BibTeX records: Paz Morillo

download as .bib file

@article{DBLP:journals/corr/abs-2304-08860,
  author       = {Ramiro Mart{\'{\i}}nez and
                  Paz Morillo},
  title        = {Revisiting Fast Fourier multiplication algorithms on quotient rings},
  journal      = {CoRR},
  volume       = {abs/2304.08860},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2304.08860},
  doi          = {10.48550/ARXIV.2304.08860},
  eprinttype    = {arXiv},
  eprint       = {2304.08860},
  timestamp    = {Mon, 24 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2304-08860.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MartinezMR23,
  author       = {Ramiro Mart{\'{\i}}nez and
                  Paz Morillo and
                  Sergi Rovira},
  title        = {Implementation and performance of a RLWE-based commitment scheme and
                  ZKPoK for its linear and multiplicative relations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1026},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1026},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MartinezMR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DazaMR22,
  author       = {Vanesa Daza and
                  Paz Morillo and
                  Sergi Rovira},
  title        = {Leveled Multikey {FHE} with constant-size ciphertexts from {RLWE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {447},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/447},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DazaMR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlborchMM21,
  author       = {Ferran Alborch and
                  Ramiro Mart{\'{\i}}nez and
                  Paz Morillo},
  title        = {RLWE-based distributed key generation and threshold decryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1694},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1694},
  timestamp    = {Thu, 13 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AlborchMM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/CostaMM19,
  author       = {N{\'{u}}ria Costa and
                  Ramiro Mart{\'{\i}}nez and
                  Paz Morillo},
  editor       = {Andrea Bracciali and
                  Jeremy Clark and
                  Federico Pintore and
                  Peter B. R{\o}nne and
                  Massimiliano Sala},
  title        = {Lattice-Based Proof of a Shuffle},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2019 International
                  Workshops, {VOTING} and WTSC, St. Kitts, St. Kitts and Nevis, February
                  18-22, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11599},
  pages        = {330--346},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-43725-1\_23},
  doi          = {10.1007/978-3-030-43725-1\_23},
  timestamp    = {Mon, 03 Jan 2022 22:29:34 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/CostaMM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/MartinezM19,
  author       = {Ramiro Mart{\'{\i}}nez and
                  Paz Morillo},
  editor       = {Martin Albrecht},
  title        = {RLWE-Based Zero-Knowledge Proofs for Linear and Multiplicative Relations},
  booktitle    = {Cryptography and Coding - 17th {IMA} International Conference, {IMACC}
                  2019, Oxford, UK, December 16-18, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11929},
  pages        = {252--277},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-35199-1\_13},
  doi          = {10.1007/978-3-030-35199-1\_13},
  timestamp    = {Fri, 15 Dec 2023 20:21:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/MartinezM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CostaMM19,
  author       = {N{\'{u}}ria Costa and
                  Ramiro Mart{\'{\i}}nez and
                  Paz Morillo},
  title        = {Lattice-based proof of a shuffle},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {357},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/357},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CostaMM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MartinezM19,
  author       = {Ramiro Mart{\'{\i}}nez and
                  Paz Morillo},
  title        = {RLWE-based Zero-Knowledge Proofs for linear and multiplicative relations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1486},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1486},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MartinezM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/CostaMM17,
  author       = {N{\'{u}}ria Costa and
                  Ramiro Mart{\'{\i}}nez and
                  Paz Morillo},
  editor       = {Helger Lipmaa and
                  Aikaterini Mitrokotsa and
                  Raimundas Matulevicius},
  title        = {Proof of a Shuffle for Lattice-Based Cryptography},
  booktitle    = {Secure {IT} Systems - 22nd Nordic Conference, NordSec 2017, Tartu,
                  Estonia, November 8-10, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10674},
  pages        = {280--296},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70290-2\_17},
  doi          = {10.1007/978-3-319-70290-2\_17},
  timestamp    = {Mon, 26 Jun 2023 20:48:37 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/CostaMM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CostaMM17,
  author       = {N{\'{u}}ria Costa and
