Giovanni Di Crescenzo

From MaRDI portal
(Redirected from Person:166363)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
A survey on delegated computation2022-08-11Paper
Towards a theory of intrusion detection
Computer Security – ESORICS 2005
2022-03-09Paper
Delegating a product of group exponentiations with application to signature schemes
Journal of Mathematical Cryptology
2021-05-12Paper
Secure and efficient delegation of elliptic-curve pairing2021-02-23Paper
Cryptographic password obfuscation2021-01-18Paper
Efficient and secure delegation of exponentiation in general groups to a single malicious server
Mathematics in Computer Science
2020-10-30Paper
Efficient and secure delegation to a single malicious server: exponentiation over non-abelian groups2018-08-17Paper
Randomness-efficient non-interactive zero knowledge
Automata, Languages and Programming
2018-07-04Paper
Visual cryptography from halftone error diffusion2017-07-11Paper
Security-preserving hardness-amplification for any regular one-way function
Proceedings of the thirty-first annual ACM symposium on Theory of Computing
2016-09-29Paper
The graph clustering problem has a perfect zero-knowledge interactive proof
Information Processing Letters
2016-06-16Paper
Universal service-providers for database private information retrieval (extended abstract)
Proceedings of the seventeenth annual ACM symposium on Principles of distributed computing - PODC '98
2016-03-02Paper
On zero-knowledge proofs (extended abstract)
Proceedings of the thirty-second annual ACM symposium on Theory of computing
2014-09-26Paper
Secure node discovery in ad-hoc networks and applications
Electronic Notes in Theoretical Computer Science
2013-12-06Paper
Zero-knowledge proofs via polynomial representations
Mathematical Foundations of Computer Science 2012
2012-09-25Paper
Combinatorial Group Testing for Corruption Localizing Hashing
Lecture Notes in Computer Science
2011-08-17Paper
On server trust in private proxy auctions
Electronic Commerce Research
2010-11-30Paper
Foundations of Optical Encryption: Formal Modeling and Achieving Shannon Secrecy
Lecture Notes in Computer Science
2009-10-22Paper
On Monotone Formula Composition of Perfect Zero-Knowledge Languages
SIAM Journal on Computing
2009-08-20Paper
Concurrently Non-malleable Black-Box Zero Knowledge in the Bare Public-Key Model
Computer Science - Theory and Applications
2009-08-18Paper
Algorithms and Computation
Lecture Notes in Computer Science
2009-08-07Paper
Minimal Assumptions and Round Complexity for Concurrent Zero-Knowledge in the Bare Public-Key Model
Lecture Notes in Computer Science
2009-07-23Paper
Hypergraph decomposition and secret sharing
Discrete Applied Mathematics
2009-06-30Paper
3-Message NP Arguments in the BPK Model with Optimal Soundness and Zero-Knowledge
Algorithms and Computation
2009-01-29Paper
On the Security of Beth’s Identification Schemes against Active and Concurrent Adversaries
Mathematical Methods in Computer Science
2009-01-22Paper
Succinct NP Proofs from an Extractability Assumption
Logic and Theory of Algorithms
2008-06-19Paper
Public Key Encryption with Searchable Keywords Based on Jacobi Symbols
Lecture Notes in Computer Science
2008-04-11Paper
Advances in Cryptology - EUROCRYPT 2004
Lecture Notes in Computer Science
2007-09-25Paper
Theory of Cryptography
Lecture Notes in Computer Science
2007-02-12Paper
Information Security and Cryptology
Lecture Notes in Computer Science
2006-11-14Paper
Security in Communication Networks
Lecture Notes in Computer Science
2006-10-10Paper
scientific article; zbMATH DE number 5056805 (Why is no real title available?)2006-09-25Paper
scientific article; zbMATH DE number 5009196 (Why is no real title available?)2006-03-01Paper
Automata, Languages and Programming
Lecture Notes in Computer Science
2006-01-10Paper
Automata, Languages and Programming
Lecture Notes in Computer Science
