Suivre
Dario Catalano
Dario Catalano
Professor of Computer Science, University of Catania
Adresse e-mail validée de dmi.unict.it
Titre
Citée par
Citée par
Année
Coercion-resistant electronic elections
A Juels, D Catalano, M Jakobsson
Towards Trustworthy Elections, 37-63, 2010
870*2010
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
M Abdalla, M Bellare, D Catalano, E Kiltz, T Kohno, T Lange, ...
Annual International Cryptology Conference, 205-222, 2005
8002005
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
M Abdalla, M Bellare, D Catalano, E Kiltz, T Kohno, T Lange, ...
Journal of cryptology 21, 350-391, 2008
4562008
A simple public-key cryptosystem with a double trapdoor decryption mechanism and its applications
E Bresson, D Catalano, D Pointcheval
International Conference on the Theory and Application of Cryptology and …, 2003
4272003
Vector commitments and their applications
D Catalano, D Fiore
Public-Key Cryptography–PKC 2013: 16th International Conference on Practice …, 2013
3792013
Privacy-preserving fingercode authentication
M Barni, T Bianchi, D Catalano, M Di Raimondo, R Donida Labati, P Failla, ...
Proceedings of the 12th ACM workshop on Multimedia and security, 231-240, 2010
2842010
Contemporary Cryptology (Advanced Courses in Mathematics-CRM Barcelona)
D Catalano, R Cramer, I Damgard, GD Crescenzo, D Pointcheval, ...
Birkhauser, 2005
187*2005
Identity-based encryption gone wild
M Abdalla, D Catalano, AW Dent, J Malone-Lee, G Neven, NP Smart
Automata, Languages and Programming: 33rd International Colloquium, ICALP …, 2006
1722006
Paillier's cryptosystem revisited
D Catalano, R Gennaro, N Howgrave-Graham, PQ Nguyen
Proceedings of the 8th ACM Conference on Computer and Communications …, 2001
1652001
Practical homomorphic MACs for arithmetic circuits
D Catalano, D Fiore
Annual International Conference on the Theory and Applications of …, 2013
1552013
ECRYPT yearly report on algorithms and keysizes
S Babbage, D Catalano, C Cid, B de Weger, O Dunkelman, C Gehrmann, ...
150*2009
A privacy-compliant fingerprint recognition system based on homomorphic encryption and fingercode templates
M Barni, T Bianchi, D Catalano, M Di Raimondo, RD Labati, P Failla, ...
2010 Fourth IEEE International Conference on Biometrics: Theory …, 2010
1452010
Multi-input functional encryption for inner products: Function-hiding realizations and constructions without pairings
M Abdalla, D Catalano, D Fiore, R Gay, B Ursu
Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018
1382018
Practical functional encryption for quadratic functions with applications to predicate encryption
CEZ Baltico, D Catalano, D Fiore, R Gay
Annual International Cryptology Conference, 67-98, 2017
1332017
Homomorphic signatures with efficient verification for polynomial functions
D Catalano, D Fiore, B Warinschi
Annual Cryptology Conference, 371-389, 2014
1272014
Using linearly-homomorphic encryption to evaluate degree-2 functions on encrypted data
D Catalano, D Fiore
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1152015
Efficient network coding signatures in the standard model
D Catalano, D Fiore, B Warinschi
Public Key Cryptography–PKC 2012: 15th International Conference on Practice …, 2012
1152012
Constant round authenticated group key agreement via distributed computation
E Bresson, D Catalano
Public Key Cryptography–PKC 2004: 7th International Workshop on Theory and …, 2004
1062004
Efficient two-party password-based key exchange protocols in the UC framework
M Abdalla, D Catalano, C Chevalier, D Pointcheval
Cryptographers’ Track at the RSA Conference, 335-351, 2008
912008
Bandwidth-efficient threshold EC-DSA
G Castagnos, D Catalano, F Laguillaumie, F Savasta, I Tucker
IACR International Conference on Public-Key Cryptography, 266-296, 2020
872020
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20