Skip to main content

and
  1. No Access

    Article

    Repairing an aggregation-based smart metering system

    Smart meters inform the electricity suppliers about the consumption of their clients in short intervals. Fine-grained electricity consumption information is highly sensitive as it has been proven to permit to ...

    Ricard Garra, Dominik Leibenger in International Journal of Information Secur… (2019)

  2. No Access

    Article

    On the 2-adic valuation of the cardinality of elliptic curves over finite extensions of \(\mathbb {F}_{\varvec{q}} \)

    In this paper we study the difference between the 2-adic valuations of the cardinalities \( \# E( \mathbb {F}_{q^k} ) \) ...

    Josep M. Miret, Jordi Pujolàs, Javier Valera in Archiv der Mathematik (2018)

  3. Article

    Foreword

    Edgar Martínez-Moro, Josep M. Miret, Luis Ramiro Piñeiro in Mathematics in Computer Science (2018)

  4. No Access

    Article

    Pairing-Based Cryptography on Elliptic Curves

    We give a brief overview of a recent branch of Public Key Cryptography, the so called Pairing-based Cryptography or Identity-based Cryptography. We describe the Weil pairing and its applications to cryptosyste...

    Josep M. Miret, Daniel Sadornil, Juan G. Tena in Mathematics in Computer Science (2018)

  5. No Access

    Article

    A hybrid approach to vector-based homomorphic tallying remote voting

    Vector-based homomorphic tallying remote voting schemes provide an efficient protocol for vote tallying, but they require voters to prove in zero-knowledge that the ballots they cast have been properly generat...

    Víctor Mateu, Josep M. Miret in International Journal of Information Security (2016)

  6. No Access

    Article

    On the \({\ell}\) -adic valuation of the cardinality of elliptic curves over finite extensions of \({\mathbb{F}_{q}}\)

    Let E be an elliptic curve defined over a finite field \({\mathbb{F}_{q}}\) ...

    Josep M. Miret, Jordi Pujolàs, Javier Valera in Archiv der Mathematik (2015)

  7. No Access

    Article

    On the Nonexistence of Almost Moore Digraphs of Degree Four and Five

    An almost Moore (d, k)-digraph is a regular digraph of degree \({d > 1}\) ...

    Josep Conde, Mirka Miller, Josep M. Miret, Kumar Saurav in Mathematics in Computer Science (2015)

  8. No Access

    Chapter and Conference Paper

    Isogeny Volcanoes of Elliptic Curves and Sylow Subgroups

    Given an ordinary elliptic curve over a finite field located in the floor of its volcano of \( \ell \) -isogenies, we ...

    Mireille Fouquet, Josep M. Miret, Javier Valera in Progress in Cryptology - LATINCRYPT 2014 (2015)

  9. No Access

    Chapter and Conference Paper

    An Efficient Homomorphic E-Voting System over Elliptic Curves

    The homomorphic tallying paradigm provides efficient e-voting solutions when implemented using the multiplicative homomorphic property of the ElGamal cryptosystem. However, that is not the case when implemente...

    M. Àngels Cerveró, Víctor Mateu in Electronic Government and the Information … (2014)

  10. No Access

    Article

    Cryptanalysis of an ad-hoc cryptosystem for mix-based e-voting robust against relation attacks

    In this paper, an ad-hoc public-key cryptosystem recently proposed to implement a general countermeasure to relation attacks in mix-based e-voting is shown to be weak in the sense that the secret key is easily...

    Josep M. Miret, Francesc Sebé in International Journal of Information Security (2011)

  11. No Access

    Chapter and Conference Paper

    Verifiable Encrypted Redundancy for Mix-Type Remote Electronic Voting

    In this paper we present a mix-type remote electronic voting system belonging to the “proof of product with redundancy” paradigm. Votes are composed using a redundancy system that permits to prove the correct ...

    Víctor Mateu, Josep M. Miret, Francesc Sebé in Electronic Government and the Information … (2011)

  12. No Access

    Book and Conference Proceedings

    Financial Cryptography and Data Security

    FC 2010 Workshops, RLCPS, WECSR, and WLC 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers

    Radu Sion, Reza Curtmola in Lecture Notes in Computer Science (2010)

  13. No Access

    Chapter and Conference Paper

    WLC Preface

    Low-cost devices are the key component of several applications: RFID tags permit an automated supply chain management while smart cards are a secure means of storing cryptographic keys required for remote and ...

    Josep M. Miret, Francesc Sebé in Financial Cryptography and Data Security (2010)

  14. No Access

    Article

    A Secure Elliptic Curve-Based RFID Protocol

    Nowadays, the use of Radio Frequency Identification (RFID) systems in industry and stores has increased. Nevertheless, some of these systems present privacy problems that may discourage potential users. Hence,...

    Santi Martínez, Magda Valls, Concepció Roig in Journal of Computer Science and Technology (2009)

  15. No Access

    Article

    The picard group of the variety of plane cuspidal cubics of ℙ3

    We give a compactification of the varietyU of non-degenerate plane cuspidal cubics of ℙ3. We construct this compactification by means of the projective bundleX of a suitable vector bundleE. We describe the inters...

    Josep M. Miret in Rendiconti del Circolo Matematico di Palermo (2000)

  16. No Access

    Article

    On the variety of rational curves inP n

    In this note one defines a stratification of the variety of rational curves inP n of given degree in terms of the decomposition of the normal bundle (see [E-vdV], [G-S] for the casen=3). The strat...

    Josep M. Miret in Annali dell’Università di Ferrara (1986)