2006-01-10Paper
Financial Cryptography and Data Security
Lecture Notes in Computer Science
2005-12-22Paper
Contemporary cryptology.
Advanced Courses in Mathematics -- CRM Barcelona
2005-08-30Paper
Advances in Cryptology – CRYPTO 2004
Lecture Notes in Computer Science
2005-08-23Paper
Mathematical Foundations of Computer Science 2004
Lecture Notes in Computer Science
2005-08-22Paper
Improved Setup Assumptions for 3-Round Resettable Zero Knowledge2005-08-12Paper
scientific article; zbMATH DE number 2088328 (Why is no real title available?)2004-08-12Paper
scientific article; zbMATH DE number 1305506 (Why is no real title available?)2004-03-09Paper
scientific article; zbMATH DE number 2044522 (Why is no real title available?)2004-02-18Paper
scientific article; zbMATH DE number 2019634 (Why is no real title available?)2003-12-17Paper
Sharing one secret vs. sharing many secrets.
Theoretical Computer Science
2003-08-17Paper
scientific article; zbMATH DE number 1952890 (Why is no real title available?)2003-07-24Paper
scientific article; zbMATH DE number 1952893 (Why is no real title available?)2003-07-24Paper
scientific article; zbMATH DE number 1842511 (Why is no real title available?)2002-12-08Paper
scientific article; zbMATH DE number 1759348 (Why is no real title available?)2002-11-28Paper
scientific article; zbMATH DE number 1834656 (Why is no real title available?)2002-11-25Paper
scientific article; zbMATH DE number 1775398 (Why is no real title available?)2002-08-01Paper
scientific article; zbMATH DE number 1696658 (Why is no real title available?)2002-07-01Paper
scientific article; zbMATH DE number 1722670 (Why is no real title available?)2002-03-21Paper
scientific article; zbMATH DE number 1670843 (Why is no real title available?)2001-12-06Paper
scientific article; zbMATH DE number 1676657 (Why is no real title available?)2001-11-25Paper
scientific article; zbMATH DE number 1676661 (Why is no real title available?)2001-11-25Paper
scientific article; zbMATH DE number 1612532 (Why is no real title available?)2001-07-01Paper
Universal service-providers for private information retrieval
Journal of Cryptology
2001-05-13Paper
scientific article; zbMATH DE number 1445314 (Why is no real title available?)2000-10-23Paper
scientific article; zbMATH DE number 1418313 (Why is no real title available?)2000-08-27Paper
scientific article; zbMATH DE number 1406777 (Why is no real title available?)2000-03-01Paper
scientific article; zbMATH DE number 1405650 (Why is no real title available?)2000-02-23Paper
scientific article; zbMATH DE number 1335878 (Why is no real title available?)1999-09-13Paper
Conditional Oblivious Transfer and Timed-Release Encryption
Advances in Cryptology — EUROCRYPT ’99
1999-06-17Paper
scientific article; zbMATH DE number 1302861 (Why is no real title available?)1999-06-17Paper
scientific article; zbMATH DE number 1304335 (Why is no real title available?)1999-06-17Paper
scientific article; zbMATH DE number 1136088 (Why is no real title available?)1999-01-10Paper
scientific article; zbMATH DE number 1107670 (Why is no real title available?)1998-06-11Paper
scientific article; zbMATH DE number 1088225 (Why is no real title available?)1998-02-10Paper
scientific article; zbMATH DE number 1088911 (Why is no real title available?)1998-01-29Paper
scientific article; zbMATH DE number 1024082 (Why is no real title available?)1997-10-06Paper
scientific article; zbMATH DE number 1024046 (Why is no real title available?)1997-07-20Paper
Zero-knowledge arguments and public-key cryptography
Information and Computation
1995-11-05Paper
The knowledge complexity of quadratic residuosity languages
Theoretical Computer Science
1994-09-25Paper
Round-optimal perfect zero-knowledge proofs
Information Processing Letters
1994-05-05Paper


Research outcomes over time


This page was built for person: Giovanni Di Crescenzo