Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Dario Catalano
@article{DBLP:journals/tcs/CastagnosCLST23, author = {Guilhem Castagnos and Dario Catalano and Fabien Laguillaumie and Federico Savasta and Ida Tucker}, title = {Bandwidth-efficient threshold {EC-DSA} revisited: Online/offline extensions, identifiable aborts proactive and adaptive security}, journal = {Theor. Comput. Sci.}, volume = {939}, pages = {78--104}, year = {2023}, url = {https://doi.org/10.1016/j.tcs.2022.10.016}, doi = {10.1016/J.TCS.2022.10.016}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/CastagnosCLST23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CatalanoFG23, author = {Dario Catalano and Dario Fiore and Emanuele Giunta}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {Efficient and Universally Composable Single Secret Leader Election from Pairings}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13940}, pages = {471--499}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31368-4\_17}, doi = {10.1007/978-3-031-31368-4\_17}, timestamp = {Fri, 05 May 2023 22:44:30 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CatalanoFG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BalbasCFL23, author = {David Balb{\'{a}}s and Dario Catalano and Dario Fiore and Russell W. F. Lai}, editor = {Guy N. Rothblum and Hoeteck Wee}, title = {Chainable Functional Commitments for Unbounded-Depth Circuits}, booktitle = {Theory of Cryptography - 21st International Conference, {TCC} 2023, Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14371}, pages = {363--393}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-48621-0\_13}, doi = {10.1007/978-3-031-48621-0\_13}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/BalbasCFL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/CatalanoFS22, author = {Dario Catalano and Georg Fuchsbauer and Azam Soleimanian}, title = {Double-authentication-preventing signatures in the standard model}, journal = {J. Comput. Secur.}, volume = {30}, number = {1}, pages = {3--38}, year = {2022}, url = {https://doi.org/10.3233/JCS-200117}, doi = {10.3233/JCS-200117}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/CatalanoFS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/CatalanoFT22, author = {Dario Catalano and Dario Fiore and Ida Tucker}, editor = {Shweta Agrawal and Dongdai Lin}, title = {Additive-Homomorphic Functional Commitments and Applications to Homomorphic Signatures}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {13794}, pages = {159--188}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22972-5\_6}, doi = {10.1007/978-3-031-22972-5\_6}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/CatalanoFT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/Catalano0G22, author = {Dario Catalano and Dario Fiore and Emanuele Giunta}, editor = {Alessia Milani and Philipp Woelfel}, title = {Adaptively Secure Single Secret Leader Election from {DDH}}, booktitle = {{PODC} '22: {ACM} Symposium on Principles of Distributed Computing, Salerno, Italy, July 25 - 29, 2022}, pages = {430--439}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3519270.3538424}, doi = {10.1145/3519270.3538424}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/Catalano0G22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/CatalanoFGG22, author = {Dario Catalano and Dario Fiore and Rosario Gennaro and Emanuele Giunta}, editor = {Eike Kiltz and Vinod Vaikuntanathan}, title = {On the Impossibility of Algebraic Vector Commitments in Pairing-Free Groups}, booktitle = {Theory of Cryptography - 20th International Conference, {TCC} 2022, Chicago, IL, USA, November 7-10, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13748}, pages = {274--299}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22365-5\_10}, doi = {10.1007/978-3-031-22365-5\_10}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/CatalanoFGG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CatalanoFG22, author = {Dario Catalano and Dario Fiore and Emanuele Giunta}, title = {Adaptively Secure Single Secret Leader Election from {DDH}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {687}, year = {2022}, url = {https://eprint.iacr.org/2022/687}, timestamp = {Mon, 20 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CatalanoFG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CatalanoFGG22, author = {Dario Catalano and Dario Fiore and Rosario Gennaro and Emanuele Giunta}, title = {On the Impossibility of Algebraic Vector Commitments in Pairing-Free Groups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {696}, year = {2022}, url = {https://eprint.iacr.org/2022/696}, timestamp = {Mon, 20 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CatalanoFGG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CatalanoFT22, author = {Dario Catalano and Dario Fiore and Ida Tucker}, title = {Additive-Homomorphic Functional Commitments and Applications to Homomorphic Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1331}, year = {2022}, url = {https://eprint.iacr.org/2022/1331}, timestamp = {Sat, 22 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CatalanoFT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BalbasCFL22, author = {David Balb{\'{a}}s and Dario Catalano and Dario Fiore and Russell W. F. Lai}, title = {Functional Commitments for Circuits from Falsifiable Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1365}, year = {2022}, url = {https://eprint.iacr.org/2022/1365}, timestamp = {Sat, 22 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BalbasCFL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CastagnosCLST21, author = {Guilhem Castagnos and Dario Catalano and Fabien Laguillaumie and Federico Savasta and Ida Tucker}, title = {Bandwidth-efficient threshold {EC-DSA} revisited: Online/Offline Extensions, Identifiable Aborts, Proactivity and Adaptive Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {291}, year = {2021}, url = {https://eprint.iacr.org/2021/291}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CastagnosCLST21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CatalanoFG21, author = {Dario Catalano and Dario Fiore and Emanuele Giunta}, title = {Efficient and Universally Composable Single Secret Leader Election from Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {344}, year = {2021}, url = {https://eprint.iacr.org/2021/344}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CatalanoFG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/AbdallaCGU20, author = {Michel Abdalla and Dario Catalano and Romain Gay and Bogdan Ursu}, editor = {Shiho Moriai and Huaxiong Wang}, title = {Inner-Product Functional Encryption with Fine-Grained Access Control}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12493}, pages = {467--497}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64840-4\_16}, doi = {10.1007/978-3-030-64840-4\_16}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/AbdallaCGU20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CastagnosCLST20, author = {Guilhem Castagnos and Dario Catalano and Fabien Laguillaumie and Federico Savasta and Ida Tucker}, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {Bandwidth-Efficient Threshold {EC-DSA}}, booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12111}, pages = {266--296}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45388-6\_10}, doi = {10.1007/978-3-030-45388-6\_10}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CastagnosCLST20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CatalanoRFG20, author = {Dario Catalano and Mario Di Raimondo and Dario Fiore and Irene Giacomelli}, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {Mon{\textdollar}{\textbackslash}mathbb \{Z\}{\_}\{2{\^{}}\{k\}\}{\textdollar}a: Fast Maliciously Secure Two Party Computation on {\textdollar}{\textbackslash}mathbb \{Z\}{\_}\{2{\^{}}\{k\}\}{\textdollar}}, booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12111}, pages = {357--386}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45388-6\_13}, doi = {10.1007/978-3-030-45388-6\_13}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CatalanoRFG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/CatalanoFS20, author = {Dario Catalano and Georg Fuchsbauer and Azam Soleimanian}, editor = {Clemente Galdi and Vladimir Kolesnikov}, title = {Double-Authentication-Preventing Signatures in the Standard Model}, booktitle = {Security and Cryptography for Networks - 12th International Conference, {SCN} 2020, Amalfi, Italy, September 14-16, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12238}, pages = {338--358}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-57990-6\_17}, doi = {10.1007/978-3-030-57990-6\_17}, timestamp = {Tue, 08 Sep 2020 19:15:32 +0200}, biburl = {https://dblp.org/rec/conf/scn/CatalanoFS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CastagnosCLST20, author = {Guilhem Castagnos and Dario Catalano and Fabien Laguillaumie and Federico Savasta and Ida Tucker}, title = {Bandwidth-efficient threshold {EC-DSA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {84}, year = {2020}, url = {https://eprint.iacr.org/2020/084}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CastagnosCLST20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaCGU20, author = {Michel Abdalla and Dario Catalano and Romain Gay and Bogdan Ursu}, title = {Inner-Product Functional Encryption with Fine-Grained Access Control}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {577}, year = {2020}, url = {https://eprint.iacr.org/2020/577}, timestamp = {Wed, 27 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaCGU20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CatalanoFS20, author = {Dario Catalano and Georg Fuchsbauer and Azam Soleimanian}, title = {Double-Authentication-Preventing Signatures in the Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {789}, year = {2020}, url = {https://eprint.iacr.org/2020/789}, timestamp = {Mon, 27 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CatalanoFS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CastagnosCLST19, author = {Guilhem Castagnos and Dario Catalano and Fabien Laguillaumie and Federico Savasta and Ida Tucker}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Two-Party {ECDSA} from Hash Proof Systems and Efficient Instantiations}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11694}, pages = {191--221}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26954-8\_7}, doi = {10.1007/978-3-030-26954-8\_7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CastagnosCLST19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/BarbosaCSW19, author = {Manuel Barbosa and Dario Catalano and Azam Soleimanian and Bogdan Warinschi}, editor = {Mitsuru Matsui}, title = {Efficient Function-Hiding Functional Encryption: From Inner-Products to Orthogonality}, booktitle = {Topics in Cryptology - {CT-RSA} 2019 - The Cryptographers' Track at the {RSA} Conference 2019, San Francisco, CA, USA, March 4-8, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11405}, pages = {127--148}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-12612-4\_7}, doi = {10.1007/978-3-030-12612-4\_7}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/BarbosaCSW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CatalanoRFG19, author = {Dario Catalano and Mario Di Raimondo and Dario Fiore and Irene Giacomelli}, title = {Mon{\(\mathbb{Z}\)}\({}_{\mbox{2\({}^{\mbox{k}}\)}}\)a: Fast Maliciously Secure Two Party Computation on {\(\mathbb{Z}\)}\({}_{\mbox{2\({}^{\mbox{k}}\)}}\)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {211}, year = {2019}, url = {https://eprint.iacr.org/2019/211}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CatalanoRFG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CastagnosCLST19, author = {Guilhem Castagnos and Dario Catalano and Fabien Laguillaumie and Federico Savasta and Ida Tucker}, title = {Two-Party {ECDSA} from Hash Proof Systems and Efficient Instantiations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {503}, year = {2019}, url = {https://eprint.iacr.org/2019/503}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CastagnosCLST19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CatalanoFN18, author = {Dario Catalano and Dario Fiore and Luca Nizzardo}, title = {Homomorphic signatures with sublinear public keys via asymmetric programmable hash functions}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {10}, pages = {2197--2246}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0444-3}, doi = {10.1007/S10623-017-0444-3}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CatalanoFN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jda/CatalanoRF18, author = {Dario Catalano and Mario Di Raimondo and Simone Faro}, title = {Verifiable pattern matching on outsourced texts}, journal = {J. Discrete Algorithms}, volume = {51}, pages = {39--50}, year = {2018}, url = {https://doi.org/10.1016/j.jda.2018.08.002}, doi = {10.1016/J.JDA.2018.08.002}, timestamp = {Fri, 18 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jda/CatalanoRF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/CatalanoF18, author = {Dario Catalano and Dario Fiore}, title = {Practical Homomorphic Message Authenticators for Arithmetic Circuits}, journal = {J. Cryptol.