Alfredo De Santis

From MaRDI portal


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Bounds and algorithms for alphabetic codes and binary search trees
IEEE Transactions on Information Theory
2025-01-23Paper
Private computations on set intersection
 
2024-10-02Paper
Communication efficient zero-knowledge proofs of knowledge (with applications to electronic cash)
STACS 92
2022-08-18Paper
Probabilistic secret sharing
 
2021-08-04Paper
Secret sharing schemes for infinite sets of participants: a new design technique
Theoretical Computer Science
2021-02-15Paper
Supporting dynamic updates in storage clouds with the Akl-Taylor scheme
Information Sciences
2020-02-06Paper
One-message statistical Zero-Knowledge Proofs and space-bounded verifier
Automata, Languages and Programming
2019-12-04Paper
Randomness in distribution protocols
Automata, Languages and Programming
2019-04-29Paper
On the number of random bits in totally private computation
Automata, Languages and Programming
2019-01-10Paper
Randomness-efficient non-interactive zero knowledge
Automata, Languages and Programming
2018-07-04Paper
Security of public-key cryptosystems based on Chebyshev polynomials
IEEE Transactions on Circuits and Systems I: Regular Papers
2017-11-20Paper
scientific article; zbMATH DE number 6741949 (Why is no real title available?)
 
2017-07-11Paper
scientific article; zbMATH DE number 6741942 (Why is no real title available?)
 
2017-07-11Paper
scientific article; zbMATH DE number 6741945 (Why is no real title available?)
 
2017-07-11Paper
On the relations between security notions in hierarchical key assignment schemes for dynamic structures
Information Security and Privacy
2016-09-02Paper
How to share a function securely
Proceedings of the twenty-sixth annual ACM symposium on Theory of computing - STOC '94
2016-09-01Paper
The graph clustering problem has a perfect zero-knowledge interactive proof
Information Processing Letters
2016-06-16Paper
On secret set schemes
Information Processing Letters
2016-06-16Paper
Visual cryptography for grey level images
Information Processing Letters
2016-06-16Paper
On secret sharing schemes
Information Processing Letters
2016-06-09Paper
Lower bounds for robust secret sharing schemes
Information Processing Letters
2016-05-26Paper
Measure-independent characterization of contrast optimal visual cryptography schemes
Lecture Notes in Computer Science
2015-09-30Paper
Modeling energy-efficient secure communications in multi-mode wireless mobile devices
Journal of Computer and System Sciences
2015-08-31Paper
Anonymous protocols: notions and equivalence
Theoretical Computer Science
2015-05-22Paper
Color visual cryptography schemes for black and white secret images
Theoretical Computer Science
2014-01-13Paper
A note on time-bound hierarchical key assignment schemes
Information Processing Letters
2013-03-21Paper
Provably-secure time-bound hierarchical key assignment schemes
Journal of Cryptology
2012-07-03Paper
Efficient provably-secure hierarchical key assignment schemes
Theoretical Computer Science
2011-10-10Paper
Using colors to improve visual cryptography for black and white images
Lecture Notes in Computer Science
2011-05-19Paper
Optimising SD and LSD in Presence of Non-uniform Probabilities of Revocation
Lecture Notes in Computer Science
2009-12-03Paper
Variations on a theme by Akl and Taylor: security and tradeoffs
Theoretical Computer Science
2009-12-01Paper
Security and Tradeoffs of the Akl-Taylor Scheme and Its Variants
Mathematical Foundations of Computer Science 2009
2009-10-16Paper
Cryptographic key assignment schemes for any access control policy
Information Processing Letters
2009-08-27Paper
Ideal contrast visual cryptography schemes with reversing
Information Processing Letters
2009-08-27Paper
On Monotone Formula Composition of Perfect Zero-Knowledge Languages
SIAM Journal on Computing
2009-08-20Paper
Colored visual cryptography without color darkening
Theoretical Computer Science
2009-06-22Paper
On Self-Healing Key Distribution Schemes
IEEE Transactions on Information Theory
2008-12-21Paper
Cheating Immune (2,n)-Threshold Visual Secret Sharing
Lecture Notes in Computer Science
2008-11-27Paper
New constructions for provably-secure time-bound hierarchical key assignment schemes
Theoretical Computer Science
2008-11-18Paper
Efficient Provably-Secure Hierarchical Key Assignment Schemes
Mathematical Foundations of Computer Science 2007
2008-09-17Paper
Weaknesses in a Recent Ultra-Lightweight RFID Authentication Protocol
Progress in Cryptology – AFRICACRYPT 2008
2008-06-13Paper
An attack on a payment scheme
Information Sciences
2008-03-12Paper
On unconditionally secure distributed oblivious transfer
Journal of Cryptology
2007-08-20Paper
Coding and Cryptography
Lecture Notes in Computer Science
2007-05-02Paper
Visual cryptography schemes with optimal pixel expansion
Theoretical Computer Science
2007-01-09Paper
Visual cryptography for general access structures
Information and Computation
2006-10-10Paper
Security in Communication Networks
Lecture Notes in Computer Science
2006-10-10Paper
Enforcing the security of a time-bound hierarchical key assignment scheme
Information Sciences
2006-05-16Paper
Unconditionally secure key assignment schemes
Discrete Applied Mathematics
2006-04-28Paper
Automata, Languages and Programming
Lecture Notes in Computer Science
2005-08-24Paper
Mathematical Foundations of Computer Science 2004
Lecture Notes in Computer Science
2005-08-22Paper
Optimal colored threshold visual cryptography schemes
Designs, Codes and Cryptography
2005-08-17Paper
scientific article; zbMATH DE number 2102766 (Why is no real title available?)
 