                  Ramiro Mart{\'{\i}}nez and
                  Paz Morillo},
  title        = {Proof of a shuffle for lattice-based cryptography (Full version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {900},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/900},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CostaMM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/MorilloRV16,
  author       = {Paz Morillo and
                  Carla R{\`{a}}fols and
                  Jorge Luis Villar},
  editor       = {Jung Hee Cheon and
                  Tsuyoshi Takagi},
  title        = {The Kernel Matrix Diffie-Hellman Assumption},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10031},
  pages        = {729--758},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53887-6\_27},
  doi          = {10.1007/978-3-662-53887-6\_27},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/MorilloRV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/GuaschM16,
  author       = {Sandra Guasch and
                  Paz Morillo},
  editor       = {Jens Grossklags and
                  Bart Preneel},
  title        = {How to Challenge and Cast Your e-Vote},
  booktitle    = {Financial Cryptography and Data Security - 20th International Conference,
                  {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9603},
  pages        = {130--145},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-54970-4\_8},
  doi          = {10.1007/978-3-662-54970-4\_8},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/GuaschM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/EscalaGHM16,
  author       = {Alex Escala and
                  Sandra Guasch and
                  Javier Herranz and
                  Paz Morillo},
  editor       = {Jeremy Clark and
                  Sarah Meiklejohn and
                  Peter Y. A. Ryan and
                  Dan S. Wallach and
                  Michael Brenner and
                  Kurt Rohloff},
  title        = {Universal Cast-as-Intended Verifiability},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2016 International
                  Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February
                  26, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9604},
  pages        = {233--250},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53357-4\_16},
  doi          = {10.1007/978-3-662-53357-4\_16},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/EscalaGHM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/voteid/BibiloniEM15,
  author       = {Pedro Bibiloni and
                  Alex Escala and
                  Paz Morillo},
  editor       = {Rolf Haenni and
                  Reto E. Koenig and
                  Douglas Wikstr{\"{o}}m},
  title        = {Vote Validatability in Mix-Net-Based eVoting},
  booktitle    = {E-Voting and Identity - 5th International Conference, VoteID 2015,
                  Bern, Switzerland, September 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9269},
  pages        = {92--109},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22270-7\_6},
  doi          = {10.1007/978-3-319-22270-7\_6},
  timestamp    = {Thu, 27 Feb 2020 12:57:39 +0100},
  biburl       = {https://dblp.org/rec/conf/voteid/BibiloniEM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MorilloRV15,
  author       = {Paz Morillo and
                  Carla R{\`{a}}fols and
                  Jorge L. Villar},
  title        = {Matrix Computational Assumptions in Multilinear Groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {353},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/353},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MorilloRV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/MorilloO13,
  author       = {Paz Morillo and
                  Marc Obrador},
  editor       = {Jordi Castell{\`{a}}{-}Roca and
                  Josep Domingo{-}Ferrer and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Ali A. Ghorbani and
                  Christian Damsgaard Jensen and
                  Jes{\'{u}}s A. Manj{\'{o}}n and
                  Iosif{-}Viorel Onut and
                  Natalia Stakhanova and
                  Vicen{\c{c}} Torra and
                  Jie Zhang},
  title        = {Efficient polynomial delegation under standard assumptions},
  booktitle    = {Eleventh Annual International Conference on Privacy, Security and
                  Trust, {PST} 2013, 10-12 July, 2013, Tarragona, Catalonia, Spain,
                  July 10-12, 2013},
  pages        = {301--308},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/PST.2013.6596066},
  doi          = {10.1109/PST.2013.6596066},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/MorilloO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ObradorMG12,
  author       = {Marc Obrador and
                  Paz Morillo and
                  Sandra Guasch},
  title        = {Applications of Polynomial Properties to Verifiable Delegation of
                  Computation and Electronic Voting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {726},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/726},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ObradorMG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/EscalaHM11,
  author       = {Alex Escala and