}, volume = {31}, number = {1}, pages = {23--59}, year = {2018}, url = {https://doi.org/10.1007/s00145-016-9249-1}, doi = {10.1007/S00145-016-9249-1}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/CatalanoF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/CatalanoFN18, author = {Dario Catalano and Dario Fiore and Luca Nizzardo}, editor = {Bart Preneel and Frederik Vercauteren}, title = {On the Security Notions for Homomorphic Signatures}, booktitle = {Applied Cryptography and Network Security - 16th International Conference, {ACNS} 2018, Leuven, Belgium, July 2-4, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10892}, pages = {183--201}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93387-0\_10}, doi = {10.1007/978-3-319-93387-0\_10}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/CatalanoFN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AbdallaCFGU18, author = {Michel Abdalla and Dario Catalano and Dario Fiore and Romain Gay and Bogdan Ursu}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Multi-Input Functional Encryption for Inner Products: Function-Hiding Realizations and Constructions Without Pairings}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10991}, pages = {597--627}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96884-1\_20}, doi = {10.1007/978-3-319-96884-1\_20}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/AbdallaCFGU18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/scn/2018, editor = {Dario Catalano and Roberto De Prisco}, title = {Security and Cryptography for Networks - 11th International Conference, {SCN} 2018, Amalfi, Italy, September 5-7, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11035}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98113-0}, doi = {10.1007/978-3-319-98113-0}, isbn = {978-3-319-98112-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/CatalanoFG17, author = {Dario Catalano and Dario Fiore and Rosario Gennaro}, title = {A certificateless approach to onion routing}, journal = {Int. J. Inf. Sec.}, volume = {16}, number = {3}, pages = {327--343}, year = {2017}, url = {https://doi.org/10.1007/s10207-016-0337-x}, doi = {10.1007/S10207-016-0337-X}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/CatalanoFG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BalticoCFG17, author = {Carmen Elisabetta Zaira Baltico and Dario Catalano and Dario Fiore and Romain Gay}, editor = {Jonathan Katz and Hovav Shacham}, title = {Practical Functional Encryption for Quadratic Functions with Applications to Predicate Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10401}, pages = {67--98}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63688-7\_3}, doi = {10.1007/978-3-319-63688-7\_3}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BalticoCFG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BarbosaCF17, author = {Manuel Barbosa and Dario Catalano and Dario Fiore}, editor = {Simon N. Foley and Dieter Gollmann and Einar Snekkenes}, title = {Labeled Homomorphic Encryption - Scalable and Privacy-Preserving Processing of Outsourced Data}, booktitle = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10492}, pages = {146--166}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66402-6\_10}, doi = {10.1007/978-3-319-66402-6\_10}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BarbosaCF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BalticoCFG17, author = {Carmen Elisabetta Zaira Baltico and Dario Catalano and Dario Fiore and Romain Gay}, title = {Practical Functional Encryption for Quadratic Functions with Applications to Predicate Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {151}, year = {2017}, url = {http://eprint.iacr.org/2017/151}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BalticoCFG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarbosaCF17, author = {Manuel Barbosa and Dario Catalano and Dario Fiore}, title = {Labeled Homomorphic Encryption: Scalable and Privacy-Preserving Processing of Outsourced Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {326}, year = {2017}, url = {http://eprint.iacr.org/2017/326}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarbosaCF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaCFGU17, author = {Michel Abdalla and Dario Catalano and Dario Fiore and Romain Gay and Bogdan Ursu}, title = {Multi-Input Functional Encryption for Inner Products: Function-Hiding Realizations and Constructions without Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {972}, year = {2017}, url = {http://eprint.iacr.org/2017/972}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaCFGU17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BertinoCLLSV16, author = {Elisa Bertino and Dario Catalano and Qi Li and Alex X. Liu and Anna Cinzia Squicciarini and Alexey V. Vinel}, title = {Editor's Note}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {4}, pages = {409--410}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2016.2564478}, doi = {10.1109/TDSC.2016.2564478}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BertinoCLLSV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/CatalanoRF16, author = {Dario Catalano and Mario Di Raimondo and Simone Faro}, editor = {Vassilis Zikas and Roberto De Prisco}, title = {Verifiable Pattern Matching on Outsourced Texts}, booktitle = {Security and Cryptography for Networks - 10th International Conference, {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9841}, pages = {333--350}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44618-9\_18}, doi = {10.1007/978-3-319-44618-9\_18}, timestamp = {Thu, 23 Jun 2022 19:58:57 +0200}, biburl = {https://dblp.org/rec/conf/scn/CatalanoRF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BalticoCF16, author = {Carmen Elisabetta Zaira Baltico and Dario Catalano and Dario Fiore}, title = {Practical Functional Encryption for Bilinear Forms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1104}, year = {2016}, url = {http://eprint.iacr.org/2016/1104}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BalticoCF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CatalanoFN16, author = {Dario Catalano and Dario Fiore and Luca Nizzardo}, title = {On the Security Notions for Homomorphic Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1175}, year = {2016}, url = {http://eprint.iacr.org/2016/1175}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CatalanoFN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/CatalanoFGV15, author = {Dario Catalano and Dario Fiore and Rosario Gennaro and Konstantinos Vamvourellis}, title = {Algebraic (trapdoor) one-way functions: Constructions and applications}, journal = {Theor. Comput. Sci.