Zero-knowledge contingent payments revisited: Attacks and payments for services M Campanelli, R Gennaro, S Goldfeder, L Nizzardo Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 193 | 2017 |
Multi-key homomorphic authenticators D Fiore, A Mitrokotsa, L Nizzardo, E Pagnin International conference on the theory and application of cryptology and …, 2016 | 66 | 2016 |
Incrementally aggregatable vector commitments and applications to verifiable decentralized storage M Campanelli, D Fiore, N Greco, D Kolonelos, L Nizzardo Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the …, 2020 | 52 | 2020 |
Generalizing homomorphic MACs for arithmetic circuits D Catalano, D Fiore, R Gennaro, L Nizzardo Public-Key Cryptography–PKC 2014: 17th International Conference on Practice …, 2014 | 48 | 2014 |
Programmable hash functions go private: constructions and applications to (homomorphic) signatures with shorter public keys D Catalano, D Fiore, L Nizzardo Advances in Cryptology--CRYPTO 2015: 35th Annual Cryptology Conference …, 2015 | 43 | 2015 |
Multi‐key homomorphic authenticators D Fiore, A Mitrokotsa, L Nizzardo, E Pagnin IET Information Security 13 (6), 618-638, 2019 | 16 | 2019 |
Vector Commitment Techniques and Applications to Verifiable Decentralized Storage. M Campanelli, D Fiore, N Greco, D Kolonelos, L Nizzardo IACR Cryptol. ePrint Arch. 2020, 149, 2020 | 14 | 2020 |
On the security notions for homomorphic signatures D Catalano, D Fiore, L Nizzardo International Conference on Applied Cryptography and Network Security, 183-201, 2018 | 13 | 2018 |
Transferable Anonymous Payments via TumbleBit in Permissioned Blockchains. C Ferretti, A Leporati, L Mariot, L Nizzardo DLT@ ITASEC 2334, 56-67, 2019 | 5 | 2019 |
Subversion-resilient enhanced privacy ID A Faonio, D Fiore, L Nizzardo, C Soriente Cryptographers’ Track at the RSA Conference, 562-588, 2022 | 2 | 2022 |
Homomorphic signatures with sublinear public keys via asymmetric programmable hash functions D Catalano, D Fiore, L Nizzardo Designs, Codes and Cryptography 86, 2197-2246, 2018 | 2 | 2018 |
Witness-authenticated key exchange revisited: Improved models, simpler constructions, extensions to groups M Campanelli, R Gennaro, K Melissaris, L Nizzardo Cryptology ePrint Archive, 2022 | 1 | 2022 |
Witness-Authenticated Key Exchange, Revisited: Extensions to Groups, Improved Models, Simpler Constructions M Campanelli, R Gennaro, K Melissaris, L Nizzardo International Conference on Financial Cryptography and Data Security, 112-128, 2023 | | 2023 |
Subversion resilient attestation for trusted execution environments C Soriente, A Faonio, D Fiore, L Nizzardo US Patent 11,361,069, 2022 | | 2022 |
Cryptographic techniques for the security of cloud and blockchain systems L Nizzardo ETSI_Informatica, 2018 | | 2018 |
Programmable Hash Functions go Private: Constructions and Applications to (Homomorphic) Signatures with Shorter Public Keys D Fiore, D Catalano, L Nizzardo Actas de las primeras Jornadas Nacionales de Investigación en Ciberseguridad …, 2015 | | 2015 |
Witness-Authenticated Key Exchange Revisited M Campanelli, R Gennaro, K Melissaris, L Nizzardo | | |
Appunti di Algebra I P Magoni, L Nizzardo, F Pasini, A Savoldi | | |