Secret sharing, rank inequalities, and information inequalities. S Martín Molleví, C Padró, A Yang IEEE Transactions on Information Theory 62 (1), 599-609, 2016 | 36* | 2016 |
Secret Sharing, Rank Inequalities and Information Inequalities S Martín Molleví, C Padró, A Yang Advances in Cryptology–CRYPTO 8043, 277-288, 2013 | 36* | 2013 |
A practical public key cryptosystem from Paillier and Rabin schemes JLV David Galindo, Sebastiá Martýn, Paz Morillo Public Key Cryptography—PKC 2003, 279-291, 2003 | 34* | 2003 |
Improving the linear programming technique in the search for lower bounds in secret sharing O Farràs, T Kaced, S Martín, C Padró Annual International Conference on the Theory and Applications of …, 2018 | 30 | 2018 |
Linear broadcast encryption schemes PM Carles Padró, Ignacio Gracia, Sebastià Martı́n Discrete Applied Mathematics 128 (1), 223-238, 2003 | 25* | 2003 |
An efficient semantically secure elliptic curve cryptosystem based on KMOV D Galindo, S Mart, P Morillo, JL Villar Cryptology ePrint Archive, 2002 | 23 | 2002 |
Linear key predistribution schemes C Padró, I Gracia, SM Molleví, P Morillo Designs, Codes and Cryptography 25, 281-298, 2002 | 22 | 2002 |
Improving the trade-off between storage and communication in broadcast encryption schemes SM Carles Padró, Ignacio Gracia Discrete applied mathematics 143 (1), 213-220, 2004 | 21 | 2004 |
Improving the linear programming technique in the search for lower bounds in secret sharing O Farràs, T Kaced, S Martín, C Padró IEEE Transactions on Information Theory 66 (11), 7088-7100, 2020 | 20 | 2020 |
Computing the order of points on an elliptic curve modulo N is as difficult as factoring N S Martin, P Morillo, JL Villar Applied Mathematics Letters 14 (3), 341-346, 2001 | 15 | 2001 |
Danos, 0.(2000) Proc G Towers, M Bock, S Martin, Y Takeuchi, JP Stoye Natl. Acad. Sci. USA 97, 12295-12299, 0 | 14 | |
Fujisaki–Okamoto hybrid encryption revisited JLV David Galindo, Sebastià Martín, Paz Morillo International Journal of Information Security 4 (4), 228-241, 2005 | 11 | 2005 |
A linear algebraic approach to metering schemes CP Carlo Blundo, Sebastià Martín, Barbara Masucci Designs, Codes and Cryptography 33 (3), 241-260, 2004 | 10* | 2004 |
Linear threshold multisecret sharing schemes O Farras, I Gracia, S Martín, C Padró International Conference on Information Theoretic Security, 110-126, 2009 | 9 | 2009 |
Evaluating elliptic curve based KEMs in the light of pairings. JLV David Galindo, Sebastià Martín Molleví IACR Cryptology ePrint Archive 2004 (84), 2004 | 8* | 2004 |
An IND-CPA cryptosystem from Demytko's primitive JLV David Galindo, Sebastià Martín, Paz Morillo Information Theory Workshop, 2003. Proceedings. 2003 IEEE, 167-170, 2003 | 6* | 2003 |
A note on non-perfect secret sharing O Farras, S Martín, C Padró Cryptology ePrint Archive, 2016 | 5 | 2016 |
Easy verifiable primitives and practical public key cryptosystems JLV David Galindo, Sebastià Martín, Paz Morillo Information Security 2851, 69-83, 2003 | 5* | 2003 |
Fujisaki-Okamoto IND-CCA hybrid encryption revisited D Galindo, S Mart, P Morillo, JL Villar Cryptology ePrint Archive, 2003 | 5 | 2003 |
The security of PSEC-KEM versus ECIES-KEM JLV David Galindo, Sebastià Martín Proceedings of the 26th Symposium on Information Theory in the BeNeLux, 17-27, 2005 | 4* | 2005 |