                  Javier Herranz and
                  Paz Morillo},
  editor       = {Abderrahmane Nitaj and
                  David Pointcheval},
  title        = {Revocable Attribute-Based Signatures with Adaptive Security in the
                  Standard Model},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2011 - 4th International Conference
                  on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6737},
  pages        = {224--241},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21969-6\_14},
  doi          = {10.1007/978-3-642-21969-6\_14},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/africacrypt/EscalaHM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EscalaHM11,
  author       = {Alex Escala and
                  Javier Herranz and
                  Paz Morillo},
  title        = {Revocable Attribute-Based Signatures with Adaptive Security in the
                  Standard Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {52},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/052},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EscalaHM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aaecc/DazaHMR10,
  author       = {Vanesa Daza and
                  Javier Herranz and
                  Paz Morillo and
                  Carla R{\`{a}}fols},
  title        = {Extensions of access structures and their cryptographic applications},
  journal      = {Appl. Algebra Eng. Commun. Comput.},
  volume       = {21},
  number       = {4},
  pages        = {257--284},
  year         = {2010},
  url          = {https://doi.org/10.1007/s00200-010-0125-1},
  doi          = {10.1007/S00200-010-0125-1},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/aaecc/DazaHMR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/MorilloR09,
  author       = {Paz Morillo and
                  Carla R{\`{a}}fols},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {The Security of All Bits Using List Decoding},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {15--33},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_2},
  doi          = {10.1007/978-3-642-00468-1\_2},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/MorilloR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/GalindoMR08,
  author       = {David Galindo and
                  Paz Morillo and
                  Carla R{\`{a}}fols},
  title        = {Improved certificate-based encryption in the standard model},
  journal      = {J. Syst. Softw.},
  volume       = {81},
  number       = {7},
  pages        = {1218--1226},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.jss.2007.09.009},
  doi          = {10.1016/J.JSS.2007.09.009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jss/GalindoMR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DazaHMR08,
  author       = {Vanesa Daza and
                  Javier Herranz and
                  Paz Morillo and
                  Carla R{\`{a}}fols},
  title        = {Extended Access Structures and Their Cryptographic Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {502},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/502},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DazaHMR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/DazaHMR07,
  author       = {Vanesa Daza and
                  Javier Herranz and
                  Paz Morillo and
                  Carla R{\`{a}}fols},
  title        = {Cryptographic techniques for mobile ad-hoc networks},
  journal      = {Comput. Networks},
  volume       = {51},
  number       = {18},
  pages        = {4938--4950},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.comnet.2007.08.002},
  doi          = {10.1016/J.COMNET.2007.08.002},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/DazaHMR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/DazaHMR07,
  author       = {Vanesa Daza and
                  Javier Herranz and
                  Paz Morillo and
                  Carla R{\`{a}}fols},
  editor       = {Willy Susilo and
                  Joseph K. Liu and
                  Yi Mu},
  title        = {CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts},
  booktitle    = {Provable Security, First International Conference, ProvSec 2007, Wollongong,
                  Australia, November 1-2, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4784},
  pages        = {35--50},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75670-5\_3},
  doi          = {10.1007/978-3-540-75670-5\_3},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/DazaHMR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/DazaHMR08,
  author       = {Vanesa Daza and
                  Javier Herranz and
                  Paz Morillo and
                  Carla R{\`{a}}fols},
  editor       = {Giovanni Di Crescenzo and
                  Refik Molva},
  title        = {Ad-Hoc Threshold Broadcast Encryption with Shorter Ciphertexts},
  booktitle    = {Proceedings of theThird Workshop on Cryptography for Ad-hoc Networks,
                  WCAN@ICALP 2007, Wroclaw, Poland, July 8, 2007},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {192},
  number       = {2},
  pages        = {3--15},
  publisher    = {Elsevier},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.entcs.2008.05.002},
  doi          = {10.1016/J.ENTCS.2008.05.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entcs/DazaHMR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DazaHMR07,
  author       = {Vanesa Daza and
                  Javier Herranz and
                  Paz Morillo and
                  Carla R{\`{a}}fols},
  title        = {CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {127},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/127},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DazaHMR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europki/GalindoMR06,
  author       = {David Galindo and
                  Paz Morillo and
                  Carla R{\`{a}}fols},
  editor       = {Andrea S. Atzeni and
                  Antonio Lioy},
  title        = {Breaking Yum and Lee Generic Constructions of Certificate-Less and
                  Certificate-Based Encryption Schemes},
  booktitle    = {Public Key Infrastructure, Third European {PKI} Workshop: Theory and
                  Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4043},
  pages        = {81--91},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11774716\_7},
  doi          = {10.1007/11774716\_7},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/europki/GalindoMR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/DazaMR07,
  author       = {Vanesa Daza and
                  Paz Morillo and
                  Carla R{\`{a}}fols},
  editor       = {Giovanni Di Crescenzo and
                  Luigi V. Mancini},
  title        = {On Dynamic Distribution of Private Keys over MANETs},
  booktitle    = {Proceedings of the Second Workshop on Cryptography for Ad-hoc Networks,
                  WCAN@ICALP 2006, Venice, Italy, July 16, 2006},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {171},
  number       = {1},
  pages        = {33--41},
  publisher    = {Elsevier},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.entcs.2006.11.008},
  doi          = {10.1016/J.ENTCS.2006.11.008},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entcs/DazaMR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MorilloR06,
  author       = {Paz Morillo and
                  Carla R{\`{a}}fols},
  title        = {Certificate-Based Encryption Without Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {12},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/012},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MorilloR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/GalindoMMV05,
  author       = {David Galindo and
                  Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and
                  Paz Morillo and
                  Jorge Luis Villar},
  title        = {Fujisaki-Okamoto hybrid encryption revisited},
  journal      = {Int. J. Inf. Sec.},
  volume       = {4},
  number       = {4},
  pages        = {228--241},
  year         = {2005},
  url          = {https://doi.org/10.1007/s10207-004-0042-z},
  doi          = {10.1007/S10207-004-0042-Z},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/GalindoMMV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dam/PadroGMM03,
  author       = {Carles Padr{\'{o}} and
                  Ignacio Gracia and
                  Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and
                  Paz Morillo},
  title        = {Linear Broadcast Encryption Schemes},
  journal      = {Discret. Appl. Math.},
  volume       = {128},
  number       = {1},
  pages        = {223--238},
  year         = {2003},
  url          = {https://doi.org/10.1016/S0166-218X(02)00447-X},
  doi          = {10.1016/S0166-218X(02)00447-X},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dam/PadroGMM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/GalindoMMV03,
  author       = {David Galindo and
                  Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and
                  Paz Morillo and
                  Jorge Luis Villar},
  editor       = {Colin Boyd and
                  Wenbo Mao},
  title        = {Easy Verifiable Primitives and Practical Public Key Cryptosystems},
  booktitle    = {Information Security, 6th International Conference, {ISC} 2003, Bristol,
                  UK, October 1-3, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2851},
  pages        = {69--83},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/10958513\_6},
  doi          = {10.1007/10958513\_6},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/GalindoMMV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itw/GalindoMMV03,
  author       = {David Galindo and
                  Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and
                  Paz Morillo and
                  Jorge L. Villar},
  title        = {An {IND-CPA} cryptosystem from Demytko's primitive},
  booktitle    = {Proceedings 2003 {IEEE} Information Theory Workshop, {ITW} 2003, La
                  Sorbonne, Paris, France, 31 March - 4 April, 2003},
  pages        = {167--170},
  publisher    = {{IEEE}},
  year         = {2003},
  url          = {https://doi.org/10.1109/ITW.2003.1216721},
  doi          = {10.1109/ITW.2003.1216721},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/itw/GalindoMMV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GalindoMMV03,
  author       = {David Galindo and
                  Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and
