Giovanni Di Crescenzo
Orcid: 0000-0002-5138-1144
According to our database1,
Giovanni Di Crescenzo
authored at least 156 papers
between 1993 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Energy-efficient Hardening of the SEDIMENT Methodology for Scalable IoT Network Security.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024
Proceedings of the 2024 on Cloud Computing Security Workshop, 2024
2023
Proceedings of the 20th International Conference on Security and Cryptography, 2023
An Efficient Small Modulus Test and Its Applications to Delegated Computation Without Preprocessing.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2023
Single-Server Batch Delegation of Variable-Input Pairings with Unbounded Client Lifetime.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023
2022
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2022
Proceedings of the Developments in Language Theory - 26th International Conference, 2022
Single-Server Delegation of Small-Exponent Exponentiation from Quasilinear-Time Clients and Applications.
Proceedings of the 4th Workshop on CPS & IoT Security and Privacy, 2022
2021
Proceedings of the 14th International Conference on Security of Information and Networks, 2021
Proceedings of the Data and Applications Security and Privacy XXXV, 2021
2020
Efficient and Secure Delegation of Exponentiation in General Groups to a Single Malicious Server.
Math. Comput. Sci., 2020
Delegating a Product of Group Exponentiations with Application to Signature Schemes (Submission to Special NutMiC 2019 Issue of JMC).
J. Math. Cryptol., 2020
Proceedings of the SIN 2020: 13th International Conference on Security of Information and Networks, 2020
Encrypted-Input Program Obfuscation: Simultaneous Security Against White-Box and Black-Box Attacks.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020
Securing Classifiers Against Both White-Box and Black-Box Attacks using Encrypted-Input Obfuscation.
Proceedings of the CCSW'20, 2020
Proceedings of the Smart Card Research and Advanced Applications, 2020
Proceedings of the Applied Cryptography and Network Security, 2020
2019
Logic Locking of Boolean Circuits: Provable Hardware-Based Obfuscation from a Tamper-Proof Memory.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2019
Secure Deterministic Automata Evaluation: Completeness and Efficient 2-party Protocols.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2019
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019
2018
Intrusion-Resilient Classifier Approximation: From Wildcard Matching to Range Membership.
Proceedings of the 17th IEEE International Conference On Trust, 2018
Efficient and Secure Delegation to a Single Malicious Server: Exponentiation over Non-abelian Groups.
Proceedings of the Mathematical Software - ICMS 2018, 2018
Proceedings of the Information and Communications Security - 20th International Conference, 2018
Proceedings of the Foundations and Practice of Security - 11th International Symposium, 2018
Proceedings of the 8th International Conference on Cloud Computing and Services Science, 2018
2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the 2017 International Conference on High Performance Computing & Simulation, 2017
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2017
Computing multiple exponentiations in discrete log and RSA groups: From batch verification to batch delegation.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
Boolean Circuit Camouflage: Cryptographic Models, Limitations, Provable Results and a Random Oracle Realization.
Proceedings of the 2017 Workshop on Attacks and Solutions in Hardware Security, 2017
Practical and Secure Outsourcing of Discrete Log Group Exponentiation to a Single Malicious Server.
Proceedings of the 9th Cloud Computing Security Workshop, 2017
2016
J. Comput. Secur., 2016
Proceedings of the International Conference on High Performance Computing & Simulation, 2016
Enhanced Functionality and Confidentiality for Database Search and Publish/Subscribe Protocols.
Proceedings of the Data and Applications Security and Privacy XXX, 2016
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Network and System Security - 9th International Conference, 2015
Proceedings of the Mathematical Foundations of Computer Science 2015, 2015
Proceedings of the Data and Applications Security and Privacy XXIX, 2015
2014
Proceedings of the Financial Cryptography and Data Security, 2014
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014
Practical Private Information Retrieval from a Time-Varying, Multi-attribute, and Multiple-Occurrence Database.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014
2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013
2012
Non-Interactive Detection of Malicious Vehicular Network Data.
J. Cyber Secur. Mobil., 2012
Proceedings of the Mathematical Foundations of Computer Science 2012, 2012
Proceedings of IEEE International Conference on Communications, 2012
Proceedings of IEEE International Conference on Communications, 2012
2011
Anonymity notions and techniques for public-key infrastructures in vehicular networks.
Secur. Commun. Networks, 2011
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011
Proceedings of the Computing and Combinatorics - 17th Annual International Conference, 2011
2010
Proceedings of the Second IEEE Vehicular Networking Conference, 2010
Analysis of Certificate Revocation List Distribution Protocols for Vehicular Networks.
Proceedings of the Global Communications Conference, 2010
Proceedings of the 6th Workshop on Digital Identity Management, 2010
2009
IEEE Trans. Inf. Forensics Secur., 2009
Proceedings of the Wireless Algorithms, 2009
Proceedings of the Unconventional Computation, 8th International Conference, 2009
Proceedings of the Computer Science, 2009
Minimal Assumptions and Round Complexity for Concurrent Zero-Knowledge in the Bare Public-Key Model.
Proceedings of the Computing and Combinatorics, 15th Annual International Conference, 2009
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009
2008
SIAM J. Comput., 2008
A secure virtual point of service for purchasing digital media content over 3G wireless networks.
Secur. Commun. Networks, 2008
IEEE Commun. Mag., 2008
On the Security of Beth's Identification Schemes against Active and Concurrent Adversaries.
Proceedings of the Mathematical Methods in Computer Science, 2008
Proceedings of the Protecting Persons While Protecting the People, 2008
Proceedings of the Algorithms and Computation, 19th International Symposium, 2008
Proceedings of the Logic and Theory of Algorithms, 2008
2007
Threshold cryptography in mobile ad hoc networks under minimal topology and setup assumptions.
Ad Hoc Networks, 2007
Proceedings of the IEEE 4th International Conference on Mobile Adhoc and Sensor Systems, 2007
Proceedings of the Progress in Cryptology, 2007
On Defining Proofs of Knowledge in the Bare Public Key Model.
Proceedings of the Theoretical Computer Science, 10th Italian Conference, 2007
Proceedings of the 2007 Workshop on Digital Identity Management, 2007
2006
IEEE Trans. Inf. Forensics Secur., 2006
IEEE J. Sel. Areas Commun., 2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Second Workshop on Cryptography for Ad-hoc Networks, 2006
Proceedings of the Second Workshop on Cryptography for Ad-hoc Networks, 2006
Proceedings of the 2006 International Symposium on a World of Wireless, 2006
Proceedings of the 2006 ACM Workshop on Rapid Malcode, 2006
Proceedings of the Theory of Cryptography, Third Theory of Cryptography Conference, 2006
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2006
Proceedings of the 14th European Signal Processing Conference, 2006
2005
Proceedings of the 2005 ACM Workshop On Storage Security And Survivability, 2005
Proceedings of the 3rd ACM Workshop on Security of ad hoc and Sensor Networks, 2005
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005
Proceedings of the Automata, Languages and Programming, 32nd International Colloquium, 2005
Proceedings of the Automata, Languages and Programming, 32nd International Colloquium, 2005
Proceedings of the Financial Cryptography and Data Security, 2005
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005
Contemporary cryptology.
Advanced courses in mathematics : CRM Barcelona, Birkhäuser, ISBN: 978-3-7643-7294-1, 2005
2004
Proceedings of the Trust and Privacy in Digital Business, First International Conference, 2004
Proceedings of the Security in Communication Networks, 4th International Conference, 2004
On NC<sup>1</sup> Boolean Circuit Composition of Non-interactive Perfect Zero-Knowledge.
Proceedings of the Mathematical Foundations of Computer Science 2004, 2004
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004
Constant-Round Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key Model.
Proceedings of the Advances in Cryptology, 2004
Proceedings of the Color Imaging IX: Processing, Hardcopy, and Applications, San Jose, 2004
Proceedings of the Advances in Cryptology, 2004
2003
2002
Proceedings of the Security in Communication Networks, Third International Conference, 2002
Proceedings of the Security in Communication Networks, Third International Conference, 2002
Proceedings of the Randomization and Approximation Techniques, 6th International Workshop, 2002
Proceedings of the IEEE International Conference on Communications, 2002
2001
IACR Cryptol. ePrint Arch., 2001
Sharing One Secret vs. Sharing Many Secrets: Tight Bounds for the Max Improvement Ratio.
Proceedings of the Mathematical Foundations of Computer Science 2001, 2001
Proceedings of the Information Security, 4th International Conference, 2001
Proceedings of the Advances in Cryptology, 2001
2000
Proceedings of the Thirty-Second Annual ACM Symposium on Theory of Computing, 2000
Sharing one secret vs. sharing many secrets: tight bounds on the average improvement ratio.
Proceedings of the Eleventh Annual ACM-SIAM Symposium on Discrete Algorithms, 2000
Necessary and Sufficient Assumptions for Non-iterative Zero-Knowledge Proofs of Knowledge for All NP Relations.
Proceedings of the Automata, Languages and Programming, 27th International Colloquium, 2000
Proceedings of the Advances in Cryptology, 2000
Proceedings of the Computing and Combinatorics, 6th Annual International Conference, 2000
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000
1999
Inf. Process. Lett., 1999
Proceedings of the Thirty-First Annual ACM Symposium on Theory of Computing, 1999
Proceedings of the Tenth Annual ACM-SIAM Symposium on Discrete Algorithms, 1999
Proceedings of the Automata, 1999
Proceedings of the Advances in Cryptology, 1999
Proceedings of the Advances in Cryptology, 1999
1998
IACR Cryptol. ePrint Arch., 1998
IACR Cryptol. ePrint Arch., 1998
Electron. Colloquium Comput. Complex., 1998
Proceedings of the Thirtieth Annual ACM Symposium on the Theory of Computing, 1998
Result-Indistinguishable Zero-Knowledge Proofs: Increased Power and Constant-Round Protocols.
Proceedings of the STACS 98, 1998
Universal Service-Providers for Database Private Information Retrieval (Extended Abstract).
Proceedings of the Seventeenth Annual ACM Symposium on Principles of Distributed Computing, 1998
Checking Programs Discreetly: Demonstrating Result-Correctness Efficiently while Concealing it.
Proceedings of the Algorithms and Computation, 9th International Symposium, 1998
Proceedings of the Automata, Languages and Programming, 25th International Colloquium, 1998
Proceedings of the 13th Annual IEEE Conference on Computational Complexity, 1998
Proceedings of the CCS '98, 1998
1997
Proceedings of the Information and Communication Security, First International Conference, 1997
Proceedings of the Automata, Languages and Programming, 24th International Colloquium, 1997
Proceedings of the Advances in Cryptology, 1997
1995
Proceedings of the Advances in Cryptology, 1995
Proceedings of the Advances in Cryptology, 1995
1994
Theor. Comput. Sci., 1994
Proceedings of the 35th Annual Symposium on Foundations of Computer Science, 1994
Proceedings of the Advances in Cryptology, 1994
Proceedings of the Algorithms and Complexity, Second Italian Conference, 1994
Multiplicative Non-abelian Sharing Schemes and their Application to Threshold Cryptography.
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994
1993
Proceedings of the Advances in Cryptology, 1993