default search action
Riccardo Longo
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j8]Andrea Flamini, Riccardo Longo, Alessio Meneghetti:
Multidimensional Byzantine agreement in a synchronous setting. Appl. Algebra Eng. Commun. Comput. 35(2): 233-251 (2024) - [j7]Andrea Flamini, Riccardo Longo, Alessio Meneghetti:
Cob: a leaderless protocol for parallel Byzantine agreement in incomplete networks. Distributed Parallel Databases 42(2): 179-216 (2024) - [j6]Marco Calderini, Riccardo Longo, Massimiliano Sala, Irene Villa:
Searchable encryption with randomized ciphertext and randomized keyword search. J. Math. Cryptol. 18(1) (2024) - 2023
- [j5]Chiara Spadafora, Riccardo Longo, Massimiliano Sala:
A coercion-resistant blockchain-based E-voting protocol with receipts. Adv. Math. Commun. 17(2): 500-521 (2023) - [j4]Roberto Civino, Riccardo Longo:
Formal security proof for a scheme on a topological network. Adv. Math. Commun. 17(3): 562-571 (2023) - 2022
- [j3]Riccardo Longo, Carla Mascia, Alessio Meneghetti, Giordano Santilli, Giovanni Tognolini:
Adaptable Cryptographic Primitives in Blockchains via Smart Contracts. Cryptogr. 6(3): 32 (2022) - 2020
- [j2]Riccardo Longo, Alessandro Sebastian Podda, Roberto Saia:
Analysis of a Consensus Protocol for Extending Consistent Subchains on the Bitcoin Blockchain. Comput. 8(3): 67 (2020) - 2017
- [j1]Riccardo Aragona, Riccardo Longo, Massimiliano Sala:
Several proofs of security for a tokenization algorithm. Appl. Algebra Eng. Commun. Comput. 28(5): 425-436 (2017)
Conference and Workshop Papers
- 2024
- [c5]Riccardo Longo, Chiara Spadafora:
Amun: Securing E-Voting Against Over-the-Shoulder Coercion. SECRYPT 2024: 508-517 - 2022
- [c4]Michele Battagliola, Alessio Galli, Riccardo Longo, Alessio Meneghetti:
A Provably-Unforgeable Threshold Schnorr Signature With an Offline Recovery Party. DLT@ITASEC 2022: 60-76 - [c3]Andrea Flamini, Riccardo Longo, Alessio Meneghetti:
Cob: A Consensus Layer Enabling Sustainable Sharding-Based Consensus Protocols. DLT@ITASEC 2022: 77-93 - 2017
- [c2]Riccardo Longo, Federico Pintore, Giancarlo Rinaldo, Massimiliano Sala:
On the security of the blockchain BIX protocol and certificates. CyCon 2017: 1-16 - 2015
- [c1]Riccardo Longo, Chiara Marcolla, Massimiliano Sala:
Key-Policy Multi-authority Attribute-Based Encryption. CAI 2015: 152-164
Informal and Other Publications
- 2024
- [i20]Michele Battagliola, Riccardo Longo, Federico Pintore, Edoardo Signorini, Giovanni Tognolini:
Security of Fixed-Weight Repetitions of Special-Sound Multi-Round Proofs. IACR Cryptol. ePrint Arch. 2024: 884 (2024) - [i19]Matteo Bitussi, Riccardo Longo, Francesco Antonio Marino, Umberto Morelli, Amir Sharif, Chiara Spadafora, Alessandro Tomasi:
Coercion-resistant i-voting with short PIN and OAuth 2.0. IACR Cryptol. ePrint Arch. 2024: 1398 (2024) - 2022
- [i18]Andrea Flamini, Riccardo Longo, Alessio Meneghetti:
Cob: a consensus layer enabling sustainable sharding-based consensus protocols. CoRR abs/2205.06384 (2022) - [i17]Marco Calderini, Riccardo Longo, Massimiliano Sala, Irene Villa:
Searchable Encryption with randomized ciphertext and randomized keyword search. IACR Cryptol. ePrint Arch. 2022: 945 (2022) - [i16]Michele Battagliola, Riccardo Longo, Alessio Meneghetti:
Extensible Decentralized Secret Sharing and Application to Schnorr Signatures. IACR Cryptol. ePrint Arch. 2022: 1551 (2022) - 2021
- [i15]Andrea Flamini, Riccardo Longo, Alessio Meneghetti:
Multidimensional Byzantine Agreement in a Synchronous Setting. CoRR abs/2105.13487 (2021) - [i14]Nicola Di Chiano, Riccardo Longo, Alessio Meneghetti, Giordano Santilli:
A survey on NIST PQ signatures. CoRR abs/2107.11082 (2021) - [i13]Andrea Flamini, Riccardo Longo, Alessio Meneghetti:
Cob: a Multidimensional Byzantine Agreement Protocol for Asynchronous Incomplete Networks. CoRR abs/2108.11157 (2021) - [i12]Riccardo Longo, Chiara Spadafora:
Multiple Candidates Coercion-Resistant Blockchain-Based E-Voting Protocol With Receipts. IACR Cryptol. ePrint Arch. 2021: 851 (2021) - 2020
- [i11]Michele Battagliola, Riccardo Longo, Alessio Meneghetti, Massimiliano Sala:
Threshold ECDSA with an Offline Recovery Party. CoRR abs/2007.04036 (2020) - [i10]Michele Battagliola, Riccardo Longo, Alessio Meneghetti, Massimiliano Sala:
A Provably-Unforgeable Threshold EdDSA with an Offline Recovery Party. CoRR abs/2009.01631 (2020) - [i9]Riccardo Longo, Alessio Meneghetti, Massimiliano Sala:
Threshold Multi-Signature with an Offline Recovery Party. IACR Cryptol. ePrint Arch. 2020: 23 (2020) - [i8]Chiara Spadafora, Riccardo Longo, Massimiliano Sala:
Coercion-Resistant Blockchain-Based E-Voting Protocol. IACR Cryptol. ePrint Arch. 2020: 674 (2020) - 2019
- [i7]Riccardo Longo, Massimiliano Sala:
Public Ledger for Sensitive Data. CoRR abs/1906.06912 (2019) - [i6]Riccardo Longo, Massimiliano Sala:
Public Ledger for Sensitive Data. IACR Cryptol. ePrint Arch. 2019: 713 (2019) - 2016
- [i5]Riccardo Longo, Federico Pintore, Giancarlo Rinaldo, Massimiliano Sala:
On the security of the Blockchain Bix Protocol and Certificates. CoRR abs/1607.08401 (2016) - [i4]Riccardo Longo, Massimiliano Sala, Riccardo Aragona:
Several Proofs of Security for a Tokenization Algorithm. CoRR abs/1609.00151 (2016) - [i3]Riccardo Longo, Chiara Marcolla, Massimiliano Sala:
Collaborative Multi-Authority KP-ABE for Shorter Keys and Parameters. IACR Cryptol. ePrint Arch. 2016: 262 (2016) - 2014
- [i2]Riccardo Longo, Chiara Marcolla, Massimiliano Sala:
Two novel applications of bilinear groups to ABE encryption. CoRR abs/1412.4234 (2014) - [i1]Riccardo Longo, Chiara Marcolla, Massimiliano Sala:
Two novel applications of bilinear groups to ABE encryption. IACR Cryptol. ePrint Arch. 2014: 994 (2014)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 01:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint