Antonio Faonio
Orcid: 0000-0002-7152-6478
According to our database1,
Antonio Faonio
authored at least 30 papers
between 2014 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025
2024
Lookup Arguments: Improvements, Extensions and Applications to Zero-Knowledge Decision Trees.
Proceedings of the Public-Key Cryptography - PKC 2024, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
Proceedings of the Theory of Cryptography - 21st International Conference, 2023
Almost Tightly-Secure Re-randomizable and Replayable CCA-Secure Public Key Encryption.
Proceedings of the Public-Key Cryptography - PKC 2023, 2023
2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the Security and Cryptography for Networks - 13th International Conference, 2022
Proceedings of the Topics in Cryptology - CT-RSA 2022, 2022
Proceedings of the Cryptology and Network Security - 21st International Conference, 2022
2021
Continuously Non-malleable Secret Sharing: Joint Tampering, Plain Model and Capacity.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021
The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021
Proceedings of the Cryptology and Network Security - 20th International Conference, 2021
Lunar: A Toolbox for More Efficient Universal and Updatable zkSNARKs and Commit-and-Prove Extensions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021
2020
Non-malleable Secret Sharing Against Bounded Joint-Tampering Attacks in the Plain Model.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020
Improving the Efficiency of Re-randomizable and Replayable CCA Secure Public Key Encryption.
Proceedings of the Applied Cryptography and Network Security, 2020
2019
Proceedings of the Theory of Cryptography - 17th International Conference, 2019
Proceedings of the Topics in Cryptology - CT-RSA 2019, 2019
Non-malleable Secret Sharing in the Computational Setting: Adaptive Tampering, Noisy-Leakage Resilience, and Improved Rate.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019
Structure-Preserving and Re-randomizable RCCA-Secure Public Key Encryption and Its Applications.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019
Proceedings of the Applied Cryptography and Network Security, 2019
2018
Proceedings of the Applied Cryptography and Network Security, 2018
2017
Fully leakage-resilient signatures revisited: Graceful degradation, noisy leakage, and construction in the bounded-retrieval model.
Theor. Comput. Sci., 2017
Proceedings of the Public-Key Cryptography - PKC 2017, 2017
Proceedings of the Public-Key Cryptography - PKC 2017, 2017
Proceedings of the Public-Key Cryptography - PKC 2017, 2017
2016
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016
2015
Proceedings of the Cryptography and Coding - 15th IMA International Conference, 2015
Proceedings of the Automata, Languages, and Programming - 42nd International Colloquium, 2015
2014
Proceedings of the Security and Cryptography for Networks - 9th International Conference, 2014
Proceedings of the Applied Cryptography and Network Security, 2014