default search action
Paz Morillo
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [i17]Ramiro Martínez, Paz Morillo:
Revisiting Fast Fourier multiplication algorithms on quotient rings. CoRR abs/2304.08860 (2023) - [i16]Ramiro Martínez, Paz Morillo, Sergi Rovira:
Implementation and performance of a RLWE-based commitment scheme and ZKPoK for its linear and multiplicative relations. IACR Cryptol. ePrint Arch. 2023: 1026 (2023) - 2022
- [i15]Vanesa Daza, Paz Morillo, Sergi Rovira:
Leveled Multikey FHE with constant-size ciphertexts from RLWE. IACR Cryptol. ePrint Arch. 2022: 447 (2022) - 2021
- [i14]Ferran Alborch, Ramiro Martínez, Paz Morillo:
RLWE-based distributed key generation and threshold decryption. IACR Cryptol. ePrint Arch. 2021: 1694 (2021)
2010 – 2019
- 2019
- [c20]Núria Costa, Ramiro Martínez, Paz Morillo:
Lattice-Based Proof of a Shuffle. Financial Cryptography Workshops 2019: 330-346 - [c19]Ramiro Martínez, Paz Morillo:
RLWE-Based Zero-Knowledge Proofs for Linear and Multiplicative Relations. IMACC 2019: 252-277 - [i13]Núria Costa, Ramiro Martínez, Paz Morillo:
Lattice-based proof of a shuffle. IACR Cryptol. ePrint Arch. 2019: 357 (2019) - [i12]Ramiro Martínez, Paz Morillo:
RLWE-based Zero-Knowledge Proofs for linear and multiplicative relations. IACR Cryptol. ePrint Arch. 2019: 1486 (2019) - 2017
- [c18]Núria Costa, Ramiro Martínez, Paz Morillo:
Proof of a Shuffle for Lattice-Based Cryptography. NordSec 2017: 280-296 - [i11]Núria Costa, Ramiro Martínez, Paz Morillo:
Proof of a shuffle for lattice-based cryptography (Full version). IACR Cryptol. ePrint Arch. 2017: 900 (2017) - 2016
- [c17]Paz Morillo, Carla Ràfols, Jorge Luis Villar:
The Kernel Matrix Diffie-Hellman Assumption. ASIACRYPT (1) 2016: 729-758 - [c16]Sandra Guasch, Paz Morillo:
How to Challenge and Cast Your e-Vote. Financial Cryptography 2016: 130-145 - [c15]Alex Escala, Sandra Guasch, Javier Herranz, Paz Morillo:
Universal Cast-as-Intended Verifiability. Financial Cryptography Workshops 2016: 233-250 - 2015
- [c14]Pedro Bibiloni, Alex Escala, Paz Morillo:
Vote Validatability in Mix-Net-Based eVoting. VoteID 2015: 92-109 - [i10]Paz Morillo, Carla Ràfols, Jorge L. Villar:
Matrix Computational Assumptions in Multilinear Groups. IACR Cryptol. ePrint Arch. 2015: 353 (2015) - 2013
- [c13]Paz Morillo, Marc Obrador:
Efficient polynomial delegation under standard assumptions. PST 2013: 301-308 - 2012
- [i9]Marc Obrador, Paz Morillo, Sandra Guasch:
Applications of Polynomial Properties to Verifiable Delegation of Computation and Electronic Voting. IACR Cryptol. ePrint Arch. 2012: 726 (2012) - 2011
- [c12]Alex Escala, Javier Herranz, Paz Morillo:
Revocable Attribute-Based Signatures with Adaptive Security in the Standard Model. AFRICACRYPT 2011: 224-241 - [i8]Alex Escala, Javier Herranz, Paz Morillo:
Revocable Attribute-Based Signatures with Adaptive Security in the Standard Model. IACR Cryptol. ePrint Arch. 2011: 52 (2011) - 2010
- [j14]Vanesa Daza, Javier Herranz, Paz Morillo, Carla Ràfols:
Extensions of access structures and their cryptographic applications. Appl. Algebra Eng. Commun. Comput. 21(4): 257-284 (2010)
2000 – 2009
- 2009
- [c11]Paz Morillo, Carla Ràfols:
The Security of All Bits Using List Decoding. Public Key Cryptography 2009: 15-33 - 2008
- [j13]David Galindo, Paz Morillo, Carla Ràfols:
Improved certificate-based encryption in the standard model. J. Syst. Softw. 81(7): 1218-1226 (2008) - [i7]Vanesa Daza, Javier Herranz, Paz Morillo, Carla Ràfols:
Extended Access Structures and Their Cryptographic Applications. IACR Cryptol. ePrint Arch. 2008: 502 (2008) - 2007
- [j12]Vanesa Daza, Javier Herranz, Paz Morillo, Carla Ràfols:
Cryptographic techniques for mobile ad-hoc networks. Comput. Networks 51(18): 4938-4950 (2007) - [c10]Vanesa Daza, Javier Herranz, Paz Morillo, Carla Ràfols:
CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts. ProvSec 2007: 35-50 - [c9]Vanesa Daza, Javier Herranz, Paz Morillo, Carla Ràfols:
Ad-Hoc Threshold Broadcast Encryption with Shorter Ciphertexts. WCAN@ICALP 2007: 3-15 - [i6]Vanesa Daza, Javier Herranz, Paz Morillo, Carla Ràfols:
CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts. IACR Cryptol. ePrint Arch. 2007: 127 (2007) - 2006
- [c8]David Galindo, Paz Morillo, Carla Ràfols:
Breaking Yum and Lee Generic Constructions of Certificate-Less and Certificate-Based Encryption Schemes. EuroPKI 2006: 81-91 - [c7]Vanesa Daza, Paz Morillo, Carla Ràfols:
On Dynamic Distribution of Private Keys over MANETs. WCAN@ICALP 2006: 33-41 - [i5]Paz Morillo, Carla Ràfols:
Certificate-Based Encryption Without Random Oracles. IACR Cryptol. ePrint Arch. 2006: 12 (2006) - 2005
- [j11]David Galindo, Sebastià Martín Molleví, Paz Morillo, Jorge Luis Villar:
Fujisaki-Okamoto hybrid encryption revisited. Int. J. Inf. Sec. 4(4): 228-241 (2005) - 2003
- [j10]Carles Padró, Ignacio Gracia, Sebastià Martín Molleví, Paz Morillo:
Linear Broadcast Encryption Schemes. Discret. Appl. Math. 128(1): 223-238 (2003) - [c6]David Galindo, Sebastià Martín Molleví, Paz Morillo, Jorge Luis Villar:
Easy Verifiable Primitives and Practical Public Key Cryptosystems. ISC 2003: 69-83 - [c5]David Galindo, Sebastià Martín Molleví, Paz Morillo, Jorge L. Villar:
An IND-CPA cryptosystem from Demytko's primitive. ITW 2003: 167-170 - [c4]David Galindo, Sebastià Martín Molleví, Paz Morillo, Jorge Luis Villar:
A Practical Public Key Cryptosystem from Paillier and Rabin Schemes. Public Key Cryptography 2003: 279-291 - [i4]David Galindo, Sebastià Martín Molleví, Paz Morillo, Jorge L. Villar:
Fujisaki-Okamoto IND-CCA hybrid encryption revisited. IACR Cryptol. ePrint Arch. 2003: 107 (2003) - 2002
- [j9]Carles Padró, Ignacio Gracia, Sebastià Martín Molleví, Paz Morillo:
Linear Key Predistribution Schemes. Des. Codes Cryptogr. 25(3): 281-298 (2002) - [i3]David Galindo, Sebastià Martín Molleví, Paz Morillo, Jorge L. Villar:
An efficient semantically secure elliptic curve cryptosystem based on KMOV. IACR Cryptol. ePrint Arch. 2002: 37 (2002) - [i2]David Galindo, Sebastià Martín Molleví, Paz Morillo, Jorge L. Villar:
A semantically secure elliptic curve RSA scheme with small expansion factor. IACR Cryptol. ePrint Arch. 2002: 83 (2002) - 2001
- [j8]Sebastià Martín Molleví, Paz Morillo, Jorge Luis Villar:
Computing the order of points on an elliptic curve modulo N is as difficult as factoring N. Appl. Math. Lett. 14(3): 341-346 (2001) - [j7]Carles Padró, Ignacio Gracia, Sebastià Martín Molleví, Paz Morillo:
Linear broadcast encryption schemes. Electron. Notes Discret. Math. 6: 35-44 (2001) - [i1]Carles Padró, Ignacio Gracia, Sebastià Martín Molleví, Paz Morillo:
Linear broadcast encryption schemes. IACR Cryptol. ePrint Arch. 2001: 89 (2001)
1990 – 1999
- 1999
- [j6]Paz Morillo, Carles Padró, Germán Sáez, Jorge Luis Villar:
Weighted Threshold Secret Sharing Schemes. Inf. Process. Lett. 70(5): 211-216 (1999) - 1998
- [j5]Carles Padró, Paz Morillo, Xavier Muñoz:
Fault-Tolerant Fixed Routings in Some Families of Digraphs. SIAM J. Discret. Math. 11(3): 501-509 (1998) - 1996
- [j4]Carles Padró, Paz Morillo, Eduard Llobet Valero:
Diameter-vulnerability of Large Bipartite Digraphs. Discret. Appl. Math. 64(3): 239-248 (1996) - [j3]Carles Padró, Paz Morillo:
Diameter vulnerability of iterated line digraphs. Discret. Math. 149(1-3): 189-204 (1996) - [j2]Carles Padró, Paz Morillo, Miguel Angel Fiol:
Comments on "Line Digraph Iterations and Connectivity Analysis of de Bruijn and Kautz Graphs". IEEE Trans. Computers 45(6): 768 (1996) - [c3]Ch. Marco, Paz Morillo:
A New Algorithm for Smart Cards. IFIP World Conference on Mobile Communications 1996: 301-308 - 1995
- [j1]José Gómez, Paz Morillo, Carles Padró:
Large (d, D, D', s) - bipartite Digraphs. Discret. Appl. Math. 59(2): 103-114 (1995) - 1994
- [c2]Ch. Marco, Paz Morillo:
The Use of Elliptic Curves in Smart Cards. IFIP Congress (1) 1994: 271-275
1980 – 1989
- 1987
- [b1]Paz Morillo:
Grafos y digrafos asociados con teselaciones como modelos para redes de interconexión. Polytechnic University of Catalonia, Spain, 1987 - [c1]Paz Morillo, Miguel Angel Fiol, J. Guitart:
On the (d, D, D, s) - Digraph Problem. AAECC 1987: 334-340
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint