Titolo | Pubblicato in | Anno |
---|---|---|
Terrorist Attacks for Fake Exposure Notifications in Contact Tracing Systems | Applied Cryptography and Network Security 19th International Conference, ACNS 2021, Kamakura, Japan, June 21–24, 2021, Proceedings, Part I | 2021 |
How to extract useful randomness from unreliable sources | Advances in Cryptology – EUROCRYPT 2020 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10–14, 2020, Proceedings, Part I | 2020 |
Black-box constructions of bounded-concurrent secure computation | Security and Cryptography for Networks 12th International Conference, SCN 2020, Amalfi, Italy, September 14–16, 2020, Proceedings | 2020 |
Universally Composable Secure Computation with Corrupted Tokens | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2019 |
UC-Secure Multiparty Computation from One-Way Functions Using Stateless Tokens | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2019 |
Publicly Verifiable Proofs from Blockchains | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2019 |
Non-interactive zero knowledge proofs in the random oracle model | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2019 |
Continuously non-malleable codes in the split-state model from minimal assumptions | Advances in Cryptology – CRYPTO 2018 | 2018 |
Non-interactive secure computation from one-way functions | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2018 |
I work on research projects focusing -on data security and privacy, blockchain technology, zero-knowledge proofs, post-quantum cryptography, secure computation, cryptographic protocols, e-voting, privacy-enhancing cryptography, decentralization, and more.
© Università degli Studi di Roma "La Sapienza" - Piazzale Aldo Moro 5, 00185 Roma