Titolo | Pubblicato in | Anno |
---|---|---|
Continuously Non-malleable Codes Against Bounded-Depth Tampering | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2022 |
Short Non-Malleable Codes from Related-Key Secure Block Ciphers, Revisited | IACR TRANSACTION ON SYMMETRIC CRYPTOLOGY | 2022 |
The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free | IEEE TRANSACTIONS ON INFORMATION THEORY | 2022 |
The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2021 |
Continuously Non-malleable Secret Sharing: Joint Tampering, Plain Model and Capacity | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2021 |
Non-malleable secret sharing against bounded joint-tampering attacks in the plain model | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2020 |
Continuously Non-malleable Secret Sharing for General Access Structures | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2019 |
© Università degli Studi di Roma "La Sapienza" - Piazzale Aldo Moro 5, 00185 Roma