Dario Catalano
Dario Catalano
Professor of Computer Science, University of Catania
Verified email at
Cited by
Cited by
Coercion-resistant electronic elections
A Juels, D Catalano, M Jakobsson
Towards Trustworthy Elections, 37-63, 2010
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
M Abdalla, M Bellare, D Catalano, E Kiltz, T Kohno, T Lange, ...
Annual International Cryptology Conference, 205-222, 2005
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
M Abdalla, M Bellare, D Catalano, E Kiltz, T Kohno, T Lange, ...
Journal of cryptology 21, 350-391, 2008
A simple public-key cryptosystem with a double trapdoor decryption mechanism and its applications
E Bresson, D Catalano, D Pointcheval
Advances in Cryptology-ASIACRYPT 2003: 9th International Conference on the …, 2003
Vector commitments and their applications
D Catalano, D Fiore
Public-Key Cryptography–PKC 2013: 16th International Conference on Practice …, 2013
Privacy-preserving fingercode authentication
M Barni, T Bianchi, D Catalano, M Di Raimondo, R Donida Labati, P Failla, ...
Proceedings of the 12th ACM workshop on Multimedia and security, 231-240, 2010
Contemporary Cryptology (Advanced Courses in Mathematics-CRM Barcelona)
D Catalano, R Cramer, I Damgard, GD Crescenzo, D Pointcheval, ...
Birkhauser, 2005
Identity-based encryption gone wild
M Abdalla, D Catalano, AW Dent, J Malone-Lee, G Neven, NP Smart
Automata, Languages and Programming: 33rd International Colloquium, ICALP …, 2006
Paillier's cryptosystem revisited
D Catalano, R Gennaro, N Howgrave-Graham, PQ Nguyen
Proceedings of the 8th ACM Conference on Computer and Communications …, 2001
A privacy-compliant fingerprint recognition system based on homomorphic encryption and fingercode templates
M Barni, T Bianchi, D Catalano, M Di Raimondo, RD Labati, P Failla, ...
2010 Fourth IEEE International Conference on Biometrics: Theory …, 2010
Practical homomorphic MACs for arithmetic circuits
D Catalano, D Fiore
Advances in Cryptology–EUROCRYPT 2013: 32nd Annual International Conference …, 2013
Homomorphic signatures with efficient verification for polynomial functions
D Catalano, D Fiore, B Warinschi
Advances in Cryptology–CRYPTO 2014: 34th Annual Cryptology Conference, Santa …, 2014
ECRYPT II yearly report on algorithms and keysizes (2011–2012)
N Smart, S Babbage, D Catalano, C Cid, B Weger, O Dunkelman, M Ward
European network of excellence in cryptology (ECRYPT II), 2012
Practical functional encryption for quadratic functions with applications to predicate encryption
CEZ Baltico, D Catalano, D Fiore, R Gay
Advances in Cryptology–CRYPTO 2017: 37th Annual International Cryptology …, 2017
Efficient network coding signatures in the standard model
D Catalano, D Fiore, B Warinschi
Public Key Cryptography–PKC 2012: 15th International Conference on Practice …, 2012
Using linearly-homomorphic encryption to evaluate degree-2 functions on encrypted data
D Catalano, D Fiore
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
Multi-input functional encryption for inner products: Function-hiding realizations and constructions without pairings
M Abdalla, D Catalano, D Fiore, R Gay, B Ursu
Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018
Constant round authenticated group key agreement via distributed computation
E Bresson, D Catalano
Public Key Cryptography, 115-129, 2004
Efficient two-party password-based key exchange protocols in the UC framework
M Abdalla, D Catalano, C Chevalier, D Pointcheval
Topics in Cryptology–CT-RSA 2008: The Cryptographers’ Track at the RSA …, 2008
Computing inverses over a shared secret modulus
D Catalano, R Gennaro, S Halevi
Advances in Cryptology—EUROCRYPT 2000: International Conference on the …, 2000
The system can't perform the operation now. Try again later.
Articles 1–20