Antonio Faonio

Orcid: 0000-0002-7152-6478

According to our database1, Antonio Faonio authored at least 30 papers between 2014 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
SNARKs for Virtual Machines Are Non-malleable.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

2024
Lookup Arguments: Improvements, Extensions and Applications to Zero-Knowledge Decision Trees.
Proceedings of the Public-Key Cryptography - PKC 2024, 2024

Real-World Universal zkSNARKs are Non-Malleable.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
From Polynomial IOP and Commitments to Non-malleable zkSNARKs.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023

Almost Tightly-Secure Re-randomizable and Replayable CCA-Secure Public Key Encryption.
Proceedings of the Public-Key Cryptography - PKC 2023, 2023

2022
Short Non-Malleable Codes from Related-Key Secure Block Ciphers, Revisited.
IACR Cryptol. ePrint Arch., 2022

Mix-Nets from Re-randomizable and Replayable CCA-Secure Public-Key Encryption.
Proceedings of the Security and Cryptography for Networks - 13th International Conference, 2022

Subversion-Resilient Enhanced Privacy ID.
Proceedings of the Topics in Cryptology - CT-RSA 2022, 2022

Auditable Asymmetric Password Authenticated Public Key Establishment.
Proceedings of the Cryptology and Network Security - 21st International Conference, 2022

2021
Continuously Non-malleable Secret Sharing: Joint Tampering, Plain Model and Capacity.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

Practical Continuously Non-malleable Randomness Encoders in the Random Oracle Model.
Proceedings of the Cryptology and Network Security - 20th International Conference, 2021

Lunar: A Toolbox for More Efficient Universal and Updatable zkSNARKs and Commit-and-Prove Extensions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

2020
Non-malleable Secret Sharing Against Bounded Joint-Tampering Attacks in the Plain Model.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

Improving the Efficiency of Re-randomizable and Replayable CCA Secure Public Key Encryption.
Proceedings of the Applied Cryptography and Network Security, 2020

2019
Continuously Non-malleable Secret Sharing for General Access Structures.
Proceedings of the Theory of Cryptography - 17th International Conference, 2019

Efficient Fully-Leakage Resilient One-More Signature Schemes.
Proceedings of the Topics in Cryptology - CT-RSA 2019, 2019

Non-malleable Secret Sharing in the Computational Setting: Adaptive Tampering, Noisy-Leakage Resilience, and Improved Rate.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

Structure-Preserving and Re-randomizable RCCA-Secure Public Key Encryption and Its Applications.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

Rate-Optimizing Compilers for Continuously Non-malleable Codes.
Proceedings of the Applied Cryptography and Network Security, 2019

2018
Continuously Non-malleable Codes with Split-State Refresh.
Proceedings of the Applied Cryptography and Network Security, 2018

2017
Fully leakage-resilient signatures revisited: Graceful degradation, noisy leakage, and construction in the bounded-retrieval model.
Theor. Comput. Sci., 2017

Fully Leakage-Resilient Codes.
Proceedings of the Public-Key Cryptography - PKC 2017, 2017

Non-malleable Codes with Split-State Refresh.
Proceedings of the Public-Key Cryptography - PKC 2017, 2017

Predictable Arguments of Knowledge.
Proceedings of the Public-Key Cryptography - PKC 2017, 2017

2016
Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage.
Proceedings of the Cryptography and Coding - 15th IMA International Conference, 2015

Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation.
Proceedings of the Automata, Languages, and Programming - 42nd International Colloquium, 2015

2014
Proofs of Space: When Space Is of the Essence.
Proceedings of the Security and Cryptography for Networks - 9th International Conference, 2014

Certified Bitcoins.
Proceedings of the Applied Cryptography and Network Security, 2014


  Loading...