}, volume = {592}, pages = {143--165}, year = {2015}, url = {https://doi.org/10.1016/j.tcs.2015.05.029}, doi = {10.1016/J.TCS.2015.05.029}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/CatalanoFGV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CatalanoF15, author = {Dario Catalano and Dario Fiore}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Using Linearly-Homomorphic Encryption to Evaluate Degree-2 Functions on Encrypted Data}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1518--1529}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813624}, doi = {10.1145/2810103.2813624}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/CatalanoF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CatalanoFN15, author = {Dario Catalano and Dario Fiore and Luca Nizzardo}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Programmable Hash Functions Go Private: Constructions and Applications to (Homomorphic) Signatures with Shorter Public Keys}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {254--274}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_13}, doi = {10.1007/978-3-662-48000-7\_13}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CatalanoFN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CatalanoF15, author = {Dario Catalano and Dario Fiore}, title = {Practical Homomorphic MACs for Arithmetic Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {194}, year = {2015}, url = {http://eprint.iacr.org/2015/194}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CatalanoF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CatalanoFGN15, author = {Dario Catalano and Dario Fiore and Rosario Gennaro and Luca Nizzardo}, title = {Generalizing Homomorphic MACs for Arithmetic Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {396}, year = {2015}, url = {http://eprint.iacr.org/2015/396}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CatalanoFGN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CatalanoFN15, author = {Dario Catalano and Dario Fiore and Luca Nizzardo}, title = {Programmable Hash Functions go Private: Constructions and Applications to (Homomorphic) Signatures with Shorter Public Keys}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {826}, year = {2015}, url = {http://eprint.iacr.org/2015/826}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CatalanoFN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/AbdallaCF14, author = {Michel Abdalla and Dario Catalano and Dario Fiore}, title = {Verifiable Random Functions: Relations to Identity-Based Key Encapsulation and New Constructions}, journal = {J. Cryptol.}, volume = {27}, number = {3}, pages = {544--593}, year = {2014}, url = {https://doi.org/10.1007/s00145-013-9153-x}, doi = {10.1007/S00145-013-9153-X}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/AbdallaCF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/CatalanoMP14, author = {Dario Catalano and Antonio Marcedone and Orazio Puglisi}, editor = {Palash Sarkar and Tetsu Iwata}, title = {Authenticating Computation on Groups: New Homomorphic Primitives and Applications}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8874}, pages = {193--212}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45608-8\_11}, doi = {10.1007/978-3-662-45608-8\_11}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/CatalanoMP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CatalanoFW14, author = {Dario Catalano and Dario Fiore and Bogdan Warinschi}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Homomorphic Signatures with Efficient Verification for Polynomial Functions}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8616}, pages = {371--389}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44371-2\_21}, doi = {10.1007/978-3-662-44371-2\_21}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CatalanoFW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CatalanoFGN14, author = {Dario Catalano and Dario Fiore and Rosario Gennaro and Luca Nizzardo}, editor = {Hugo Krawczyk}, title = {Generalizing Homomorphic MACs for Arithmetic Circuits}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {538--555}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_31}, doi = {10.1007/978-3-642-54631-0\_31}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CatalanoFGN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/Catalano14, author = {Dario Catalano}, editor = {Michel Abdalla and Roberto De Prisco}, title = {Homomorphic Signatures and Message Authentication Codes}, booktitle = {Security and Cryptography for Networks - 9th International Conference, {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8642}, pages = {514--519}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10879-7\_29}, doi = {10.1007/978-3-319-10879-7\_29}, timestamp = {Thu, 23 Jun 2022 19:58:57 +0200}, biburl = {https://dblp.org/rec/conf/scn/Catalano14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CatalanoFW14, author = {Dario Catalano and Dario Fiore and Bogdan Warinschi}, title = {Homomorphic Signatures with Efficient Verification for Polynomial Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {469}, year = {2014}, url = {http://eprint.iacr.org/2014/469}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CatalanoFW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CatalanoF14, author = {Dario Catalano and Dario Fiore}, title = {Boosting Linearly-Homomorphic Encryption to Evaluate Degree-2 Functions on Encrypted Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {813}, year = {2014}, url = {http://eprint.iacr.org/2014/813}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CatalanoF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/CatalanoRFGP13, author = {Dario Catalano and Mario Di Raimondo and Dario Fiore and Rosario Gennaro and Orazio Puglisi}, title = {Fully non-interactive onion routing with forward secrecy}, journal = {Int. J. Inf. Sec.}, volume = {12}, number = {1}, pages = {33--47}, year = {2013}, url = {https://doi.org/10.1007/s10207-012-0185-2}, doi = {10.1007/S10207-012-0185-2}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/CatalanoRFGP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BressonCRFG13, author = {Emmanuel Bresson and Dario Catalano and Mario Di Raimondo and Dario Fiore and Rosario Gennaro}, title = {Off-line/on-line signatures revisited: a general unifying paradigm, efficient threshold variants and experimental results}, journal = {Int. J. Inf. Sec.