Vincenzo Iovino
Vincenzo Iovino
Aragon ZK Research
Verified email at
Cited by
Cited by
jPBC: Java pairing based cryptography
A De Caro, V Iovino
2011 IEEE symposium on computers and communications (ISCC), 850-855, 2011
Selene: Voting with transparent verifiability and coercion-mitigation
PYA Ryan, PB Rønne, V Iovino
Financial Cryptography and Data Security: FC 2016 International Workshops …, 2016
Hidden-vector encryption with groups of prime order
V Iovino, G Persiano
Pairing-Based Cryptography–Pairing 2008: Second International Conference …, 2008
On the achievability of simulation-based security for functional encryption
A De Caro, V Iovino, A Jain, A O’Neill, O Paneth, G Persiano
Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013
Fully secure anonymous HIBE and secret-key anonymous IBE with short ciphertexts
A De Caro, V Iovino, G Persiano
Pairing-Based Cryptography-Pairing 2010: 4th International Conference …, 2010
Privacy and integrity threats in contact tracing systems and their mitigations
G Avitabile, V Botta, V Iovino, I Visconti
IEEE Internet Computing 27 (2), 13-19, 2022
Private-key hidden vector encryption with key confidentiality
C Blundo, V Iovino, G Persiano
International Conference on Cryptology and Network Security, 259-277, 2009
Does impaired glucose tolerance predict hypertension? A prospective analysis
O Vaccaro, G Imperatore, V Iovino, C Iovine, AA Rivellese, G Riccardi
Diabetologia 39, 70-76, 1996
Java pairing-based cryptography library
AD Caro, V Iovino
Fully secure hidden vector encryption
A De Caro, V Iovino, G Persiano
International Conference on Pairing-Based Cryptography, 102-121, 2012
Using Selene to Verify your Vote in JCJ
V Iovino, A Rial, PB Rønne, PYA Ryan
Predicate encryption with partial public keys
C Blundo, V Iovino, G Persiano
International Conference on Cryptology and Network Security, 298-313, 2010
Deniable Functional Encryption
V Iovino, A O'Neill
19th IACR International Conference on Practice and Theory in Public-Key …, 2016
Incidence of fibroblastic sleeve and of catheter-related venous thrombosis in peripherally inserted central catheters: a prospective study on oncological and hematological patients
C Trezza, C Califano, V Iovino, C D’Ambrosio, G Grimaldi, M Pittiruti
The Journal of Vascular Access 22 (3), 444-449, 2021
On the effectiveness of time travel to inject COVID-19 alerts
V Iovino, S Vaudenay, M Vuagnoux
Cryptographers’ Track at the RSA Conference, 422-443, 2021
On the Power of Rewinding Simulators in Functional Encryption
A De Caro, V Iovino
Design, Codes and Cryptography, 2016
“The Simplest Protocol for Oblivious Transfer” Revisited
ZA Genç, V Iovino, A Rial
On the Possibility of Non-Interactive E-Voting in the Public-key Setting
R Giustolisi, V Iovino, P Rønne
VOTING 2016 9604 (Financial Cryptography and Data Security), 193-208, 2015
Simulation-Based Secure Functional Encryption in the Random Oracle Model
V Iovino, K Zebrowski
LATINCRYPT 2015 9320 (LNCS), 21-39, 2015
Verifiable inner product encryption scheme
N Soroush, V Iovino, A Rial, PB Roenne, PYA Ryan
Public-Key Cryptography–PKC 2020: 23rd IACR International Conference on …, 2020
The system can't perform the operation now. Try again later.
Articles 1–20