Follow
Giovanni Di Crescenzo
Giovanni Di Crescenzo
Peraton Labs also formerly known as Applied Communication Sciences, Vencore Labs, BellCore
Verified email at peratonlabs.com
Title
Cited by
Cited by
Year
Public key encryption with keyword search
D Boneh, G Di Crescenzo, R Ostrovsky, G Persiano
Advances in Cryptology-EUROCRYPT 2004: International Conference on the …, 2004
42052004
Halftone visual cryptography
Z Zhou, GR Arce, G Di Crescenzo
IEEE transactions on image processing 15 (8), 2441-2453, 2006
5682006
Robust non-interactive zero knowledge
A De Santis, G Di Crescenzo, R Ostrovsky, G Persiano, A Sahai
Advances in Cryptology—CRYPTO 2001: 21st Annual International Cryptology …, 2001
3642001
Halftone visual cryptography via error diffusion
Z Wang, GR Arce, G Di Crescenzo
IEEE transactions on information forensics and security 4 (3), 383-396, 2009
3492009
Non-interactive and non-malleable commitment
G Di Crescenzo, Y Ishai, R Ostrovsky
Proceedings of the thirtieth annual ACM symposium on Theory of computing …, 1998
2221998
Single database private information retrieval implies oblivious transfer
G Di Crescenzo, T Malkin, R Ostrovsky
Advances in Cryptology—EUROCRYPT 2000: International Conference on the …, 2000
2032000
Providing secure, instantaneous, directory-integrated, multiparty, communications services
C Chung, S Dalal, G Crescenzo, R Graveman, M Long, G Patton, H Shim
US Patent App. 10/002,882, 2002
1842002
On monotone formula closure of SZK
A De Santis, G Di Crescenzo, G Persiano, M Yung
Proceedings 35th Annual Symposium on Foundations of Computer Science, 454-465, 1994
1761994
Conditional oblivious transfer and timed-release encryption
G Di Crescenzo, R Ostrovsky, S Rajagopalan
Advances in Cryptology—EUROCRYPT’99: International Conference on the Theory …, 1999
1731999
Perfectly secure password protocols in the bounded retrieval model
G Di Crescenzo, R Lipton, S Walfish
Theory of Cryptography Conference, 225-244, 2006
1722006
Public key encryption with searchable keywords based on jacobi symbols
G Di Crescenzo, V Saraswat
Progress in Cryptology–INDOCRYPT 2007: 8th International Conference on …, 2007
1572007
Efficient and non-interactive non-malleable commitment
G Di Crescenzo, J Katz, R Ostrovsky, A Smith
International Conference on the Theory and Applications of Cryptographic …, 2001
1522001
Multi-secret sharing schemes
C Blundo, A De Santis, G Di Crescenzo, AG Gaggia, U Vaccaro
Annual International Cryptology Conference, 150-163, 1994
1451994
Multiparty computation, an introduction
D Catalano, R Cramer, G Di Crescenzo, I Darmgård, D Pointcheval, ...
Contemporary cryptology, 41-87, 2005
1442005
Universal service-providers for database private information retrieval
G Di-Crescenzo, Y Ishai, R Ostrovsky
Proceedings of the seventeenth annual ACM symposium on Principles of …, 1998
1271998
Method and system for secure session establishment using identity-based encryption (VDTLS)
G Di Crescenzo, S Pietrowicz, HS Shim, T Zhang
US Patent 9,094,206, 2015
1102015
How to forget a secret
G Di Crescenzo, N Ferguson, R Impagliazzo, M Jakobsson
Annual Symposium on Theoretical Aspects of Computer Science, 500-509, 1999
1081999
On concurrent zero-knowledge with pre-processing
G Di Crescenzo, R Ostrovsky
Annual International Cryptology Conference, 485-502, 1999
751999
Security amplification by composition: The case of doubly-iterated, ideal ciphers
W Aiello, M Bellare, G Di Crescenzo, R Venkatesan
Annual International Cryptology Conference, 390-407, 1998
741998
Constant-round resettable zero knowledge with concurrent soundness in the bare public-key model
G Di Crescenzo, G Persiano, I Visconti
Annual International Cryptology Conference, 237-253, 2004
692004
The system can't perform the operation now. Try again later.
Articles 1–20