Seguir
Carla Ràfols
Carla Ràfols
Dirección de correo verificada de upf.edu
Título
Citado por
Citado por
Año
An algebraic framework for Diffie-Hellman assumptions
A Escala, G Herold, E Kiltz, C Rafols, J Villar
Advances in Cryptology–CRYPTO 2013, 129-147, 2013
395*2013
Constant size ciphertexts in threshold attribute-based encryption
J Herranz, F Laguillaumie, C Ràfols
Public Key Cryptography–PKC 2010: 13th International Conference on Practice …, 2010
3352010
Attribute-based encryption schemes with constant-size ciphertexts
N Attrapadung, J Herranz, F Laguillaumie, B Libert, E De Panafieu, ...
Theoretical computer science 422, 15-38, 2012
2412012
Short attribute-based signatures for threshold predicates
J Herranz, F Laguillaumie, B Libert, C Rafols
Cryptographers’ Track at the RSA Conference, 51-67, 2012
1742012
Improved certificate-based encryption in the standard model
D Galindo, P Morillo, C Ràfols
Journal of Systems and Software 81 (7), 1218-1226, 2008
732008
Breaking Yum and Lee generic constructions of certificate-less and certificate-based encryption schemes
D Galindo, P Morillo, C Ràfols
Public Key Infrastructure: Third European PKI Workshop: Theory and Practice …, 2006
682006
The kernel matrix Diffie-Hellman assumption
P Morillo, C Ràfols, JL Villar
International Conference on the Theory and Application of Cryptology and …, 2016
662016
CCA2-secure threshold broadcast encryption with shorter ciphertexts
V Daza, J Herranz, P Morillo, C Rafols
International Conference on Provable Security, 35-50, 2007
442007
Polynomial spaces: A new framework for composite-to-prime-order transformations
G Herold, J Hesse, D Hofheinz, C Rafols, A Rupp
CRYPTO 1, 261-279, 2014
382014
QA-NIZK arguments in asymmetric groups: new tools and new constructions
A González, A Hevia, C Ràfols
International Conference on the Theory and Application of Cryptology and …, 2015
372015
Stretching Groth-Sahai: NIZK proofs of partial satisfiability
C Ràfols
Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015 …, 2015
362015
Extensions of access structures and their cryptographic applications
V Daza, J Herranz, P Morillo, C Ràfols
Applicable Algebra in Engineering, Communication and Computing 21 (4), 257-284, 2010
342010
An algebraic framework for universal and updatable SNARKs
C Ràfols, A Zapico
Annual International Cryptology Conference, 774-804, 2021
292021
Updateable inner product argument with logarithmic verifier and applications
V Daza, C Ràfols, A Zacharakis
Public-Key Cryptography–PKC 2020: 23rd IACR International Conference on …, 2020
282020
Shorter quadratic QA-NIZK proofs
V Daza, A González, Z Pindado, C Ràfols, J Silva
Public-Key Cryptography–PKC 2019: 22nd IACR International Conference on …, 2019
282019
Simulation extractable versions of Groth’s zk-SNARK revisited
K Baghery, Z Pindado, C Ràfols
International Conference on Cryptology and Network Security, 453-461, 2020
262020
New techniques for non-interactive shuffle and range arguments
A González, C Ràfols
International Conference on Applied Cryptography and Network Security, 427-444, 2016
262016
Matrix computational assumptions in multilinear groups
P Morillo, C Ràfols, JL Villar
Cryptology ePrint Archive, 2015
232015
Ad-hoc threshold broadcast encryption with shorter ciphertexts
V Daza, J Herranz, P Morillo, C Ràfols
Electronic Notes in Theoretical Computer Science 192 (2), 3-15, 2008
222008
New techniques for structural batch verification in bilinear groups with applications to groth-sahai proofs
G Herold, M Hoffmann, M Klooß, C Ràfols, A Rupp
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
182017
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20