An algebraic framework for Diffie–Hellman assumptions A Escala, G Herold, E Kiltz, C Ràfols, J Villar Journal of cryptology 30, 242-288, 2017 | 433 | 2017 |
Weighted threshold secret sharing schemes P Morillo, C Padró, G Sáez, JL Villar Information processing letters 70 (5), 211-216, 1999 | 98 | 1999 |
The kernel matrix Diffie-Hellman assumption P Morillo, C Ràfols, JL Villar International Conference on the Theory and Application of Cryptology and …, 2016 | 69 | 2016 |
Trading one-wayness against chosen-ciphertext security in factoring-based encryption P Paillier, JL Villar International Conference on the Theory and Application of Cryptology and …, 2006 | 65 | 2006 |
Detection of cheaters in vector space secret sharing schemes C Padro, G Sáez, JL Villar Designs, Codes and cryptography 16, 75-85, 1999 | 64 | 1999 |
Public verifiability from pairings in secret sharing schemes S Heidarvand, JL Villar Selected Areas in Cryptography: 15th International Workshop, SAC 2008 …, 2009 | 51 | 2009 |
Publicly verifiable secret sharing from Paillier's cryptosystem A Ruiz, JL Villar Gesellschaft für Informatik eV, 2005 | 43 | 2005 |
Identity-based encryption with master key-dependent message security and leakage-resilience D Galindo, J Herranz, J Villar European Symposium on Research in Computer Security, 627-642, 2012 | 41 | 2012 |
A practical public key cryptosystem from Paillier and Rabin schemes D Galindo, S Martýn, P Morillo, JL Villar Public Key Cryptography—PKC 2003: 6th International Workshop on Practice …, 2002 | 35 | 2002 |
Matrix computational assumptions in multilinear groups P Morillo, C Ràfols, JL Villar Cryptology ePrint Archive, 2015 | 23 | 2015 |
An efficient semantically secure elliptic curve cryptosystem based on KMOV D Galindo, S Mart, P Morillo, JL Villar Cryptology ePrint Archive, 2002 | 23 | 2002 |
Optimal reductions of some decisional problems to the rank problem JL Villar Advances in Cryptology–ASIACRYPT 2012: 18th International Conference on the …, 2012 | 19 | 2012 |
Computing the order of points on an elliptic curve modulo N is as difficult as factoring N S Martin, P Morillo, JL Villar Applied Mathematics Letters 14 (3), 341-346, 2001 | 16 | 2001 |
The underlying graph of a line digraph JL Villar Discrete Applied Mathematics 37, 525-538, 1992 | 16 | 1992 |
A new Cramer-Shoup like methodology for group based provably secure encryption schemes MIG Vasco, C Martínez, R Steinwandt, JL Villar Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005 …, 2005 | 15 | 2005 |
Digraphs on alphabets and the (d, N) digraph problem M Fiol, A Llado, J Villar | 15 | 1988 |
Intermodulation measurement of nonlinearities in piezoceramic resonators A Albareda, R Pérez, JL Villar, E Minguella, JA Gorri Review of scientific instruments 68 (8), 3143-3149, 1997 | 14 | 1997 |
Cryptanalysis of a key exchange scheme based on block matrices MIG Vasco, ALP del Pozo, PT Duarte, JL Villar Information Sciences 276, 319-331, 2014 | 12 | 2014 |
On proper secrets, (t, k)-bases and linear codes T Tassa, JL Villar Designs, Codes and Cryptography 52, 129-154, 2009 | 12 | 2009 |
Fujisaki–Okamoto hybrid encryption revisited D Galindo, S Martín, P Morillo, JL Villar International Journal of Information Security 4, 228-241, 2005 | 12 | 2005 |