Name
Papers
Collaborators
PAZ MORILLO
32
31
Citations 
PageRank 
Referers 
166
16.02
284
Referees 
References 
338
308
Search Limit
100338
Title
Citations
PageRank
Year
Leveled Multikey FHE with constant-size ciphertexts from RLWE.00.342022
<p>R-LWE-Based Distributed Key Generation and Threshold Decryption</p>00.342021
RLWE-Based Zero-Knowledge Proofs for Linear and Multiplicative Relations.00.342019
Lattice-Based Proof of a Shuffle.00.342019
Lattice-based proof of a shuffle.00.342019
Proof of a shuffle for lattice-based cryptography (Full version).10.372017
Proof of a Shuffle for Lattice-Based Cryptography.10.352017
The Kernel Matrix Diffie-Hellman Assumption.60.422016
How to Challenge and Cast Your e-Vote.10.352016
Vote Validatability in Mix-Net-Based eVoting00.342015
Matrix Computational Assumptions in Multilinear Groups.00.342015
Applications of Polynomial Properties to Verifiable Delegation of Computation and Electronic Voting.10.352012
Revocable attribute-based signatures with adaptive security in the standard model190.732011
The Security of All Bits Using List Decoding60.482009
Improved certificate-based encryption in the standard model220.742008
Ad-Hoc Threshold Broadcast Encryption with Shorter Ciphertexts90.682008
Extensions of access structures and their cryptographic applications00.342008
On Dynamic Distribution of Private Keys over MANETs50.522007
Cryptographic techniques for mobile ad-hoc networks40.452007
CCA2-secure threshold broadcast encryption with shorter ciphertexts210.942007
Certificate-Based Encryption Without Random Oracles100.562006
Breaking yum and lee generic constructions of certificate-less and certificate-based encryption schemes291.202006
Fujisaki–Okamoto hybrid encryption revisited50.462005
Fujisaki-Okamoto IND-CCA hybrid encryption revisited21.362003
Linear broadcast encryption schemes100.622003
An Ind-Cpa Cryptosystem From Demytko'S Primitive00.342003
Linear Key Predistribution Schemes60.482002
An efficient semantically secure elliptic curve cryptosystem based on KMOV.70.552002
A semantically secure elliptic curve RSA scheme with small expansion factor00.342002
Linear broadcast encryption schemes.00.342001
Computing the order of points on an elliptic curve modulo N is as difficult as factoring N10.362001
A New Algorithm for Smart Cards00.341996