List of Publications
Recent publications:
- S. Platikanov, A. Palomas, M. Cedeño, R. Tauler, J.L. Villar, R. Bragós, S. Bermejo, J. Jaumot and S. Lacorte. Coupling electrochemical and spectroscopic methods for river water dissolved organic matter characterization. Environmental Monitoring and Assessment 197 (2025) 1071. DOI: 10.1007/s10661-025-14489-2
Publications in cryptology:
- A. Escala, G. Herold, E. Kiltz, C. Ràfols and J.L. Villar. An Algebraic Framework for Diffie-Hellman Assumptions. Journal of Cryptology 30(1) (2017) 242-288. DOI: 10.1007/s00145-015-9220-6
- J.L. Villar. Equivalences and Black-Box Separations of Matrix Diffie-Hellman Problems. Public Key Cryptography (PKC 2017), Lecture Notes in Computer Science 10174 (2017) 435-464. Amsterdam, Netherlands, March 2017. DOI: 10.1007/978-3-662-54365-8_18
- P. Morillo, C. Ràfols and J.L. Villar. The Kernel Matrix Diffie-Hellman Assumption. Asiacrypt 2016, Lecture Notes in Computer Science 10031 (2016) 729-758. Hanoi, Vietnam, December 2016. DOI: 10.1007/978-3-662-53887-6_27
- M.I. González-Vasco, A.L. Pérez del Pozo, P. Taborda and J.L. Villar. Cryptanalysis of a key exchange scheme based on block matrices. Information Sciences 276 (2014) 319-331. DOI: 10.1016/j.ins.2013.11.009
- A. Escala, G. Herold, E. Kiltz, C. Ràfols and J.L. Villar. An Algebraic Framework for Diffie-Hellman Assumptions. Crypto 2013, Lecture Notes in Computer Science 8043 (2013) 129-147. Santa Barbara, USA, August 2013. DOI: 10.1007/978-3-642-40084-1_8
- J.L. Villar. Optimal Reductions of Some Decisional Problems to the Rank Problem. Asiacrypt 2012, Lecture Notes in Computer Science 7658 (2012) 80-97. Beijing, China, December 2012. DOI: 10.1007/978-3-642-34961-4_7
- D. Galindo, J. Herranz and J.L. Villar. Identity-Based Encryption with Master Key-Dependent Message Security and Leakage Resilience. ESORICS 2012, Lecture Notes in Computer Science 7459 (2012) 627-642. Pisa, Italy, September 2012. DOI: 10.1007/978-3-642-33167-1_36
- S. Heidarvand and J.L. Villar. A Fair and Abuse-Free Contract Signing Protocol from Boneh-Boyen Signature. EuroPKI 2010, Lecture Notes in Computer Science 6711 (2011) 125-140. Athens, Greece, September 2010. DOI: 10.1007/978-3-642-22633-5
- M.I. González-Vasco, S. Heidarvand and J.L Villar. Anonymous Subscription Schemes - A Flexible Construction for On-line Services Access. Proc. of the International Conference on Security and Cryptography (SECRYPT 2010), (2010) 120-131. Athens, Greece, July 2010.
- S. Heidarvand and J.L. Villar. Public Verifiability from Pairings in Secret Sharing Schemes. SAC 2008, Lecture Notes in Computer Science 5381 (2009) 294-308. Sackville NB, Canada, August 2008. DOI: 10.1007/978-3-642-04159-4
- T. Tassa and J.L. Villar. On proper secrets, $(t,k)$-bases and linear codes. Designs, Codes and Cryptography 52(2) (2009) 129-154. DOI: 10.1007/s10623-009-9272-4
- M.I. González and J.L. Villar. In search of mathematical primitives for deriving universal projective hash families. Applicable Algebra in Engineering, Communication and Computing 19(2) (2008) 161-173. DOI: 10.1007/s00200-008-0068-y
- M.I. González, R. Steinwandt and J.L. Villar. Towards Provable Security for Cryptographic Constructions Arising from Combinatorial Group Theory. Algebraic Methods in Cryptography. Contemporary Mathematics 418 (2006) 89-102. DOI: 10.1090/CONM/418/07948
- P. Paillier and J.L. Villar. Trading One-Wayness against Chosen-Ciphertext Security in Factoring-Based Encryption. Asiacrypt 2006, Lecture Notes in Computer Science 4284 (2006) 252-266. Shangai, China, December 2006. DOI: 10.1007/11935230_17
- A. Ruiz and J.L. Villar. Publicly Verifiable Secret Sharing from Paillier's Cryptosystem. Lecture Notes in Informatics P-74 (2005) 98-108.
