Follow
Ivan Visconti
Title
Cited by
Cited by
Year
Constructing non-malleable commitments: A black-box approach
V Goyal, CK Lee, R Ostrovsky, I Visconti
2012 IEEE 53rd Annual Symposium on Foundations of Computer Science, 51-60, 2012
902012
Universally composable secure computation with (malicious) physically uncloneable functions
R Ostrovsky, A Scafuro, I Visconti, A Wadia
Annual International Conference on the Theory and Applications of …, 2013
832013
PUF-enhanced RFID security and privacy
AR Sadeghi, I Visconti, C Wachsmann
Workshop on secure component and system identification (SECSI) 110, 2010
752010
Enhancing RFID Security and Privacy by Physically Unclonable Functions
AR Sadeghi, I Visconti, C Wachsmann
Towards Hardware-Intrinsic Security, 281-305, 2010
752010
Constant-round resettable zero knowledge with concurrent soundness in the bare public-key model
GD Crescenzo, G Persiano, I Visconti
Annual International Cryptology Conference, 237-253, 2004
682004
Towards Defeating Mass Surveillance and SARS-CoV-2: The Pronto-C2 Fully Decentralized Automatic Contact Tracing System
G Avitabile, V Botta, V Iovino, I Visconti
Workshop on Secure IT Technologies against COVID-19 (CoronaDef), 2021
662021
User privacy in transport systems based on RFID e-tickets
AR Sadeghi, I Visconti, C Wachsmann
PiLBA’08 Privacy in Location-Based Applications, 102-121, 2008
662008
Secure set intersection with untrusted hardware tokens
M Fischlin, B Pinkas, AR Sadeghi, T Schneider, I Visconti
Cryptographers’ Track at the RSA Conference, 1-16, 2011
542011
Concurrent non-malleable commitments (and more) in 3 rounds
M Ciampi, R Ostrovsky, L Siniscalchi, I Visconti
Annual International Cryptology Conference, 270-299, 2016
522016
An efficient and usable multi-show non-transferable anonymous credential system
G Persiano, I Visconti
International Conference on Financial Cryptography, 196-211, 2004
522004
Mercurial commitments: Minimal assumptions and efficient constructions
D Catalano, Y Dodis, I Visconti
Theory of Cryptography, 120-144, 2006
502006
On RFID privacy with mutual authentication and tag corruption
F Armknecht, AR Sadeghi, I Visconti, C Wachsmann
International Conference on Applied Cryptography and Network Security, 493-510, 2010
49*2010
Collusion-free protocols in the mediated model
J Alwen, A Shelat, I Visconti
Annual International Cryptology Conference, 497-514, 2008
492008
Collusion-free multiparty computation in the mediated model
J Alwen, J Katz, Y Lindell, G Persiano, I Visconti
Annual International Cryptology Conference, 524-540, 2009
472009
Improved OR-composition of sigma-protocols
M Ciampi, G Persiano, A Scafuro, L Siniscalchi, I Visconti
Theory of Cryptography Conference, 112-141, 2016
462016
Simultaneous resettability from one-way functions
KM Chung, R Ostrovsky, R Pass, I Visconti
Foundations of Computer Science (FOCS), 2013 IEEE 54th Annual Symposium on …, 2013
45*2013
Four-round concurrent non-malleable commitments from one-way functions
M Ciampi, R Ostrovsky, L Siniscalchi, I Visconti
Annual International Cryptology Conference, 127-157, 2017
422017
Anonymizer-enabled security and privacy for RFID
AR Sadeghi, I Visconti, C Wachsmann
Cryptology and Network Security, 134-153, 2009
412009
User privacy issues regarding certificates and the TLS protocol: the design and implementation of the SPSL protocol
P Persiano, I Visconti
Proceedings of the 7th ACM Conference on Computer and Communications …, 2000
412000
Online/offline OR composition of sigma protocols
M Ciampi, G Persiano, A Scafuro, L Siniscalchi, I Visconti
Annual International Conference on the Theory and Applications of …, 2016
392016
The system can't perform the operation now. Try again later.
Articles 1–20