Paz Morillo
Orcid: 0000-0002-0063-2716
According to our database1,
Paz Morillo
authored at least 46 papers
between 1987 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Implementation and performance of a RLWE-based commitment scheme and ZKPoK for its linear and multiplicative relations.
IACR Cryptol. ePrint Arch., 2023
2022
IACR Cryptol. ePrint Arch., 2022
2021
IACR Cryptol. ePrint Arch., 2021
2019
IACR Cryptol. ePrint Arch., 2019
2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Secure IT Systems, 2017
2016
Proceedings of the Financial Cryptography and Data Security, 2016
Proceedings of the Financial Cryptography and Data Security, 2016
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016
2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the E-Voting and Identity - 5th International Conference, 2015
2013
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013
2012
Applications of Polynomial Properties to Verifiable Delegation of Computation and Electronic Voting.
IACR Cryptol. ePrint Arch., 2012
2011
IACR Cryptol. ePrint Arch., 2011
2010
Appl. Algebra Eng. Commun. Comput., 2010
2009
Proceedings of the Public Key Cryptography, 2009
2008
IACR Cryptol. ePrint Arch., 2008
2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of theThird Workshop on Cryptography for Ad-hoc Networks, 2007
2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Second Workshop on Cryptography for Ad-hoc Networks, 2006
Breaking Yum and Lee Generic Constructions of Certificate-Less and Certificate-Based Encryption Schemes.
Proceedings of the Public Key Infrastructure, 2006
2005
2003
IACR Cryptol. ePrint Arch., 2003
Proceedings of the Public Key Cryptography, 2003
Proceedings of the Proceedings 2003 IEEE Information Theory Workshop, 2003
Proceedings of the Information Security, 6th International Conference, 2003
2002
IACR Cryptol. ePrint Arch., 2002
IACR Cryptol. ePrint Arch., 2002
Linear Key Predistribution Schemes.
Des. Codes Cryptogr., 2002
2001
Computing the order of points on an elliptic curve modulo N is as difficult as factoring N.
Appl. Math. Lett., 2001
1999
1998
SIAM J. Discret. Math., 1998
1996
Comments on "Line Digraph Iterations and Connectivity Analysis of de Bruijn and Kautz Graphs".
IEEE Trans. Computers, 1996
A New Algorithm for Smart Cards.
Proceedings of the Mobile Communications: Technology, 1996
1995
1994
The Use of Elliptic Curves in Smart Cards.
Proceedings of the Technology and Foundations - Information Processing '94, Volume 1, Proceedings of the IFIP 13th World Computer Congress, Hamburg, Germany, 28 August, 1994
1987
Grafos y digrafos asociados con teselaciones como modelos para redes de interconexión.
PhD thesis, 1987