Titolo | Pubblicato in | Anno |
---|---|---|
Rate-limited secure function evaluation | THEORETICAL COMPUTER SCIENCE | 2016 |
Fiat-Shamir for highly sound protocols is instantiable | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2016 |
Chosen-ciphertext security from subset sum | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2016 |
Naor-Yung paradigm with shared randomness and applications | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2016 |
Non-malleable encryption: simpler, shorter, stronger | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2016 |
Subversion-resilient signature schemes | Proceedings of the ACM Conference on Computer and Communications Security | 2015 |
Entangled encodings and data entanglement | SCC 2015 - Proceedings of the 3rd ACM International Workshop on Security in Cloud Computing, part of ASIACCS 2015 | 2015 |
From Single-Bit to Multi-bit Public-Key Encryption via Non-malleable Codes | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2015 |
Mind your coins: fully leakage-resilient signatures with graceful degradation | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2015 |
The chaining lemma and its application | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2015 |
A Tamper and Leakage Resilient von Neumann Architecture | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2015 |
Secure data sharing and processing in heterogeneous clouds | Procedia Computer Science | 2015 |
(De-)constructing TLS 1.3 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2015 |
A multi-party protocol for privacy-preserving cooperative linear systems of equations | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2015 |
© Università degli Studi di Roma "La Sapienza" - Piazzale Aldo Moro 5, 00185 Roma