Carlo Brunetta

Orcid: 0000-0001-9363-7585

According to our database1, Carlo Brunetta authored at least 17 papers between 2015 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Stabilizing the Staking Rate, Dynamically Distributed Inflation and Delay Induced Oscillations.
CoRR, October, 2025

An Approach to Computable Contracts with Verifiable Computation Outsourcing and Blockchain Transactions.
IACR Cryptol. ePrint Arch., 2025

Influence of Faulty Signatures in Batch Verification in VANET.
Proceedings of the 8th IEEE International Conference on Industrial Cyber-Physical Systems, 2025

2024
A Scheme for Distributed Vehicle Authentication and Revocation in Decentralized VANETs.
IEEE Access, 2024

SoK: Public Key Encryption with Openings.
Proceedings of the Public-Key Cryptography - PKC 2024, 2024

Leakage Certification Made Simple.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

2023
Multi-instance Secure Public-Key Encryption.
Proceedings of the Public-Key Cryptography - PKC 2023, 2023

2022
Modelling cryptographic distinguishers using machine learning.
J. Cryptogr. Eng., 2022

2021
Turn-Based Communication Channels.
Proceedings of the Provable and Practical Security, 2021

sf DEVA: Decentralized, Verifiable Secure Aggregation for Privacy-Preserving Learning.
Proceedings of the Information Security - 24th International Conference, 2021

Non-interactive, Secure Verifiable Aggregation for Decentralized, Privacy-Preserving Learning.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021

2019
On hidden sums compatible with a given block cipher diffusion layer.
Discret. Math., 2019

Code-Based Zero Knowledge PRF Arguments.
Proceedings of the Information Security - 22nd International Conference, 2019

2018
Lattice-Based Simulatable VRFs: Challenges and Future Directions.
J. Internet Serv. Inf. Secur., 2018

\mathsf HIKE : Walking the Privacy Trail.
Proceedings of the Cryptology and Network Security - 17th International Conference, 2018

2017
A Differentially Private Encryption Scheme.
Proceedings of the Information Security - 20th International Conference, 2017

2015
Towards the verification of image integrity in online news.
Proceedings of the 2015 IEEE International Conference on Multimedia & Expo Workshops, 2015


  Loading...