Follow
Dario Catalano
Dario Catalano
Professor of Computer Science, University of Catania
Verified email at dmi.unict.it
Title
Cited by
Cited by
Year
Coercion-resistant electronic elections
A Juels, D Catalano, M Jakobsson
Towards Trustworthy Elections, 37-63, 2010
910*2010
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
M Abdalla, M Bellare, D Catalano, E Kiltz, T Kohno, T Lange, ...
Annual International Cryptology Conference, 205-222, 2005
8192005
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
M Abdalla, M Bellare, D Catalano, E Kiltz, T Kohno, T Lange, ...
Journal of cryptology 21, 350-391, 2008
4662008
A simple public-key cryptosystem with a double trapdoor decryption mechanism and its applications
E Bresson, D Catalano, D Pointcheval
International Conference on the Theory and Application of Cryptology and …, 2003
4402003
Vector commitments and their applications
D Catalano, D Fiore
Public-Key Cryptography–PKC 2013: 16th International Conference on Practice …, 2013
4082013
Privacy-preserving fingercode authentication
M Barni, T Bianchi, D Catalano, M Di Raimondo, R Donida Labati, P Failla, ...
Proceedings of the 12th ACM workshop on Multimedia and security, 231-240, 2010
2902010
Contemporary Cryptology (Advanced Courses in Mathematics-CRM Barcelona)
D Catalano, R Cramer, I Damgard, GD Crescenzo, D Pointcheval, ...
Birkhauser, 2005
187*2005
Identity-based encryption gone wild
M Abdalla, D Catalano, AW Dent, J Malone-Lee, G Neven, NP Smart
Automata, Languages and Programming: 33rd International Colloquium, ICALP …, 2006
1702006
Paillier's cryptosystem revisited
D Catalano, R Gennaro, N Howgrave-Graham, PQ Nguyen
Proceedings of the 8th ACM Conference on Computer and Communications …, 2001
1662001
Practical homomorphic MACs for arithmetic circuits
D Catalano, D Fiore
Annual International Conference on the Theory and Applications of …, 2013
1622013
Multi-input functional encryption for inner products: Function-hiding realizations and constructions without pairings
M Abdalla, D Catalano, D Fiore, R Gay, B Ursu
Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018
1582018
Practical functional encryption for quadratic functions with applications to predicate encryption
CEZ Baltico, D Catalano, D Fiore, R Gay
Annual International Cryptology Conference, 67-98, 2017
1512017
ECRYPT yearly report on algorithms and keysizes
S Babbage, D Catalano, C Cid, B de Weger, O Dunkelman, C Gehrmann, ...
151*2009
A privacy-compliant fingerprint recognition system based on homomorphic encryption and fingercode templates
M Barni, T Bianchi, D Catalano, M Di Raimondo, RD Labati, P Failla, ...
2010 fourth IEEE international conference on biometrics: theory …, 2010
1502010
Homomorphic signatures with efficient verification for polynomial functions
D Catalano, D Fiore, B Warinschi
Annual Cryptology Conference, 371-389, 2014
1332014
Efficient network coding signatures in the standard model
D Catalano, D Fiore, B Warinschi
Public Key Cryptography–PKC 2012: 15th International Conference on Practice …, 2012
1192012
Using linearly-homomorphic encryption to evaluate degree-2 functions on encrypted data
D Catalano, D Fiore
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1172015
Constant round authenticated group key agreement via distributed computation
E Bresson, D Catalano
Public Key Cryptography–PKC 2004: 7th International Workshop on Theory and …, 2004
1062004
Bandwidth-efficient threshold EC-DSA
G Castagnos, D Catalano, F Laguillaumie, F Savasta, I Tucker
IACR International Conference on Public-Key Cryptography, 266-296, 2020
1022020
Efficient two-party password-based key exchange protocols in the UC framework
M Abdalla, D Catalano, C Chevalier, D Pointcheval
Cryptographers’ Track at the RSA Conference, 335-351, 2008
932008
The system can't perform the operation now. Try again later.
Articles 1–20