What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Ivan Visconti
Google Scholar
62
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/joc
Compact Proofs of Partial Knowledge for Overlapping CNF Formulae.
Gennaro Avitabile
Vincenzo Botta
Daniele Friolo
Daniele Venturi
Ivan Visconti
2025
conf/sp
Trust Nobody: Privacy-Preserving Proofs for Edited Photos with Your Laptop.
Pierpaolo Della Monica
Ivan Visconti
Andrea Vitaletti
Marco Zecchini
2024
conf/crypto
Black-Box (and Fast) Non-malleable Zero Knowledge.
Vincenzo Botta
Michele Ciampi
Emmanuela Orsini
Luisa Siniscalchi
Ivan Visconti
2024
conf/sp
PUF-Based Authentication in IoT Against Strong Physical Adversary Using Zero-Knowledge Proofs.
Lukas Petzi
Alexandra Dmitrienko
Ivan Visconti
2024
conf/esorics
Incremental Time-Deniable Signatures.
Luisa Siniscalchi
Ivan Visconti
2023
conf/acns
Preventing Content Cloning in NFT Collections.
Ivan Visconti
Andrea Vitaletti
Marco Zecchini
2022
conf/esorics
Efficient Proofs of Knowledge for Threshold Relations.
Gennaro Avitabile
Vincenzo Botta
Daniele Friolo
Ivan Visconti
2022
conf/cans
Efficient NIZK Arguments with Straight-Line Simulation and Extraction.
Michele Ciampi
Ivan Visconti
2021
conf/fc
Shielded Computations in Smart Contracts Overcoming Forks.
Vincenzo Botta
Daniele Friolo
Daniele Venturi
Ivan Visconti
2021
conf/acns
Terrorist Attacks for Fake Exposure Notifications in Contact Tracing Systems.
Gennaro Avitabile
Daniele Friolo
Ivan Visconti
2021
conf/pkc
Publicly Verifiable Zero Knowledge from (Collapsing) Blockchains.
Alessandra Scafuro
Luisa Siniscalchi
Ivan Visconti
2020
conf/eurocrypt
How to Extract Useful Randomness from Unreliable Sources.
Divesh Aggarwal
Maciej Obremski
João Ribeiro
Luisa Siniscalchi
Ivan Visconti
2019
conf/crypto
Universally Composable Secure Computation with Corrupted Tokens.
Nishanth Chandran
Wutichai Chongchitmate
Rafail Ostrovsky
Ivan Visconti
2019
conf/pkc
Publicly Verifiable Proofs from Blockchains.
Alessandra Scafuro
Luisa Siniscalchi
Ivan Visconti
2019
conf/asiacrypt
UC-Secure Multiparty Computation from One-Way Functions Using Stateless Tokens.
Saikrishna Badrinarayanan
Abhishek Jain
Rafail Ostrovsky
Ivan Visconti
2018
conf/crypto
Continuously Non-Malleable Codes in the Split-State Model from Minimal Assumptions.
Rafail Ostrovsky
Giuseppe Persiano
Daniele Venturi
Ivan Visconti
2018
conf/asiacrypt
Non-interactive Secure Computation from One-Way Functions.
Saikrishna Badrinarayanan
Abhishek Jain
Rafail Ostrovsky
Ivan Visconti
2017
conf/crypto
Four-Round Concurrent Non-Malleable Commitments from One-Way Functions.
Michele Ciampi
Rafail Ostrovsky
Luisa Siniscalchi
Ivan Visconti
2017
conf/fc
Controlled Homomorphic Encryption: Definition and Construction.
Yvo Desmedt
Vincenzo Iovino
Giuseppe Persiano
Ivan Visconti
2017
conf/eurocrypt
Unconditional UC-Secure Computation with (Stronger-Malicious) PUFs.
Saikrishna Badrinarayanan
Dakshita Khurana
Rafail Ostrovsky
Ivan Visconti
2017
conf/tcc
Resettably-Sound Resettable Zero Knowledge in Constant Rounds.
Wutichai Chongchitmate
Rafail Ostrovsky
Ivan Visconti
2017
conf/tcc
Round-Optimal Secure Two-Party Computation from Trapdoor Permutations.
Michele Ciampi
Rafail Ostrovsky
Luisa Siniscalchi
Ivan Visconti
2017
conf/tcc
Delayed-Input Non-Malleable Zero Knowledge and Multi-Party Coin Tossing in Four Rounds.
Michele Ciampi
Rafail Ostrovsky
Luisa Siniscalchi
Ivan Visconti
2016
conf/crypto
Concurrent Non-Malleable Commitments (and More) in 3 Rounds.
