Privacy-preserving fingercode authentication M Barni, T Bianchi, D Catalano, M Di Raimondo, R Donida Labati, P Failla, ... Proceedings of the 12th ACM workshop on Multimedia and security, 231-240, 2010 | 226 | 2010 |
Provably secure threshold password-authenticated key exchange M Di Raimondo, R Gennaro International Conference on the Theory and Applications of Cryptographic …, 2003 | 151 | 2003 |
Deniable authentication and key exchange M Di Raimondo, R Gennaro, H Krawczyk Proceedings of the 13th ACM conference on Computer and communications …, 2006 | 123 | 2006 |
A privacy-compliant fingerprint recognition system based on homomorphic encryption and fingercode templates M Barni, T Bianchi, D Catalano, M Di Raimondo, RD Labati, P Failla, ... 2010 Fourth IEEE International Conference on Biometrics: Theory …, 2010 | 118 | 2010 |
New approaches for deniable authentication M Di Raimondo, R Gennaro Journal of cryptology 22 (4), 572-615, 2009 | 114 | 2009 |
New approaches for deniable authentication M Di Raimondo, R Gennaro ACM Conf. Computer and Communications Security, 112-121, 2005 | 114* | 2005 |
Secure off-the-record messaging M Di Raimondo, R Gennaro, H Krawczyk Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, 81-89, 2005 | 84 | 2005 |
Zero-knowledge sets with short proofs D Catalano, D Fiore, M Messina Annual International Conference on the Theory and Applications of …, 2008 | 55 | 2008 |
Off-line/on-line signatures: Theoretical aspects and experimental results D Catalano, M Di Raimondo, D Fiore, R Gennaro International Workshop on Public Key Cryptography, 101-120, 2008 | 47 | 2008 |
Provably secure threshold password-authenticated key exchange M Di Raimondo, R Gennaro Journal of Computer and System Sciences 72 (6), 978-1001, 2006 | 40 | 2006 |
Fully non-interactive onion routing with forward-secrecy D Catalano, M Di Raimondo, D Fiore, R Gennaro, O Puglisi International Conference on Applied Cryptography and Network Security, 255-273, 2011 | 12 | 2011 |
Fully non-interactive onion routing with forward secrecy D Catalano, M Di Raimondo, D Fiore, R Gennaro, O Puglisi International journal of information security 12 (1), 33-47, 2013 | 10 | 2013 |
Zero-knowledge sets with short proofs D Catalano, M Di Raimondo, D Fiore, M Messina IEEE transactions on information theory 57 (4), 2488-2502, 2011 | 10 | 2011 |
Mona: Fast Maliciously Secure Two Party Computation on D Catalano, M Di Raimondo, D Fiore, I Giacomelli IACR International Conference on Public-Key Cryptography, 357-386, 2020 | 5 | 2020 |
Off-line/on-line signatures revisited: a general unifying paradigm, efficient threshold variants and experimental results E Bresson, D Catalano, M Di Raimondo, D Fiore, R Gennaro International journal of information security 12 (6), 439-465, 2013 | 3 | 2013 |
Secure multiplication of shared secrets in the exponent R Gennaro, M Di Raimondo Information processing letters 96 (2), 71-79, 2005 | 3* | 2005 |
Verifiable pattern matching on outsourced texts D Catalano, M Di Raimondo, S Faro Journal of Discrete Algorithms 51, 39-50, 2018 | 2 | 2018 |
Advances in Authentication Protocols. M Di Raimondo Universita'degli Studi di Catania, 2006 | | 2006 |