Ivan Visconti
Orcid: 0000-0003-2381-5846Affiliations:
- Sapienza University of Rome, Italy
- Sapienza University of Rome, Italy (former)
- University of Salerno, Italy (former)
According to our database1,
Ivan Visconti
authored at least 115 papers
between 2000 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
On csauthors.net:
Bibliography
2025
J. Cryptol., March, 2025
2024
IEEE Trans. Emerg. Top. Comput., 2024
IACR Cryptol. ePrint Arch., 2024
Proceedings of the Computer Security - ESORICS 2024, 2024
Proceedings of the Sixth Distributed Ledger Technology Workshop (DLT 2024), 2024
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
IEEE Internet Comput., 2023
Proceedings of the 2023 ACM Conference on Information Technology for Social Good, 2023
Proceedings of the Applied Cryptography and Network Security Workshops, 2023
2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the Cryptology and Network Security - 21st International Conference, 2022
2021
Proceedings of the IEEE Symposium on Computers and Communications, 2021
Proceedings of the Financial Cryptography and Data Security, 2021
Proceedings of the Applied Cryptography and Network Security, 2021
2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
TEnK-U: Terrorist Attacks for Fake Exposure Notifications in Contact Tracing Systems.
IACR Cryptol. ePrint Arch., 2020
Towards Defeating Mass Surveillance and SARS-CoV-2: The Pronto-C2 Fully Decentralized Automatic Contact Tracing System.
IACR Cryptol. ePrint Arch., 2020
2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019
2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
2017
Delayed-Input Non-Malleable Zero Knowledge and Multi-Party Coin Tossing in Four Rounds.
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Universally Composable Secure Two and Multi-party Computation in the Corruptible Tamper-Proof Hardware Token Model.
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017
Proceedings of the Unveiling Dynamics and Complexity, 2017
2016
IACR Cryptol. ePrint Arch., 2016
New Feasibility Results in Unconditional UC-Secure Computation with (Malicious) PUFs.
IACR Cryptol. ePrint Arch., 2016
2015
A Transform for NIZK Almost as Efficient and General as the Fiat-Shamir Transform Without Programmable Random Oracles.
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015
2014
Secur. Commun. Networks, 2014
Impossibility Results for Leakage-Resilient Zero Knowledge and Multi-Party Computation.
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Theory of Cryptography - 11th Theory of Cryptography Conference, 2014
Proceedings of the Security and Cryptography for Networks - 9th International Conference, 2014
Proceedings of the Automata, Languages, and Programming - 41st International Colloquium, 2014
2013
J. Comput. Secur., 2013
Inf. Secur. Tech. Rep., 2013
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013
Proceedings of the 54th Annual IEEE Symposium on Foundations of Computer Science, 2013
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013
2012
Universally Composable Secure Computation with (Malicious) Physically Uncloneable Functions.
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Electron. Colloquium Comput. Complex., 2012
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012
Proceedings of the Automata, Languages, and Programming - 39th International Colloquium, 2012
Proceedings of the 53rd Annual IEEE Symposium on Foundations of Computer Science, 2012
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012
2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Topics in Cryptology - CT-RSA 2011, 2011
2010
Proceedings of the Towards Hardware-Intrinsic Security - Foundations and Practice, 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 2010
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010
Constant-Round Concurrent Non-Malleable Statistically Binding Commitments and Decommitments.
Proceedings of the Public Key Cryptography, 2010
Proceedings of the Financial Cryptography and Data Security, 2010
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010
2009
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009
Proceedings of the Privacy in Location-Based Applications, 2009
Proceedings of the Advances in Cryptology, 2009
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009
Proceedings of the Algorithmic Aspects of Wireless Sensor Networks, 2009
Proceedings of the Progress in Cryptology, 2009
2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Public Key Cryptography, 2008
Proceedings of the Automata, Languages and Programming, 35th International Colloquium, 2008
Proceedings of the 1st International Workshop on Privacy in Location-Based Applications, 2008
Proceedings of the Computer Security, 2008
Proceedings of the Advances in Cryptology, 2008
2007
Theor. Comput. Sci., 2007
On Defining Proofs of Knowledge in the Bare Public Key Model.
Proceedings of the Theoretical Computer Science, 10th Italian Conference, 2007
2006
IACR Cryptol. ePrint Arch., 2006
Electron. Colloquium Comput. Complex., 2006
Proceedings of the Theory of Cryptography, Third Theory of Cryptography Conference, 2006
On Non-Interactive Zero-Knowledge Proofs of Knowledge in the Shared Random String Model.
Proceedings of the Mathematical Foundations of Computer Science 2006, 2006
Proceedings of the Automata, Languages and Programming, 33rd International Colloquium, 2006
2005
Proceedings of the Trust, 2005
Proceedings of the Automata, Languages and Programming, 32nd International Colloquium, 2005
Proceedings of the Automata, Languages and Programming, 32nd International Colloquium, 2005
Proceedings of the Automata, Languages and Programming, 32nd International Colloquium, 2005
Proceedings of the Advances in Cryptology, 2005
2004
Comput. J., 2004
Proceedings of the Grid and Cooperative Computing, 2004
Proceedings of the Financial Cryptography, 2004
Constant-Round Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key Model.
Proceedings of the Advances in Cryptology, 2004
Proceedings of the Advances in Cryptology, 2004
2003
ACM Trans. Inf. Syst. Secur., 2003
Proceedings of the On The Move to Meaningful Internet Systems 2003: OTM 2003 Workshops, 2003
Proceedings of the Theoretical Computer Science, 8th Italian Conference, 2003
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003
2002
A Format-Independent Architecture for Run-Time Integrity Checking of Executable Code.
Proceedings of the Security in Communication Networks, Third International Conference, 2002
2000
User privacy issues regarding certificates and the TLS protocol: the design and implementation of the SPSL protocol.
Proceedings of the CCS 2000, 2000