Paz Morillo

From MaRDI portal


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Lattice-Based Proof of a Shuffle
Financial Cryptography and Data Security
2023-08-03Paper
How to challenge and cast your e-vote
Financial Cryptography and Data Security
2021-04-07Paper
RLWE-based zero-knowledge proofs for linear and multiplicative relations
 
2020-05-06Paper
The kernel matrix Diffie-Hellman assumption
Advances in Cryptology – ASIACRYPT 2016
2017-02-01Paper
On dynamic distribution of private keys over MANETs
Electronic Notes in Theoretical Computer Science
2013-12-06Paper
Ad-hoc threshold broadcast encryption with shorter ciphertexts
Electronic Notes in Theoretical Computer Science
2013-12-06Paper
Revocable attribute-based signatures with adaptive security in the standard model
Lecture Notes in Computer Science
2011-06-29Paper
Extensions of access structures and their cryptographic applications
Applicable Algebra in Engineering, Communication and Computing
2010-08-23Paper
Easy verifiable primitives and practical public key cryptosystems
Lecture Notes in Computer Science
2010-02-09Paper
scientific article; zbMATH DE number 5556018 (Why is no real title available?)
 
2009-05-22Paper
The Security of All Bits Using List Decoding
Public Key Cryptography – PKC 2009
2009-03-24Paper
CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts
Provable Security
2008-06-10Paper
Cryptographic techniques for mobile ad-hoc networks
Computer Networks
2007-11-30Paper
Comments on "Line digraph iterations and connectivity analysis of de Bruijn and Kautz graphs"
IEEE Transactions on Computers
2003-11-02Paper
A Practical Public Key Cryptosystem from Paillier and Rabin Schemes
Public Key Cryptography — PKC 2003
2003-07-27Paper
Linear broadcast encryption schemes
Discrete Applied Mathematics
2003-06-10Paper
Linear key predistribution schemes
Designs, Codes and Cryptography
2003-03-19Paper
Weighted threshold secret sharing schemes
Information Processing Letters
2002-07-25Paper
Linear broadcast encryption schemes
 
2001-10-14Paper
Computing the order of points on an elliptic curve modulo \(N\) is as difficult as factoring \(N\)
Applied Mathematics Letters
2001-08-07Paper
Fault-Tolerant Fixed Routings in Some Families of Digraphs
SIAM Journal on Discrete Mathematics
1998-09-21Paper
Diameter-vulnerability of large bipartite digraphs
Discrete Applied Mathematics
1996-11-21Paper
Diameter vulnerability of iterated line digraphs
Discrete Mathematics
1996-03-25Paper
scientific article; zbMATH DE number 4168704 (Why is no real title available?)
 
1990-01-01Paper
scientific article; zbMATH DE number 4108811 (Why is no real title available?)
 
1989-01-01Paper
scientific article; zbMATH DE number 4059299 (Why is no real title available?)
 
1988-01-01Paper
scientific article; zbMATH DE number 4057538 (Why is no real title available?)
 
1986-01-01Paper
scientific article; zbMATH DE number 4004216 (Why is no real title available?)
 
1985-01-01Paper
scientific article; zbMATH DE number 3966106 (Why is no real title available?)
 
1985-01-01Paper
scientific article; zbMATH DE number 3948333 (Why is no real title available?)
 
1985-01-01Paper


Research outcomes over time


This page was built for person: Paz Morillo