[go: up one dir, main page]

Follow
Dario Catalano
Dario Catalano
Professor of Computer Science, University of Catania
Verified email at dmi.unict.it
Title
Cited by
Cited by
Year
Coercion-resistant electronic elections
A Juels, D Catalano, M Jakobsson
Towards Trustworthy Elections, 37-63, 2010
991*2010
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
M Abdalla, M Bellare, D Catalano, E Kiltz, T Kohno, T Lange, ...
Annual International Cryptology Conference, 205-222, 2005
8322005
Vector commitments and their applications
D Catalano, D Fiore
International Workshop on Public Key Cryptography, 55-72, 2013
5242013
A simple public-key cryptosystem with a double trapdoor decryption mechanism and its applications
E Bresson, D Catalano, D Pointcheval
International Conference on the Theory and Application of Cryptology and …, 2003
4752003
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
M Abdalla, M Bellare, D Catalano, E Kiltz, T Kohno, T Lange, ...
Journal of cryptology 21 (3), 350-391, 2008
4692008
Privacy-preserving fingercode authentication
M Barni, T Bianchi, D Catalano, M Di Raimondo, R Donida Labati, P Failla, ...
Proceedings of the 12th ACM workshop on Multimedia and security, 231-240, 2010
2942010
Multi-input functional encryption for inner products: Function-hiding realizations and constructions without pairings
M Abdalla, D Catalano, D Fiore, R Gay, B Ursu
Annual International Cryptology Conference, 597-627, 2018
2042018
Practical homomorphic MACs for arithmetic circuits
D Catalano, D Fiore
Annual International Conference on the Theory and Applications of …, 2013
1872013
Practical functional encryption for quadratic functions with applications to predicate encryption
CEZ Baltico, D Catalano, D Fiore, R Gay
Annual International Cryptology Conference, 67-98, 2017
1792017
Paillier's cryptosystem revisited
D Catalano, R Gennaro, N Howgrave-Graham, PQ Nguyen
Proceedings of the 8th ACM Conference on Computer and Communications …, 2001
1772001
Identity-based encryption gone wild
M Abdalla, D Catalano, AW Dent, J Malone-Lee, G Neven, NP Smart
International Colloquium on Automata, Languages, and Programming, 300-311, 2006
1752006
A privacy-compliant fingerprint recognition system based on homomorphic encryption and fingercode templates
M Barni, T Bianchi, D Catalano, M Di Raimondo, RD Labati, P Failla, ...
2010 fourth IEEE international conference on biometrics: theory …, 2010
1612010
ECRYPT yearly report on algorithms and keysizes
S Babbage, D Catalano, C Cid, B de Weger, O Dunkelman, C Gehrmann, ...
150*2009
Homomorphic signatures with efficient verification for polynomial functions
D Catalano, D Fiore, B Warinschi
Annual Cryptology Conference, 371-389, 2014
1412014
Bandwidth-efficient threshold EC-DSA
G Castagnos, D Catalano, F Laguillaumie, F Savasta, I Tucker
IACR International Conference on Public-Key Cryptography, 266-296, 2020
1352020
Using linearly-homomorphic encryption to evaluate degree-2 functions on encrypted data
D Catalano, D Fiore
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1342015
Efficient network coding signatures in the standard model
D Catalano, D Fiore, B Warinschi
International Workshop on Public Key Cryptography, 680-696, 2012
1242012
Two-party ECDSA from hash proof systems and efficient instantiations
G Castagnos, D Catalano, F Laguillaumie, F Savasta, I Tucker
Annual International Cryptology Conference, 191-221, 2019
1202019
Inner-product functional encryption with fine-grained access control
M Abdalla, D Catalano, R Gay, B Ursu
International Conference on the Theory and Application of Cryptology and …, 2020
1132020
Constant round authenticated group key agreement via distributed computation
E Bresson, D Catalano
International Workshop on Public Key Cryptography, 115-129, 2004
1092004
The system can't perform the operation now. Try again later.
Articles 1–20