Alfredo De Santis

From MaRDI portal
(Redirected from Person:240098)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Bounds and algorithms for alphabetic codes and binary search trees
IEEE Transactions on Information Theory
2025-01-23Paper
Private computations on set intersection2024-10-02Paper
Communication efficient zero-knowledge proofs of knowledge (with applications to electronic cash)
STACS 92
2022-08-18Paper
Probabilistic secret sharing2021-08-04Paper
Secret sharing schemes for infinite sets of participants: a new design technique
Theoretical Computer Science
2021-02-15Paper
Supporting dynamic updates in storage clouds with the Akl-Taylor scheme
Information Sciences
2020-02-06Paper
One-message statistical Zero-Knowledge Proofs and space-bounded verifier
Automata, Languages and Programming
2019-12-04Paper
Randomness in distribution protocols
Automata, Languages and Programming
2019-04-29Paper
On the number of random bits in totally private computation
Automata, Languages and Programming
2019-01-10Paper
Randomness-efficient non-interactive zero knowledge
Automata, Languages and Programming
2018-07-04Paper
Security of public-key cryptosystems based on Chebyshev polynomials
IEEE Transactions on Circuits and Systems I: Regular Papers
2017-11-20Paper
scientific article; zbMATH DE number 6741942 (Why is no real title available?)2017-07-11Paper
scientific article; zbMATH DE number 6741945 (Why is no real title available?)2017-07-11Paper
scientific article; zbMATH DE number 6741949 (Why is no real title available?)2017-07-11Paper
On the relations between security notions in hierarchical key assignment schemes for dynamic structures
Information Security and Privacy
2016-09-02Paper
How to share a function securely
Proceedings of the twenty-sixth annual ACM symposium on Theory of computing - STOC '94
2016-09-01Paper
The graph clustering problem has a perfect zero-knowledge interactive proof
Information Processing Letters
2016-06-16Paper
On secret set schemes
Information Processing Letters
2016-06-16Paper
Visual cryptography for grey level images
Information Processing Letters
2016-06-16Paper
On secret sharing schemes
Information Processing Letters
2016-06-09Paper
Lower bounds for robust secret sharing schemes
Information Processing Letters
2016-05-26Paper
Measure-independent characterization of contrast optimal visual cryptography schemes
Lecture Notes in Computer Science
2015-09-30Paper
Modeling energy-efficient secure communications in multi-mode wireless mobile devices
Journal of Computer and System Sciences
2015-08-31Paper
Anonymous protocols: notions and equivalence
Theoretical Computer Science
2015-05-22Paper
Color visual cryptography schemes for black and white secret images
Theoretical Computer Science
2014-01-13Paper
A note on time-bound hierarchical key assignment schemes
Information Processing Letters
2013-03-21Paper
Provably-secure time-bound hierarchical key assignment schemes
Journal of Cryptology
2012-07-03Paper
Efficient provably-secure hierarchical key assignment schemes
Theoretical Computer Science
2011-10-10Paper
Using colors to improve visual cryptography for black and white images
Lecture Notes in Computer Science
2011-05-19Paper
Optimising SD and LSD in Presence of Non-uniform Probabilities of Revocation
Lecture Notes in Computer Science
2009-12-03Paper
Variations on a theme by Akl and Taylor: security and tradeoffs
Theoretical Computer Science
2009-12-01Paper
Security and Tradeoffs of the Akl-Taylor Scheme and Its Variants
Mathematical Foundations of Computer Science 2009
2009-10-16Paper
Cryptographic key assignment schemes for any access control policy
Information Processing Letters
2009-08-27Paper
Ideal contrast visual cryptography schemes with reversing
Information Processing Letters
2009-08-27Paper
On Monotone Formula Composition of Perfect Zero-Knowledge Languages
SIAM Journal on Computing
2009-08-20Paper
Colored visual cryptography without color darkening
Theoretical Computer Science
2009-06-22Paper
On Self-Healing Key Distribution Schemes
IEEE Transactions on Information Theory
2008-12-21Paper
Cheating Immune (2,n)-Threshold Visual Secret Sharing