Michele Ciampi
Rafail Ostrovsky
Luisa Siniscalchi
Ivan Visconti
2016
conf/eurocrypt
Online/Offline OR Composition of Sigma Protocols.
Michele Ciampi
Giuseppe Persiano
Alessandra Scafuro
Luisa Siniscalchi
Ivan Visconti
2016
conf/tcc
Improved OR-Composition of Sigma-Protocols.
Michele Ciampi
Giuseppe Persiano
Alessandra Scafuro
Luisa Siniscalchi
Ivan Visconti
2016
conf/tcc
A Transform for NIZK Almost as Efficient and General as the Fiat-Shamir Transform Without Programmable Random Oracles.
Michele Ciampi
Giuseppe Persiano
Luisa Siniscalchi
Ivan Visconti
2015
conf/crypto
Impossibility of Black-Box Simulation Against Leakage Attacks.
Rafail Ostrovsky
Giuseppe Persiano
Ivan Visconti
2015
conf/eurocrypt
Executable Proofs, Input-Size Hiding Secure Computation and a New Ideal World.
Melissa Chase
Rafail Ostrovsky
Ivan Visconti
2014
conf/tcc
Statistical Concurrent Non-malleable Zero Knowledge.
Claudio Orlandi
Rafail Ostrovsky
Vanishree Rao
Amit Sahai
Ivan Visconti
2014
conf/tcc
4-Round Resettably-Sound Zero Knowledge.
Kai-Min Chung
Rafail Ostrovsky
Rafael Pass
Muthuramakrishnan Venkitasubramaniam
Ivan Visconti
2013
journals/istr
SmartK: Smart cards in operating systems at kernel level.
Luigi Catuogno
Roberto Gassirà
Michele Masullo
Ivan Visconti
2013
conf/eurocrypt
Universally Composable Secure Computation with (Malicious) Physically Uncloneable Functions.
Rafail Ostrovsky
Alessandra Scafuro
Ivan Visconti
Akshay Wadia
2013
conf/asiacrypt
Constant-Round Concurrent Zero Knowledge in the Bounded Player Model.
Vipul Goyal
Abhishek Jain
Rafail Ostrovsky
Silas Richelson
Ivan Visconti
2013
conf/tcc
Revisiting Lower and Upper Bounds for Selective Decommitments.
Rafail Ostrovsky
Vanishree Rao
Alessandra Scafuro
Ivan Visconti
2013
conf/tcc
Concurrent Zero Knowledge in the Bounded Player Model.
Vipul Goyal
Abhishek Jain
Rafail Ostrovsky
Silas Richelson
Ivan Visconti
2012
conf/crypto
Impossibility Results for Static Input Secure Computation.
Sanjam Garg
Abishek Kumarasubramanian
Rafail Ostrovsky
Ivan Visconti
2012
conf/crypto
Secure Database Commitments and Universal Arguments of Quasi Knowledge.
Melissa Chase
Ivan Visconti
2012
conf/eurocrypt
On Round-Optimal Zero Knowledge in the Bare Public-Key Model.
Alessandra Scafuro
Ivan Visconti
2012
conf/tcc
Simultaneously Resettable Arguments of Knowledge.
Chongwon Cho
Rafail Ostrovsky
Alessandra Scafuro
Ivan Visconti
2012
conf/tcc
Resettable Statistical Zero Knowledge.
Sanjam Garg
Rafail Ostrovsky
Ivan Visconti
Akshay Wadia
2011
conf/ctrsa
Secure Set Intersection with Untrusted Hardware Tokens.
Marc Fischlin
Benny Pinkas
Ahmad-Reza Sadeghi
Thomas Schneider
Ivan Visconti
2010
conf/fc
Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports.
Vincenzo Auletta
Carlo Blundo
Angelo De Caro
Emiliano De Cristofaro
Giuseppe Persiano
Ivan Visconti
2010
conf/acns
On RFID Privacy with Mutual Authentication and Tag Corruption.
Frederik Armknecht
Ahmad-Reza Sadeghi
Ivan Visconti
Christian Wachsmann
2010
conf/pkc
Constant-Round Concurrent Non-Malleable Statistically Binding Commitments and Decommitments.
Zhenfu Cao
Ivan Visconti
Zongyang Zhang
2010
conf/tcc
Efficiency Preserving Transformations for Concurrent Non-malleable Zero Knowledge.
Rafail Ostrovsky
Omkant Pandey
Ivan Visconti
2009
conf/crypto
Collusion-Free Multiparty Computation in the Mediated Model.
Joël Alwen
Jonathan Katz
Yehuda Lindell
Giuseppe Persiano
Abhi Shelat
Ivan Visconti
2009
conf/esorics
Location Privacy in RFID Applications.
