Giovanni Di Crescenzo
Giovanni Di Crescenzo
Perspecta Labs also d/b/a Applied Communication Sciences
Verified email at appcomsci.com
TitleCited byYear
Public key encryption with keyword search
D Boneh, G Di Crescenzo, R Ostrovsky, G Persiano
International conference on the theory and applications of cryptographic …, 2004
27912004
Halftone visual cryptography
Z Zhou, GR Arce, G Di Crescenzo
IEEE transactions on image processing 15 (8), 2441-2453, 2006
4752006
Halftone visual cryptography via error diffusion
Z Wang, GR Arce, G Di Crescenzo
IEEE transactions on information forensics and security 4 (3), 383-396, 2009
2752009
Robust non-interactive zero knowledge
A De Santis, G Di Crescenzo, R Ostrovsky, G Persiano, A Sahai
Annual International Cryptology Conference, 566-598, 2001
2752001
Non-interactive and non-malleable commitment
G Di Crescenzo, Y Ishai, R Ostrovsky
STOC 98, 141-150, 1998
1831998
Single database private information retrieval implies oblivious transfer
G Di Crescenzo, T Malkin, R Ostrovsky
International Conference on the Theory and Applications of Cryptographic …, 2000
1722000
Method for manufacturing a high-resistivity semiconductor-on-insulator substrate including an RF circuit overlapping a doped region in the substrate
BY Nguyen, F Allibert, C Maleville
US Patent 10,002,882, 2018
1662018
On monotone formula closure of SZK
A De Santis, G Di Crescenzo, G Persiano, M Yung
Proceedings 35th Annual Symposium on Foundations of Computer Science, 454-465, 1994
1611994
Conditional oblivious transfer and timed-release encryption
G Di Crescenzo, R Ostrovsky, S Rajagopalan
International Conference on the Theory and Applications of Cryptographic …, 1999
1431999
Perfectly secure password protocols in the bounded retrieval model
G Di Crescenzo, R Lipton, S Walfish
Theory of Cryptography Conference, 225-244, 2006
1362006
Efficient and non-interactive non-malleable commitment
G Di Crescenzo, J Katz, R Ostrovsky, A Smith
International Conference on the Theory and Applications of Cryptographic …, 2001
1212001
Public key encryption with searchable keywords based on Jacobi symbols
G Di Crescenzo, V Saraswat
International Conference on Cryptology in India, 282-296, 2007
1142007
Universal service-providers for private information retrieval
G Di Crescenzo, Y Ishai, R Ostrovsky
Journal of Cryptology 14 (1), 37-74, 2001
1102001
Multi-secret sharing schemes
C Blundo, A De Santis, G Di Crescenzo, AG Gaggia, U Vaccaro
Annual International Cryptology Conference, 150-163, 1994
1031994
How to forget a secret
G Di Crescenzo, N Ferguson, R Impagliazzo, M Jakobsson
Annual Symposium on Theoretical Aspects of Computer Science, 500-509, 1999
1001999
Method and system for secure session establishment using identity-based encryption (VDTLS)
G Di Crescenzo, S Pietrowicz, HS Shim, T Zhang
US Patent 9,094,206, 2015
712015
On concurrent zero-knowledge with pre-processing
G Di Crescenzo, R Ostrovsky
Annual International Cryptology Conference, 485-502, 1999
671999
Constant-round resettable zero knowledge with concurrent soundness in the bare public-key model
G Di Crescenzo, G Persiano, I Visconti
Annual International Cryptology Conference, 237-253, 2004
602004
Security amplification by composition: The case of doubly-iterated, ideal ciphers
W Aiello, M Bellare, G Di Crescenzo, R Venkatesan
Annual International Cryptology Conference, 390-407, 1998
581998
Multiplicative non-abelian sharing schemes and their application to threshold cryptography
Y Desmedt, G Di Crescenzo, M Burmester
International Conference on the Theory and Application of Cryptology, 19-32, 1994
531994
The system can't perform the operation now. Try again later.
Articles 1–20