The following pages link to Dario Catalano (Q500978):
Displaying 50 items.
- Algebraic (trapdoor) one-way functions: constructions and applications (Q500981) (← links)
- Verifiable random functions: relations to identity-based key encapsulation and new constructions (Q744351) (← links)
- Cramer-Damgård signatures revisited: Efficient flat-tree signatures based on factoring (Q868950) (← links)
- Trapdoor hard-to-invert group isomorphisms and their application to password-based authentication (Q882777) (← links)
- Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions (Q1021236) (← links)
- Hybrid commitments and their applications to zero-knowledge proof systems (Q1022606) (← links)
- New efficient and secure protocols for verifiable signature sharing and other applications (Q1582011) (← links)
- On the security notions for homomorphic signatures (Q1656032) (← links)
- Homomorphic signatures with sublinear public keys via asymmetric programmable hash functions (Q1671634) (← links)
- Multi-input functional encryption for inner products: function-hiding realizations and constructions without pairings (Q1673411) (← links)
- Practical functional encryption for quadratic functions with applications to predicate encryption (Q1675718) (← links)
- Practical homomorphic message authenticators for arithmetic circuits (Q1747657) (← links)
- Verifiable pattern matching on outsourced texts (Q1757465) (← links)
- Paillier's trapdoor function hides up to \(O(n)\) bits (Q1865126) (← links)
- Bandwidth-efficient threshold EC-DSA (Q2055695) (← links)
- Mon\(\mathbb{Z}_{2^k}\)a: fast maliciously secure two party computation on \(\mathbb{Z}_{2^k} \) (Q2055698) (← links)
- Bandwidth-efficient threshold EC-DSA revisited: online/offline extensions, identifiable aborts proactive and adaptive security (Q2098172) (← links)
- Double-authentication-preventing signatures in the standard model (Q2106650) (← links)
- Labeled homomorphic encryption. Scalable and privacy-preserving processing of outsourced data (Q2167714) (← links)
- Efficient function-hiding functional encryption: from inner-products to orthogonality (Q2290446) (← links)
- Two-party ECDSA from hash proof systems and efficient instantiations (Q2304919) (← links)
- Contemporary cryptology. (Q2386512) (← links)
- Wildcarded identity-based encryption (Q2429713) (← links)
- Inner-product functional encryption with fine-grained access control (Q2691594) (← links)
- (Q2728905) (← links)
- (Q2778852) (← links)
- Verifiable Pattern Matching on Outsourced Texts (Q2827727) (← links)
- Homomorphic Signatures with Efficient Verification for Polynomial Functions (Q2874515) (← links)
- Efficient Network Coding Signatures in the Standard Model (Q2900252) (← links)
- Homomorphic Signatures and Message Authentication Codes (Q2922678) (← links)
- Authenticating Computation on Groups: New Homomorphic Primitives and Applications (Q2936609) (← links)
- Adaptive Pseudo-free Groups and Applications (Q3003384) (← links)
- (Q3374909) (← links)
- Programmable Hash Functions Go Private: Constructions and Applications to (Homomorphic) Signatures with Shorter Public Keys (Q3457069) (← links)
- Coercion-Resistant Electronic Elections (Q3569101) (← links)
- Identity-Based Encryption Gone Wild (Q3591437) (← links)
- Verifiable Random Functions from Identity-Based Key Encapsulation (Q3627457) (← links)
- Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness (Q3637144) (← links)
- (Q4249324) (← links)
- The Hardness of Hensel Lifting: The Case of RSA and Discrete Logarithm (Q4412805) (← links)
- Algebraic (Trapdoor) One-Way Functions and Their Applications (Q4910305) (← links)
- Vector Commitments and Their Applications (Q4916001) (← links)
- Practical Homomorphic MACs for Arithmetic Circuits (Q4924420) (← links)
- Zero-Knowledge Sets With Short Proofs (Q5281008) (← links)
- Advances in Cryptology – CRYPTO 2004 (Q5311551) (← links)
- Generalizing Homomorphic MACs for Arithmetic Circuits (Q5402992) (← links)
- Off-Line/On-Line Signatures: Theoretical Aspects and Experimental Results (Q5445449) (← links)
- Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions (Q5451027) (← links)
- Zero-Knowledge Sets with Short Proofs (Q5458606) (← links)
- Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework (Q5458950) (← links)