}, volume = {12}, number = {6}, pages = {439--465}, year = {2013}, url = {https://doi.org/10.1007/s10207-013-0200-2}, doi = {10.1007/S10207-013-0200-2}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/BressonCRFG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CatalanoF13, author = {Dario Catalano and Dario Fiore}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {Practical Homomorphic MACs for Arithmetic Circuits}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {336--352}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_21}, doi = {10.1007/978-3-642-38348-9\_21}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CatalanoF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CatalanoF13, author = {Dario Catalano and Dario Fiore}, editor = {Kaoru Kurosawa and Goichiro Hanaoka}, title = {Vector Commitments and Their Applications}, booktitle = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7778}, pages = {55--72}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36362-7\_5}, doi = {10.1007/978-3-642-36362-7\_5}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CatalanoF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/CatalanoFGV13, author = {Dario Catalano and Dario Fiore and Rosario Gennaro and Konstantinos Vamvourellis}, editor = {Amit Sahai}, title = {Algebraic (Trapdoor) One-Way Functions and Their Applications}, booktitle = {Theory of Cryptography - 10th Theory of Cryptography Conference, {TCC} 2013, Tokyo, Japan, March 3-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7785}, pages = {680--699}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36594-2\_38}, doi = {10.1007/978-3-642-36594-2\_38}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/CatalanoFGV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CatalanoMP13, author = {Dario Catalano and Antonio Marcedone and Orazio Puglisi}, title = {Linearly Homomorphic Structure Preserving Signatures: New Methodologies and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {801}, year = {2013}, url = {http://eprint.iacr.org/2013/801}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CatalanoMP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CatalanoFW12, author = {Dario Catalano and Dario Fiore and Bogdan Warinschi}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {Efficient Network Coding Signatures in the Standard Model}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {680--696}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_40}, doi = {10.1007/978-3-642-30057-8\_40}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CatalanoFW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/AbdallaBCDMNSS11, author = {Michel Abdalla and James Birkett and Dario Catalano and Alexander W. Dent and John Malone{-}Lee and Gregory Neven and Jacob C. N. Schuldt and Nigel P. Smart}, title = {Wildcarded Identity-Based Encryption}, journal = {J. Cryptol.}, volume = {24}, number = {1}, pages = {42--82}, year = {2011}, url = {https://doi.org/10.1007/s00145-010-9060-3}, doi = {10.1007/S00145-010-9060-3}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/AbdallaBCDMNSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/CatalanoRFM11, author = {Dario Catalano and Mario Di Raimondo and Dario Fiore and Mariagrazia Messina}, title = {Zero-Knowledge Sets With Short Proofs}, journal = {{IEEE} Trans. Inf. Theory}, volume = {57}, number = {4}, pages = {2488--2502}, year = {2011}, url = {https://doi.org/10.1109/TIT.2011.2112150}, doi = {10.1109/TIT.2011.2112150}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/CatalanoRFM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/CatalanoRFGP11, author = {Dario Catalano and Mario Di Raimondo and Dario Fiore and Rosario Gennaro and Orazio Puglisi}, editor = {Javier L{\'{o}}pez and Gene Tsudik}, title = {Fully Non-interactive Onion Routing with Forward-Secrecy}, booktitle = {Applied Cryptography and Network Security - 9th International Conference, {ACNS} 2011, Nerja, Spain, June 7-10, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6715}, pages = {255--273}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21554-4\_15}, doi = {10.1007/978-3-642-21554-4\_15}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/CatalanoRFGP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CatalanoFW11, author = {Dario Catalano and Dario Fiore and Bogdan Warinschi}, editor = {Kenneth G. Paterson}, title = {Adaptive Pseudo-free Groups and Applications}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {207--223}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_13}, doi = {10.1007/978-3-642-20465-4\_13}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CatalanoFW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2011, editor = {Dario Catalano and Nelly Fazio and Rosario Gennaro and Antonio Nicolosi}, title = {Public Key Cryptography - {PKC} 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6571}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19379-8}, doi = {10.1007/978-3-642-19379-8}, isbn = {978-3-642-19378-1}, timestamp = {Fri, 01 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CatalanoFW11, author = {Dario Catalano and Dario Fiore and Bogdan Warinschi}, title = {Adaptive Pseudo-Free Groups and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {53}, year = {2011}, url = {http://eprint.iacr.org/2011/053}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CatalanoFW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CatalanoF11, author = {Dario Catalano and Dario Fiore}, title = {Concise Vector Commitments and their Applications to Zero-Knowledge Elementary Databases}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {495}, year = {2011}, url = {http://eprint.iacr.org/2011/495}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CatalanoF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CatalanoFW11a, author = {Dario Catalano and Dario Fiore and Bogdan Warinschi}, title = {Efficient Network Coding Signatures in the Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {696}, year = {2011}, url = {http://eprint.iacr.org/2011/696}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CatalanoFW11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/btas/BarniBCRLFFLPPS10, author = {Mauro Barni and Tiziano Bianchi and Dario Catalano and Mario Di Raimondo and Ruggero Donida Labati and Pierluigi Failla and Dario Fiore and Riccardo Lazzeretti and Vincenzo Piuri and Alessandro Piva and Fabio Scotti}, title = {A privacy-compliant fingerprint recognition system based on homomorphic encryption and Fingercode templates}, booktitle = {Fourth {IEEE} International Conference on Biometrics: Theory Applications and Systems, {BTAS} 2010, Washington, DC, USA, 27-29 September, 2010}, pages = {1--7}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/BTAS.2010.5634527}, doi = {10.1109/BTAS.2010.5634527}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/btas/BarniBCRLFFLPPS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/BarniBCRLFFLPSP10, author = {Mauro Barni and Tiziano Bianchi and Dario Catalano and Mario Di Raimondo and Ruggero Donida Labati and Pierluigi Failla and Dario Fiore and Riccardo Lazzeretti and Vincenzo Piuri and Fabio Scotti and Alessandro Piva}, editor = {Patrizio Campisi and Jana Dittmann and Scott Craver}, title = {Privacy-preserving fingercode authentication}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy, September 9-10, 2010}, pages = {231--240}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1854229.1854270}, doi = {10.1145/1854229.1854270}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsec/BarniBCRLFFLPSP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wote/JuelsCJ10, author = {Ari Juels and Dario Catalano and Markus Jakobsson}, editor = {David Chaum and Markus Jakobsson and Ronald