- D. Galindo, S. Martín, P. Morillo and J.L. Villar. Fujisaki-Okamoto hybrid encryption revisited. International Journal of Information Security 4(4) (2005) 228-241. DOI: 10.1007/s10207-004-0042-z
- M.I. González-Vasco, C. Martínez, R. Steinwandt and J.L. Villar. A New Cramer-Shoup Like Methodology for Group Based Provably Secure Encryption Schemes. Theory of Cryptography Conference (TCC 2005), Lecture Notes in Computer Science 3378 (2005) 495-509. Cambridge MA, USA, February 2005. DOI: 10.1007/b106171
- D. Galindo, S. Martín, T. Takagi and J.L. Villar. A Provably Secure Elliptic Curve Scheme with Fast Encryption. Progress in Cryptology (INDOCRYPT '04), Lecture Notes in Computer Science 3348 (2004) 245-259. Chennai, India, December 2004. DOI: 10.1007/b104579
- J. Herranz and J.L. Villar. An unbalanced protocol for group key exchange. Trust and Privacy in Digital Business (TrustBus '04), Lecture Notes in Computer Science 3184 (2004) 172-180. Zaragoza, Spain, August 2004. DOI: 10.1007/b99832
- D. Galindo, S. Martín, P. Morillo and J.L. Villar. Easy Verifiable Primitives and Practical Public Key Cryptosystems. Information Security Conference (ISC '03), Lecture Notes in Computer Science 2851 (2003) 69-83. Bristol, United Kingdom, October 2003. DOI: 10.1007/10958513_6
- D. Galindo, S. Martín, P. Morillo and J.L. Villar. An IND-CPA cryptosystem from Demytko's primitive. Proc. of the IEEE Information Theory Workshop (ITW '03), 167-170. Paris, France, April 2003. DOI: 10.1109/ITW.2003.1216721
- D. Galindo, S. Martín, P. Morillo and J.L. Villar. An efficient semantically secure elliptic curve cryptosystem based on KMOV. Proc. of the International Workshop on Coding and Cryptography (WCC '03), 213-221. Versailles, France, March 2003.
- D. Galindo, S. Martín, P. Morillo and J.L. Villar. A Practical Public Key Cryptosystem from Paillier and Rabin Schemes. Public Key Cryptography (PKC '03), Lecture Notes in Computer Science 2567 (2002) 279-291. Miami, USA, January 2003.
- M. Valls and J.L. Villar. Distributed virtual safe-deposit box. IEICE Trans. Information and Systems E85-D 4 (2002) 786-788.
- S. Martín, P. Morillo and J.L. Villar. Computing the order of points on an elliptic curve modulo N is as difficult as factoring N. Applied Mathematics Letters 14 (2001) 341-346. DOI: 10.1016/S0893-9659(00)00159-2
- P. Morillo, C. Padró, G. Sáez and J.L. Villar. Weighted threshold secret sharing schemes. Information Processing Letters 70 (1999) 211-216. DOI: 10.1016/S0020-0190(99)00070-8
- C. Padró, G. Sáez and J.L. Villar. Detection of cheaters in vector space secret sharing schemes. Designs, Codes and Cryptography 16 (1999) 75-85. DOI: 10.1023/A:1008378426278
- A. Daniel, V. Torres and J.L. Villar. Parallelizing the RSA operator. Proc. of the 1st International Conference on the Theory and Applications of Cryptology (PRAGACRYPT '96), 67-75. Praga, Czech Republic, September 1996.