Ahmad-Reza Sadeghi
Ivan Visconti
Christian Wachsmann
2009
conf/africacrypt
Co-sound Zero-Knowledge with Public Keys.
Carmine Ventre
Ivan Visconti
2009
conf/tcc
Simulation-Based Concurrent Non-malleable Commitments and Decommitments.
Rafail Ostrovsky
Giuseppe Persiano
Ivan Visconti
2009
conf/cans
Anonymizer-Enabled Security and Privacy for RFID.
Ahmad-Reza Sadeghi
Ivan Visconti
Christian Wachsmann
2008
conf/crypto
Collusion-Free Protocols in the Mediated Model.
Joël Alwen
Abhi Shelat
Ivan Visconti
2008
conf/esorics
Improved Security Notions and Protocols for Non-transferable Identification.
Carlo Blundo
Giuseppe Persiano
Ahmad-Reza Sadeghi
Ivan Visconti
2008
conf/esorics
User Privacy in Transport Systems Based on RFID E-Tickets.
Ahmad-Reza Sadeghi
Ivan Visconti
Christian Wachsmann
2008
conf/pkc
Completely Non-malleable Encryption Revisited.
Carmine Ventre
Ivan Visconti
2006
conf/tcc
Mercurial Commitments: Minimal Assumptions and Efficient Constructions.
Dario Catalano
Yevgeniy Dodis
Ivan Visconti
2005
conf/crypto
Impossibility and Feasibility Results for Zero Knowledge with Public Keys.
Joël Alwen
Giuseppe Persiano
Ivan Visconti
2004
conf/crypto
Constant-Round Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key Model.
Giovanni Di Crescenzo
Giuseppe Persiano
Ivan Visconti
2004
conf/fc
An Efficient and Usable Multi-show Non-transferable Anonymous Credential System.
Giuseppe Persiano
Ivan Visconti
2004
conf/asiacrypt
Improved Setup Assumptions for 3-Round Resettable Zero Knowledge.
Giovanni Di Crescenzo
Giuseppe Persiano
Ivan Visconti
2003
conf/acisp
An Anonymous Credential System and a Privacy-Aware PKI.
Pino Persiano
Ivan Visconti
2000
conf/ccs
User privacy issues regarding certificates and the TLS protocol: the design and implementation of the SPSL protocol.
Pino Persiano
Ivan Visconti
Coauthors
Abhi Shelat
(2)
Abhishek Jain
(4)
Abishek Kumarasubramanian
(1)
Ahmad-Reza Sadeghi
(6)
Akshay Wadia
(2)
Alessandra Scafuro
(8)
Alexandra Dmitrienko
(1)
Amit Sahai
(1)
Andrea Vitaletti
(2)
Angelo De Caro
(1)
Benny Pinkas
(1)
Carlo Blundo
(2)
Carmine Ventre
(2)
Chongwon Cho
(1)
Christian Wachsmann
(4)
Claudio Orlandi
(1)
Dakshita Khurana
(1)
Daniele Friolo
(4)
Daniele Venturi
(3)
Dario Catalano
(1)
Divesh Aggarwal
(1)
Emiliano De Cristofaro
(1)
Emmanuela Orsini
(1)
Frederik Armknecht
(1)
Gennaro Avitabile
(3)
Giovanni Di Crescenzo
(2)
Giuseppe Persiano
(14)
Ivan Visconti
(62)
João Ribeiro
(1)
Joël Alwen
(3)
Jonathan Katz
(1)
Kai-Min Chung
(1)
Luigi Catuogno
(1)
Luisa Siniscalchi
(12)
Lukas Petzi
(1)
Maciej Obremski
(1)
Marc Fischlin
(1)
Marco Zecchini
(2)
Melissa Chase
(2)
Michele Ciampi
(9)
Michele Masullo
(1)
Muthuramakrishnan Venkitasubramaniam
(1)
Nishanth Chandran
(1)
Omkant Pandey
(1)
Pierpaolo Della Monica
(1)
Pino Persiano
(2)
Rafael Pass
(1)
Rafail Ostrovsky
(23)
Roberto Gassirà
(1)
Saikrishna Badrinarayanan
(3)
Sanjam Garg
(2)
Silas Richelson
(2)
Thomas Schneider
(1)
Vanishree Rao
(2)
Vincenzo Auletta
(1)
Vincenzo Botta
(4)
Vincenzo Iovino
(1)
Vipul Goyal
(2)
Wutichai Chongchitmate
(2)
Yehuda Lindell
(1)
Yevgeniy Dodis
(1)
Yvo Desmedt
(1)
Zhenfu Cao
(1)
Zongyang Zhang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to