Nelly Fazio

According to our database1, Nelly Fazio authored at least 20 papers between 2002 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Amigo: Secure Group Mesh Messaging in Realistic Protest Settings.
IACR Cryptol. ePrint Arch., 2024

2017
Homomorphic Secret Sharing from Paillier Encryption.
Proceedings of the Provable Security, 2017

2015
Hardness of learning problems over Burnside groups of exponent 3.
Des. Codes Cryptogr., 2015

2014
Combating Insider Attacks in IEEE 802.11 Wireless Networks with Broadcast Encryption.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

2013
Broadcast Steganography.
IACR Cryptol. ePrint Arch., 2013

Hardcore Predicates for a Diffie-Hellman Problem over Finite Fields.
IACR Cryptol. ePrint Arch., 2013

Hard-Core Predicates for a Diffie-Hellman Problem over Finite Fields.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

2012
Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts.
IACR Cryptol. ePrint Arch., 2012

2011
Random Self-Reducibility Properties of Learning Problems over Burnside Groups of Exponent 3.
IACR Cryptol. ePrint Arch., 2011

Generalized Learning Problems and Applications to Non-Commutative Cryptography.
IACR Cryptol. ePrint Arch., 2011

2009
Forward-Secure Hierarchical IBE with Applications to Broadcast Encryption.
Proceedings of the Identity-Based Cryptography, 2009

Dynamic and Efficient Key Management for Access Hierarchies.
ACM Trans. Inf. Syst. Secur., 2009

2008
Tutorial on content protection.
Proceedings of the 16th International Conference on Multimedia 2008, 2008

2007
Traitor Tracing with Optimal Transmission Rate.
Proceedings of the Information Security, 10th International Conference, 2007

2006
On Cryptographic Techniques for Digital Rights Management.
PhD thesis, 2006

Non-interactive Zero-Knowledge from Homomorphic Encryption.
Proceedings of the Theory of Cryptography, Third Theory of Cryptography Conference, 2006

2005
Scalable public-key tracing and revoking.
Distributed Comput., 2005

2004
ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption.
IACR Cryptol. ePrint Arch., 2004

2003
Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack.
IACR Cryptol. ePrint Arch., 2003

2002
Public Key Broadcast Encryption for Stateless Receivers.
Proceedings of the Security and Privacy in Digital Rights Management, 2002


  Loading...