Lecture Notes in Computer Science
2008-11-27Paper
New constructions for provably-secure time-bound hierarchical key assignment schemes
Theoretical Computer Science
2008-11-18Paper
Efficient Provably-Secure Hierarchical Key Assignment Schemes
Mathematical Foundations of Computer Science 2007
2008-09-17Paper
Weaknesses in a Recent Ultra-Lightweight RFID Authentication Protocol
Progress in Cryptology – AFRICACRYPT 2008
2008-06-13Paper
An attack on a payment scheme
Information Sciences
2008-03-12Paper
On unconditionally secure distributed oblivious transfer
Journal of Cryptology
2007-08-20Paper
Coding and Cryptography
Lecture Notes in Computer Science
2007-05-02Paper
Visual cryptography schemes with optimal pixel expansion
Theoretical Computer Science
2007-01-09Paper
Visual cryptography for general access structures
Information and Computation
2006-10-10Paper
Security in Communication Networks
Lecture Notes in Computer Science
2006-10-10Paper
Enforcing the security of a time-bound hierarchical key assignment scheme
Information Sciences
2006-05-16Paper
Unconditionally secure key assignment schemes
Discrete Applied Mathematics
2006-04-28Paper
Automata, Languages and Programming
Lecture Notes in Computer Science
2005-08-24Paper
Mathematical Foundations of Computer Science 2004
Lecture Notes in Computer Science
2005-08-22Paper
Optimal colored threshold visual cryptography schemes
Designs, Codes and Cryptography
2005-08-17Paper
scientific article; zbMATH DE number 2102766 (Why is no real title available?)2004-09-24Paper
Design of self-healing key distribution schemes
Designs, Codes and Cryptography
2004-08-16Paper
Anonymous membership broadcast schemes
Designs, Codes and Cryptography
2004-08-16Paper
Randomness in secret sharing and visual cryptography schemes
Theoretical Computer Science
2004-08-06Paper
scientific article; zbMATH DE number 2044524 (Why is no real title available?)2004-02-18Paper
Contrast Optimal Threshold Visual Cryptography Schemes
SIAM Journal on Discrete Mathematics
2004-01-08Paper
scientific article; zbMATH DE number 2019634 (Why is no real title available?)2003-12-17Paper
scientific article; zbMATH DE number 1951618 (Why is no real title available?)2003-07-21Paper
scientific article; zbMATH DE number 1842511 (Why is no real title available?)2002-12-08Paper
Bounds on entropy in a guessing game
IEEE Transactions on Information Theory
2002-08-04Paper
Probability of shares in secret sharing schemes
Information Processing Letters
2002-07-25Paper
scientific article; zbMATH DE number 1500549 (Why is no real title available?)2002-05-14Paper
Randomness complexity of private computation
Computational Complexity
2002-04-21Paper
Improved schemes for visual cryptography
Designs, Codes and Cryptography
2002-04-15Paper
scientific article; zbMATH DE number 1670843 (Why is no real title available?)2001-12-06Paper
scientific article; zbMATH DE number 1588476 (Why is no real title available?)2001-07-17Paper
A t-private k-database information retrieval scheme
International Journal of Information Security
2001-01-01Paper
Extended capabilities for visual cryptography
Theoretical Computer Science
2000-12-12Paper
On the contrast in visual cryptography schemes
Journal of Cryptology
2000-09-24Paper
scientific article; zbMATH DE number 1456816 (Why is no real title available?)2000-06-07Paper
On a fallacious bound for authentication codes
Journal of Cryptology
2000-05-22Paper
On the Data Expansion of the Huffman Compression Algorithm
The Computer Journal
2000-03-19Paper
scientific article; zbMATH DE number 1406777 (Why is no real title available?)2000-03-01Paper
scientific article; zbMATH DE number 1405650 (Why is no real title available?)2000-02-23Paper
A lower bound on the encoding length in lossy transmission
Information Sciences
2000-01-05Paper
Multiple ramp schemes
IEEE Transactions on Information Theory
1999-11-21Paper
On lower bounds for the redundancy of optimal codes
Designs, Codes and Cryptography
1999-06-27Paper
A new bound for the data expansion of Huffman codes
IEEE Transactions on Information Theory
1999-05-05Paper
