| Public key encryption with keyword search D Boneh, G Di Crescenzo, R Ostrovsky, G Persiano International conference on the theory and applications of cryptographic …, 2004 | 4500 | 2004 |
| Halftone visual cryptography Z Zhou, GR Arce, G Di Crescenzo IEEE transactions on image processing 15 (8), 2441-2453, 2006 | 596 | 2006 |
| Robust non-interactive zero knowledge A De Santis, G Di Crescenzo, R Ostrovsky, G Persiano, A Sahai Annual International Cryptology Conference, 566-598, 2001 | 425 | 2001 |
| Halftone visual cryptography via error diffusion Z Wang, GR Arce, G Di Crescenzo IEEE transactions on information forensics and security 4 (3), 383-396, 2009 | 361 | 2009 |
| Non-interactive and non-malleable commitment G Di Crescenzo, Y Ishai, R Ostrovsky Proceedings of the thirtieth annual ACM symposium on Theory of computing …, 1998 | 233 | 1998 |
| Single database private information retrieval implies oblivious transfer G Di Crescenzo, T Malkin, R Ostrovsky International Conference on the Theory and Applications of Cryptographic …, 2000 | 232 | 2000 |
| Perfectly secure password protocols in the bounded retrieval model G Di Crescenzo, R Lipton, S Walfish Theory of Cryptography Conference, 225-244, 2006 | 190 | 2006 |
| Providing secure, instantaneous, directory-integrated, multiparty, communications services C Chung, S Dalal, G Crescenzo, R Graveman, M Long, G Patton, H Shim US Patent App. 10/002,882, 2002 | 186 | 2002 |
| On monotone formula closure of SZK A De Santis, G Di Crescenzo, G Persiano, M Yung Proceedings 35th Annual Symposium on Foundations of Computer Science, 454-465, 1994 | 184 | 1994 |
| Conditional oblivious transfer and timed-release encryption G Di Crescenzo, R Ostrovsky, S Rajagopalan International Conference on the Theory and Applications of Cryptographic …, 1999 | 178 | 1999 |
| Efficient and non-interactive non-malleable commitment G Di Crescenzo, J Katz, R Ostrovsky, A Smith International Conference on the Theory and Applications of Cryptographic …, 2001 | 165 | 2001 |
| Public key encryption with searchable keywords based on jacobi symbols G Di Crescenzo, V Saraswat International conference on cryptology in India, 282-296, 2007 | 160 | 2007 |
| Multi-secret sharing schemes C Blundo, A De Santis, G Di Crescenzo, AG Gaggia, U Vaccaro Annual International Cryptology Conference, 150-163, 1994 | 156 | 1994 |
| Method and system for secure session establishment using identity-based encryption (VDTLS) G Di Crescenzo, S Pietrowicz, HS Shim, T Zhang US Patent 9,094,206, 2015 | 134 | 2015 |
| Universal service-providers for database private information retrieval G Di-Crescenzo, Y Ishai, R Ostrovsky Proceedings of the seventeenth annual ACM symposium on Principles of …, 1998 | 132 | 1998 |
| How to forget a secret G Di Crescenzo, N Ferguson, R Impagliazzo, M Jakobsson Annual Symposium on Theoretical Aspects of Computer Science, 500-509, 1999 | 116 | 1999 |
| On concurrent zero-knowledge with pre-processing G Di Crescenzo, R Ostrovsky Annual International Cryptology Conference, 485-502, 1999 | 77 | 1999 |
| Vehicle segment certificate management using short-lived, unlinked certificate schemes S Pietrowicz, G Di Crescenzo, RG White, T Zhang US Patent 8,171,283, 2012 | 72 | 2012 |
| Constant-round resettable zero knowledge with concurrent soundness in the bare public-key model G Di Crescenzo, G Persiano, I Visconti Annual International Cryptology Conference, 237-253, 2004 | 72 | 2004 |
| Multiplicative non-abelian sharing schemes and their application to threshold cryptography Y Desmedt, G Di Crescenzo, M Burmester International Conference on the Theory and Application of Cryptology, 19-32, 1994 | 71 | 1994 |