L. Rivest and Peter Y. A. Ryan and Josh Benaloh and Miroslaw Kutylowski and Ben Adida}, title = {Coercion-Resistant Electronic Elections}, booktitle = {Towards Trustworthy Elections, New Directions in Electronic Voting}, series = {Lecture Notes in Computer Science}, volume = {6000}, pages = {37--63}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12980-3\_2}, doi = {10.1007/978-3-642-12980-3\_2}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/wote/JuelsCJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/AbdallaCCP09, author = {Michel Abdalla and Dario Catalano and C{\'{e}}line Chevalier and David Pointcheval}, editor = {Bart Preneel}, title = {Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2009, Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5580}, pages = {254--271}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02384-2\_16}, doi = {10.1007/978-3-642-02384-2\_16}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/africacrypt/AbdallaCCP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CatalanoFG09, author = {Dario Catalano and Dario Fiore and Rosario Gennaro}, editor = {Ehab Al{-}Shaer and Somesh Jha and Angelos D. Keromytis}, title = {Certificateless onion routing}, booktitle = {Proceedings of the 2009 {ACM} Conference on Computer and Communications Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009}, pages = {151--160}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1653662.1653682}, doi = {10.1145/1653662.1653682}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/CatalanoFG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AbdallaCF09, author = {Michel Abdalla and Dario Catalano and Dario Fiore}, editor = {Antoine Joux}, title = {Verifiable Random Functions from Identity-Based Key Encapsulation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5479}, pages = {554--571}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01001-9\_32}, doi = {10.1007/978-3-642-01001-9\_32}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AbdallaCF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/AbdallaBCKKLMNPS08, author = {Michel Abdalla and Mihir Bellare and Dario Catalano and Eike Kiltz and Tadayoshi Kohno and Tanja Lange and John Malone{-}Lee and Gregory Neven and Pascal Paillier and Haixia Shi}, title = {Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions}, journal = {J. Cryptol.}, volume = {21}, number = {3}, pages = {350--391}, year = {2008}, url = {https://doi.org/10.1007/s00145-007-9006-6}, doi = {10.1007/S00145-007-9006-6}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/AbdallaBCKKLMNPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/AbdallaCCP08, author = {Michel Abdalla and Dario Catalano and C{\'{e}}line Chevalier and David Pointcheval}, editor = {Tal Malkin}, title = {Efficient Two-Party Password-Based Key Exchange Protocols in the {UC} Framework}, booktitle = {Topics in Cryptology - {CT-RSA} 2008, The Cryptographers' Track at the {RSA} Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4964}, pages = {335--351}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79263-5\_22}, doi = {10.1007/978-3-540-79263-5\_22}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/AbdallaCCP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CatalanoFM08, author = {Dario Catalano and Dario Fiore and Mariagrazia Messina}, editor = {Nigel P. Smart}, title = {Zero-Knowledge Sets with Short Proofs}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4965}, pages = {433--450}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78967-3\_25}, doi = {10.1007/978-3-540-78967-3\_25}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CatalanoFM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CatalanoRFG08, author = {Dario Catalano and Mario Di Raimondo and Dario Fiore and Rosario Gennaro}, editor = {Ronald Cramer}, title = {Off-Line/On-Line Signatures: Theoretical Aspects and Experimental Results}, booktitle = {Public Key Cryptography - {PKC} 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4939}, pages = {101--120}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78440-1\_7}, doi = {10.1007/978-3-540-78440-1\_7}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CatalanoRFG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/CatalanoPP07, author = {Dario Catalano and David Pointcheval and Thomas Pornin}, title = {Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication}, journal = {J. Cryptol.}, volume = {20}, number = {1}, pages = {115--149}, year = {2007}, url = {https://doi.org/10.1007/s00145-006-0431-8}, doi = {10.1007/S00145-006-0431-8}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/CatalanoPP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/CatalanoG07, author = {Dario Catalano and Rosario Gennaro}, title = {Cramer-Damg{\aa}rd signatures revisited: Efficient flat-tree signatures based on factoring}, journal = {Theor. Comput. Sci.}, volume = {370}, number = {1-3}, pages = {186--200}, year = {2007}, url = {https://doi.org/10.1016/j.tcs.2006.10.029}, doi = {10.1016/J.TCS.2006.10.029}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/CatalanoG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/CatalanoV07, author = {Dario Catalano and Ivan Visconti}, title = {Hybrid commitments and their applications to zero-knowledge proof systems}, journal = {Theor. Comput. Sci.}, volume = {374}, number = {1-3}, pages = {229--260}, year = {2007}, url = {https://doi.org/10.1016/j.tcs.2007.01.007}, doi = {10.1016/J.TCS.2007.01.007}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/CatalanoV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BressonCG07, author = {Emmanuel Bresson and Dario Catalano and Rosario Gennaro}, editor = {Tatsuaki Okamoto and Xiaoyun Wang}, title = {Improved On-Line/Off-Line Threshold Signatures}, booktitle = {Public Key Cryptography - {PKC} 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4450}, pages = {217--232}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71677-8\_15}, doi = {10.1007/978-3-540-71677-8\_15}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BressonCG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/AbdallaCDMNS06, author = {Michel Abdalla and Dario Catalano and Alexander W. Dent and John Malone{-}Lee and Gregory Neven and Nigel P. Smart}, editor = {Michele Bugliesi and Bart Preneel and Vladimiro Sassone and Ingo Wegener}, title = {Identity-Based Encryption Gone Wild}, booktitle = {Automata, Languages and Programming, 33rd International Colloquium, {ICALP} 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {4052}, pages = {300--311}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11787006\_26}, doi = {10.1007/11787006\_26}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/AbdallaCDMNS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/CatalanoDV06, author = {Dario Catalano and Yevgeniy Dodis and