J. Villar

From MaRDI portal
(Redirected from Person:1283222)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Equivalences and black-box separations of matrix Diffie-Hellman problems
Lecture Notes in Computer Science
2017-06-13Paper
An algebraic framework for Diffie-Hellman assumptions
Journal of Cryptology
2017-03-02Paper
The kernel matrix Diffie-Hellman assumption
Advances in Cryptology – ASIACRYPT 2016
2017-02-01Paper
Cryptanalysis of a key exchange scheme based on block matrices
Information Sciences
2016-07-11Paper
Application of possibility theory to robust Cournot equilibrium in the electricity market
Probability in the Engineering and Informational Sciences
2016-05-23Paper
Identity-based encryption with master key-dependent message security and leakage-resilience
Computer Security – ESORICS 2012
2013-10-23Paper
An algebraic framework for Diffie-Hellman assumptions
Advances in Cryptology – CRYPTO 2013
2013-09-17Paper
Optimal reductions of some decisional problems to the rank problem
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
scientific article; zbMATH DE number 5901702 (Why is no real title available?)2011-05-31Paper
Easy verifiable primitives and practical public key cryptosystems
Lecture Notes in Computer Science
2010-02-09Paper
Public Verifiability from Pairings in Secret Sharing Schemes
Selected Areas in Cryptography
2009-11-03Paper
On proper secrets, \((t,k)\)-bases and linear codes
Designs, Codes and Cryptography
2009-10-14Paper
scientific article; zbMATH DE number 5380257 (Why is no real title available?)2008-12-10Paper
In search of mathematical primitives for deriving universal projective hash families
Applicable Algebra in Engineering, Communication and Computing
2008-05-14Paper
Trading One-Wayness Against Chosen-Ciphertext Security in Factoring-Based Encryption
Advances in Cryptology – ASIACRYPT 2006
2008-04-24Paper
Progress in Cryptology - INDOCRYPT 2004
Lecture Notes in Computer Science
2005-12-22Paper
Theory of Cryptography
Lecture Notes in Computer Science
2005-12-07Paper
A Practical Public Key Cryptosystem from Paillier and Rabin Schemes
Public Key Cryptography — PKC 2003
2003-07-27Paper
Weighted threshold secret sharing schemes
Information Processing Letters
2002-07-25Paper
Computing the order of points on an elliptic curve modulo \(N\) is as difficult as factoring \(N\)
Applied Mathematics Letters
2001-08-07Paper
scientific article; zbMATH DE number 1511169 (Why is no real title available?)2000-09-26Paper
scientific article; zbMATH DE number 1511172 (Why is no real title available?)2000-09-26Paper
Detection of cheaters in vector space secret sharing schemes
Designs, Codes and Cryptography
1999-04-13Paper
The underlying graph of a line digraph
Discrete Applied Mathematics
1993-01-16Paper
scientific article; zbMATH DE number 4055643 (Why is no real title available?)1988-01-01Paper


Research outcomes over time


This page was built for person: J. Villar