Alfredo De Santis

From MaRDI portal
Person:240098

Available identifiers

zbMath Open de-santis.alfredoWikidataQ21704685 ScholiaQ21704685MaRDI QIDQ240098

List of research outcomes





PublicationDate of PublicationType
Bounds and algorithms for alphabetic codes and binary search trees2025-01-23Paper
Private computations on set intersection2024-10-02Paper
Communication efficient Zero-knowledge Proofs of knowledge2022-08-18Paper
Probabilistic secret sharing2021-08-04Paper
Secret sharing schemes for infinite sets of participants: a new design technique2021-02-15Paper
Supporting dynamic updates in storage clouds with the Akl-Taylor scheme2020-02-06Paper
One-message statistical Zero-Knowledge Proofs and space-bounded verifier2019-12-04Paper
Randomness in distribution protocols2019-04-29Paper
On the number of random bits in totally private computation2019-01-10Paper
Randomness-efficient non-interactive zero knowledge2018-07-04Paper
Security of public-key cryptosystems based on Chebyshev polynomials2017-11-20Paper
https://portal.mardi4nfdi.de/entity/Q52714342017-07-11Paper
https://portal.mardi4nfdi.de/entity/Q52714272017-07-11Paper
https://portal.mardi4nfdi.de/entity/Q52714302017-07-11Paper
On the Relations Between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structures2016-09-02Paper
How to share a function securely2016-09-01Paper
The graph clustering problem has a perfect zero-knowledge interactive proof2016-06-16Paper
On secret set schemes2016-06-16Paper
Visual cryptography for grey level images2016-06-16Paper
On secret sharing schemes2016-06-09Paper
Lower bounds for robust secret sharing schemes2016-05-26Paper
Measure-Independent Characterization of Contrast Optimal Visual Cryptography Schemes2015-09-30Paper
Modeling energy-efficient secure communications in multi-mode wireless mobile devices2015-08-31Paper
Anonymous protocols: notions and equivalence2015-05-22Paper
Color visual cryptography schemes for black and white secret images2014-01-13Paper
A note on time-bound hierarchical key assignment schemes2013-03-21Paper
Provably-secure time-bound hierarchical key assignment schemes2012-07-03Paper
Efficient provably-secure hierarchical key assignment schemes2011-10-10Paper
Using colors to improve visual cryptography for black and white images2011-05-19Paper
Optimising SD and LSD in Presence of Non-uniform Probabilities of Revocation2009-12-03Paper
Variations on a theme by Akl and Taylor: security and tradeoffs2009-12-01Paper
Security and Tradeoffs of the Akl-Taylor Scheme and Its Variants2009-10-16Paper
Cryptographic key assignment schemes for any access control policy2009-08-27Paper
Ideal contrast visual cryptography schemes with reversing2009-08-27Paper
On Monotone Formula Composition of Perfect Zero-Knowledge Languages2009-08-20Paper
Colored visual cryptography without color darkening2009-06-22Paper
On Self-Healing Key Distribution Schemes2008-12-21Paper
Cheating Immune (2,n)-Threshold Visual Secret Sharing2008-11-27Paper
New constructions for provably-secure time-bound hierarchical key assignment schemes2008-11-18Paper
Efficient Provably-Secure Hierarchical Key Assignment Schemes2008-09-17Paper
Weaknesses in a Recent Ultra-Lightweight RFID Authentication Protocol2008-06-13Paper
An attack on a payment scheme2008-03-12Paper
On unconditionally secure distributed oblivious transfer2007-08-20Paper
Coding and Cryptography2007-05-02Paper
Visual cryptography schemes with optimal pixel expansion2007-01-09Paper
Visual cryptography for general access structures2006-10-10Paper
Security in Communication Networks2006-10-10Paper
Enforcing the security of a time-bound hierarchical key assignment scheme2006-05-16Paper
Unconditionally secure key assignment schemes2006-04-28Paper
Automata, Languages and Programming2005-08-24Paper
Mathematical Foundations of Computer Science 20042005-08-22Paper
Optimal colored threshold visual cryptography schemes2005-08-17Paper
https://portal.mardi4nfdi.de/entity/Q48188542004-09-24Paper
Design of self-healing key distribution schemes2004-08-16Paper
Anonymous membership broadcast schemes2004-08-16Paper
Randomness in secret sharing and visual cryptography schemes2004-08-06Paper