                  Paz Morillo and
                  Jorge Luis Villar},
  editor       = {Yvo Desmedt},
  title        = {A Practical Public Key Cryptosystem from Paillier and Rabin Schemes},
  booktitle    = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on
                  Theory and Practice in Public Key Cryptography, Miami, FL, USA, January
                  6-8, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2567},
  pages        = {279--291},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36288-6\_21},
  doi          = {10.1007/3-540-36288-6\_21},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/GalindoMMV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalindoMMV03,
  author       = {David Galindo and
                  Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and
                  Paz Morillo and
                  Jorge L. Villar},
  title        = {Fujisaki-Okamoto {IND-CCA} hybrid encryption revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {107},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/107},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalindoMMV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/PadroGMM02,
  author       = {Carles Padr{\'{o}} and
                  Ignacio Gracia and
                  Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and
                  Paz Morillo},
  title        = {Linear Key Predistribution Schemes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {25},
  number       = {3},
  pages        = {281--298},
  year         = {2002},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/PadroGMM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalindoMMV02,
  author       = {David Galindo and
                  Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and
                  Paz Morillo and
                  Jorge L. Villar},
  title        = {An efficient semantically secure elliptic curve cryptosystem based
                  on {KMOV}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {37},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/037},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalindoMMV02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalindoMMV02a,
  author       = {David Galindo and
                  Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and
                  Paz Morillo and
                  Jorge L. Villar},
  title        = {A semantically secure elliptic curve {RSA} scheme with small expansion
                  factor},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {83},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/083},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalindoMMV02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/appml/MartinMV01,
  author       = {Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and
                  Paz Morillo and
                  Jorge Luis Villar},
  title        = {Computing the order of points on an elliptic curve modulo {N} is as
                  difficult as factoring {N}},
  journal      = {Appl. Math. Lett.},
  volume       = {14},
  number       = {3},
  pages        = {341--346},
  year         = {2001},
  url          = {https://doi.org/10.1016/S0893-9659(00)00159-2},
  doi          = {10.1016/S0893-9659(00)00159-2},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/appml/MartinMV01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/endm/PadroGMM01,
  author       = {Carles Padr{\'{o}} and
                  Ignacio Gracia and
                  Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and
                  Paz Morillo},
  title        = {Linear broadcast encryption schemes},
  journal      = {Electron. Notes Discret. Math.},
  volume       = {6},
  pages        = {35--44},
  year         = {2001},
  url          = {https://doi.org/10.1016/S1571-0653(04)00155-6},
  doi          = {10.1016/S1571-0653(04)00155-6},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/endm/PadroGMM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PadroGMM01,
  author       = {Carles Padr{\'{o}} and
                  Ignacio Gracia and
                  Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and
                  Paz Morillo},
  title        = {Linear broadcast encryption schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {89},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/089},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PadroGMM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/MorilloPSV99,
  author       = {Paz Morillo and
                  Carles Padr{\'{o}} and
                  Germ{\'{a}}n S{\'{a}}ez and
                  Jorge Luis Villar},
  title        = {Weighted Threshold Secret Sharing Schemes},
  journal      = {Inf. Process. Lett.},
  volume       = {70},
  number       = {5},
  pages        = {211--216},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0020-0190(99)00070-8},
  doi          = {10.1016/S0020-0190(99)00070-8},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/MorilloPSV99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamdm/PadroMM98,
  author       = {Carles Padr{\'{o}} and
                  Paz Morillo and
                  Xavier Mu{\~{n}}oz},
  title        = {Fault-Tolerant Fixed Routings in Some Families of Digraphs},
