The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Dario Catalano: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Emmanuel Bresson, Dario Catalano, David Pointcheval
    A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:37-54 [Conf]
  2. Dario Catalano, Phong Q. Nguyen, Jacques Stern
    The Hardness of Hensel Lifting: The Case of RSA and Discrete Logarithm. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:299-310 [Conf]
  3. Dario Catalano, Rosario Gennaro, Nick Howgrave-Graham, Phong Q. Nguyen
    Paillier's cryptosystem revisited. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2001, pp:206-214 [Conf]
  4. Sebastiano Battiato, Domenico Cantone, Dario Catalano, Gianluca Cincotti, Micha Hofri
    An Efficient Algorithm for the Approximate Median Selection Problem. [Citation Graph (0, 0)][DBLP]
    CIAC, 2000, pp:226-238 [Conf]
  5. Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi
    Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:205-222 [Conf]
  6. Dario Catalano, Rosario Gennaro
    New Efficient and Secure Protocols for Verifiable Signature Sharing and Other Applications. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1998, pp:105-120 [Conf]
  7. Dario Catalano, David Pointcheval, Thomas Pornin
    IPAKE: Isomorphisms for Password-Based Authenticated Key Exchange. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2004, pp:477-493 [Conf]
  8. Dario Catalano, Rosario Gennaro, Shai Halevi
    Computing Inverses over a Shared Secret Modulus. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2000, pp:190-206 [Conf]
  9. Dario Catalano, Rosario Gennaro, Nick Howgrave-Graham
    The Bit Security of Paillier's Encryption Scheme and Its Applications. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2001, pp:229-243 [Conf]
  10. Michel Abdalla, Dario Catalano, Alexander W. Dent, John Malone-Lee, Gregory Neven, Nigel P. Smart
    Identity-Based Encryption Gone Wild. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:300-311 [Conf]
  11. Dario Catalano, Ivan Visconti
    Hybrid Trapdoor Commitments and Their Applications. [Citation Graph (0, 0)][DBLP]
    ICALP, 2005, pp:298-310 [Conf]
  12. Sebastiano Battiato, Dario Catalano, Giovanni Gallo, Rosario Gennaro
    Robust Watermarking for Images Based on Color Manipulation. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1999, pp:302-317 [Conf]
  13. Dario Catalano, Giancarlo Ruffo, Rossano Schifanella
    A P2P Market Place Based on Aggregate Signatures. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:54-63 [Conf]
  14. Emmanuel Bresson, Dario Catalano
    Constant Round Authenticated Group Key Agreement via Distributed Computation. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2004, pp:115-129 [Conf]
  15. Dario Catalano, Rosario Gennaro
    Cramer-Damgård Signatures Revisited: Efficient Flat-Tree Signatures Based on Factoring. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2005, pp:313-327 [Conf]
  16. Francesco Bergadano, Dario Catalano, Stefano Varricchio
    Learning Sat-k-DNF Formulas from Membership Queries. [Citation Graph (0, 0)][DBLP]
    STOC, 1996, pp:126-130 [Conf]
  17. Dario Catalano, Yevgeniy Dodis, Ivan Visconti
    Mercurial Commitments: Minimal Assumptions and Efficient Constructions. [Citation Graph (0, 0)][DBLP]
    TCC, 2006, pp:120-144 [Conf]
  18. Ari Juels, Dario Catalano, Markus Jakobsson
    Coercion-resistant electronic elections. [Citation Graph (0, 0)][DBLP]
    WPES, 2005, pp:61-70 [Conf]
  19. Dario Catalano, Rosario Gennaro
    New Efficient and Secure Protocols for Verifiable Signature Sharing and Other Applications. [Citation Graph (0, 0)][DBLP]
    J. Comput. Syst. Sci., 2000, v:61, n:1, pp:51-80 [Journal]
  20. Dario Catalano, Rosario Gennaro, Nick Howgrave-Graham
    Paillier's Trapdoor Function Hides up to O(n) Bits. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2002, v:15, n:4, pp:251-269 [Journal]
  21. Dario Catalano, Rosario Gennaro
    Cramer-Damgård signatures revisited: Efficient flat-tree signatures based on factoring. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2007, v:370, n:1-3, pp:186-200 [Journal]
  22. Dario Catalano, Ivan Visconti
    Hybrid commitments and their applications to zero-knowledge proof systems. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2007, v:374, n:1-3, pp:229-260 [Journal]
  23. Emmanuel Bresson, Dario Catalano, Rosario Gennaro
    Improved On-Line/Off-Line Threshold Signatures. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:217-232 [Conf]
  24. Dario Catalano, David Pointcheval, Thomas Pornin
    Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2007, v:20, n:1, pp:115-149 [Journal]

  25. Certificateless onion routing. [Citation Graph (, )][DBLP]


  26. Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework. [Citation Graph (, )][DBLP]


  27. Zero-Knowledge Sets with Short Proofs. [Citation Graph (, )][DBLP]


  28. Verifiable Random Functions from Identity-Based Key Encapsulation. [Citation Graph (, )][DBLP]


  29. Off-Line/On-Line Signatures: Theoretical Aspects and Experimental Results. [Citation Graph (, )][DBLP]


  30. Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness. [Citation Graph (, )][DBLP]


  31. Coercion-Resistant Electronic Elections. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002