https://portal.mardi4nfdi.de/entity/Q44483872004-02-18Paper
Contrast Optimal Threshold Visual Cryptography Schemes2004-01-08Paper
https://portal.mardi4nfdi.de/entity/Q44404372003-12-17Paper
https://portal.mardi4nfdi.de/entity/Q44138692003-07-21Paper
https://portal.mardi4nfdi.de/entity/Q47837452002-12-08Paper
Bounds on entropy in a guessing game2002-08-04Paper
Probability of shares in secret sharing schemes2002-07-25Paper
https://portal.mardi4nfdi.de/entity/Q45015682002-05-14Paper
Randomness complexity of private computation2002-04-21Paper
Improved schemes for visual cryptography2002-04-15Paper
https://portal.mardi4nfdi.de/entity/Q27541632001-12-06Paper
https://portal.mardi4nfdi.de/entity/Q27086232001-07-17Paper
A t-private k-database information retrieval scheme2001-01-01Paper
Extended capabilities for visual cryptography2000-12-12Paper
On the contrast in visual cryptography schemes2000-09-24Paper
https://portal.mardi4nfdi.de/entity/Q49544142000-06-07Paper
On a fallacious bound for authentication codes2000-05-22Paper
On the Data Expansion of the Huffman Compression Algorithm2000-03-19Paper
https://portal.mardi4nfdi.de/entity/Q49406932000-03-01Paper
https://portal.mardi4nfdi.de/entity/Q49386302000-02-23Paper
A lower bound on the encoding length in lossy transmission2000-01-05Paper
Multiple ramp schemes1999-11-21Paper
On lower bounds for the redundancy of optimal codes1999-06-27Paper
A new bound for the data expansion of Huffman codes1999-05-05Paper
https://portal.mardi4nfdi.de/entity/Q42303671999-04-22Paper
Perfectly secure key distribution for dynamic conferences1999-03-30Paper
https://portal.mardi4nfdi.de/entity/Q43417891998-01-04Paper
Tight bounds on the information rate of secret sharing schemes1997-12-18Paper
Randomness in distribution protocols1997-10-13Paper
On the redundancy achieved by Huffman codes1997-09-04Paper
Catastrophic faults in reconfigurable systolic linear arrays1997-08-10Paper
https://portal.mardi4nfdi.de/entity/Q43417341997-07-20Paper
https://portal.mardi4nfdi.de/entity/Q43417371997-07-20Paper
On the information rate of secret sharing schemes1997-02-28Paper
Fully dynamic secret sharing schemes1997-02-27Paper
New lower bounds on the cost of binary search trees1997-02-27Paper
The power of preprocessing in zero-knowledge proofs of knowledge1997-01-14Paper
New bounds on the information rate of secret sharing schemes1995-12-17Paper
https://portal.mardi4nfdi.de/entity/Q48584511995-12-13Paper
Zero-knowledge arguments and public-key cryptography1995-11-05Paper
Graph decompositions and secret sharing schemes1995-07-16Paper
https://portal.mardi4nfdi.de/entity/Q43187161995-07-16Paper
https://portal.mardi4nfdi.de/entity/Q43186911995-03-30Paper
Binary prefix codes ending in a "1"1995-03-01Paper
https://portal.mardi4nfdi.de/entity/Q42815711994-10-04Paper
The knowledge complexity of quadratic residuosity languages1994-09-25Paper
Tight Upper and Lower Bounds on the Path Length of Binary Trees1994-03-27Paper
Cryptographic Applications of the Non-Interactive Metaproof and Many-prover Systems1994-03-07Paper
https://portal.mardi4nfdi.de/entity/Q42796561994-02-22Paper
On the size of shares for secret sharing schemes1994-01-03Paper
On binary search trees1993-06-29Paper
https://portal.mardi4nfdi.de/entity/Q40357101993-05-18Paper
https://portal.mardi4nfdi.de/entity/Q40356941993-05-18Paper
https://portal.mardi4nfdi.de/entity/Q40368971993-05-18Paper
https://portal.mardi4nfdi.de/entity/Q40368581993-05-18Paper
On the construction of statistically synchronizable codes1992-06-28Paper
On the redundancy of optimal codes with limited word length1992-06-28Paper
Noninteractive Zero-Knowledge1992-06-27Paper
New bounds on the redundancy of Huffman codes1991-01-01Paper
A note on D-ary Huffman codes1991-01-01Paper
Removing Interaction from Zero-Knowledge Proofs1990-01-01Paper
Tight upper bounds on the redundancy of Huffman codes1989-01-01Paper
https://portal.mardi4nfdi.de/entity/Q37891041988-01-01Paper
Bounds on the entropy series1988-01-01Paper
Regular universal codeword sets (Corresp.)1986-01-01Paper

Research outcomes over time

This page was built for person: Alfredo De Santis