Ivan Visconti}, editor = {Shai Halevi and Tal Rabin}, title = {Mercurial Commitments: Minimal Assumptions and Efficient Constructions}, booktitle = {Theory of Cryptography, Third Theory of Cryptography Conference, {TCC} 2006, New York, NY, USA, March 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3876}, pages = {120--144}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11681878\_7}, doi = {10.1007/11681878\_7}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/CatalanoDV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaCDMNS06, author = {Michel Abdalla and Dario Catalano and Alexander W. Dent and John Malone{-}Lee and Gregory Neven and Nigel P. Smart}, title = {Identity-Based Encryption Gone Wild}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {304}, year = {2006}, url = {http://eprint.iacr.org/2006/304}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaCDMNS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/daglib/0018105, author = {Dario Catalano and Ronald Cramer and Ivan Bjerre Damg{\aa}rd and Giovanni Di Crescenzo and David Pointcheval}, title = {Contemporary cryptology}, series = {Advanced courses in mathematics : {CRM} Barcelona}, publisher = {Birkh{\"{a}}user}, year = {2005}, isbn = {978-3-7643-7294-1}, timestamp = {Fri, 12 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/daglib/0018105.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AbdallaBCKKLMNPS05, author = {Michel Abdalla and Mihir Bellare and Dario Catalano and Eike Kiltz and Tadayoshi Kohno and Tanja Lange and John Malone{-}Lee and Gregory Neven and Pascal Paillier and Haixia Shi}, editor = {Victor Shoup}, title = {Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions}, booktitle = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3621}, pages = {205--222}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11535218\_13}, doi = {10.1007/11535218\_13}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/AbdallaBCKKLMNPS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/CatalanoV05, author = {Dario Catalano and Ivan Visconti}, editor = {Lu{\'{\i}}s Caires and Giuseppe F. Italiano and Lu{\'{\i}}s Monteiro and Catuscia Palamidessi and Moti Yung}, title = {Hybrid Trapdoor Commitments and Their Applications}, booktitle = {Automata, Languages and Programming, 32nd International Colloquium, {ICALP} 2005, Lisbon, Portugal, July 11-15, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3580}, pages = {298--310}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11523468\_25}, doi = {10.1007/11523468\_25}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/CatalanoV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispa/CatalanoRS05, author = {Dario Catalano and Giancarlo Ruffo and Rossano Schifanella}, editor = {Guihai Chen and Yi Pan and Minyi Guo and Jian Lu}, title = {A {P2P} Market Place Based on Aggregate Signatures}, booktitle = {Parallel and Distributed Processing and Applications - {ISPA} 2005 Workshops, {ISPA} 2005 International Workshops AEPP, ASTD, BIOS, GCIC, IADS, MASN, SGCA, and WISA, Nanjing, China, November 2-5, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3759}, pages = {54--63}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11576259\_7}, doi = {10.1007/11576259\_7}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispa/CatalanoRS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CatalanoG05, author = {Dario Catalano and Rosario Gennaro}, editor = {Serge Vaudenay}, title = {Cramer-Damg{\aa}rd Signatures Revisited: Efficient Flat-Tree Signatures Based on Factoring}, booktitle = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3386}, pages = {313--327}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30580-4\_22}, doi = {10.1007/978-3-540-30580-4\_22}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CatalanoG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/JuelsCJ05, author = {Ari Juels and Dario Catalano and Markus Jakobsson}, editor = {Vijay Atluri and Sabrina De Capitani di Vimercati and Roger Dingledine}, title = {Coercion-resistant electronic elections}, booktitle = {Proceedings of the 2005 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2005, Alexandria, VA, USA, November 7, 2005}, pages = {61--70}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102199.1102213}, doi = {10.1145/1102199.1102213}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/JuelsCJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaBCKKLMNPS05, author = {Michel Abdalla and Mihir Bellare and Dario Catalano and Eike Kiltz and Tadayoshi Kohno and Tanja Lange and John Malone{-}Lee and Gregory Neven and Pascal Paillier and Haixia Shi}, title = {Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {254}, year = {2005}, url = {http://eprint.iacr.org/2005/254}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaBCKKLMNPS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CatalanoPP04, author = {Dario Catalano and David Pointcheval and Thomas Pornin}, editor = {Matthew K. Franklin}, title = {{IPAKE:} Isomorphisms for Password-Based Authenticated Key Exchange}, booktitle = {Advances in Cryptology - {CRYPTO} 2004, 24th Annual International CryptologyConference, Santa Barbara, California, USA, August 15-19, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3152}, pages = {477--493}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28628-8\_29}, doi = {10.1007/978-3-540-28628-8\_29}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CatalanoPP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotp2p/CatalanoR04, author = {Dario Catalano and Giancarlo Ruffo}, title = {A fair micro-payment scheme for profit sharing in {P2P} networks}, booktitle = {International Workshop on Hot Topics in Peer-to-Peer Systems, {HOT-P2P} 2004, Volendam, The Netherlands, October 8, 2004}, pages = {32--39}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/PTPSYS.2004.1}, doi = {10.1109/PTPSYS.2004.1}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hotp2p/CatalanoR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BressonC04, author = {Emmanuel Bresson and Dario Catalano}, editor = {Feng Bao and Robert H. Deng and Jianying Zhou}, title = {Constant Round Authenticated Group Key Agreement via Distributed Computation}, booktitle = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004}, series = {Lecture Notes in Computer Science}, volume = {2947}, pages = {115--129}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24632-9\_9}, doi = {10.1007/978-3-540-24632-9\_9}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BressonC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BressonCP03, author = {Emmanuel Bresson and Dario Catalano and David Pointcheval}, editor = {Chi{-}Sung Laih}, title = {A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 - December 4, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2894}, pages = {37--54}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40061-5\_3}, doi = {10.1007/978-3-540-40061-5\_3}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BressonCP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/CatalanoGH02, author = {Dario Catalano and Rosario Gennaro and Nick Howgrave{-}Graham}, title = {Paillier's Trapdoor Function Hides up to \emph{O}(\emph{n}) Bits}, journal = {J. Cryptol.