default search action
Dario Catalano
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c60]Dario Catalano, Emanuele Giunta, Francesco Migliaro:
Limits of Black-Box Anamorphic Encryption. CRYPTO (2) 2024: 352-383 - [c59]Dario Catalano, Emanuele Giunta, Francesco Migliaro:
Anamorphic Encryption: New Constructions and Homomorphic Realizations. EUROCRYPT (2) 2024: 33-62 - [i32]Dario Catalano, Emanuele Giunta, Francesco Migliaro:
Anamorphic Encryption: New Constructions and Homomorphic Realizations. IACR Cryptol. ePrint Arch. 2024: 486 (2024) - [i31]Davide Carnemolla, Dario Catalano, Mario Di Raimondo, Federico Savasta:
Implementation and Performance Analysis of Homomorphic Signature Schemes. IACR Cryptol. ePrint Arch. 2024: 655 (2024) - [i30]Dario Catalano, Emanuele Giunta, Francesco Migliaro:
Limits of Black-Box Anamorphic Encryption. IACR Cryptol. ePrint Arch. 2024: 1098 (2024) - [i29]Dario Catalano, Emanuele Giunta, Francesco Migliaro:
Generic Anamorphic Encryption, Revisited: New Limitations and Constructions. IACR Cryptol. ePrint Arch. 2024: 1119 (2024) - 2023
- [j19]Guilhem Castagnos, Dario Catalano, Fabien Laguillaumie, Federico Savasta, Ida Tucker:
Bandwidth-efficient threshold EC-DSA revisited: Online/offline extensions, identifiable aborts proactive and adaptive security. Theor. Comput. Sci. 939: 78-104 (2023) - [c58]Dario Catalano, Dario Fiore, Emanuele Giunta:
Efficient and Universally Composable Single Secret Leader Election from Pairings. Public Key Cryptography (1) 2023: 471-499 - [c57]David Balbás, Dario Catalano, Dario Fiore, Russell W. F. Lai:
Chainable Functional Commitments for Unbounded-Depth Circuits. TCC (3) 2023: 363-393 - 2022
- [j18]Dario Catalano, Georg Fuchsbauer, Azam Soleimanian:
Double-authentication-preventing signatures in the standard model. J. Comput. Secur. 30(1): 3-38 (2022) - [c56]Dario Catalano, Dario Fiore, Ida Tucker:
Additive-Homomorphic Functional Commitments and Applications to Homomorphic Signatures. ASIACRYPT (4) 2022: 159-188 - [c55]Dario Catalano, Dario Fiore, Emanuele Giunta:
Adaptively Secure Single Secret Leader Election from DDH. PODC 2022: 430-439 - [c54]Dario Catalano, Dario Fiore, Rosario Gennaro, Emanuele Giunta:
On the Impossibility of Algebraic Vector Commitments in Pairing-Free Groups. TCC (2) 2022: 274-299 - [i28]Dario Catalano, Dario Fiore, Emanuele Giunta:
Adaptively Secure Single Secret Leader Election from DDH. IACR Cryptol. ePrint Arch. 2022: 687 (2022) - [i27]Dario Catalano, Dario Fiore, Rosario Gennaro, Emanuele Giunta:
On the Impossibility of Algebraic Vector Commitments in Pairing-Free Groups. IACR Cryptol. ePrint Arch. 2022: 696 (2022) - [i26]Dario Catalano, Dario Fiore, Ida Tucker:
Additive-Homomorphic Functional Commitments and Applications to Homomorphic Signatures. IACR Cryptol. ePrint Arch. 2022: 1331 (2022) - [i25]David Balbás, Dario Catalano, Dario Fiore, Russell W. F. Lai:
Functional Commitments for Circuits from Falsifiable Assumptions. IACR Cryptol. ePrint Arch. 2022: 1365 (2022) - 2021
- [i24]Guilhem Castagnos, Dario Catalano, Fabien Laguillaumie, Federico Savasta, Ida Tucker:
Bandwidth-efficient threshold EC-DSA revisited: Online/Offline Extensions, Identifiable Aborts, Proactivity and Adaptive Security. IACR Cryptol. ePrint Arch. 2021: 291 (2021) - [i23]Dario Catalano, Dario Fiore, Emanuele Giunta:
Efficient and Universally Composable Single Secret Leader Election from Pairings. IACR Cryptol. ePrint Arch. 2021: 344 (2021) - 2020
- [c53]Michel Abdalla, Dario Catalano, Romain Gay, Bogdan Ursu:
Inner-Product Functional Encryption with Fine-Grained Access Control. ASIACRYPT (3) 2020: 467-497 - [c52]Guilhem Castagnos, Dario Catalano, Fabien Laguillaumie, Federico Savasta, Ida Tucker:
Bandwidth-Efficient Threshold EC-DSA. Public Key Cryptography (2) 2020: 266-296 - [c51]Dario Catalano, Mario Di Raimondo, Dario Fiore, Irene Giacomelli:
Mon$\mathbb {Z}_{2^{k}}$a: Fast Maliciously Secure Two Party Computation on $\mathbb {Z}_{2^{k}}$. Public Key Cryptography (2) 2020: 357-386 - [c50]Dario Catalano, Georg Fuchsbauer, Azam Soleimanian:
Double-Authentication-Preventing Signatures in the Standard Model. SCN 2020: 338-358 - [i22]Guilhem Castagnos, Dario Catalano, Fabien Laguillaumie, Federico Savasta, Ida Tucker:
Bandwidth-efficient threshold EC-DSA. IACR Cryptol. ePrint Arch. 2020: 84 (2020) - [i21]Michel Abdalla, Dario Catalano, Romain Gay, Bogdan Ursu:
Inner-Product Functional Encryption with Fine-Grained Access Control. IACR Cryptol. ePrint Arch. 2020: 577 (2020) - [i20]Dario Catalano, Georg Fuchsbauer, Azam Soleimanian:
Double-Authentication-Preventing Signatures in the Standard Model. IACR Cryptol. ePrint Arch. 2020: 789 (2020)
2010 – 2019
- 2019
- [c49]Guilhem Castagnos, Dario Catalano, Fabien Laguillaumie, Federico Savasta, Ida Tucker:
Two-Party ECDSA from Hash Proof Systems and Efficient Instantiations. CRYPTO (3) 2019: 191-221 - [c48]Manuel Barbosa, Dario Catalano, Azam Soleimanian, Bogdan Warinschi:
Efficient Function-Hiding Functional Encryption: From Inner-Products to Orthogonality. CT-RSA 2019: 127-148 - [i19]Dario Catalano, Mario Di Raimondo, Dario Fiore, Irene Giacomelli:
Monℤ2ka: Fast Maliciously Secure Two Party Computation on ℤ2k. IACR Cryptol. ePrint Arch. 2019: 211 (2019) - [i18]Guilhem Castagnos, Dario Catalano, Fabien Laguillaumie, Federico Savasta, Ida Tucker:
Two-Party ECDSA from Hash Proof Systems and Efficient Instantiations. IACR Cryptol. ePrint Arch. 2019: 503 (2019) - 2018
- [j17]Dario Catalano, Dario Fiore, Luca Nizzardo:
Homomorphic signatures with sublinear public keys via asymmetric programmable hash functions. Des. Codes Cryptogr. 86(10): 2197-2246 (2018) - [j16]Dario Catalano, Mario Di Raimondo, Simone Faro:
Verifiable pattern matching on outsourced texts. J. Discrete Algorithms 51: 39-50 (2018) - [j15]Dario Catalano, Dario Fiore:
Practical Homomorphic Message Authenticators for Arithmetic Circuits. J. Cryptol. 31(1): 23-59 (2018) - [c47]Dario Catalano, Dario Fiore, Luca Nizzardo:
On the Security Notions for Homomorphic Signatures. ACNS 2018: 183-201 - [c46]Michel Abdalla, Dario Catalano, Dario Fiore, Romain Gay, Bogdan Ursu:
Multi-Input Functional Encryption for Inner Products: Function-Hiding Realizations and Constructions Without Pairings. CRYPTO (1) 2018: 597-627 - [e2]Dario Catalano, Roberto De Prisco:
Security and Cryptography for Networks - 11th International Conference, SCN 2018, Amalfi, Italy, September 5-7, 2018, Proceedings. Lecture Notes in Computer Science 11035, Springer 2018, ISBN 978-3-319-98112-3 [contents] - 2017
- [j14]Dario Catalano, Dario Fiore, Rosario Gennaro:
A certificateless approach to onion routing. Int. J. Inf. Sec. 16(3): 327-343 (2017) - [c45]Carmen Elisabetta Zaira Baltico, Dario Catalano, Dario Fiore, Romain Gay:
Practical Functional Encryption for Quadratic Functions with Applications to Predicate Encryption. CRYPTO (1) 2017: 67-98 - [c44]Manuel Barbosa, Dario Catalano, Dario Fiore:
Labeled Homomorphic Encryption - Scalable and Privacy-Preserving Processing of Outsourced Data. ESORICS (1) 2017: 146-166 - [i17]Carmen Elisabetta Zaira Baltico, Dario Catalano, Dario Fiore, Romain Gay:
Practical Functional Encryption for Quadratic Functions with Applications to Predicate Encryption. IACR Cryptol. ePrint Arch. 2017: 151 (2017) - [i16]Manuel Barbosa, Dario Catalano, Dario Fiore:
Labeled Homomorphic Encryption: Scalable and Privacy-Preserving Processing of Outsourced Data. IACR Cryptol. ePrint Arch. 2017: 326 (2017) - [i15]Michel Abdalla, Dario Catalano, Dario Fiore, Romain Gay, Bogdan Ursu:
Multi-Input Functional Encryption for Inner Products: Function-Hiding Realizations and Constructions without Pairings. IACR Cryptol. ePrint Arch. 2017: 972 (2017) - 2016
- [j13]Elisa Bertino, Dario Catalano, Qi Li, Alex X. Liu, Anna Cinzia Squicciarini, Alexey V. Vinel:
Editor's Note. IEEE Trans. Dependable Secur. Comput. 13(4): 409-410 (2016) - [c43]Dario Catalano, Mario Di Raimondo, Simone Faro:
Verifiable Pattern Matching on Outsourced Texts. SCN 2016: 333-350 - [i14]Carmen Elisabetta Zaira Baltico, Dario Catalano, Dario Fiore:
Practical Functional Encryption for Bilinear Forms. IACR Cryptol. ePrint Arch. 2016: 1104 (2016) - [i13]Dario Catalano, Dario Fiore, Luca Nizzardo:
On the Security Notions for Homomorphic Signatures. IACR Cryptol. ePrint Arch. 2016: 1175 (2016) - 2015
- [j12]Dario Catalano, Dario Fiore, Rosario Gennaro, Konstantinos Vamvourellis:
Algebraic (trapdoor) one-way functions: Constructions and applications. Theor. Comput. Sci. 592: 143-165 (2015) - [c42]Dario Catalano, Dario Fiore:
Using Linearly-Homomorphic Encryption to Evaluate Degree-2 Functions on Encrypted Data. CCS 2015: 1518-1529 - [c41]Dario Catalano, Dario Fiore, Luca Nizzardo:
Programmable Hash Functions Go Private: Constructions and Applications to (Homomorphic) Signatures with Shorter Public Keys. CRYPTO (2) 2015: 254-274 - [i12]Dario Catalano, Dario Fiore:
Practical Homomorphic MACs for Arithmetic Circuits. IACR Cryptol. ePrint Arch. 2015: 194 (2015) - [i11]Dario Catalano, Dario Fiore, Rosario Gennaro, Luca Nizzardo:
Generalizing Homomorphic MACs for Arithmetic Circuits. IACR Cryptol. ePrint Arch. 2015: 396 (2015) - [i10]Dario Catalano, Dario Fiore, Luca Nizzardo:
Programmable Hash Functions go Private: Constructions and Applications to (Homomorphic) Signatures with Shorter Public Keys. IACR Cryptol. ePrint Arch. 2015: 826 (2015) - 2014
- [j11]Michel Abdalla, Dario Catalano, Dario Fiore:
Verifiable Random Functions: Relations to Identity-Based Key Encapsulation and New Constructions. J. Cryptol. 27(3): 544-593 (2014) - [c40]Dario Catalano, Antonio Marcedone, Orazio Puglisi:
Authenticating Computation on Groups: New Homomorphic Primitives and Applications. ASIACRYPT (2) 2014: 193-212 - [c39]Dario Catalano, Dario Fiore, Bogdan Warinschi:
