Mario Di Raimondo

Orcid: 0000-0002-5531-1098

According to our database1, Mario Di Raimondo authored at least 15 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Implementation and Performance Analysis of Homomorphic Signature Schemes.
IACR Cryptol. ePrint Arch., 2024

2020
Mon$\mathbb {Z}_{2^{k}}$a: Fast Maliciously Secure Two Party Computation on $\mathbb {Z}_{2^{k}}$.
Proceedings of the Public-Key Cryptography - PKC 2020, 2020

2019
Monℤ<sub>2<sup>k</sup></sub>a: Fast Maliciously Secure Two Party Computation on ℤ<sub>2<sup>k</sup></sub>.
IACR Cryptol. ePrint Arch., 2019

2016
Verifiable Pattern Matching on Outsourced Texts.
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016

2013
Off-line/on-line signatures revisited: a general unifying paradigm, efficient threshold variants and experimental results.
Int. J. Inf. Sec., 2013

2011
Zero-Knowledge Sets With Short Proofs.
IEEE Trans. Inf. Theory, 2011

Fully Non-interactive Onion Routing with Forward-Secrecy.
Proceedings of the Applied Cryptography and Network Security, 2011

2010
Privacy-preserving fingercode authentication.
Proceedings of the Multimedia and Security Workshop, 2010

A privacy-compliant fingerprint recognition system based on homomorphic encryption and Fingercode templates.
Proceedings of the Fourth IEEE International Conference on Biometrics: Theory Applications and Systems, 2010

2008
Off-Line/On-Line Signatures: Theoretical Aspects and Experimental Results.
Proceedings of the Public Key Cryptography, 2008

2006
Deniable authentication and key exchange.
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006

2005
Secure multiplication of shared secrets in the exponent.
Inf. Process. Lett., 2005

Secure off-the-record messaging.
Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, 2005

New approaches for deniable authentication.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

2003
Provably Secure Threshold Password-Authenticated Key Exchange.
Proceedings of the Advances in Cryptology, 2003


  Loading...