  journal      = {{SIAM} J. Discret. Math.},
  volume       = {11},
  number       = {3},
  pages        = {501--509},
  year         = {1998},
  url          = {https://doi.org/10.1137/S0895480195280940},
  doi          = {10.1137/S0895480195280940},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/siamdm/PadroMM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dam/PadroMV96,
  author       = {Carles Padr{\'{o}} and
                  Paz Morillo and
                  Eduard Llobet Valero},
  title        = {Diameter-vulnerability of Large Bipartite Digraphs},
  journal      = {Discret. Appl. Math.},
  volume       = {64},
  number       = {3},
  pages        = {239--248},
  year         = {1996},
  url          = {https://doi.org/10.1016/0166-218X(94)00127-Y},
  doi          = {10.1016/0166-218X(94)00127-Y},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dam/PadroMV96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dm/PadroM96,
  author       = {Carles Padr{\'{o}} and
                  Paz Morillo},
  title        = {Diameter vulnerability of iterated line digraphs},
  journal      = {Discret. Math.},
  volume       = {149},
  number       = {1-3},
  pages        = {189--204},
  year         = {1996},
  url          = {https://doi.org/10.1016/0012-365X(96)83094-9},
  doi          = {10.1016/0012-365X(96)83094-9},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dm/PadroM96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/PadroMF96,
  author       = {Carles Padr{\'{o}} and
                  Paz Morillo and
                  Miguel Angel Fiol},
  title        = {Comments on "Line Digraph Iterations and Connectivity Analysis
                  of de Bruijn and Kautz Graphs"},
  journal      = {{IEEE} Trans. Computers},
  volume       = {45},
  number       = {6},
  pages        = {768},
  year         = {1996},
  url          = {https://doi.org/10.1109/12.506435},
  doi          = {10.1109/12.506435},
  timestamp    = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/PadroMF96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip/MarcoM96,
  author       = {Ch. Marco and
                  Paz Morillo},
  editor       = {Jos{\'{e}} L. Encarna{\c{c}}{\~{a}}o and
                  Jan M. Rabaey},
  title        = {A New Algorithm for Smart Cards},
  booktitle    = {Mobile Communications: Technology, Tools Applications, Authentication
                  and Security},
  series       = {{IFIP} Conference Proceedings},
  volume       = {66},
  pages        = {301--308},
  publisher    = {Chapman {\&} Hall},
  year         = {1996},
  timestamp    = {Sat, 07 Sep 2019 11:59:24 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip/MarcoM96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dam/GomezMP95,
  author       = {Jos{\'{e}} G{\'{o}}mez and
                  Paz Morillo and
                  Carles Padr{\'{o}}},
  title        = {Large (d, D, D', s) - bipartite Digraphs},
  journal      = {Discret. Appl. Math.},
  volume       = {59},
  number       = {2},
  pages        = {103--114},
  year         = {1995},
  url          = {https://doi.org/10.1016/0166-218X(93)E0165-U},
  doi          = {10.1016/0166-218X(93)E0165-U},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dam/GomezMP95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip/MarcoM94,
  author       = {Ch. Marco and
                  Paz Morillo},
  editor       = {Bj{\"{o}}rn Pehrson and
                  Imre Simon},
  title        = {The Use of Elliptic Curves in Smart Cards},
  booktitle    = {Technology and Foundations - Information Processing '94, Volume 1,
                  Proceedings of the {IFIP} 13th World Computer Congress, Hamburg, Germany,
                  28 August - 2 September, 1994},
  series       = {{IFIP} Transactions},
  volume       = {{A-51}},
  pages        = {271--275},
  publisher    = {North-Holland},
  year         = {1994},
  timestamp    = {Tue, 15 Mar 2016 13:03:03 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip/MarcoM94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/es/Bosch87,
  author       = {Paz Morillo},
  title        = {Grafos y digrafos asociados con teselaciones como modelos para redes
                  de interconexi{\'{o}}n},
  school       = {Polytechnic University of Catalonia, Spain},
  year         = {1987},
  url          = {http://hdl.handle.net/10803/5921},
  timestamp    = {Thu, 22 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/es/Bosch87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaecc/MorilloFG87,
  author       = {Paz Morillo and
                  Miguel Angel Fiol and
                  J. Guitart},
  editor       = {Lloren{\c{c}} Huguet i Rotger and
                  Alain Poli},
  title        = {On the (d, D, D, s) - Digraph Problem},
  booktitle    = {Applied Algebra, Algebraic Algorithms and Error-Correcting Codes,
                  5th International Conference, AAECC-5, Menorca, Spain, June 15-19,
                  1987, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {356},
  pages        = {334--340},
  publisher    = {Springer},
  year         = {1987},
  url          = {https://doi.org/10.1007/3-540-51082-6\_89},
  doi          = {10.1007/3-540-51082-6\_89},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/aaecc/MorilloFG87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics