VISCONTI, Ivan
VISCONTI, Ivan
4-Round Resettably-Sound Zero Knowledge
2014-01-01 Kai Min, Chung; Rafail, Ostrovsky; Rafael, Pass; Muthuramakrishnan, Venkitasubramaniam; Visconti, Ivan
6th International Conference on Security and Cryptography for Networks, SCN 2008
2008-01-01 Rafail, Ostrovsky; DE PRISCO, Roberto; Visconti, Ivan
A Distributed and Secure Architecture for Signature and Decryption Delegation Through Remote Smart Cards
2012-01-01 Cattaneo, Giuseppe; Pompeo, Faruolo; Visconti, Ivan
A Format-Independent Architecture for Run-Time Integrity Checking of Executable Code
2003-01-01 Catuogno, Luigi; Visconti, Ivan
A Lightweight Security Model for WBEM
2003-01-01 Cattaneo, Giuseppe; Catuogno, Luigi; Umberto Ferraro, Petrillo; Visconti, Ivan
A secure and private system for subscription-based remote services
2003-01-01 Persiano, Giuseppe; Visconti, Ivan
A Transform for NIZK Almost as Efficient and General as the Fiat-Shamir Transform Without Programmable Random Oracles
2016-01-01 Ciampi, Michele; Persiano, Giuseppe; Siniscalchi, Luisa; Visconti, Ivan
An anonymous credential system and a privacy-awake PKI
2003-01-01 Persiano, Giuseppe; Visconti, Ivan
An Architecture for Kernel-Level Verification of Executables at Run Time
2004-01-01 Catuogno, Luigi; Visconti, Ivan
An Efficient and Usable Multi-Show Non-Transferable Anonymous Credential System
2004-01-01 Persiano, Giuseppe; Visconti, Ivan
Anonymizer-Enabled Security and Privacy for RFID
2009-01-01 Ahmad Reza, Sadeghi; Visconti, Ivan; Christian, Wachsmann
Anonymous Group Communication in Mobile Networks (Extended Abstract)
2003-01-01 Stelvio, Cimato; D'Arco, Paolo; Visconti, Ivan
Black-box constructions of bounded-concurrent secure computation
2020-01-01 Garg, Sanjam; Liang, Xiao; Pandey, Omkant; Visconti, Ivan
Black-box non-black-box zero knowledge
2014-01-01 Vipul, Goyal; Rafail, Ostrovsky; Alessandra, Scafuro; Visconti, Ivan
Co-sound Zero-Knowledge with Public Keys
2009-01-01 Carmine, Ventre; Visconti, Ivan
Collusion-Free Multiparty Computation in the Mediated Model
2009-01-01 Joel, Alwen; Jonathan, Katz; Yehuda, Lindell; Persiano, Giuseppe; Abhi, Shelat; Visconti, Ivan
Collusion-Free Protocols in the Mediated Model
2008-01-01 Joel, Alwen; Abhi, Shelat; Visconti, Ivan
Completely Non-Malleable Encryption Revisited
2008-01-01 Carmine, Ventre; Visconti, Ivan
Concurrent non-malleable commitments (and more) in 3 rounds
2016-01-01 Ciampi, Michele; Ostrovsky, Rafail; Siniscalchi, Luisa; Visconti, Ivan
Concurrent Zero Knowledge in the Bounded Player Model
2013-01-01 Vipul, Goyal; Abhishek, Jain; Rafail, Ostrovsky; Silas, Richelson; Visconti, Ivan
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
4-Round Resettably-Sound Zero Knowledge | 1-gen-2014 | Kai Min, Chung; Rafail, Ostrovsky; Rafael, Pass; Muthuramakrishnan, Venkitasubramaniam; Visconti, Ivan | |
6th International Conference on Security and Cryptography for Networks, SCN 2008 | 1-gen-2008 | Rafail, Ostrovsky; DE PRISCO, Roberto; Visconti, Ivan | |
A Distributed and Secure Architecture for Signature and Decryption Delegation Through Remote Smart Cards | 1-gen-2012 | Cattaneo, Giuseppe; Pompeo, Faruolo; Visconti, Ivan | |
A Format-Independent Architecture for Run-Time Integrity Checking of Executable Code | 1-gen-2003 | Catuogno, Luigi; Visconti, Ivan | |
A Lightweight Security Model for WBEM | 1-gen-2003 | Cattaneo, Giuseppe; Catuogno, Luigi; Umberto Ferraro, Petrillo; Visconti, Ivan | |
A secure and private system for subscription-based remote services | 1-gen-2003 | Persiano, Giuseppe; Visconti, Ivan | |
A Transform for NIZK Almost as Efficient and General as the Fiat-Shamir Transform Without Programmable Random Oracles | 1-gen-2016 | Ciampi, Michele; Persiano, Giuseppe; Siniscalchi, Luisa; Visconti, Ivan | |
An anonymous credential system and a privacy-awake PKI | 1-gen-2003 | Persiano, Giuseppe; Visconti, Ivan | |
An Architecture for Kernel-Level Verification of Executables at Run Time | 1-gen-2004 | Catuogno, Luigi; Visconti, Ivan | |
An Efficient and Usable Multi-Show Non-Transferable Anonymous Credential System | 1-gen-2004 | Persiano, Giuseppe; Visconti, Ivan | |
Anonymizer-Enabled Security and Privacy for RFID | 1-gen-2009 | Ahmad Reza, Sadeghi; Visconti, Ivan; Christian, Wachsmann | |
Anonymous Group Communication in Mobile Networks (Extended Abstract) | 1-gen-2003 | Stelvio, Cimato; D'Arco, Paolo; Visconti, Ivan | |
Black-box constructions of bounded-concurrent secure computation | 1-gen-2020 | Garg, Sanjam; Liang, Xiao; Pandey, Omkant; Visconti, Ivan | |
Black-box non-black-box zero knowledge | 1-gen-2014 | Vipul, Goyal; Rafail, Ostrovsky; Alessandra, Scafuro; Visconti, Ivan | |
Co-sound Zero-Knowledge with Public Keys | 1-gen-2009 | Carmine, Ventre; Visconti, Ivan | |
Collusion-Free Multiparty Computation in the Mediated Model | 1-gen-2009 | Joel, Alwen; Jonathan, Katz; Yehuda, Lindell; Persiano, Giuseppe; Abhi, Shelat; Visconti, Ivan | |
Collusion-Free Protocols in the Mediated Model | 1-gen-2008 | Joel, Alwen; Abhi, Shelat; Visconti, Ivan | |
Completely Non-Malleable Encryption Revisited | 1-gen-2008 | Carmine, Ventre; Visconti, Ivan | |
Concurrent non-malleable commitments (and more) in 3 rounds | 1-gen-2016 | Ciampi, Michele; Ostrovsky, Rafail; Siniscalchi, Luisa; Visconti, Ivan | |
Concurrent Zero Knowledge in the Bounded Player Model | 1-gen-2013 | Vipul, Goyal; Abhishek, Jain; Rafail, Ostrovsky; Silas, Richelson; Visconti, Ivan |