Titolo |
Pubblicato in |
Anno |
Compact Proofs of Partial Knowledge for Overlapping CNF Formulae |
JOURNAL OF CRYPTOLOGY |
2025 |
Data Redaction in Smart-Contract-Enabled Permissioned Blockchains |
CEUR Workshop Proceedings |
2024 |
Multi-key and Multi-input Predicate Encryption (for Conjunctions) from Learning with Errors |
JOURNAL OF CRYPTOLOGY |
2024 |
MARTSIA: Enabling Data Confidentiality for Blockchain-Based Process Execution |
Enterprise Design, Operations, and Computing - 27th International Conference, EDOC 2023, Groningen, The Netherlands, October 30 - November 3, 2023, Proceedings |
2023 |
Multi-key and Multi-input Predicate Encryption from Learning with Errors |
Advances in Cryptology - EUROCRYPT 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part III |
2023 |
Registered (Inner-Product) Functional Encryption |
|
2023 |
On the Complete Non-malleability of the Fujisaki-Okamoto Transform |
|
2023 |
Cryptographic and Financial Fairness |
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY |
2022 |
Efficient Proofs of Knowledge for Threshold Relations |
Computer Security – ESORICS 2022 |
2022 |
Shielded Computations in Smart Contracts Overcoming Forks |
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
2021 |
Personalizing Cancer Pain Therapy: Insights from the Rational Use of Analgesics (RUA) Group |
PAIN AND THERAPY |
2021 |
Terrorist Attacks for Fake Exposure Notifications in Contact Tracing Systems |
Applied Cryptography and Network Security |
2021 |
Terrorist Attacks for Fake Exposure Notifications in Contact Tracing Systems |
Applied Cryptography and Network Security 19th International Conference, ACNS 2021, Kamakura, Japan, June 21–24, 2021, Proceedings, Part I |
2021 |
Vision: What If They All Die? Crypto Requirements For Key People |
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) |
2020 |
A Black-Box Construction of Fully-Simulatable, Round-Optimal Oblivious Transfer from Strongly Uniform Key Agreement |
Theory of Cryptography |
2019 |
Affordable Security or Big Guy vs Small Guy |
Security Protocols XXVII |
2019 |