2004-09-24Paper
Design of self-healing key distribution schemes
Designs, Codes and Cryptography
2004-08-16Paper
Anonymous membership broadcast schemes
Designs, Codes and Cryptography
2004-08-16Paper
Randomness in secret sharing and visual cryptography schemes
Theoretical Computer Science
2004-08-06Paper
scientific article; zbMATH DE number 2044524 (Why is no real title available?)
 
2004-02-18Paper
Contrast Optimal Threshold Visual Cryptography Schemes
SIAM Journal on Discrete Mathematics
2004-01-08Paper
scientific article; zbMATH DE number 2019634 (Why is no real title available?)
 
2003-12-17Paper
scientific article; zbMATH DE number 1951618 (Why is no real title available?)
 
2003-07-21Paper
scientific article; zbMATH DE number 1842511 (Why is no real title available?)
 
2002-12-08Paper
Bounds on entropy in a guessing game
IEEE Transactions on Information Theory
2002-08-04Paper
Probability of shares in secret sharing schemes
Information Processing Letters
2002-07-25Paper
scientific article; zbMATH DE number 1500549 (Why is no real title available?)
 
2002-05-14Paper
Randomness complexity of private computation
Computational Complexity
2002-04-21Paper
Improved schemes for visual cryptography
Designs, Codes and Cryptography
2002-04-15Paper
scientific article; zbMATH DE number 1670843 (Why is no real title available?)
 
2001-12-06Paper
scientific article; zbMATH DE number 1588476 (Why is no real title available?)
 
2001-07-17Paper
A t-private k-database information retrieval scheme
International Journal of Information Security
2001-01-01Paper
Extended capabilities for visual cryptography
Theoretical Computer Science
2000-12-12Paper
On the contrast in visual cryptography schemes
Journal of Cryptology
2000-09-24Paper
scientific article; zbMATH DE number 1456816 (Why is no real title available?)
 
2000-06-07Paper
On a fallacious bound for authentication codes
Journal of Cryptology
2000-05-22Paper
On the Data Expansion of the Huffman Compression Algorithm
The Computer Journal
2000-03-19Paper
scientific article; zbMATH DE number 1406777 (Why is no real title available?)
 
2000-03-01Paper
scientific article; zbMATH DE number 1405650 (Why is no real title available?)
 
2000-02-23Paper
A lower bound on the encoding length in lossy transmission
Information Sciences
2000-01-05Paper
Multiple ramp schemes
IEEE Transactions on Information Theory
1999-11-21Paper
On lower bounds for the redundancy of optimal codes
Designs, Codes and Cryptography
1999-06-27Paper
A new bound for the data expansion of Huffman codes
IEEE Transactions on Information Theory
1999-05-05Paper
scientific article; zbMATH DE number 1256680 (Why is no real title available?)
 
1999-04-22Paper
Perfectly secure key distribution for dynamic conferences
Information and Computation
1999-03-30Paper
scientific article; zbMATH DE number 1024095 (Why is no real title available?)
 
1998-01-04Paper
Tight bounds on the information rate of secret sharing schemes
Designs, Codes and Cryptography
1997-12-18Paper
Randomness in distribution protocols
Information and Computation
1997-10-13Paper
On the redundancy achieved by Huffman codes
Information Sciences
1997-09-04Paper
Catastrophic faults in reconfigurable systolic linear arrays
Discrete Applied Mathematics
1997-08-10Paper
scientific article; zbMATH DE number 1024046 (Why is no real title available?)
 
1997-07-20Paper
scientific article; zbMATH DE number 1024049 (Why is no real title available?)
 
1997-07-20Paper
On the information rate of secret sharing schemes
Theoretical Computer Science
1997-02-28Paper
Fully dynamic secret sharing schemes
Theoretical Computer Science
1997-02-27Paper
New lower bounds on the cost of binary search trees
Theoretical Computer Science
1997-02-27Paper
The power of preprocessing in zero-knowledge proofs of knowledge
Journal of Cryptology
1997-01-14Paper
New bounds on the information rate of secret sharing schemes
IEEE Transactions on Information Theory
1995-12-17Paper
scientific article; zbMATH DE number 826065 (Why is no real title available?)
 
1995-12-13Paper
Zero-knowledge arguments and public-key cryptography
Information and Computation
1995-11-05Paper
Graph decompositions and secret sharing schemes
Journal of Cryptology
1995-07-16Paper
scientific article; zbMATH DE number 708825 (Why is no real title available?)
 
1995-07-16Paper
scientific article; zbMATH DE number 708803 (Why is no real title available?)
 
1995-03-30Paper
Binary prefix codes ending in a "1"
IEEE Transactions on Information Theory
1995-03-01Paper
scientific article; zbMATH DE number 512874 (Why is no real title available?)
 
1994-10-04Paper
The knowledge complexity of quadratic residuosity languages
Theoretical Computer Science
1994-09-25Paper
Tight Upper and Lower Bounds on the Path Length of Binary Trees
SIAM Journal on Computing
1994-03-27Paper
Cryptographic Applications of the Non-Interactive Metaproof and Many-prover Systems
Advances in Cryptology - CRYPTO '90. A conference on the theory and application of Cryptography, Univ. of California, Santa Barbara, USA, August 11--15, 1990. Proceedings
1994-03-07Paper
scientific article; zbMATH DE number 503323 (Why is no real title available?)
 
1994-02-22Paper
On the size of shares for secret sharing schemes
Journal of Cryptology
1994-01-03Paper
On binary search trees
Information Processing Letters
1993-06-29Paper
scientific article; zbMATH DE number 176543 (Why is no real title available?)
 
1993-05-18Paper
scientific article; zbMATH DE number 176528 (Why is no real title available?)
 
1993-05-18Paper
scientific article; zbMATH DE number 177052 (Why is no real title available?)
 
1993-05-18Paper
scientific article; zbMATH DE number 177022 (Why is no real title available?)
 
1993-05-18Paper
On the construction of statistically synchronizable codes
IEEE Transactions on Information Theory
1992-06-28Paper
On the redundancy of optimal codes with limited word length
IEEE Transactions on Information Theory
1992-06-28Paper
Noninteractive Zero-Knowledge
SIAM Journal on Computing
1992-06-27Paper
New bounds on the redundancy of Huffman codes
IEEE Transactions on Information Theory
1991-01-01Paper
A note on D-ary Huffman codes
IEEE Transactions on Information Theory
1991-01-01Paper
Removing Interaction from Zero-Knowledge Proofs
Sequences
1990-01-01Paper
Tight upper bounds on the redundancy of Huffman codes
IEEE Transactions on Information Theory
1989-01-01Paper
scientific article; zbMATH DE number 4053065 (Why is no real title available?)
 
1988-01-01Paper
Bounds on the entropy series
IEEE Transactions on Information Theory
1988-01-01Paper
Regular universal codeword sets (Corresp.)
IEEE Transactions on Information Theory
1986-01-01Paper


Research outcomes over time


This page was built for person: Alfredo De Santis