scientific article; zbMATH DE number 1256680 (Why is no real title available?)1999-04-22Paper
Perfectly secure key distribution for dynamic conferences
Information and Computation
1999-03-30Paper
scientific article; zbMATH DE number 1024095 (Why is no real title available?)1998-01-04Paper
Tight bounds on the information rate of secret sharing schemes
Designs, Codes and Cryptography
1997-12-18Paper
Randomness in distribution protocols
Information and Computation
1997-10-13Paper
On the redundancy achieved by Huffman codes
Information Sciences
1997-09-04Paper
Catastrophic faults in reconfigurable systolic linear arrays
Discrete Applied Mathematics
1997-08-10Paper
scientific article; zbMATH DE number 1024046 (Why is no real title available?)1997-07-20Paper
scientific article; zbMATH DE number 1024049 (Why is no real title available?)1997-07-20Paper
On the information rate of secret sharing schemes
Theoretical Computer Science
1997-02-28Paper
Fully dynamic secret sharing schemes
Theoretical Computer Science
1997-02-27Paper
New lower bounds on the cost of binary search trees
Theoretical Computer Science
1997-02-27Paper
The power of preprocessing in zero-knowledge proofs of knowledge
Journal of Cryptology
1997-01-14Paper
New bounds on the information rate of secret sharing schemes
IEEE Transactions on Information Theory
1995-12-17Paper
scientific article; zbMATH DE number 826065 (Why is no real title available?)1995-12-13Paper
Zero-knowledge arguments and public-key cryptography
Information and Computation
1995-11-05Paper
scientific article; zbMATH DE number 708825 (Why is no real title available?)1995-07-16Paper
Graph decompositions and secret sharing schemes
Journal of Cryptology
1995-07-16Paper
scientific article; zbMATH DE number 708803 (Why is no real title available?)1995-03-30Paper
Binary prefix codes ending in a "1"
IEEE Transactions on Information Theory
1995-03-01Paper
scientific article; zbMATH DE number 512874 (Why is no real title available?)1994-10-04Paper
The knowledge complexity of quadratic residuosity languages
Theoretical Computer Science
1994-09-25Paper
Tight Upper and Lower Bounds on the Path Length of Binary Trees
SIAM Journal on Computing
1994-03-27Paper
Cryptographic Applications of the Non-Interactive Metaproof and Many-prover Systems
Advances in Cryptology - CRYPTO '90. A conference on the theory and application of Cryptography, Univ. of California, Santa Barbara, USA, August 11--15, 1990. Proceedings
1994-03-07Paper
scientific article; zbMATH DE number 503323 (Why is no real title available?)1994-02-22Paper
On the size of shares for secret sharing schemes
Journal of Cryptology
1994-01-03Paper
On binary search trees
Information Processing Letters
1993-06-29Paper
scientific article; zbMATH DE number 176543 (Why is no real title available?)1993-05-18Paper
scientific article; zbMATH DE number 176528 (Why is no real title available?)1993-05-18Paper
scientific article; zbMATH DE number 177052 (Why is no real title available?)1993-05-18Paper
scientific article; zbMATH DE number 177022 (Why is no real title available?)1993-05-18Paper
On the construction of statistically synchronizable codes
IEEE Transactions on Information Theory
1992-06-28Paper
On the redundancy of optimal codes with limited word length
IEEE Transactions on Information Theory
1992-06-28Paper
Noninteractive Zero-Knowledge
SIAM Journal on Computing
1992-06-27Paper
New bounds on the redundancy of Huffman codes
IEEE Transactions on Information Theory
1991-01-01Paper
A note on D-ary Huffman codes
IEEE Transactions on Information Theory
1991-01-01Paper
Removing Interaction from Zero-Knowledge Proofs
Sequences
1990-01-01Paper
Tight upper bounds on the redundancy of Huffman codes
IEEE Transactions on Information Theory
1989-01-01Paper
scientific article; zbMATH DE number 4053065 (Why is no real title available?)1988-01-01Paper
Bounds on the entropy series
IEEE Transactions on Information Theory
1988-01-01Paper
Regular universal codeword sets (Corresp.)
IEEE Transactions on Information Theory
1986-01-01Paper


Research outcomes over time


This page was built for person: Alfredo De Santis