Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Paz Morillo
@article{DBLP:journals/corr/abs-2304-08860, author = {Ramiro Mart{\'{\i}}nez and Paz Morillo}, title = {Revisiting Fast Fourier multiplication algorithms on quotient rings}, journal = {CoRR}, volume = {abs/2304.08860}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2304.08860}, doi = {10.48550/ARXIV.2304.08860}, eprinttype = {arXiv}, eprint = {2304.08860}, timestamp = {Mon, 24 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2304-08860.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MartinezMR23, author = {Ramiro Mart{\'{\i}}nez and Paz Morillo and Sergi Rovira}, title = {Implementation and performance of a RLWE-based commitment scheme and ZKPoK for its linear and multiplicative relations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1026}, year = {2023}, url = {https://eprint.iacr.org/2023/1026}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MartinezMR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DazaMR22, author = {Vanesa Daza and Paz Morillo and Sergi Rovira}, title = {Leveled Multikey {FHE} with constant-size ciphertexts from {RLWE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {447}, year = {2022}, url = {https://eprint.iacr.org/2022/447}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DazaMR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlborchMM21, author = {Ferran Alborch and Ramiro Mart{\'{\i}}nez and Paz Morillo}, title = {RLWE-based distributed key generation and threshold decryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1694}, year = {2021}, url = {https://eprint.iacr.org/2021/1694}, timestamp = {Thu, 13 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AlborchMM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/CostaMM19, author = {N{\'{u}}ria Costa and Ramiro Mart{\'{\i}}nez and Paz Morillo}, editor = {Andrea Bracciali and Jeremy Clark and Federico Pintore and Peter B. R{\o}nne and Massimiliano Sala}, title = {Lattice-Based Proof of a Shuffle}, booktitle = {Financial Cryptography and Data Security - {FC} 2019 International Workshops, {VOTING} and WTSC, St. Kitts, St. Kitts and Nevis, February 18-22, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11599}, pages = {330--346}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-43725-1\_23}, doi = {10.1007/978-3-030-43725-1\_23}, timestamp = {Mon, 03 Jan 2022 22:29:34 +0100}, biburl = {https://dblp.org/rec/conf/fc/CostaMM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/MartinezM19, author = {Ramiro Mart{\'{\i}}nez and Paz Morillo}, editor = {Martin Albrecht}, title = {RLWE-Based Zero-Knowledge Proofs for Linear and Multiplicative Relations}, booktitle = {Cryptography and Coding - 17th {IMA} International Conference, {IMACC} 2019, Oxford, UK, December 16-18, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11929}, pages = {252--277}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-35199-1\_13}, doi = {10.1007/978-3-030-35199-1\_13}, timestamp = {Fri, 15 Dec 2023 20:21:14 +0100}, biburl = {https://dblp.org/rec/conf/ima/MartinezM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CostaMM19, author = {N{\'{u}}ria Costa and Ramiro Mart{\'{\i}}nez and Paz Morillo}, title = {Lattice-based proof of a shuffle}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {357}, year = {2019}, url = {https://eprint.iacr.org/2019/357}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CostaMM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MartinezM19, author = {Ramiro Mart{\'{\i}}nez and Paz Morillo}, title = {RLWE-based Zero-Knowledge Proofs for linear and multiplicative relations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1486}, year = {2019}, url = {https://eprint.iacr.org/2019/1486}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MartinezM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/CostaMM17, author = {N{\'{u}}ria Costa and Ramiro Mart{\'{\i}}nez and Paz Morillo}, editor = {Helger Lipmaa and Aikaterini Mitrokotsa and Raimundas Matulevicius}, title = {Proof of a Shuffle for Lattice-Based Cryptography}, booktitle = {Secure {IT} Systems - 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8-10, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10674}, pages = {280--296}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70290-2\_17}, doi = {10.1007/978-3-319-70290-2\_17}, timestamp = {Mon, 26 Jun 2023 20:48:37 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/CostaMM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CostaMM17, author = {N{\'{u}}ria Costa and Ramiro Mart{\'{\i}}nez and Paz Morillo}, title = {Proof of a shuffle for lattice-based cryptography (Full version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {900}, year = {2017}, url = {http://eprint.iacr.org/2017/900}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CostaMM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/MorilloRV16, author = {Paz Morillo and Carla R{\`{a}}fols and Jorge Luis Villar}, editor = {Jung Hee Cheon and Tsuyoshi Takagi}, title = {The Kernel Matrix Diffie-Hellman Assumption}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10031}, pages = {729--758}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53887-6\_27}, doi = {10.1007/978-3-662-53887-6\_27}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/MorilloRV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/GuaschM16, author = {Sandra Guasch and Paz Morillo}, editor = {Jens Grossklags and Bart Preneel}, title = {How to Challenge and Cast Your e-Vote}, booktitle = {Financial Cryptography and Data Security - 20th International Conference, {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9603}, pages = {130--145}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-54970-4\_8}, doi = {10.1007/978-3-662-54970-4\_8}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/GuaschM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/EscalaGHM16, author = {Alex Escala and Sandra Guasch and Javier Herranz and Paz Morillo}, editor = {Jeremy Clark and Sarah Meiklejohn and Peter Y. A. Ryan and Dan S. Wallach and Michael Brenner and Kurt Rohloff}, title = {Universal Cast-as-Intended Verifiability}, booktitle = {Financial Cryptography and Data Security - {FC} 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9604}, pages = {233--250}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53357-4\_16}, doi = {10.1007/978-3-662-53357-4\_16}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/EscalaGHM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/voteid/BibiloniEM15, author = {Pedro Bibiloni and Alex Escala and Paz Morillo}, editor = {Rolf Haenni and Reto E. Koenig and Douglas Wikstr{\"{o}}m}, title = {Vote Validatability in Mix-Net-Based eVoting}, booktitle = {E-Voting and Identity - 5th International Conference, VoteID 2015, Bern, Switzerland, September 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9269}, pages = {92--109}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22270-7\_6}, doi = {10.1007/978-3-319-22270-7\_6}, timestamp = {Thu, 27 Feb 2020 12:57:39 +0100}, biburl = {https://dblp.org/rec/conf/voteid/BibiloniEM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MorilloRV15, author = {Paz Morillo and Carla R{\`{a}}fols and Jorge L. Villar}, title = {Matrix Computational Assumptions in Multilinear Groups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {353}, year = {2015}, url = {http://eprint.iacr.org/2015/353}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MorilloRV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/MorilloO13, author = {Paz Morillo and Marc Obrador}, editor = {Jordi Castell{\`{a}}{-}Roca and Josep Domingo{-}Ferrer and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Ali A. Ghorbani and Christian Damsgaard Jensen and Jes{\'{u}}s A. Manj{\'{o}}n and Iosif{-}Viorel Onut and Natalia Stakhanova and Vicen{\c{c}} Torra and Jie Zhang}, title = {Efficient polynomial delegation under standard assumptions}, booktitle = {Eleventh Annual International Conference on Privacy, Security and Trust, {PST} 2013, 10-12 July, 2013, Tarragona, Catalonia, Spain, July 10-12, 2013}, pages = {301--308}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/PST.2013.6596066}, doi = {10.1109/PST.2013.6596066}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/MorilloO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ObradorMG12, author = {Marc Obrador and Paz Morillo and Sandra Guasch}, title = {Applications of Polynomial Properties to Verifiable Delegation of Computation and Electronic Voting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {726}, year = {2012}, url = {http://eprint.iacr.org/2012/726}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ObradorMG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/EscalaHM11, author = {Alex Escala and Javier Herranz and Paz Morillo}, editor = {Abderrahmane Nitaj and David Pointcheval}, title = {Revocable Attribute-Based Signatures with Adaptive Security in the Standard Model}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2011 - 4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6737}, pages = {224--241}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21969-6\_14}, doi = {10.1007/978-3-642-21969-6\_14}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/africacrypt/EscalaHM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EscalaHM11, author = {Alex Escala and Javier Herranz and Paz Morillo}, title = {Revocable Attribute-Based Signatures with Adaptive Security in the Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {52}, year = {2011}, url = {http://eprint.iacr.org/2011/052}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EscalaHM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aaecc/DazaHMR10, author = {Vanesa Daza and Javier Herranz and Paz Morillo and Carla R{\`{a}}fols}, title = {Extensions of access structures and their cryptographic applications}, journal = {Appl. Algebra Eng. Commun. Comput.