Public key encryption with keyword search D Boneh, GD Crescenzo, R Ostrovsky, G Persiano International conference on the theory and applications of cryptographic …, 2004 | 3720 | 2004 |
Halftone visual cryptography Z Zhou, GR Arce, G Di Crescenzo IEEE transactions on image processing 15 (8), 2441-2453, 2006 | 528 | 2006 |
Robust non-interactive zero knowledge AD Santis, GD Crescenzo, R Ostrovsky, G Persiano, A Sahai Annual International Cryptology Conference, 566-598, 2001 | 324 | 2001 |
Halftone visual cryptography via error diffusion Z Wang, GR Arce, G Di Crescenzo IEEE transactions on information forensics and security 4 (3), 383-396, 2009 | 312 | 2009 |
Non-interactive and non-malleable commitment G Di Crescenzo, Y Ishai, R Ostrovsky Proceedings of the thirtieth annual ACM symposium on Theory of computing …, 1998 | 208 | 1998 |
Single database private information retrieval implies oblivious transfer GD Crescenzo, T Malkin, R Ostrovsky International Conference on the Theory and Applications of Cryptographic …, 2000 | 185 | 2000 |
Providing secure, instantaneous, directory-integrated, multiparty, communications services C Chung, S Dalal, G Crescenzo, R Graveman, M Long, G Patton, H Shim US Patent App. 10/002,882, 2002 | 180 | 2002 |
On monotone formula closure of SZK A De Santis, G Di Crescenzo, G Persiano, M Yung Proceedings 35th Annual Symposium on Foundations of Computer Science, 454-465, 1994 | 166 | 1994 |
Perfectly secure password protocols in the bounded retrieval model GD Crescenzo, R Lipton, S Walfish Theory of Cryptography Conference, 225-244, 2006 | 164 | 2006 |
Conditional oblivious transfer and timed-release encryption GD Crescenzo, R Ostrovsky, S Rajagopalan International Conference on the Theory and Applications of Cryptographic …, 1999 | 162 | 1999 |
Public key encryption with searchable keywords based on Jacobi symbols GD Crescenzo, V Saraswat International Conference on Cryptology in India, 282-296, 2007 | 142 | 2007 |
Efficient and non-interactive non-malleable commitment GD Crescenzo, J Katz, R Ostrovsky, A Smith International Conference on the Theory and Applications of Cryptographic …, 2001 | 138 | 2001 |
Multi-secret sharing schemes C Blundo, AD Santis, GD Crescenzo, AG Gaggia, U Vaccaro Annual International Cryptology Conference, 150-163, 1994 | 131 | 1994 |
Universal service-providers for private information retrieval G Di Crescenzo, Y Ishai, R Ostrovsky Journal of Cryptology 14 (1), 37-74, 2001 | 123 | 2001 |
How to forget a secret GD Crescenzo, N Ferguson, R Impagliazzo, M Jakobsson Annual Symposium on Theoretical Aspects of Computer Science, 500-509, 1999 | 104 | 1999 |
Method and system for secure session establishment using identity-based encryption (VDTLS) G Di Crescenzo, S Pietrowicz, HS Shim, T Zhang US Patent 9,094,206, 2015 | 98 | 2015 |
On concurrent zero-knowledge with pre-processing GD Crescenzo, R Ostrovsky Annual International Cryptology Conference, 485-502, 1999 | 73 | 1999 |
Constant-round resettable zero knowledge with concurrent soundness in the bare public-key model GD Crescenzo, G Persiano, I Visconti Annual International Cryptology Conference, 237-253, 2004 | 68 | 2004 |
Security amplification by composition: The case of doubly-iterated, ideal ciphers W Aiello, M Bellare, GD Crescenzo, R Venkatesan Annual International Cryptology Conference, 390-407, 1998 | 66 | 1998 |
Multiplicative non-abelian sharing schemes and their application to threshold cryptography Y Desmedt, GD Crescenzo, M Burmester International Conference on the Theory and Application of Cryptology, 19-32, 1994 | 64 | 1994 |