What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Carla Ràfols
Google Scholar
24
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/cic
Baloo: Algebraic Lookup Arguments.
Arantxa Zapico
Ariel Gabizon
Dmitry Khovratovich
Mary Maller
Carla Ràfols
2023
conf/latincrypt
Folding Schemes with Selective Verification.
Carla Ràfols
Alexandros Zacharakis
2022
conf/asiacrypt
Linear-Map Vector Commitments and Their Practical Applications.
Matteo Campanelli
Anca Nitulescu
Carla Ràfols
Alexandros Zacharakis
Arantxa Zapico
2021
conf/crypto
An Algebraic Framework for Universal and Updatable SNARKs.
Carla Ràfols
Arantxa Zapico
2020
conf/pkc
Updateable Inner Product Argument with Logarithmic Verifier and Applications.
Vanesa Daza
Carla Ràfols
Alexandros Zacharakis
2020
conf/africacrypt
QA-NIZK Arguments of Same Opening for Bilateral Commitments.
Carla Ràfols
Javier Silva
2020
conf/africacrypt
Signatures of Knowledge for Boolean Circuits Under Standard Assumptions.
Karim Baghery
Alonso González
Zaira Pindado
Carla Ràfols
2020
conf/cans
Simulation Extractable Versions of Groth's zk-SNARK Revisited.
Karim Baghery
Zaira Pindado
Carla Ràfols
2019
conf/pkc
Shorter Quadratic QA-NIZK Proofs.
Vanesa Daza
Alonso González
Zaira Pindado
Carla Ràfols
Javier Silva
2019
conf/asiacrypt
Structure-Preserving and Re-randomizable RCCA-Secure Public Key Encryption and Its Applications.
Antonio Faonio
Dario Fiore
Javier Herranz
Carla Ràfols
2019
conf/asiacrypt
Shorter Pairing-Based Arguments Under Standard Assumptions.
Alonso González
Carla Ràfols
2017
journals/joc
An Algebraic Framework for Diffie-Hellman Assumptions.
Alex Escala
Gottfried Herold
Eike Kiltz
Carla Ràfols
Jorge Luis Villar
2017
conf/ccs
New Techniques for Structural Batch Verification in Bilinear Groups with Applications to Groth-Sahai Proofs.
Gottfried Herold
Max Hoffmann
Michael Klooß
Carla Ràfols
Andy Rupp
2016
conf/acns
New Techniques for Non-interactive Shuffle and Range Arguments.
Alonso González
Carla Ràfols
2016
conf/asiacrypt
The Kernel Matrix Diffie-Hellman Assumption.
Paz Morillo
Carla Ràfols
Jorge Luis Villar
2015
conf/asiacrypt
QA-NIZK Arguments in Asymmetric Groups: New Tools and New Constructions.
Alonso González
Alejandro Hevia
Carla Ràfols
2015
conf/tcc
Stretching Groth-Sahai: NIZK Proofs of Partial Satisfiability.
Carla Ràfols
2014
conf/crypto
Polynomial Spaces: A New Framework for Composite-to-Prime-Order Transformations.
Gottfried Herold
Julia Hesse
Dennis Hofheinz
Carla Ràfols
Andy Rupp
2014
conf/pkc
Identity-Based Lossy Trapdoor Functions: New Definitions, Hierarchical Extensions, and Implications.
Alex Escala
Javier Herranz
Benoît Libert
Carla Ràfols
2013
conf/crypto
An Algebraic Framework for Diffie-Hellman Assumptions.
Alex Escala
Gottfried Herold
Eike Kiltz
Carla Ràfols
Jorge L. Villar
2012
conf/ctrsa
Short Attribute-Based Signatures for Threshold Predicates.
Javier Herranz
Fabien Laguillaumie
Benoît Libert
Carla Ràfols
2010
conf/pkc
Constant Size Ciphertexts in Threshold Attribute-Based Encryption.
Javier Herranz
Fabien Laguillaumie
Carla Ràfols
2009
conf/pkc
The Security of All Bits Using List Decoding.
Paz Morillo
Carla Ràfols
2007
conf/provsec
CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts.
Vanesa Daza
Javier Herranz
Paz Morillo
Carla Ràfols
Coauthors
Alejandro Hevia
(1)
Alex Escala
(3)
Alexandros Zacharakis
(3)
Alonso González
(5)
Anca Nitulescu
(1)
Andy Rupp
(2)
Antonio Faonio
(1)
Arantxa Zapico
(3)
Ariel Gabizon
(1)
Benoît Libert
(2)
Carla Ràfols
(24)
Dario Fiore
(1)
Dennis Hofheinz
(1)
Dmitry Khovratovich
(1)
Eike Kiltz
(2)
Fabien Laguillaumie
(2)
Gottfried Herold
(4)
Javier Herranz
(5)
Javier Silva
(2)
Jorge L. Villar
(1)
Jorge Luis Villar
(2)
Julia Hesse
(1)
Karim Baghery
(2)
Mary Maller
(1)
Matteo Campanelli
(1)
Max Hoffmann
(1)
Michael Klooß
(1)
Paz Morillo
(3)
Vanesa Daza
(3)
Zaira Pindado
(3)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to