}, volume = {21}, number = {4}, pages = {257--284}, year = {2010}, url = {https://doi.org/10.1007/s00200-010-0125-1}, doi = {10.1007/S00200-010-0125-1}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/aaecc/DazaHMR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/MorilloR09, author = {Paz Morillo and Carla R{\`{a}}fols}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {The Security of All Bits Using List Decoding}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {15--33}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_2}, doi = {10.1007/978-3-642-00468-1\_2}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/MorilloR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/GalindoMR08, author = {David Galindo and Paz Morillo and Carla R{\`{a}}fols}, title = {Improved certificate-based encryption in the standard model}, journal = {J. Syst. Softw.}, volume = {81}, number = {7}, pages = {1218--1226}, year = {2008}, url = {https://doi.org/10.1016/j.jss.2007.09.009}, doi = {10.1016/J.JSS.2007.09.009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jss/GalindoMR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DazaHMR08, author = {Vanesa Daza and Javier Herranz and Paz Morillo and Carla R{\`{a}}fols}, title = {Extended Access Structures and Their Cryptographic Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {502}, year = {2008}, url = {http://eprint.iacr.org/2008/502}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DazaHMR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/DazaHMR07, author = {Vanesa Daza and Javier Herranz and Paz Morillo and Carla R{\`{a}}fols}, title = {Cryptographic techniques for mobile ad-hoc networks}, journal = {Comput. Networks}, volume = {51}, number = {18}, pages = {4938--4950}, year = {2007}, url = {https://doi.org/10.1016/j.comnet.2007.08.002}, doi = {10.1016/J.COMNET.2007.08.002}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/DazaHMR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/DazaHMR07, author = {Vanesa Daza and Javier Herranz and Paz Morillo and Carla R{\`{a}}fols}, editor = {Willy Susilo and Joseph K. Liu and Yi Mu}, title = {CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts}, booktitle = {Provable Security, First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4784}, pages = {35--50}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75670-5\_3}, doi = {10.1007/978-3-540-75670-5\_3}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/DazaHMR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/DazaHMR08, author = {Vanesa Daza and Javier Herranz and Paz Morillo and Carla R{\`{a}}fols}, editor = {Giovanni Di Crescenzo and Refik Molva}, title = {Ad-Hoc Threshold Broadcast Encryption with Shorter Ciphertexts}, booktitle = {Proceedings of theThird Workshop on Cryptography for Ad-hoc Networks, WCAN@ICALP 2007, Wroclaw, Poland, July 8, 2007}, series = {Electronic Notes in Theoretical Computer Science}, volume = {192}, number = {2}, pages = {3--15}, publisher = {Elsevier}, year = {2007}, url = {https://doi.org/10.1016/j.entcs.2008.05.002}, doi = {10.1016/J.ENTCS.2008.05.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/DazaHMR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DazaHMR07, author = {Vanesa Daza and Javier Herranz and Paz Morillo and Carla R{\`{a}}fols}, title = {CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {127}, year = {2007}, url = {http://eprint.iacr.org/2007/127}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DazaHMR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europki/GalindoMR06, author = {David Galindo and Paz Morillo and Carla R{\`{a}}fols}, editor = {Andrea S. Atzeni and Antonio Lioy}, title = {Breaking Yum and Lee Generic Constructions of Certificate-Less and Certificate-Based Encryption Schemes}, booktitle = {Public Key Infrastructure, Third European {PKI} Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4043}, pages = {81--91}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11774716\_7}, doi = {10.1007/11774716\_7}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/europki/GalindoMR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/DazaMR07, author = {Vanesa Daza and Paz Morillo and Carla R{\`{a}}fols}, editor = {Giovanni Di Crescenzo and Luigi V. Mancini}, title = {On Dynamic Distribution of Private Keys over MANETs}, booktitle = {Proceedings of the Second Workshop on Cryptography for Ad-hoc Networks, WCAN@ICALP 2006, Venice, Italy, July 16, 2006}, series = {Electronic Notes in Theoretical Computer Science}, volume = {171}, number = {1}, pages = {33--41}, publisher = {Elsevier}, year = {2006}, url = {https://doi.org/10.1016/j.entcs.2006.11.008}, doi = {10.1016/J.ENTCS.2006.11.008}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/DazaMR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MorilloR06, author = {Paz Morillo and Carla R{\`{a}}fols}, title = {Certificate-Based Encryption Without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {12}, year = {2006}, url = {http://eprint.iacr.org/2006/012}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MorilloR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/GalindoMMV05, author = {David Galindo and Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and Paz Morillo and Jorge Luis Villar}, title = {Fujisaki-Okamoto hybrid encryption revisited}, journal = {Int. J. Inf. Sec.}, volume = {4}, number = {4}, pages = {228--241}, year = {2005}, url = {https://doi.org/10.1007/s10207-004-0042-z}, doi = {10.1007/S10207-004-0042-Z}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/GalindoMMV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dam/PadroGMM03, author = {Carles Padr{\'{o}} and Ignacio Gracia and Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and Paz Morillo}, title = {Linear Broadcast Encryption Schemes}, journal = {Discret. Appl. Math.}, volume = {128}, number = {1}, pages = {223--238}, year = {2003}, url = {https://doi.org/10.1016/S0166-218X(02)00447-X}, doi = {10.1016/S0166-218X(02)00447-X}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dam/PadroGMM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/GalindoMMV03, author = {David Galindo and Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and Paz Morillo and Jorge Luis Villar}, editor = {Colin Boyd and Wenbo Mao}, title = {Easy Verifiable Primitives and Practical Public Key Cryptosystems}, booktitle = {Information Security, 6th International Conference, {ISC} 2003, Bristol, UK, October 1-3, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2851}, pages = {69--83}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/10958513\_6}, doi = {10.1007/10958513\_6}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/GalindoMMV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itw/GalindoMMV03, author = {David Galindo and Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and Paz Morillo and Jorge L. Villar}, title = {An {IND-CPA} cryptosystem from Demytko's primitive}, booktitle = {Proceedings 2003 {IEEE} Information Theory Workshop, {ITW} 2003, La Sorbonne, Paris, France, 31 March - 4 April, 2003}, pages = {167--170}, publisher = {{IEEE}}, year = {2003}, url = {https://doi.org/10.1109/ITW.2003.1216721}, doi = {10.1109/ITW.2003.1216721}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itw/GalindoMMV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GalindoMMV03, author = {David Galindo and Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and Paz Morillo and Jorge Luis Villar}, editor = {Yvo Desmedt}, title = {A Practical Public Key Cryptosystem from Paillier and Rabin Schemes}, booktitle = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2567}, pages = {279--291}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36288-6\_21}, doi = {10.1007/3-540-36288-6\_21}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GalindoMMV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalindoMMV03, author = {David Galindo and Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and Paz Morillo and Jorge L. Villar}, title = {Fujisaki-Okamoto {IND-CCA} hybrid encryption revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {107}, year = {2003}, url = {http://eprint.iacr.org/2003/107}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalindoMMV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/PadroGMM02, author = {Carles Padr{\'{o}} and Ignacio Gracia and Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and Paz Morillo}, title = {Linear Key Predistribution Schemes}, journal = {Des. Codes Cryptogr.}, volume = {25}, number = {3}, pages = {281--298}, year = {2002}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/PadroGMM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalindoMMV02, author = {David Galindo and Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and Paz Morillo and Jorge L. Villar}, title = {An efficient semantically secure elliptic curve cryptosystem based on {KMOV}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {37}, year = {2002}, url = {http://eprint.iacr.org/2002/037}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalindoMMV02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalindoMMV02a, author = {David Galindo and Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and Paz Morillo and Jorge L. Villar}, title = {A semantically secure elliptic curve {RSA} scheme with small expansion factor}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {83}, year = {2002}, url = {http://eprint.iacr.org/2002/083}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalindoMMV02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/appml/MartinMV01, author = {Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and Paz Morillo and Jorge Luis Villar}, title = {Computing the order of points on an elliptic curve modulo {N} is as difficult as factoring {N}}, journal = {Appl. Math. Lett.}, volume = {14}, number = {3}, pages = {341--346}, year = {2001}, url = {https://doi.org/10.1016/S0893-9659(00)00159-2}, doi = {10.1016/S0893-9659(00)00159-2}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/appml/MartinMV01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/endm/PadroGMM01, author = {Carles Padr{\'{o}} and Ignacio Gracia and Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and Paz Morillo}, title = {Linear broadcast encryption schemes}, journal = {Electron. Notes Discret. Math.}, volume = {6}, pages = {35--44}, year = {2001}, url = {https://doi.org/10.1016/S1571-0653(04)00155-6}, doi = {10.1016/S1571-0653(04)00155-6}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/endm/PadroGMM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PadroGMM01, author = {Carles Padr{\'{o}} and Ignacio Gracia and Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and Paz Morillo}, title = {Linear broadcast encryption schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {89}, year = {2001}, url = {http://eprint.iacr.org/2001/089}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PadroGMM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/MorilloPSV99, author = {Paz Morillo and Carles Padr{\'{o}} and Germ{\'{a}}n S{\'{a}}ez and Jorge Luis Villar}, title = {Weighted Threshold Secret Sharing Schemes}, journal = {Inf. Process. Lett.}, volume = {70}, number = {5}, pages = {211--216}, year = {1999}, url = {https://doi.org/10.1016/S0020-0190(99)00070-8}, doi = {10.1016/S0020-0190(99)00070-8}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/MorilloPSV99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamdm/PadroMM98, author = {Carles Padr{\'{o}} and Paz Morillo and Xavier Mu{\~{n}}oz}, title = {Fault-Tolerant Fixed Routings in Some Families of Digraphs}, journal = {{SIAM} J. Discret. Math.}, volume = {11}, number = {3}, pages = {501--509}, year = {1998}, url = {https://doi.org/10.1137/S0895480195280940}, doi = {10.1137/S0895480195280940}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/siamdm/PadroMM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dam/PadroMV96, author = {Carles Padr{\'{o}} and Paz Morillo and Eduard Llobet Valero}, title = {Diameter-vulnerability of Large Bipartite Digraphs}, journal = {Discret. Appl. Math.}, volume = {64}, number = {3}, pages = {239--248}, year = {1996}, url = {https://doi.org/10.1016/0166-218X(94)00127-Y}, doi = {10.1016/0166-218X(94)00127-Y}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dam/PadroMV96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dm/PadroM96, author = {Carles Padr{\'{o}} and Paz Morillo}, title = {Diameter vulnerability of iterated line digraphs}, journal = {Discret. Math.}, volume = {149}, number = {1-3}, pages = {189--204}, year = {1996}, url = {https://doi.org/10.1016/0012-365X(96)83094-9}, doi = {10.1016/0012-365X(96)83094-9}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dm/PadroM96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/PadroMF96, author = {Carles Padr{\'{o}} and Paz Morillo and Miguel Angel Fiol}, title = {Comments on "Line Digraph Iterations and Connectivity Analysis of de Bruijn and Kautz Graphs"}, journal = {{IEEE} Trans. Computers}, volume = {45}, number = {6}, pages = {768}, year = {1996}, url = {https://doi.org/10.1109/12.506435}, doi = {10.1109/12.506435}, timestamp = {Thu, 08 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/PadroMF96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip/MarcoM96, author = {Ch. Marco and Paz Morillo}, editor = {Jos{\'{e}} L. Encarna{\c{c}}{\~{a}}o and Jan M. Rabaey}, title = {A New Algorithm for Smart Cards}, booktitle = {Mobile Communications: Technology, Tools Applications, Authentication and Security}, series = {{IFIP} Conference Proceedings}, volume = {66}, pages = {301--308}, publisher = {Chapman {\&} Hall}, year = {1996}, timestamp = {Sat, 07 Sep 2019 11:59:24 +0200}, biburl = {https://dblp.org/rec/conf/ifip/MarcoM96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dam/GomezMP95, author = {Jos{\'{e}} G{\'{o}}mez and Paz Morillo and Carles Padr{\'{o}}}, title = {Large (d, D, D', s) - bipartite Digraphs}, journal = {Discret. Appl. Math.}, volume = {59}, number = {2}, pages = {103--114}, year = {1995}, url = {https://doi.org/10.1016/0166-218X(93)E0165-U}, doi = {10.1016/0166-218X(93)E0165-U}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dam/GomezMP95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip/MarcoM94, author = {Ch. Marco and Paz Morillo}, editor = {Bj{\"{o}}rn Pehrson and Imre Simon}, title = {The Use of Elliptic Curves in Smart Cards}, booktitle = {Technology and Foundations - Information Processing '94, Volume 1, Proceedings of the {IFIP} 13th World Computer Congress, Hamburg, Germany, 28 August - 2 September, 1994}, series = {{IFIP} Transactions}, volume = {{A-51}}, pages = {271--275}, publisher = {North-Holland}, year = {1994}, timestamp = {Tue, 15 Mar 2016 13:03:03 +0100}, biburl = {https://dblp.org/rec/conf/ifip/MarcoM94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/es/Bosch87, author = {Paz Morillo}, title = {Grafos y digrafos asociados con teselaciones como modelos para redes de interconexi{\'{o}}n}, school = {Polytechnic University of Catalonia, Spain}, year = {1987}, url = {http://hdl.handle.net/10803/5921}, timestamp = {Thu, 22 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/es/Bosch87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaecc/MorilloFG87, author = {Paz Morillo and Miguel Angel Fiol and J. Guitart}, editor = {Lloren{\c{c}} Huguet i Rotger and Alain Poli}, title = {On the (d, D, D, s) - Digraph Problem}, booktitle = {Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 5th International Conference, AAECC-5, Menorca, Spain, June 15-19, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {356}, pages = {334--340}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-51082-6\_89}, doi = {10.1007/3-540-51082-6\_89}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/aaecc/MorilloFG87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.