). His research interest are in the field of cryptography, computer forensics, signal processing, and artificial intelligence. Nowadays, his research is focused on three main areas in which he has published a great number of papers in specialized journals and conference proceedings. Some of his most relevant works in each of these fields are listed below:

Security & e-health (Biosignals and IMDs)

  • [PDF] C. Camara, P. Peris-Lopez, and J. E. Tapiador, “Security and privacy issues in implantable medical devices: a comprehensive survey.,” Journal of biomedical informatics, vol. 55, pp. 272-289, 2015.
    [Bibtex]
    @article{j37camarapt2015,
    title = "Security and privacy issues in implantable medical devices: A comprehensive survey.",
    journal = "Journal of Biomedical Informatics",
    volume = "55",
    number = "",
    pages = "272-289",
    year = "2015",
    note = "",
    issn = "",
    doi = "",
    url = "",
    author = {Camara, C. and Peris-Lopez, P. and Tapiador, J. E.},
    }

  • [PDF] R. M. Seepers, C. Strydis, P. Peris-Lopez, I. Sourdis, and C. I. De Zeeuw, “Peak misdetection in heart-beat-based security: characterization and tolerance,” in International conference of the ieee engineering in medicine and biology society — embc’14, 2014.
    [Bibtex]
    @INPROCEEDINGS{c30sspsz2014,
    year={2014},
    booktitle={International Conference of the IEEE Engineering in Medicine and Biology Society -- EMBC'14},
    volume={},
    series={},
    doi={},
    title={Peak Misdetection in Heart-Beat-Based Security: Characterization and Tolerance},
    url={},
    publisher={},
    keywords={},
    author={Seepers, R. M. and Strydis, C. and Peris-Lopez, P. and Sourdis, I. and De Zeeuw, C. I.},
    pages={},
    }

Security & Hardware

  • [PDF] [DOI] H. Martin, P. Peris-Lopez, J. E. Tapiador, and E. San Millan, “An estimator for the asic footprint area of lightweight cryptographic algorithms,” Ieee transactions on industrial informatics, vol. 10, iss. 2, pp. 1216-1225, 2014.
    [Bibtex]
    @null{j27hpts2013,
    author={Martin, H. and Peris-Lopez, P. and Tapiador, J.E. and San Millan, E.},
    journal={IEEE Transactions on Industrial Informatics},
    title={An Estimator for the ASIC Footprint Area of Lightweight Cryptographic Algorithms},
    year={2014},
    volume={10},
    number={2},
    pages={1216-1225},
    keywords={Algorithm design and analysis;Clocks;Computer architecture;Cryptography;Hardware;Multiplexing;Registers;ASIC implementations;Footprint area;Lightweight algorithms;RFID;VHDL},
    doi={10.1109/TII.2013.2288576},
    ISSN={1551-3203},}

  • [PDF] [DOI] C. Strydis, R. M. Seepers, P. Peris-Lopez, D. Siskos, and I. Sourdis, “A system architecture, processor, and communication protocol for secure implants,” Acm trans. archit. code optim., vol. 10, iss. 4, p. 57:1-57:23, 2013.
    [Bibtex]
    @article{j29sspss2014,
    author = {Strydis, C. and Seepers, R. M. and Peris-Lopez, P. and Siskos, D. and Sourdis, I.},
    title = {A System Architecture, Processor, and Communication Protocol for Secure Implants},
    journal = {ACM Trans. Archit. Code Optim.},
    volume = {10},
    number = {4},
    year = {2013},
    pages = {57:1-57:23},
    articleno = {57},
    numpages = {23},
    url = {http://doi.acm.org/10.1145/2555289.2555313},
    doi = {10.1145/2555289.2555313},
    acmid = {2555313},
    publisher = {ACM},
    }

Security & Smart Devices

  • [PDF] [DOI] G. Suarez-Tangil, J. E. Tapiador, P. Peris-Lopez, and A. Ribagorda, “Evolution, detection and analysis of malware for smart devices,” Ieee communications surveys & tutorials, vol. 16, iss. 2, pp. 961-987, 2014.
    [Bibtex]
    @article{j26stpr2013,
    title = "Evolution, Detection and Analysis of Malware for Smart Devices",
    journal = "IEEE Communications Surveys \& Tutorials",
    volume = "16",
    number = "2",
    pages = "961-987",
    year = "2014",
    note = "",
    issn = "",
    doi = "10.1109/SURV.2013.101613.00077",
    url = "",
    author = "Guillermo Suarez-Tangil and Juan E. Tapiador and Pedro Peris-Lopez and Arturo Ribagorda",
    }

  • [PDF] [DOI] G. Suarez-Tangil, J. E. Tapiador, P. Peris-Lopez, and J. Blasco, “Dendroid: a text mining approach to analyzing and classifying code structures in android malware families,” Expert systems with applications, vol. 41, iss. 4, Part 1, pp. 1104-1117, 2014.
    [Bibtex]
    @article{j25stpb2013,
    title = "Dendroid: A text mining approach to analyzing and classifying code structures in Android malware families ",
    journal = "Expert Systems with Applications ",
    volume = "41",
    number = "4, Part 1",
    pages = "1104 - 1117 ",
    year = "2014",
    note = "",
    issn = "0957-4174",
    doi = "10.1016/j.eswa.2013.07.106",
    url = "http://www.sciencedirect.com/science/article/pii/S0957417413006088",
    author = "Guillermo Suarez-Tangil and Juan E. Tapiador and Pedro Peris-Lopez and Jorge Blasco",
    }

© Copyright Pedro Peris-Lopez – LW Cryptography 2016. All Rights Reserved