Titolo | Pubblicato in | Anno |
---|---|---|
Compact Proofs of Partial Knowledge for Overlapping CNF Formulae | JOURNAL OF CRYPTOLOGY | 2025 |
Multi-key and Multi-input Predicate Encryption (for Conjunctions) from Learning with Errors | JOURNAL OF CRYPTOLOGY | 2024 |
Watermarks in the Sand: Impossibility of Strong Watermarking for Language Models | Proceedings of Machine Learning Research | 2024 |
Improved Reductions from Noisy to Bounded and Probing Leakages via Hockey-Stick Divergences | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2024 |
Non-malleable Fuzzy Extractors | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2024 |
Key Exchange in the Post-snowden Era: Universally Composable Subversion-Resilient PAKE | Advances in Cryptology. ASIACRYPT 2024. 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9–13, 2024, Proceedings. Part V | 2024 |
MARTSIA: Enabling Data Confidentiality for Blockchain-Based Process Execution | Enterprise Design, Operations, and Computing - 27th International Conference, EDOC 2023, Groningen, The Netherlands, October 30 - November 3, 2023, Proceedings | 2023 |
Multi-key and Multi-input Predicate Encryption from Learning with Errors | Advances in Cryptology - EUROCRYPT 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part III | 2023 |
Registered (Inner-Product) Functional Encryption | 2023 | |
On the Complete Non-malleability of the Fujisaki-Okamoto Transform | 2023 | |
Preface | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2022 |
Universally Composable Subversion-Resilient Cryptography | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2022 |
From Privacy-Only to Simulatable OT: Black-Box, Round-Optimal, Information-Theoretic | Leibniz International Proceedings in Informatics, LIPIcs | 2022 |
Continuously Non-malleable Codes Against Bounded-Depth Tampering | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2022 |
Short Non-Malleable Codes from Related-Key Secure Block Ciphers, Revisited | IACR TRANSACTION ON SYMMETRIC CRYPTOLOGY | 2022 |
The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free | IEEE TRANSACTIONS ON INFORMATION THEORY | 2022 |
Cryptographic and Financial Fairness | IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY | 2022 |
Preface - ACNS 2022 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2022 |
Immunization against complete subversion without random oracles | THEORETICAL COMPUTER SCIENCE | 2021 |
Match Me if You Can: Matchmaking Encryption and Its Applications | JOURNAL OF CRYPTOLOGY | 2021 |
© Università degli Studi di Roma "La Sapienza" - Piazzale Aldo Moro 5, 00185 Roma