Public key encryption with keyword search D Boneh, G Di Crescenzo, R Ostrovsky, G Persiano Advances in Cryptology-EUROCRYPT 2004: International Conference on the …, 2004 | 4001 | 2004 |
Halftone visual cryptography Z Zhou, GR Arce, G Di Crescenzo IEEE transactions on image processing 15 (8), 2441-2453, 2006 | 552 | 2006 |
Robust non-interactive zero knowledge A De Santis, G Di Crescenzo, R Ostrovsky, G Persiano, A Sahai Advances in Cryptology—CRYPTO 2001: 21st Annual International Cryptology …, 2001 | 349 | 2001 |
Halftone visual cryptography via error diffusion Z Wang, GR Arce, G Di Crescenzo IEEE transactions on information forensics and security 4 (3), 383-396, 2009 | 332 | 2009 |
Non-interactive and non-malleable commitment G Di Crescenzo, Y Ishai, R Ostrovsky Proceedings of the thirtieth annual ACM symposium on Theory of computing …, 1998 | 219 | 1998 |
Single database private information retrieval implies oblivious transfer G Di Crescenzo, T Malkin, R Ostrovsky Advances in Cryptology—EUROCRYPT 2000: International Conference on the …, 2000 | 196 | 2000 |
Providing secure, instantaneous, directory-integrated, multiparty, communications services C Chung, S Dalal, G Crescenzo, R Graveman, M Long, G Patton, H Shim US Patent App. 10/002,882, 2002 | 181 | 2002 |
On monotone formula closure of SZK A De Santis, G Di Crescenzo, G Persiano, M Yung Proceedings 35th Annual Symposium on Foundations of Computer Science, 454-465, 1994 | 173 | 1994 |
Perfectly secure password protocols in the bounded retrieval model G Di Crescenzo, R Lipton, S Walfish Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006 …, 2006 | 169 | 2006 |
Conditional oblivious transfer and timed-release encryption G Di Crescenzo, R Ostrovsky, S Rajagopalan EuroCrypt 99, 74-89, 1999 | 167 | 1999 |
Efficient and non-interactive non-malleable commitment G Di Crescenzo, J Katz, R Ostrovsky, A Smith Advances in Cryptology—EUROCRYPT 2001: International Conference on the …, 2001 | 151 | 2001 |
Public key encryption with searchable keywords based on Jacobi symbols G Di Crescenzo, V Saraswat Progress in Cryptology–INDOCRYPT 2007: 8th International Conference on …, 2007 | 150 | 2007 |
Multiparty computation, an introduction D Catalano, R Cramer, G Di Crescenzo, I Darmgård, D Pointcheval, ... Contemporary cryptology, 41-87, 2005 | 144 | 2005 |
Multi-secret sharing schemes C Blundo, A De Santis, G Di Crescenzo, AG Gaggia, U Vaccaro Advances in Cryptology—CRYPTO’94: 14th Annual International Cryptology …, 2001 | 138 | 2001 |
Universal service-providers for database private information retrieval G Di-Crescenzo, Y Ishai, R Ostrovsky Proceedings of the seventeenth annual ACM symposium on Principles of …, 1998 | 127 | 1998 |
Method and system for secure session establishment using identity-based encryption (VDTLS) G Di Crescenzo, S Pietrowicz, HS Shim, T Zhang US Patent 9,094,206, 2015 | 107 | 2015 |
How to forget a secret G Di Crescenzo, N Ferguson, R Impagliazzo, M Jakobsson STACS 99: 16th Annual Symposium on Theoretical Aspects of Computer Science …, 1999 | 107 | 1999 |
On concurrent zero-knowledge with pre-processing G Di Crescenzo, R Ostrovsky Advances in Cryptology—CRYPTO’99: 19th Annual International Cryptology …, 1999 | 75 | 1999 |
Security amplification by composition: The case of doubly-iterated, ideal ciphers W Aiello, M Bellare, G Di Crescenzo, R Venkatesan Advances in Cryptology—CRYPTO'98: 18th Annual International Cryptology …, 2006 | 72 | 2006 |
Constant-round resettable zero knowledge with concurrent soundness in the bare public-key model G Di Crescenzo, G Persiano, I Visconti Advances in Cryptology–CRYPTO 2004: 24th Annual International Cryptology …, 2004 | 69 | 2004 |