Public key encryption with keyword search D Boneh, G Di Crescenzo, R Ostrovsky, G Persiano Advances in Cryptology-EUROCRYPT 2004: International Conference on the …, 2004 | 4408 | 2004 |
Halftone visual cryptography Z Zhou, GR Arce, G Di Crescenzo IEEE transactions on image processing 15 (8), 2441-2453, 2006 | 582 | 2006 |
Robust non-interactive zero knowledge A De Santis, G Di Crescenzo, R Ostrovsky, G Persiano, A Sahai Advances in Cryptology—CRYPTO 2001: 21st Annual International Cryptology …, 2001 | 388 | 2001 |
Halftone visual cryptography via error diffusion Z Wang, GR Arce, G Di Crescenzo IEEE transactions on information forensics and security 4 (3), 383-396, 2009 | 353 | 2009 |
Non-interactive and non-malleable commitment G Di Crescenzo, Y Ishai, R Ostrovsky Proceedings of the thirtieth annual ACM symposium on Theory of computing …, 1998 | 222 | 1998 |
Single database private information retrieval implies oblivious transfer G Di Crescenzo, T Malkin, R Ostrovsky Advances in Cryptology—EUROCRYPT 2000: International Conference on the …, 2000 | 209 | 2000 |
Providing secure, instantaneous, directory-integrated, multiparty, communications services C Chung, S Dalal, G Crescenzo, R Graveman, M Long, G Patton, H Shim US Patent App. 10/002,882, 2002 | 184 | 2002 |
On monotone formula closure of SZK A De Santis, G Di Crescenzo, G Persiano, M Yung Proceedings 35th Annual Symposium on Foundations of Computer Science, 454-465, 1994 | 180 | 1994 |
Perfectly secure password protocols in the bounded retrieval model G Di Crescenzo, R Lipton, S Walfish Theory of Cryptography Conference, 225-244, 2006 | 176 | 2006 |
Conditional oblivious transfer and timed-release encryption G Di Crescenzo, R Ostrovsky, S Rajagopalan Advances in Cryptology—EUROCRYPT’99: International Conference on the Theory …, 1999 | 173 | 1999 |
Public key encryption with searchable keywords based on Jacobi symbols G Di Crescenzo, V Saraswat International conference on cryptology in India, 282-296, 2007 | 162 | 2007 |
Efficient and non-interactive non-malleable commitment G Di Crescenzo, J Katz, R Ostrovsky, A Smith International Conference on the Theory and Applications of Cryptographic …, 2001 | 157 | 2001 |
Multi-secret sharing schemes C Blundo, A De Santis, G Di Crescenzo, AG Gaggia, U Vaccaro Annual International Cryptology Conference, 150-163, 1994 | 147 | 1994 |
Multiparty computation, an introduction D Catalano, R Cramer, G Di Crescenzo, I Darmgård, D Pointcheval, ... Contemporary cryptology, 41-87, 2005 | 146 | 2005 |
Universal service-providers for database private information retrieval G Di-Crescenzo, Y Ishai, R Ostrovsky Proceedings of the seventeenth annual ACM symposium on Principles of …, 1998 | 126 | 1998 |
Method and system for secure session establishment using identity-based encryption (VDTLS) G Di Crescenzo, S Pietrowicz, HS Shim, T Zhang US Patent 9,094,206, 2015 | 115 | 2015 |
How to forget a secret G Di Crescenzo, N Ferguson, R Impagliazzo, M Jakobsson Annual Symposium on Theoretical Aspects of Computer Science, 500-509, 1999 | 113 | 1999 |
On concurrent zero-knowledge with pre-processing G Di Crescenzo, R Ostrovsky Annual International Cryptology Conference, 485-502, 1999 | 76 | 1999 |
Security amplification by composition: The case of doubly-iterated, ideal ciphers W Aiello, M Bellare, G Di Crescenzo, R Venkatesan Annual International Cryptology Conference, 390-407, 1998 | 72 | 1998 |
Succinct NP proofs from an extractability assumption G Di Crescenzo, H Lipmaa Logic and Theory of Algorithms: 4th Conference on Computability in Europe …, 2008 | 69 | 2008 |