dblp.uni-trier.dewww.uni-trier.de

Dario Catalano

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
29EEMichel Abdalla, Dario Catalano, Dario Fiore: Verifiable Random Functions from Identity-Based Key Encapsulation. EUROCRYPT 2009: 554-571
2008
28EEMichel Abdalla, Dario Catalano, Céline Chevalier, David Pointcheval: Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework. CT-RSA 2008: 335-351
27EEDario Catalano, Dario Fiore, Mariagrazia Messina: Zero-Knowledge Sets with Short Proofs. EUROCRYPT 2008: 433-450
26EEDario Catalano, Mario Di Raimondo, Dario Fiore, Rosario Gennaro: Off-Line/On-Line Signatures: Theoretical Aspects and Experimental Results. Public Key Cryptography 2008: 101-120
25EEMichel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi: Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. J. Cryptology 21(3): 350-391 (2008)
2007
24EEEmmanuel Bresson, Dario Catalano, Rosario Gennaro: Improved On-Line/Off-Line Threshold Signatures. Public Key Cryptography 2007: 217-232
23EEDario Catalano, David Pointcheval, Thomas Pornin: Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication. J. Cryptology 20(1): 115-149 (2007)
22EEDario Catalano, Rosario Gennaro: Cramer-Damgård signatures revisited: Efficient flat-tree signatures based on factoring. Theor. Comput. Sci. 370(1-3): 186-200 (2007)
21EEDario Catalano, Ivan Visconti: Hybrid commitments and their applications to zero-knowledge proof systems. Theor. Comput. Sci. 374(1-3): 229-260 (2007)
2006
20EEMichel Abdalla, Dario Catalano, Alexander W. Dent, John Malone-Lee, Gregory Neven, Nigel P. Smart: Identity-Based Encryption Gone Wild. ICALP (2) 2006: 300-311
19EEDario Catalano, Yevgeniy Dodis, Ivan Visconti: Mercurial Commitments: Minimal Assumptions and Efficient Constructions. TCC 2006: 120-144
2005
18EEMichel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi: Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. CRYPTO 2005: 205-222
17EEDario Catalano, Ivan Visconti: Hybrid Trapdoor Commitments and Their Applications. ICALP 2005: 298-310
16EEDario Catalano, Giancarlo Ruffo, Rossano Schifanella: A P2P Market Place Based on Aggregate Signatures. ISPA Workshops 2005: 54-63
15EEDario Catalano, Rosario Gennaro: Cramer-Damgård Signatures Revisited: Efficient Flat-Tree Signatures Based on Factoring. Public Key Cryptography 2005: 313-327
14EEAri Juels, Dario Catalano, Markus Jakobsson: Coercion-resistant electronic elections. WPES 2005: 61-70
2004
13EEDario Catalano, David Pointcheval, Thomas Pornin: IPAKE: Isomorphisms for Password-Based Authenticated Key Exchange. CRYPTO 2004: 477-493
12EEEmmanuel Bresson, Dario Catalano: Constant Round Authenticated Group Key Agreement via Distributed Computation. Public Key Cryptography 2004: 115-129
2003
11EEEmmanuel Bresson, Dario Catalano, David Pointcheval: A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications. ASIACRYPT 2003: 37-54
2002
10EEDario Catalano, Phong Q. Nguyen, Jacques Stern: The Hardness of Hensel Lifting: The Case of RSA and Discrete Logarithm. ASIACRYPT 2002: 299-310
9EEDario Catalano, Rosario Gennaro, Nick Howgrave-Graham: Paillier's Trapdoor Function Hides up to O(n) Bits. J. Cryptology 15(4): 251-269 (2002)
2001
8EEDario Catalano, Rosario Gennaro, Nick Howgrave-Graham, Phong Q. Nguyen: Paillier's cryptosystem revisited. ACM Conference on Computer and Communications Security 2001: 206-214
7EEDario Catalano, Rosario Gennaro, Nick Howgrave-Graham: The Bit Security of Paillier's Encryption Scheme and Its Applications. EUROCRYPT 2001: 229-243
2000
6EESebastiano Battiato, Domenico Cantone, Dario Catalano, Gianluca Cincotti, Micha Hofri: An Efficient Algorithm for the Approximate Median Selection Problem. CIAC 2000: 226-238
5EEDario Catalano, Rosario Gennaro, Shai Halevi: Computing Inverses over a Shared Secret Modulus. EUROCRYPT 2000: 190-206
4 Dario Catalano, Rosario Gennaro: New Efficient and Secure Protocols for Verifiable Signature Sharing and Other Applications. J. Comput. Syst. Sci. 61(1): 51-80 (2000)
1999
3 Sebastiano Battiato, Dario Catalano, Giovanni Gallo, Rosario Gennaro: Robust Watermarking for Images Based on Color Manipulation. Information Hiding 1999: 302-317
1998
2EEDario Catalano, Rosario Gennaro: New Efficient and Secure Protocols for Verifiable Signature Sharing and Other Applications. CRYPTO 1998: 105-120
1996
1EEFrancesco Bergadano, Dario Catalano, Stefano Varricchio: Learning Sat-k-DNF Formulas from Membership Queries. STOC 1996: 126-130

Coauthor Index

1Michel Abdalla [18] [20] [25] [28] [29]
2Sebastiano Battiato [3] [6]
3Mihir Bellare [18] [25]
4Francesco Bergadano [1]
5Emmanuel Bresson [11] [12] [24]
6Domenico Cantone [6]
7Céline Chevalier [28]
8Gianluca Cincotti [6]
9Alexander W. Dent [20]
10Yevgeniy Dodis [19]
11Dario Fiore [26] [27] [29]
12Giovanni Gallo [3]
13Rosario Gennaro [2] [3] [4] [5] [7] [8] [9] [15] [22] [24] [26]
14Shai Halevi [5]
15Micha Hofri [6]
16Nick Howgrave-Graham [7] [8] [9]
17Markus Jakobsson [14]
18Ari Juels [14]
19Eike Kiltz [18] [25]
20Tadayoshi Kohno [18] [25]
21Tanja Lange [18] [25]
22John Malone-Lee [18] [20] [25]
23Mariagrazia Messina [27]
24Gregory Neven [18] [20] [25]
25Phong Q. Nguyen [8] [10]
26Pascal Paillier [18] [25]
27David Pointcheval [11] [13] [23] [28]
28Thomas Pornin [13] [23]
29Mario Di Raimondo [26]
30Giancarlo Ruffo [16]
31Rossano Schifanella [16]
32Haixia Shi [18] [25]
33Nigel P. Smart [20]
34Jacques Stern [10]
35Stefano Varricchio [1]
36Ivan Visconti [17] [19] [21]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)