Jorge Luis Villar
Orcid: 0000-0003-1607-3792Affiliations:
- Polytechnic University of Catalonia, Department of Applied Mathematics
According to our database1,
Jorge Luis Villar
authored at least 31 papers
between 1992 and 2017.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2017
IACR Cryptol. ePrint Arch., 2017
2016
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016
2015
IACR Cryptol. ePrint Arch., 2015
2014
2012
Identity-Based Encryption with Master Key-Dependent Message Security and Applications.
IACR Cryptol. ePrint Arch., 2012
Identity-Based Encryption with Master Key-Dependent Message Security and Leakage-Resilience.
Proceedings of the Computer Security - ESORICS 2012, 2012
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012
2010
Anonymous Subscription Schemes - A Flexible Construction for On-line Services Access.
Proceedings of the SECRYPT 2010, 2010
Proceedings of the e-Business and Telecommunications - 7th International Joint Conference, 2010
Proceedings of the Public Key Infrastructures, Services and Applications, 2010
2009
Des. Codes Cryptogr., 2009
2008
In search of mathematical primitives for deriving universal projective hash families.
Appl. Algebra Eng. Commun. Comput., 2008
Proceedings of the Selected Areas in Cryptography, 15th International Workshop, SAC 2008, 2008
2006
Trading One-Wayness Against Chosen-Ciphertext Security in Factoring-Based Encryption.
Proceedings of the Advances in Cryptology, 2006
2005
Proceedings of the WEWoRC 2005, 2005
A New Cramer-Shoup Like Methodology for Group Based Provably Secure Encryption Schemes.
Proceedings of the Theory of Cryptography, Second Theory of Cryptography Conference, 2005
2004
IACR Cryptol. ePrint Arch., 2004
Proceedings of the Trust and Privacy in Digital Business, First International Conference, 2004
Proceedings of the Progress in Cryptology, 2004
2003
IACR Cryptol. ePrint Arch., 2003
Proceedings of the Public Key Cryptography, 2003
Proceedings of the Proceedings 2003 IEEE Information Theory Workshop, 2003
Proceedings of the Information Security, 6th International Conference, 2003
2002
IACR Cryptol. ePrint Arch., 2002
IACR Cryptol. ePrint Arch., 2002
2001
Computing the order of points on an elliptic curve modulo N is as difficult as factoring N.
Appl. Math. Lett., 2001
1999
Des. Codes Cryptogr., 1999
1992