| Efficient zero-knowledge arguments for arithmetic circuits in the discrete log setting J Bootle, A Cerulli, P Chaidos, J Groth, C Petit Annual International Conference on the Theory and Applications of …, 2016 | 554 | 2016 |
| Short accountable ring signatures based on DDH J Bootle, A Cerulli, P Chaidos, E Ghadafi, J Groth, C Petit European Symposium on Research in Computer Security, 243-265, 2015 | 194 | 2015 |
| Foundations of fully dynamic group signatures J Bootle, A Cerulli, P Chaidos, E Ghadafi, J Groth International Conference on Applied Cryptography and Network Security, 117-136, 2016 | 162 | 2016 |
| Sub-linear lattice-based zero-knowledge arguments for arithmetic circuits C Baum, J Bootle, A Cerulli, R Del Pino, J Groth, V Lyubashevsky Annual International Cryptology Conference, 669-699, 2018 | 143 | 2018 |
| Linear-time zero-knowledge proofs for arithmetic circuit satisfiability J Bootle, A Cerulli, E Ghadafi, J Groth, M Hajiabadi, SK Jakobsen International Conference on the Theory and Application of Cryptology and …, 2017 | 121 | 2017 |
| Arya: Nearly linear-time zero-knowledge proofs for correct program execution J Bootle, A Cerulli, J Groth, S Jakobsen, M Maller International Conference on the Theory and Application of Cryptology and …, 2018 | 113 | 2018 |
| A touch of evil: High-assurance cryptographic hardware from untrusted components V Mavroudis, A Cerulli, P Svenda, D Cvrcek, D Klinec, G Danezis Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 53 | 2017 |
| The Internet Computer for Geeks. DFINITY Team IACR Cryptol. ePrint Arch. 2022, 87, 2022 | 41* | 2022 |
| Efficient zero-knowledge proof systems J Bootle, A Cerulli, P Chaidos, J Groth International School on Foundations of Security Analysis and Design, 1-31, 2015 | 38 | 2015 |
| Foundations of fully dynamic group signatures J Bootle, A Cerulli, P Chaidos, E Ghadafi, J Groth Journal of Cryptology 33 (4), 1822-1870, 2020 | 28 | 2020 |
| Nothing refreshes like a repsi: Reactive private set intersection A Cerulli, E De Cristofaro, C Soriente International Conference on Applied Cryptography and Network Security, 280-300, 2018 | 24 | 2018 |
| vetkeys: How a blockchain can keep many secrets A Cerulli, A Connolly, G Neven, FS Preiss, V Shoup Cryptology ePrint Archive, 2023 | 15 | 2023 |
| Nearly linear-time zero-knowledge proofs for correct program execution J Bootle, A Cerulli, J Groth, S Jakobsen, M Maller Cryptology ePrint Archive, 2018 | 10 | 2018 |
| Redistribution of secret sharings J Camenisch, A CERULLI, M Drijvers, J Groth US Patent 12,519,621, 2026 | 6 | 2026 |
| Efficient zero-knowledge proofs and their applications A Cerulli UCL (University College London), 2019 | 5 | 2019 |
| Distributed network with blinded identities J Camenisch, D Williams, A CERULLI, D DERLER, M Drijvers, TT HANKE, ... US Patent 12,063,308, 2024 | 2 | 2024 |
| Data authentication in distributed networks J BREITNER, J Camenisch, A CERULLI, D DERLER, R KASHITSYN, ... US Patent App. 18/559,240, 2024 | 2 | 2024 |
| Hierarchical accumulator structure J BREITNER, J Camenisch, A CERULLI, D DERLER, R KASHITSYN, ... US Patent App. 18/559,234, 2024 | 1 | 2024 |
| Migration of computational units in distributed networks J Camenisch, A CERULLI, D DERLER, M Drijvers, R KASHITSYN, ... US Patent App. 18/014,117, 2023 | | 2023 |
| Session III: Hardware and software security engineering V Mavroudis, A Cerulli, P Svenda, D Cvrcek, D Klinec, G Danezis 2nd CRYPTACUS Workshop 16-18 November 2017 Radboud University, Nijmegen The …, 2017 | | 2017 |