Carles Padró
Orcid: 0000-0002-8644-5929Affiliations:
- Polytechnic University of Catalonia, Barcelona, Spain
According to our database1,
Carles Padró
authored at least 68 papers
between 1995 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Interaction between skew-representability, tensor products, extension properties, and rank inequalities.
CoRR, July, 2025
Discret. Appl. Math., 2025
2024
2021
Des. Codes Cryptogr., 2021
2018
Improving the Linear Programming Technique in the Search for Lower Bounds in Secret Sharing.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018
2017
2016
2015
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015
2014
Proceedings of the Theory of Cryptography - 11th Theory of Cryptography Conference, 2014
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014
2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013
2012
Finding Lower Bounds on the Complexity of Secret Sharing Schemes by Linear Programming.
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
2011
Des. Codes Cryptogr., 2011
Proceedings of the Coding and Cryptology - Third International Workshop, 2011
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011
2010
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010
Finding Lower Bounds on the Complexity of Secret Sharing Schemes by Linear Programming.
Proceedings of the LATIN 2010: Theoretical Informatics, 2010
2009
Key Predistribution Schemes and One-Time Broadcast Encryption Schemes from Algebraic Geometry Codes.
Proceedings of the Cryptography and Coding, 2009
Proceedings of the Information Theoretic Security, 4th International Conference, 2009
Proceedings of the Information Theoretic Security, 4th International Conference, 2009
2008
On Codes, Matroids, and Secure Multiparty Computation From Linear Secret-Sharing Schemes.
IEEE Trans. Inf. Theory, 2008
Proceedings of the Theory of Cryptography, Fifth Theory of Cryptography Conference, 2008
Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors.
Proceedings of the Advances in Cryptology, 2008
2007
Proceedings of the Theory of Cryptography, 4th Theory of Cryptography Conference, 2007
Proceedings of the Advances in Cryptology, 2007
A Note on Secure Computation of the Moore-Penrose Pseudoinverse and Its Application to Secure Linear Algebra.
Proceedings of the Advances in Cryptology, 2007
2006
Ideal Secret Sharing Schemes Whose Minimal Qualified Subsets Have at Most Three Participants.
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006
2005
IACR Cryptol. ePrint Arch., 2005
On Codes, Matroids and Secure Multi-party Computation from Linear Secret Sharing Schemes.
Proceedings of the Advances in Cryptology, 2005
2004
IEEE Trans. Inf. Theory, 2004
Electron. J. Comb., 2004
2003
Proceedings of the Information Security, 6th International Conference, 2003
2002
Lower bounds on the information rate of secret sharing schemes with homogeneous access structure.
Inf. Process. Lett., 2002
IACR Cryptol. ePrint Arch., 2002
Linear Key Predistribution Schemes.
Des. Codes Cryptogr., 2002
Proceedings of the Security in Communication Networks, Third International Conference, 2002
Proceedings of the Information Security, 5th International Conference, 2002
2001
Improving the trade-off between storage and communication in broadcast encryption schemes.
IACR Cryptol. ePrint Arch., 2001
Electron. Notes Discret. Math., 2001
Discret. Math., 2001
Bounds and Constructions for Unconditionally Secure Distributed Key Distribution Schemes for General Access Structures.
Proceedings of the Information Security, 4th International Conference, 2001
1999
Des. Codes Cryptogr., 1999
Proceedings of the Fundamentals of Computation Theory, 12th International Symposium, 1999
1998
SIAM J. Discret. Math., 1998
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998
1997
Proceedings of 17th International Conference of the Chilean Computer Science Society (SCCC '97), 1997
1996
Comments on "Line Digraph Iterations and Connectivity Analysis of de Bruijn and Kautz Graphs".
IEEE Trans. Computers, 1996
Spanners of Underlying Graphs of Iterated Line Digraphs.
Proceedings of the SIROCCO'96, 1996
1995