Dario Catalano
Dario Catalano
Professor of Computer Science, University of Catania
Bestätigte E-Mail-Adresse bei dmi.unict.it
Titel
Zitiert von
Zitiert von
Jahr
Coercion-resistant electronic elections
A Juels, D Catalano, M Jakobsson
Towards Trustworthy Elections, 37-63, 2010
7092010
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
M Abdalla, M Bellare, D Catalano, E Kiltz, T Kohno, T Lange, ...
Annual International Cryptology Conference, 205-222, 2005
6512005
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
M Abdalla, M Bellare, D Catalano, E Kiltz, T Kohno, T Lange, ...
Journal of cryptology 21 (3), 350-391, 2008
3912008
A simple public-key cryptosystem with a double trapdoor decryption mechanism and its applications
E Bresson, D Catalano, D Pointcheval
International Conference on the Theory and Application of Cryptology and …, 2003
2672003
Privacy-preserving fingercode authentication
M Barni, T Bianchi, D Catalano, M Di Raimondo, R Donida Labati, P Failla, ...
Proceedings of the 12th ACM workshop on Multimedia and security, 231-240, 2010
2262010
Vector commitments and their applications
D Catalano, D Fiore
International Workshop on Public Key Cryptography, 55-72, 2013
1762013
Paillier's cryptosystem revisited
D Catalano, R Gennaro, N Howgrave-Graham, PQ Nguyen
Proceedings of the 8th ACM Conference on Computer and Communications …, 2001
1452001
Identity-based encryption gone wild
M Abdalla, D Catalano, AW Dent, J Malone-Lee, G Neven, NP Smart
International Colloquium on Automata, Languages, and Programming, 300-311, 2006
1432006
A privacy-compliant fingerprint recognition system based on homomorphic encryption and fingercode templates
M Barni, T Bianchi, D Catalano, M Di Raimondo, RD Labati, P Failla, ...
2010 Fourth IEEE International Conference on Biometrics: Theory …, 2010
1182010
ECRYPT II yearly report on algorithms and keysizes (2011–2012)
N Smart, S Babbage, D Catalano, C Cid, B Weger, O Dunkelman, M Ward
European Network of Excellence in Cryptology (ECRYPT II), 2012
115*2012
Practical homomorphic MACs for arithmetic circuits
D Catalano, D Fiore
Annual International Conference on the Theory and Applications of …, 2013
1082013
Efficient network coding signatures in the standard model
D Catalano, D Fiore, B Warinschi
International Workshop on Public Key Cryptography, 680-696, 2012
932012
Constant round authenticated group key agreement via distributed computation
E Bresson, D Catalano
International Workshop on Public Key Cryptography, 115-129, 2004
932004
Homomorphic signatures with efficient verification for polynomial functions
D Catalano, D Fiore, B Warinschi
Annual Cryptology Conference, 371-389, 2014
892014
Using linearly-homomorphic encryption to evaluate degree-2 functions on encrypted data
D Catalano, D Fiore
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
792015
Efficient two-party password-based key exchange protocols in the UC framework
M Abdalla, D Catalano, C Chevalier, D Pointcheval
Cryptographers’ Track at the RSA Conference, 335-351, 2008
742008
Computing inverses over a shared secret modulus
D Catalano, R Gennaro, S Halevi
International Conference on the Theory and Applications of Cryptographic …, 2000
682000
Practical functional encryption for quadratic functions with applications to predicate encryption
CEZ Baltico, D Catalano, D Fiore, R Gay
Annual International Cryptology Conference, 67-98, 2017
652017
The bit security of Paillier’s encryption scheme and its applications
D Catalano, R Gennaro, N Howgrave-Graham
International Conference on the Theory and Applications of Cryptographic …, 2001
632001
Adaptive pseudo-free groups and applications
D Catalano, D Fiore, B Warinschi
Annual International Conference on the Theory and Applications of …, 2011
572011
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20