Paz Morillo

From MaRDI portal
(Redirected from Person:989606)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Lattice-Based Proof of a Shuffle
Financial Cryptography and Data Security
2023-08-03Paper
How to challenge and cast your e-vote
Financial Cryptography and Data Security
2021-04-07Paper
RLWE-based zero-knowledge proofs for linear and multiplicative relations2020-05-06Paper
The kernel matrix Diffie-Hellman assumption
Advances in Cryptology – ASIACRYPT 2016
2017-02-01Paper
On dynamic distribution of private keys over MANETs
Electronic Notes in Theoretical Computer Science
2013-12-06Paper
Ad-hoc threshold broadcast encryption with shorter ciphertexts
Electronic Notes in Theoretical Computer Science
2013-12-06Paper
Revocable attribute-based signatures with adaptive security in the standard model
Lecture Notes in Computer Science
2011-06-29Paper
Extensions of access structures and their cryptographic applications
Applicable Algebra in Engineering, Communication and Computing
2010-08-23Paper
Easy verifiable primitives and practical public key cryptosystems
Lecture Notes in Computer Science
2010-02-09Paper
scientific article; zbMATH DE number 5556018 (Why is no real title available?)2009-05-22Paper
The Security of All Bits Using List Decoding
Public Key Cryptography – PKC 2009
2009-03-24Paper
CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts
Provable Security
2008-06-10Paper
Cryptographic techniques for mobile ad-hoc networks
Computer Networks
2007-11-30Paper
Comments on "Line digraph iterations and connectivity analysis of de Bruijn and Kautz graphs"
IEEE Transactions on Computers
2003-11-02Paper
A Practical Public Key Cryptosystem from Paillier and Rabin Schemes
Public Key Cryptography — PKC 2003
2003-07-27Paper
Linear broadcast encryption schemes
Discrete Applied Mathematics
2003-06-10Paper
Linear key predistribution schemes
Designs, Codes and Cryptography
2003-03-19Paper
Weighted threshold secret sharing schemes
Information Processing Letters
2002-07-25Paper
Linear broadcast encryption schemes2001-10-14Paper
Computing the order of points on an elliptic curve modulo \(N\) is as difficult as factoring \(N\)
Applied Mathematics Letters
2001-08-07Paper
Fault-Tolerant Fixed Routings in Some Families of Digraphs
SIAM Journal on Discrete Mathematics
1998-09-21Paper
Diameter-vulnerability of large bipartite digraphs
Discrete Applied Mathematics
1996-11-21Paper
Diameter vulnerability of iterated line digraphs
Discrete Mathematics
1996-03-25Paper
scientific article; zbMATH DE number 4168704 (Why is no real title available?)1990-01-01Paper
scientific article; zbMATH DE number 4108811 (Why is no real title available?)1989-01-01Paper
scientific article; zbMATH DE number 4059299 (Why is no real title available?)1988-01-01Paper
scientific article; zbMATH DE number 4057538 (Why is no real title available?)1986-01-01Paper
scientific article; zbMATH DE number 4004216 (Why is no real title available?)1985-01-01Paper
scientific article; zbMATH DE number 3966106 (Why is no real title available?)1985-01-01Paper
scientific article; zbMATH DE number 3948333 (Why is no real title available?)1985-01-01Paper


Research outcomes over time


This page was built for person: Paz Morillo