Name
Affiliation
Papers
ORIOL FARRÀS
Universitat Rovira i Virgili, Tarragona, Spain
32
Collaborators
Citations 
PageRank 
50
197
15.52
Referers 
Referees 
References 
433
549
557
Search Limit
100549
Title
Citations
PageRank
Year
Common Information, Matroid Representation, And Secret Sharing For Matroid Ports00.342021
HLS-Based HW/SW Co-Design of the Post-Quantum Classic McEliece Cryptosystem10.402021
Improving the Linear Programming Technique in the Search for Lower Bounds in Secret Sharing00.342020
Secret-Sharing Schemes for General and Uniform Access Structures.00.342019
Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges30.412019
Provably secure public-key encryption with conjunctive and subset keyword search10.362019
Local bounds for the optimal information ratio of secret sharing schemes10.362019
Privacy-Preserving Data Splitting: A Combinatorial Approach00.342018
Improving the Linear Programming Technique in the Search for Lower Bounds in Secret Sharing.30.402018
Linear Secret-Sharing Schemes for Forbidden Graph Access Structures40.422017
Private Outsourced Kriging Interpolation.00.342017
Resource-efficient OT combiners with active security.10.352017
On the Information Ratio of Non-perfect Secret Sharing Schemes.20.372017
A Note on Non-Perfect Secret Sharing.10.362016
Bounds on the Information Ratios of Secret Sharing Schemes for Close Access Structures.00.342016
Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts90.452016
Secret Sharing Schemes for Dense Forbidden Graphs.30.392016
Recent Advances In Non-Perfect Secret Sharing Schemes10.352016
Self-enforcing protocols via co-utile reputation management.10.482016
Extending Brickell–Davenport theorem to non-perfect secret sharing schemes40.422015
Linear spaces and transversal designs: -anonymous combinatorial configurations for anonymous database search notes00.342014
Optimal Non-perfect Uniform Secret Sharing Schemes.80.622014
Erratum to: Linear spaces and transversal designs: k-anonymous combinatorial configurations for anonymous database search00.342014
Privacy-Preserving Trust Management Mechanisms from Private Matching Schemes.40.432013
On the optimization of bipartite secret sharing schemes140.642012
Linear spaces and transversal designs: k-anonymous combinatorial configurations for anonymous database search20.372012
Secret Sharing Schemes for Very Dense Graphs.882.702012
TTP smartcard-based elgamal cryptosystem using threshold scheme for electronic elections00.342011
Bridging broadcast encryption and group key agreement210.642011
Natural Generalizations of Threshold Secret Sharing50.412011
Ideal secret sharing schemes for useful multipartite access structures20.392011
Ideal Hierarchical Secret Sharing Schemes180.742010