Dario Fiore
Dario Fiore
Associate Research Professor, IMDEA Software Institute
Dirección de correo verificada de imdea.org - Página principal
TítuloCitado porAño
Publicly verifiable delegation of large polynomials and matrix computations, with applications
D Fiore, R Gennaro
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
2162012
Privacy-preserving fingercode authentication
M Barni, T Bianchi, D Catalano, M Di Raimondo, R Donida Labati, P Failla, ...
Proceedings of the 12th ACM workshop on Multimedia and security, 231-240, 2010
2012010
Verifiable delegation of computation on outsourced data
M Backes, D Fiore, RM Reischuk
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1732013
Vector Commitments and their Applications
D Catalano, D Fiore
Public Key Cryptography--PKC 2013 7778, 55-72, 0
133*
Efficiently verifiable computation on encrypted data
D Fiore, R Gennaro, V Pastro
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
1312014
A privacy-compliant fingerprint recognition system based on homomorphic encryption and fingercode templates
M Barni, T Bianchi, D Catalano, M Di Raimondo, RD Labati, P Failla, ...
2010 Fourth IEEE International Conference on Biometrics: Theory …, 2010
1032010
Practical homomorphic MACs for arithmetic circuits
D Catalano, D Fiore
Annual International Conference on the Theory and Applications of …, 2013
952013
Efficient network coding signatures in the standard model
D Catalano, D Fiore, B Warinschi
International Workshop on Public Key Cryptography, 680-696, 2012
882012
Homomorphic signatures with efficient verification for polynomial functions
D Catalano, D Fiore, B Warinschi
Annual Cryptology Conference, 371-389, 2014
872014
ADSNARK: Nearly Practical and Privacy-Preserving Proofs on Authenticated Data
M Backes, M Barbosa, D Fiore, RM Reischuk
https://eprint.iacr.org/2014/617/, 0
82*
Making the diffie-hellman protocol identity-based
D Fiore, R Gennaro
Cryptographers’ Track at the RSA Conference, 165-178, 2010
682010
Using linearly-homomorphic encryption to evaluate degree-2 functions on encrypted data
D Catalano, D Fiore
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
662015
Adaptive pseudo-free groups and applications
D Catalano, D Fiore, B Warinschi
Annual International Conference on the Theory and Applications of …, 2011
552011
Algebraic (trapdoor) one-way functions and their applications
D Catalano, D Fiore, R Gennaro, K Vamvourellis
Theory of Cryptography, 680-699, 2013
522013
Zero-knowledge sets with short proofs
D Catalano, D Fiore, M Messina
Advances in Cryptology–EUROCRYPT 2008, 433-450, 2008
492008
Verifiable random functions from identity-based key encapsulation
M Abdalla, D Catalano, D Fiore
Annual International Conference on the Theory and Applications of …, 2009
472009
Off-line/on-line signatures: theoretical aspects and experimental results
D Catalano, M Di Raimondo, D Fiore, R Gennaro
International Workshop on Public Key Cryptography, 101-120, 2008
452008
Automated analysis of cryptographic assumptions in generic group models
G Barthe, E Fagerholm, D Fiore, J Mitchell, A Scedrov, B Schmidt
Annual Cryptology Conference, 95-112, 2014
392014
Generalizing homomorphic MACs for arithmetic circuits
D Catalano, D Fiore, R Gennaro, L Nizzardo
International Workshop on Public Key Cryptography, 538-555, 2014
392014
Verifiable random functions: Relations to identity-based key encapsulation and new constructions
M Abdalla, D Catalano, D Fiore
Journal of Cryptology 27 (3), 544-593, 2014
372014
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20