What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Giuseppe Persiano
Google Scholar
ORCID:
0000-0001-6579-4807
46
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/eurocrypt
Anamorphism Beyond One-to-One Messaging: Public-Key with Anamorphic Broadcast Mode.
Xuan Thanh Do
Giuseppe Persiano
Duong Hieu Phan
Moti Yung
2025
conf/eurocrypt
Plinko: Single-Server PIR with Efficient Updates via Invertible PRFs.
Alexander Hoover
Sarvar Patel
Giuseppe Persiano
Kevin Yeo
2024
conf/ccs
Efficient Secret Sharing for Large-Scale Applications.
Sarvar Patel
Giuseppe Persiano
Joon Young Seo
Kevin Yeo
2024
conf/crypto
Public-Key Anamorphism in (CCA-Secure) Public-Key Encryption and Beyond.
Giuseppe Persiano
Duong Hieu Phan
Moti Yung
2023
journals/popets
The Self-Anti-Censorship Nature of Encryption: On the Prevalence of Anamorphic Cryptography.
Miroslaw Kutylowski
Giuseppe Persiano
Duong Hieu Phan
Moti Yung
Marcin Zawada
2023
journals/popets
Dynamic Volume-Hiding Encrypted Multi-Maps with Applications to Searchable Encryption.
Ghous Amjad
Sarvar Patel
Giuseppe Persiano
Kevin Yeo
Moti Yung
2023
conf/crypto
Anamorphic Signatures: Secrecy from a Dictator Who Only Permits Authentication!
Miroslaw Kutylowski
Giuseppe Persiano
Duong Hieu Phan
Moti Yung
Marcin Zawada
2023
conf/crypto
Limits of Breach-Resistant and Snapshot-Oblivious RAMs.
Giuseppe Persiano
Kevin Yeo
2023
conf/eurocrypt
Lower Bound Framework for Differentially Private and Oblivious Data Structures.
Giuseppe Persiano
Kevin Yeo
2022
conf/eurocrypt
Anamorphic Encryption: Private Communication Against a Dictator.
Giuseppe Persiano
Duong Hieu Phan
Moti Yung
2021
conf/asiacrypt
Efficient Boolean Search over Encrypted Data with Reduced Leakage.
Sarvar Patel
Giuseppe Persiano
Joon Young Seo
Kevin Yeo
2020
conf/crypto
Lower Bounds for Encrypted Multi-Maps and Searchable Encryption in the Leakage Cell Probe Model.
Sarvar Patel
Giuseppe Persiano
Kevin Yeo
2019
conf/ccs
Mitigating Leakage in Secure Cloud-Hosted Data Structures: Volume-Hiding for Multi-Maps via Hashing.
Sarvar Patel
Giuseppe Persiano
Kevin Yeo
Moti Yung
2019
conf/eurocrypt
Lower Bounds for Differentially Private RAMs.
Giuseppe Persiano
Kevin Yeo
2018
conf/ccs
Private Stateful Information Retrieval.
Sarvar Patel
Giuseppe Persiano
Kevin Yeo
2018
conf/crypto
Continuously Non-Malleable Codes in the Split-State Model from Minimal Assumptions.
Rafail Ostrovsky
Giuseppe Persiano
Daniele Venturi
Ivan Visconti
2018
conf/esorics
Symmetric Searchable Encryption with Sharing and Unsharing.
Sarvar Patel
Giuseppe Persiano
Kevin Yeo
2017
conf/fc
Controlled Homomorphic Encryption: Definition and Construction.
Yvo Desmedt
Vincenzo Iovino
Giuseppe Persiano
Ivan Visconti
2017
conf/eurosp
Secure Queries on Encrypted Multi-writer Tables.
Angelo Massimo Perillo
Giuseppe Persiano
Alberto Trombetta
2016
conf/eurocrypt
Online/Offline OR Composition of Sigma Protocols.
Michele Ciampi
Giuseppe Persiano
Alessandra Scafuro
Luisa Siniscalchi
Ivan Visconti
2016
conf/tcc
Improved OR-Composition of Sigma-Protocols.
Michele Ciampi
Giuseppe Persiano
Alessandra Scafuro
Luisa Siniscalchi
Ivan Visconti
2016
conf/tcc
A Transform for NIZK Almost as Efficient and General as the Fiat-Shamir Transform Without Programmable Random Oracles.
Michele Ciampi
Giuseppe Persiano
Luisa Siniscalchi
Ivan Visconti
2015
conf/crypto
Impossibility of Black-Box Simulation Against Leakage Attacks.
Rafail Ostrovsky
Giuseppe Persiano
Ivan Visconti
2013
conf/crypto
On the Achievability of Simulation-Based Security for Functional Encryption.
Angelo De Caro
Vincenzo Iovino
Abhishek Jain
Adam O'Neill
Omer Paneth
Giuseppe Persiano
2010
conf/ccs
Information security for sensors by overwhelming random sequences and permutations.
Shlomi Dolev
Niv Gilboa
Marina Kopeetsky
Giuseppe Persiano
Paul G. Spirakis
2010
conf/fc
Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports.
