[go: up one dir, main page]

Follow
Giulio Malavolta
Giulio Malavolta
Verified email at unibocconi.it - Homepage
Title
Cited by
Cited by
Year
Anonymous multi-hop locks for blockchain scalability and interoperability
G Malavolta, P Moreno-Sanchez, C Schneidewind, A Kate, M Maffei
Cryptology ePrint Archive, 2018
4372018
Concurrency and privacy with payment-channel networks
G Malavolta, P Moreno-Sanchez, A Kate, M Maffei, S Ravi
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
3972017
Silentwhispers: Enforcing security and privacy in decentralized credit networks
G Malavolta, P Moreno-Sanchez, A Kate, M Maffei
Cryptology ePrint Archive, 2016
2312016
Homomorphic time-lock puzzles and applications
G Malavolta, SAK Thyagarajan
Annual International Cryptology Conference, 620-649, 2019
1732019
Universal atomic swaps: Secure exchange of coins across all blockchains
SAK Thyagarajan, G Malavolta, P Moreno-Sanchez
2022 IEEE symposium on security and privacy (SP), 1299-1316, 2022
1712022
Trapdoor hash functions and their applications
N Döttling, S Garg, Y Ishai, G Malavolta, T Mour, R Ostrovsky
Annual International Cryptology Conference, 3-32, 2019
1662019
Subvector commitments with application to succinct arguments
RWF Lai, G Malavolta
Annual International Cryptology Conference, 530-560, 2019
1522019
Leveraging linear decryption: Rate-1 fully-homomorphic encryption and time-lock puzzles
Z Brakerski, N Döttling, S Garg, G Malavolta
Theory of Cryptography Conference, 407-437, 2019
1412019
Lattice-based SNARKs: publicly verifiable, preprocessing, and recursively composable
MR Albrecht, V Cini, RWF Lai, G Malavolta, SAK Thyagarajan
Annual International Cryptology Conference, 102-132, 2022
1152022
Factoring and pairings are not necessary for io: Circular-secure lwe suffices
Z Brakerski, N Döttling, S Garg, G Malavolta
Cryptology ePrint Archive, 2020
1092020
Candidate iO from homomorphic encryption schemes
Z Brakerski, N Döttling, S Garg, G Malavolta
Journal of Cryptology 36 (3), 27, 2023
1062023
Privacy and access control for outsourced personal records
M Maffei, G Malavolta, M Reinert, D Schröder
2015 IEEE Symposium on Security and Privacy, 341-358, 2015
1042015
Efficient unlinkable sanitizable signatures from signatures with re-randomizable keys
N Fleischhacker, J Krupp, G Malavolta, J Schneider, D Schröder, ...
Public-Key Cryptography–PKC 2016: 19th IACR International Conference on …, 2016
1022016
Verifiable timed signatures made practical
SAK Thyagarajan, A Bhat, G Malavolta, N Döttling, A Kate, D Schröder
Proceedings of the 2020 ACM SIGSAC conference on computer and communications …, 2020
942020
Multi-key fully-homomorphic encryption in the plain model
P Ananth, A Jain, Z Jin, G Malavolta
Theory of Cryptography Conference, 28-57, 2020
732020
Verifiable timed linkable ring signatures for scalable payments for monero
SAK Thyagarajan, G Malavolta, F Schmid, D Schröder
European Symposium on Research in Computer Security, 467-486, 2022
61*2022
Efficient registration-based encryption
N Glaeser, D Kolonelos, G Malavolta, A Rahimi
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
582023
Statistical zaps and new oblivious transfer protocols
V Goyal, A Jain, Z Jin, G Malavolta
Annual International Conference on the Theory and Applications of …, 2020
582020
Succinct arguments for bilinear group arithmetic: Practical structure-preserving cryptography
RWF Lai, G Malavolta, V Ronge
proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019
582019
Efficient laconic cryptography from learning with errors
N Döttling, D Kolonelos, RWF Lai, C Lin, G Malavolta, A Rahimi
Annual International Conference on the Theory and Applications of …, 2023
552023
The system can't perform the operation now. Try again later.
Articles 1–20