Privacy-preserving fingercode authentication M Barni, T Bianchi, D Catalano, M Di Raimondo, R Donida Labati, P Failla, ... Proceedings of the 12th ACM workshop on Multimedia and security, 231-240, 2010 | 287 | 2010 |
Provably secure threshold password-authenticated key exchange M Di Raimondo, R Gennaro Journal of Computer and System Sciences 72 (6), 978-1001, 2006 | 187 | 2006 |
Deniable authentication and key exchange M Di Raimondo, R Gennaro, H Krawczyk Proceedings of the 13th ACM conference on Computer and communications …, 2006 | 164 | 2006 |
A privacy-compliant fingerprint recognition system based on homomorphic encryption and fingercode templates M Barni, T Bianchi, D Catalano, M Di Raimondo, RD Labati, P Failla, ... 2010 fourth IEEE international conference on biometrics: theory …, 2010 | 149 | 2010 |
New approaches for deniable authentication M Di Raimondo, R Gennaro Proceedings of the 12th ACM conference on Computer and communications …, 2005 | 140 | 2005 |
Secure off-the-record messaging M Di Raimondo, R Gennaro, H Krawczyk Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, 81-89, 2005 | 121 | 2005 |
Zero-knowledge sets with short proofs D Catalano, D Fiore, M Messina Annual International Conference on the Theory and Applications of …, 2008 | 76 | 2008 |
Off-line/on-line signatures: Theoretical aspects and experimental results D Catalano, M Di Raimondo, D Fiore, R Gennaro Public Key Cryptography–PKC 2008: 11th International Workshop on Practice …, 2008 | 51 | 2008 |
Mon a: Fast Maliciously Secure Two Party Computation on D Catalano, M Di Raimondo, D Fiore, I Giacomelli IACR International Conference on Public-Key Cryptography, 357-386, 2020 | 24 | 2020 |
Fully non-interactive onion routing with forward secrecy D Catalano, M Di Raimondo, D Fiore, R Gennaro, O Puglisi International journal of information security 12 (1), 33-47, 2013 | 14 | 2013 |
Zero-knowledge sets with short proofs D Catalano, M Di Raimondo, D Fiore, M Messina IEEE transactions on information theory 57 (4), 2488-2502, 2011 | 14 | 2011 |
Fully non-interactive onion routing with forward-secrecy D Catalano, M Di Raimondo, D Fiore, R Gennaro, O Puglisi Applied Cryptography and Network Security: 9th International Conference …, 2011 | 14 | 2011 |
Secure multiplication of shared secrets in the exponent R Gennaro, M Di Raimondo Information processing letters 96 (2), 71-79, 2005 | 5* | 2005 |
Verifiable pattern matching on outsourced texts D Catalano, M Di Raimondo, S Faro Journal of Discrete Algorithms 51, 39-50, 2018 | 4 | 2018 |
Off-line/on-line signatures revisited: a general unifying paradigm, efficient threshold variants and experimental results E Bresson, D Catalano, M Di Raimondo, D Fiore, R Gennaro International journal of information security 12, 439-465, 2013 | 3 | 2013 |
Multiparty computation method I Giacomelli, M Di Raimondo, D Catalano, LI Laura, V Ricci, R Giorgetti US Patent App. 17/777,326, 2022 | 2 | 2022 |
Implementation and Performance Analysis of Homomorphic Signature Schemes D Carnemolla, D Catalano, M Di Raimondo, F Savasta Cryptology ePrint Archive, 2024 | | 2024 |
Advances in Authentication Protocols. M Di Raimondo Universita'degli Studi di Catania, 2006 | | 2006 |
New approaches for deniable authentication M Di Raimondo, R Gennaro ACM Conf. Computer and Communications Security, 112-121, 2005 | | 2005 |