Vincenzo Auletta
Carlo Blundo
Angelo De Caro
Emiliano De Cristofaro
Giuseppe Persiano
Ivan Visconti
2010
conf/cans
Predicate Encryption with Partial Public Keys.
Carlo Blundo
Vincenzo Iovino
Giuseppe Persiano
2009
conf/crypto
Collusion-Free Multiparty Computation in the Mediated Model.
Joël Alwen
Jonathan Katz
Yehuda Lindell
Giuseppe Persiano
Abhi Shelat
Ivan Visconti
2009
conf/esorics
Untraceable Tags Based on Mild Assumptions.
Carlo Blundo
Angelo De Caro
Giuseppe Persiano
2009
conf/tcc
Simulation-Based Concurrent Non-malleable Commitments and Decommitments.
Rafail Ostrovsky
Giuseppe Persiano
Ivan Visconti
2009
conf/cans
Private-Key Hidden Vector Encryption with Key Confidentiality.
Carlo Blundo
Vincenzo Iovino
Giuseppe Persiano
2008
conf/esorics
A Distributed Implementation of the Certified Information Access Service.
Carlo Blundo
Emiliano De Cristofaro
Aniello Del Sorbo
Clemente Galdi
Giuseppe Persiano
2008
conf/esorics
Improved Security Notions and Protocols for Non-transferable Identification.
Carlo Blundo
Giuseppe Persiano
Ahmad-Reza Sadeghi
Ivan Visconti
2005
conf/crypto
Impossibility and Feasibility Results for Zero Knowledge with Public Keys.
Joël Alwen
Giuseppe Persiano
Ivan Visconti
2004
conf/crypto
Constant-Round Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key Model.
Giovanni Di Crescenzo
Giuseppe Persiano
Ivan Visconti
2004
conf/fc
An Efficient and Usable Multi-show Non-transferable Anonymous Credential System.
Giuseppe Persiano
Ivan Visconti
2004
conf/eurocrypt
Public Key Encryption with Keyword Search.
Dan Boneh
Giovanni Di Crescenzo
Rafail Ostrovsky
Giuseppe Persiano
2004
conf/asiacrypt
Improved Setup Assumptions for 3-Round Resettable Zero Knowledge.
Giovanni Di Crescenzo
Giuseppe Persiano
Ivan Visconti
2001
conf/crypto
Robust Non-interactive Zero Knowledge.
Alfredo De Santis
Giovanni Di Crescenzo
Rafail Ostrovsky
Giuseppe Persiano
Amit Sahai
1998
conf/ccs
Communication-Efficient Anonymous Group Identification.
Alfredo De Santis
Giovanni Di Crescenzo
Giuseppe Persiano
1996
journals/joc
The Power of Preprocessing in Zero-Knowledge Proofs of Knowledge.
Alfredo De Santis
Giuseppe Persiano
1994
conf/asiacrypt
Zero-Knowledge Proofs of Computational Power in the Shared String Model.
Alfredo De Santis
Tatsuaki Okamoto
Giuseppe Persiano
1993
conf/crypto
Secret Sharing and Perfect Zero Knowledge.
Alfredo De Santis
Giovanni Di Crescenzo
Giuseppe Persiano
1990
conf/eurocrypt
Public-Randomness in Public Key Cryptography.
Alfredo De Santis
Giuseppe Persiano
1988
conf/crypto
Non-Interactive Zero-Knowledge with Preprocessing.
Alfredo De Santis
Silvio Micali
Giuseppe Persiano
1987
conf/crypto
Non-Interactive Zero-Knowledge Proof Systems.
Alfredo De Santis
Silvio Micali
Giuseppe Persiano
Coauthors
Abhi Shelat
(1)
Abhishek Jain
(1)
Adam O'Neill
(1)
Ahmad-Reza Sadeghi
(1)
Alberto Trombetta
(1)
Alessandra Scafuro
(2)
Alexander Hoover
(1)
Alfredo De Santis
(8)
Amit Sahai
(1)
Angelo De Caro
(3)
Angelo Massimo Perillo
(1)
Aniello Del Sorbo
(1)
Carlo Blundo
(6)
Clemente Galdi
(1)
Dan Boneh
(1)
Daniele Venturi
(1)
Duong Hieu Phan
(5)
Emiliano De Cristofaro
(2)
Ghous Amjad
(1)
Giovanni Di Crescenzo
(6)
Giuseppe Persiano
(46)
Ivan Visconti
(14)
Joël Alwen
(2)
Jonathan Katz
(1)
Joon Young Seo
(2)
Kevin Yeo
(11)
Luisa Siniscalchi
(3)
Marcin Zawada
(2)
Marina Kopeetsky
(1)
Michele Ciampi
(3)
Miroslaw Kutylowski
(2)
Moti Yung
(7)
Niv Gilboa
(1)
Omer Paneth
(1)
Paul G. Spirakis
(1)
Rafail Ostrovsky
(5)
Sarvar Patel
(8)
Shlomi Dolev
(1)
Silvio Micali
(2)
Tatsuaki Okamoto
(1)
Vincenzo Auletta
(1)
Vincenzo Iovino
(4)
Xuan Thanh Do
(1)
Yehuda Lindell
(1)
Yvo Desmedt
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to