Código Científico Revista de Investigación                   Vol. 5 – Núm. 1 / Enero – Junio – 2024 
 
 
646 
 
Referencias bibliográficas 
 
Abdelwahab,  Osama  F.,  Aziza I. Hussein, Hesham  F. A. Hamed,  Hamdy  M.  Kelash,  and 
Ashraf A. M. Khalaf. 2021. “Efficient Combination of RSA Cryptography, Lossy, and 
Lossless Compression Steganography Techniques to Hide Data.” Procedia Computer 
Science 182:5–12. doi: 10.1016/j.procs.2021.02.002. 
Abu-Faraj, Mua’Ad, Abeer Al-Hyari, Khaled Aldebei, Ziad A. Alqadi, and Bilal Al-Ahmad. 
2022.  “Rotation  Left  Digits  to  Enhance  the  Security  Level  of  Message  Blocks 
Cryptography.”  IEEE  Access  10(July):69388–97.  doi: 
10.1109/ACCESS.2022.3187317. 
Ahmad, Khaleel, Afsar Kamal, Khairol Amali Bin Ahmad, Manju Khari, and Rubén González 
Crespo. 2021. “Fast Hybrid-MixNet for Security and Privacy Using NTRU Algorithm.” 
Journal  of  Information  Security  and  Applications  60(June).  doi: 
10.1016/j.jisa.2021.102872. 
Alberts, Garrelt J. N., M. Adriaan Rol, Thorsten Last, Benno W. Broer, Cornelis C. Bultink, 
Matthijs  S. C. Rijlaarsdam, and Amber E.  Van  Hauwermeiren. 2021. “Accelerating 
Quantum  Computer  Developments.”  EPJ  Quantum  Technology  8(1).  doi: 
10.1140/epjqt/s40507-021-00107-w. 
Alexander,  Thomas,  Naoki  Kanazawa,  Daniel  J,  Egger,  Lauren  Capelluto,  Christopher  J, 
Wood, Ali Javadi-Abhari, and  David  C McKay. 2020.  “Qiskit  Pulse: Programming 
Quantum  Computers  through  the  Cloud  with  Pulses.”  Quantum  Science  and 
Technology 5(4). doi: 10.1088/2058-9565/aba404. 
Allard Guérin, Philippe, Veronika Baumann, Flavio Del Santo, and Časlav Brukner. 2021. “A 
No-Go  Theorem  for  the  Persistent  Reality  of  Wigner’s  Friend’s  Perception.” 
Communications Physics 4(1). doi: 10.1038/s42005-021-00589-1. 
Alotaibi, Majid. 2021. “Improved Blowfish Algorithm-Based Secure Routing Technique in 
IoT-Based WSN.” IEEE Access 9:159187–97. doi: 10.1109/ACCESS.2021.3130005. 
Altigani, Abdelrahman, Shafaatunnur Hasan, Bazara Barry, Shiraz Naserelden, Muawia A. 
Elsadig,  and  Huwaida  T.  Elshoush.  2021.  “A  Polymorphic  Advanced  Encryption 
Standard  -  A  Novel  Approach.”  IEEE  Access  9:20191–207.  doi: 
10.1109/ACCESS.2021.3051556. 
Anon. n.d. “CA5350: No Usar Algoritmos Criptográficos No Seguros (Análisis de Código) - 
.NET | Microsoft Learn.” Retrieved March 23, 2024 (https://learn.microsoft.com/es-
es/dotnet/fundamentals/code-analysis/quality-rules/ca5350). 
Bastos, Daniel Chicayban, and Luis Antonio Brasil Kowada. 2021. “How to Detect Whether 
Shor’s  Algorithm  Succeeds  against  Large  Integers  without  a  Quantum  Computer.” 
Procedia Computer Science 195:145–51. doi: 10.1016/j.procs.2021.11.020. 
Bayerstadler, Andreas, Guillaume Becquin, Julia Binder, Thierry Botter, Hans Ehm, Thomas 
Ehmer, Marvin Erdmann, Norbert Gaus, Philipp Harbach, Maximilian Hess, Johannes 
Klepsch, Martin Leib, Sebastian Luber, Andre Luckow, Maximilian Mansky, Wolfgang 
Mauerer,  Florian  Neukart,  Christoph  Niedermeier,  Lilly  Palackal,  Ruben  Pfeiffer, 
Carsten Polenz, Johanna Sepulveda, Tammo Sievers, Brian Standen, Michael Streif, 
Thomas  Strohm,  Clemens  Utschig-Utschig,  Daniel  Volz,  Horst  Weiss,  and  Fabian 
Winter. 2021. “Industry Quantum Computing Applications.” EPJ Quantum Technology 
8(1). doi: 10.1140/epjqt/s40507-021-00114-x. 
BBVA. 2023. Mapa Mundial de La Computación Cuantica. 
Bühler,  Heiko,  Andreas  Walz,  and  Axel  Sikora.  2022.  “Benchmarking  of  Symmetric 
Cryptographic  Algorithms  on  a  Deeply  Embedded  System.”  Pp.  266–71  in  IFAC-
PapersOnLine. Vol. 55. Elsevier B.V.