Public key encryption with keyword search D Boneh, G Di Crescenzo, R Ostrovsky, G Persiano International conference on the theory and applications of cryptographic …, 2004 | 4444 | 2004 |
Halftone visual cryptography Z Zhou, GR Arce, G Di Crescenzo IEEE transactions on image processing 15 (8), 2441-2453, 2006 | 585 | 2006 |
Robust non-interactive zero knowledge A De Santis, G Di Crescenzo, R Ostrovsky, G Persiano, A Sahai Advances in Cryptology—CRYPTO 2001: 21st Annual International Cryptology …, 2001 | 405 | 2001 |
Halftone visual cryptography via error diffusion Z Wang, GR Arce, G Di Crescenzo IEEE transactions on information forensics and security 4 (3), 383-396, 2009 | 355 | 2009 |
Non-interactive and non-malleable commitment G Di Crescenzo, Y Ishai, R Ostrovsky Proceedings of the thirtieth annual ACM symposium on Theory of computing …, 1998 | 223 | 1998 |
Single database private information retrieval implies oblivious transfer G Di Crescenzo, T Malkin, R Ostrovsky Advances in Cryptology—EUROCRYPT 2000: International Conference on the …, 2000 | 215 | 2000 |
Providing secure, instantaneous, directory-integrated, multiparty, communications services C Chung, S Dalal, G Crescenzo, R Graveman, M Long, G Patton, H Shim US Patent App. 10/002,882, 2002 | 185 | 2002 |
Perfectly secure password protocols in the bounded retrieval model G Di Crescenzo, R Lipton, S Walfish Theory of Cryptography Conference, 225-244, 2006 | 181 | 2006 |
On monotone formula closure of SZK A De Santis, G Di Crescenzo, G Persiano, M Yung Proceedings 35th Annual Symposium on Foundations of Computer Science, 454-465, 1994 | 181 | 1994 |
Conditional oblivious transfer and timed-release encryption G Di Crescenzo, R Ostrovsky, S Rajagopalan International Conference on the Theory and Applications of Cryptographic …, 1999 | 177 | 1999 |
Efficient and non-interactive non-malleable commitment G Di Crescenzo, J Katz, R Ostrovsky, A Smith International Conference on the Theory and Applications of Cryptographic …, 2001 | 162 | 2001 |
Public key encryption with searchable keywords based on Jacobi symbols G Di Crescenzo, V Saraswat International conference on cryptology in India, 282-296, 2007 | 158 | 2007 |
Multiparty computation, an introduction D Catalano, R Cramer, G Di Crescenzo, I Darmgård, D Pointcheval, ... Contemporary cryptology, 41-87, 2005 | 149 | 2005 |
Multi-secret sharing schemes C Blundo, A De Santis, G Di Crescenzo, AG Gaggia, U Vaccaro Annual International Cryptology Conference, 150-163, 1994 | 149 | 1994 |
Universal service-providers for database private information retrieval G Di-Crescenzo, Y Ishai, R Ostrovsky Proceedings of the seventeenth annual ACM symposium on Principles of …, 1998 | 131 | 1998 |
Method and system for secure session establishment using identity-based encryption (VDTLS) G Di Crescenzo, S Pietrowicz, HS Shim, T Zhang US Patent 9,094,206, 2015 | 120 | 2015 |
How to forget a secret G Di Crescenzo, N Ferguson, R Impagliazzo, M Jakobsson Annual Symposium on Theoretical Aspects of Computer Science, 500-509, 1999 | 116 | 1999 |
On concurrent zero-knowledge with pre-processing G Di Crescenzo, R Ostrovsky Annual International Cryptology Conference, 485-502, 1999 | 77 | 1999 |
Security amplification by composition: The case of doubly-iterated, ideal ciphers W Aiello, M Bellare, G Di Crescenzo, R Venkatesan Annual International Cryptology Conference, 390-407, 1998 | 71 | 1998 |
Multiplicative non-abelian sharing schemes and their application to threshold cryptography Y Desmedt, G Di Crescenzo, M Burmester Advances in Cryptology—ASIACRYPT'94: 4th International Conferences on the …, 1995 | 71 | 1995 |