}, volume = {15}, number = {4}, pages = {251--269}, year = {2002}, url = {https://doi.org/10.1007/s00145-002-0112-1}, doi = {10.1007/S00145-002-0112-1}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/CatalanoGH02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/CatalanoNS02, author = {Dario Catalano and Phong Q. Nguyen and Jacques Stern}, editor = {Yuliang Zheng}, title = {The Hardness of Hensel Lifting: The Case of {RSA} and Discrete Logarithm}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2501}, pages = {299--310}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36178-2\_19}, doi = {10.1007/3-540-36178-2\_19}, timestamp = {Tue, 30 Nov 2021 15:21:24 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/CatalanoNS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JuelsCJ02, author = {Ari Juels and Dario Catalano and Markus Jakobsson}, title = {Coercion-Resistant Electronic Elections}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {165}, year = {2002}, url = {http://eprint.iacr.org/2002/165}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JuelsCJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CatalanoGHN01, author = {Dario Catalano and Rosario Gennaro and Nick Howgrave{-}Graham and Phong Q. Nguyen}, editor = {Michael K. Reiter and Pierangela Samarati}, title = {Paillier's cryptosystem revisited}, booktitle = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001}, pages = {206--214}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/501983.502012}, doi = {10.1145/501983.502012}, timestamp = {Tue, 10 Nov 2020 20:00:35 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CatalanoGHN01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CatalanoGH01, author = {Dario Catalano and Rosario Gennaro and Nick Howgrave{-}Graham}, editor = {Birgit Pfitzmann}, title = {The Bit Security of Paillier's Encryption Scheme and Its Applications}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2001, International Conference on the Theory and Application of Cryptographic Techniques, Innsbruck, Austria, May 6-10, 2001, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {2045}, pages = {229--243}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44987-6\_15}, doi = {10.1007/3-540-44987-6\_15}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CatalanoGH01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcss/CatalanoG00, author = {Dario Catalano and Rosario Gennaro}, title = {New Efficient and Secure Protocols for Verifiable Signature Sharing and Other Applications}, journal = {J. Comput. Syst. Sci.}, volume = {61}, number = {1}, pages = {51--80}, year = {2000}, url = {https://doi.org/10.1006/jcss.1999.1685}, doi = {10.1006/JCSS.1999.1685}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcss/CatalanoG00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ciac/BattiatoCCCH00, author = {Sebastiano Battiato and Domenico Cantone and Dario Catalano and Gianluca Cincotti and Micha Hofri}, editor = {Gian Carlo Bongiovanni and Giorgio Gambosi and Rossella Petreschi}, title = {An Efficient Algorithm for the Approximate Median Selection Problem}, booktitle = {Algorithms and Complexity, 4th Italian Conference, {CIAC} 2000, Rome, Italy, March 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1767}, pages = {226--238}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-46521-9\_19}, doi = {10.1007/3-540-46521-9\_19}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ciac/BattiatoCCCH00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CatalanoGH00, author = {Dario Catalano and Rosario Gennaro and Shai Halevi}, editor = {Bart Preneel}, title = {Computing Inverses over a Shared Secret Modulus}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2000, International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1807}, pages = {190--206}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-45539-6\_14}, doi = {10.1007/3-540-45539-6\_14}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CatalanoGH00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sswmc/BattiatoCGG00, author = {Sebastiano Battiato and Dario Catalano and Giovanni Gallo and Rosario Gennaro}, editor = {Ping Wah Wong and Edward J. Delp III}, title = {Color opponency watermarking scheme for digital images}, booktitle = {Security and Watermarking of Multimedia Contents II, San Jose, CA, USA, January 22, 2000}, series = {{SPIE} Proceedings}, volume = {3971}, pages = {510--515}, publisher = {{SPIE}}, year = {2000}, url = {https://doi.org/10.1117/12.385005}, doi = {10.1117/12.385005}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sswmc/BattiatoCGG00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/BattiatoCGG99, author = {Sebastiano Battiato and Dario Catalano and Giovanni Gallo and Rosario Gennaro}, editor = {Andreas Pfitzmann}, title = {Robust Watermarking for Images Based on Color Manipulation}, booktitle = {Information Hiding, Third International Workshop, IH'99, Dresden, Germany, September 29 - October 1, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1768}, pages = {302--317}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/10719724\_21}, doi = {10.1007/10719724\_21}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/BattiatoCGG99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CatalanoG98, author = {Dario Catalano and Rosario Gennaro}, editor = {Hugo Krawczyk}, title = {New Efficient and Secure Protocols for Verifiable Signature Sharing and Other Applications}, booktitle = {Advances in Cryptology - {CRYPTO} '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1462}, pages = {105--120}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0055723}, doi = {10.1007/BFB0055723}, timestamp = {Tue, 01 Jun 2021 15:21:29 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CatalanoG98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/BergadanoCV96, author = {Francesco Bergadano and Dario Catalano and Stefano Varricchio}, editor = {Gary L. Miller}, title = {Learning Sat-\emph{k}-DNF Formulas from Membership Queries}, booktitle = {Proceedings of the Twenty-Eighth Annual {ACM} Symposium on the Theory of Computing, Philadelphia, Pennsylvania, USA, May 22-24, 1996}, pages = {126--130}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/237814.237845}, doi = {10.1145/237814.237845}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stoc/BergadanoCV96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.