Germán Sáez

716 total citations
13 papers, 136 citations indexed

About

Germán Sáez is a scholar working on Artificial Intelligence, Computer Vision and Pattern Recognition and Computational Theory and Mathematics. According to data from OpenAlex, Germán Sáez has authored 13 papers receiving a total of 136 indexed citations (citations by other indexed papers that have themselves been cited), including 13 papers in Artificial Intelligence, 7 papers in Computer Vision and Pattern Recognition and 6 papers in Computational Theory and Mathematics. Recurrent topics in Germán Sáez's work include Cryptography and Data Security (12 papers), Chaos-based Image/Signal Encryption (7 papers) and Complexity and Algorithms in Graphs (6 papers). Germán Sáez is often cited by papers focused on Cryptography and Data Security (12 papers), Chaos-based Image/Signal Encryption (7 papers) and Complexity and Algorithms in Graphs (6 papers). Germán Sáez collaborates with scholars based in Spain and Netherlands. Germán Sáez's co-authors include Carles Padró, Javier Herranz, Sergio Cabello, Vanesa Daza, Jorge L. Villar and Giovanni Di Crescenzo and has published in prestigious journals such as IEEE Transactions on Computers, Discrete Applied Mathematics and Information Processing Letters.

In The Last Decade

Germán Sáez

13 papers receiving 129 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Germán Sáez Spain 7 120 58 42 40 36 13 136
Sanjit Chatterjee India 8 152 1.3× 28 0.5× 71 1.7× 30 0.8× 44 1.2× 15 167
Paz Morillo Spain 8 122 1.0× 68 1.2× 32 0.8× 21 0.5× 72 2.0× 20 159
Kyu Young Choi South Korea 6 140 1.2× 60 1.0× 63 1.5× 10 0.3× 49 1.4× 8 148
Kazuo Ohta Japan 3 90 0.8× 20 0.3× 47 1.1× 20 0.5× 26 0.7× 4 101
Khoa Nguyen Singapore 7 91 0.8× 26 0.4× 41 1.0× 22 0.6× 21 0.6× 22 113
Masaaki Shirase Japan 7 140 1.2× 38 0.7× 79 1.9× 14 0.3× 21 0.6× 26 148
Shigeo Mitsunari Japan 4 137 1.1× 30 0.5× 90 2.1× 19 0.5× 48 1.3× 6 161
Shahram Khazaei Iran 6 82 0.7× 14 0.2× 36 0.9× 35 0.9× 21 0.6× 23 99
Mads J. Jurik Denmark 4 148 1.2× 21 0.4× 43 1.0× 32 0.8× 37 1.0× 6 167
Dung Hoang Duong Australia 9 176 1.5× 26 0.4× 80 1.9× 24 0.6× 52 1.4× 31 197

Countries citing papers authored by Germán Sáez

Since Specialization
Citations

This map shows the geographic impact of Germán Sáez's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Germán Sáez with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Germán Sáez more than expected).

Fields of papers citing papers by Germán Sáez

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Germán Sáez. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Germán Sáez. The network helps show where Germán Sáez may publish in the future.

Co-authorship network of co-authors of Germán Sáez

This figure shows the co-authorship network connecting the top 25 collaborators of Germán Sáez. A scholar is included among the top collaborators of Germán Sáez based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Germán Sáez. Germán Sáez is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

13 of 13 papers shown
1.
Herranz, Javier, et al.. (2013). New results and applications for multi-secret sharing schemes. Designs Codes and Cryptography. 73(3). 841–864. 19 indexed citations
2.
Herranz, Javier, et al.. (2013). Sharing many secrets with computational provable security. Information Processing Letters. 113(14-16). 572–579. 7 indexed citations
3.
Herranz, Javier, et al.. (2012). Signcryption schemes with threshold unsigncryption, and applications. Designs Codes and Cryptography. 70(3). 323–345. 6 indexed citations
4.
Crescenzo, Giovanni Di, Javier Herranz, & Germán Sáez. (2010). On server trust in private proxy auctions. Electronic Commerce Research. 10(3-4). 291–311. 1 indexed citations
5.
Daza, Vanesa, Javier Herranz, & Germán Sáez. (2009). Flaws in some self-healing key distribution schemes with revocation. Information Processing Letters. 109(11). 523–526. 4 indexed citations
6.
Daza, Vanesa, Javier Herranz, & Germán Sáez. (2008). On the Computational Security of a Distributed Key Distribution Scheme. IEEE Transactions on Computers. 57(8). 1087–1097. 5 indexed citations
7.
Herranz, Javier & Germán Sáez. (2006). Distributed Ring Signatures from General Dual Access Structures. Designs Codes and Cryptography. 40(1). 103–120. 6 indexed citations
8.
Daza, Vanesa, Javier Herranz, & Germán Sáez. (2004). Protocols useful on the Internet from distributed signature schemes. International Journal of Information Security. 3(2). 61–69. 2 indexed citations
9.
Sáez, Germán. (2003). Generation of key predistribution schemes using secret sharing schemes. Discrete Applied Mathematics. 128(1). 239–249. 28 indexed citations
10.
Padró, Carles & Germán Sáez. (2002). Lower bounds on the information rate of secret sharing schemes with homogeneous access structure. Information Processing Letters. 83(6). 345–351. 13 indexed citations
11.
Cabello, Sergio, Carles Padró, & Germán Sáez. (2002). Secret Sharing Schemes with Detection of Cheaters for a General Access Structure. Designs Codes and Cryptography. 25(2). 175–188. 35 indexed citations
12.
Sáez, Germán. (2001). Generation of Key Predistribution Schemes using Secret Sharing Schemes. Electronic Notes in Discrete Mathematics. 6. 220–229. 1 indexed citations
13.
Padró, Carles, Germán Sáez, & Jorge L. Villar. (1999). Detection of Cheaters in Vector Space Secret Sharing Schemes. Designs Codes and Cryptography. 16(1). 75–85. 9 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026