Preprints
- J.L. Villar. Equivalences and Black-Box Separations of Matrix Diffie-Hellman Problems. Cryptology ePrint Archive, Report 2017/001 [2 Jan 2017].
- P. Morillo, C. Ràfols and J.L. Villar. Matrix Computational Assumptions in Multilinear Groups. Cryptology ePrint Archive, Report 2015/353 [20 Apr 2015].
- A. Escala, G. Herold, E. Kiltz, C. Ràfols and J.L. Villar. An Algebraic Framework for Diffie-Hellman Assumptions. Cryptology ePrint Archive, Report 2013/377 [11 Jun 2013].
- D. Galindo, J. Herranz and J.L. Villar. Identity-Based Encryption with Master Key-Dependent Message Security and Applications. Cryptology ePrint Archive, Report 2012/142 [16 Mar 2012].
- D. Galindo, S. Martín, P. Morillo and J.L. Villar. Fujisaki-Okamoto IND-CCA hybrid encryption revisited. Cryptology ePrint Archive, Report 2003/107 [28 May 2003].
- D. Galindo, S. Martín, P. Morillo and J.L. Villar. A semantically secure elliptic curve RSA scheme with small expansion factor. Cryptology ePrint Archive, Report 2002/083 [27 Jun 2002].
- D. Galindo, S. Martín, P. Morillo and J.L. Villar. An efficient semantically secure elliptic curve cryptosystem based on KMOV. Cryptology ePrint Archive, Report 2002/037 [27 Nov 2002].
Publications in graph theory:
- J.L. Villar. The underlying graph of a line digraph. Discrete Applied Mathematics 37/38 (1992) 525-538. DOI: 10.1016/0166-218X(92)90156-5
- A.S. Lladó, J.L. Villar and M.A. Fiol. A new family of digraphs on alphabets. Proc. of the International Conference on Incidence Geometries and Combinatorial Structures (COMBINATORICS '88), 2 (1991) 181-193. Ravello, Italy, May 1988.
- J.L. Villar. Kautz s-ary closed sequences. Proc. of the International Conference on Incidence Geometries and Combinatorial Structures (COMBINATORICS '88), 2 (1991) 459-469. Ravello, Italy, May 1988.
- M.A. Fiol, A.S. Lladó and J.L. Villar. Digraphs on alphabets and the (d,N) digraph problem. Ars Combinatoria 25C (1988) 105-122.
Other publications:
- A. Albareda, R. Pérez, J.L. Villar, E. Minguella and J.A. Gorri. Intermodulation measurement of nonlinearities in piezoceramic resonators. Review of Scientific Instruments 68(8) (1997) 3143-3149. DOI: 10.1063/1.1148259
- R. Pérez, A. Albareda, E. Minguella and J.L. Villar. Electrical model for a nonlinear piezoelectric transducer. Proc. of the 10th IEEE Int. Symp. on Appl. of Ferroelectrics (ISAF '96), 2 (1996) 955-958. East Brunswick, USA, August 1996. DOI: 10.1109/ISAF.1996.598185
- R. Pérez, L. Benadero, A. Albareda, M. Tresánchez, J.A. Gorri and J.L. Villar. Low signal analysis of piezoelectric transformers. Ferroelectrics 134 (1992) 99-104. DOI: 10.1080/00150199208015572
- L. Benadero, J.L. Villar, J.A. Gorri, A. Albareda, E. Toribio and R. Pérez. Measuring magnetic dipole fields using Hall effect sensors. European Journal of Physics 12(3) (1991) 146-148. DOI: 10.1088/0143-0807/12/3/009
- N. Ferrer Anglada, J. Fontcuberta, J.L. Villar and A. Albareda. Transport properties of YBa2Cu3-xFexO7 superconducting oxides. Ferroelectrics 105 (1990) 69-74. DOI: 10.1080/00150199008224620