Homomorphic Signatures with Efficient Verification for Polynomial Functions. CRYPTO (1) 2014: 371-389 - [c38]Dario Catalano, Dario Fiore, Rosario Gennaro, Luca Nizzardo:
Generalizing Homomorphic MACs for Arithmetic Circuits. Public Key Cryptography 2014: 538-555 - [c37]Dario Catalano:
Homomorphic Signatures and Message Authentication Codes. SCN 2014: 514-519 - [i9]Dario Catalano, Dario Fiore, Bogdan Warinschi:
Homomorphic Signatures with Efficient Verification for Polynomial Functions. IACR Cryptol. ePrint Arch. 2014: 469 (2014) - [i8]Dario Catalano, Dario Fiore:
Boosting Linearly-Homomorphic Encryption to Evaluate Degree-2 Functions on Encrypted Data. IACR Cryptol. ePrint Arch. 2014: 813 (2014) - 2013
- [j10]Dario Catalano, Mario Di Raimondo, Dario Fiore, Rosario Gennaro, Orazio Puglisi:
Fully non-interactive onion routing with forward secrecy. Int. J. Inf. Sec. 12(1): 33-47 (2013) - [j9]Emmanuel Bresson, Dario Catalano, Mario Di Raimondo, Dario Fiore, Rosario Gennaro:
Off-line/on-line signatures revisited: a general unifying paradigm, efficient threshold variants and experimental results. Int. J. Inf. Sec. 12(6): 439-465 (2013) - [c36]Dario Catalano, Dario Fiore:
Practical Homomorphic MACs for Arithmetic Circuits. EUROCRYPT 2013: 336-352 - [c35]Dario Catalano, Dario Fiore:
Vector Commitments and Their Applications. Public Key Cryptography 2013: 55-72 - [c34]Dario Catalano, Dario Fiore, Rosario Gennaro, Konstantinos Vamvourellis:
Algebraic (Trapdoor) One-Way Functions and Their Applications. TCC 2013: 680-699 - [i7]Dario Catalano, Antonio Marcedone, Orazio Puglisi:
Linearly Homomorphic Structure Preserving Signatures: New Methodologies and Applications. IACR Cryptol. ePrint Arch. 2013: 801 (2013) - 2012
- [c33]Dario Catalano, Dario Fiore, Bogdan Warinschi:
Efficient Network Coding Signatures in the Standard Model. Public Key Cryptography 2012: 680-696 - 2011
- [j8]Michel Abdalla, James Birkett, Dario Catalano, Alexander W. Dent, John Malone-Lee, Gregory Neven, Jacob C. N. Schuldt, Nigel P. Smart:
Wildcarded Identity-Based Encryption. J. Cryptol. 24(1): 42-82 (2011) - [j7]Dario Catalano, Mario Di Raimondo, Dario Fiore, Mariagrazia Messina:
Zero-Knowledge Sets With Short Proofs. IEEE Trans. Inf. Theory 57(4): 2488-2502 (2011) - [c32]Dario Catalano, Mario Di Raimondo, Dario Fiore, Rosario Gennaro, Orazio Puglisi:
Fully Non-interactive Onion Routing with Forward-Secrecy. ACNS 2011: 255-273 - [c31]Dario Catalano, Dario Fiore, Bogdan Warinschi:
Adaptive Pseudo-free Groups and Applications. EUROCRYPT 2011: 207-223 - [e1]Dario Catalano, Nelly Fazio, Rosario Gennaro, Antonio Nicolosi:
Public Key Cryptography - PKC 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings. Lecture Notes in Computer Science 6571, Springer 2011, ISBN 978-3-642-19378-1 [contents] - [i6]Dario Catalano, Dario Fiore, Bogdan Warinschi:
Adaptive Pseudo-Free Groups and Applications. IACR Cryptol. ePrint Arch. 2011: 53 (2011) - [i5]Dario Catalano, Dario Fiore:
Concise Vector Commitments and their Applications to Zero-Knowledge Elementary Databases. IACR Cryptol. ePrint Arch. 2011: 495 (2011) - [i4]Dario Catalano, Dario Fiore, Bogdan Warinschi:
Efficient Network Coding Signatures in the Standard Model. IACR Cryptol. ePrint Arch. 2011: 696 (2011) - 2010
- [c30]Mauro Barni, Tiziano Bianchi, Dario Catalano, Mario Di Raimondo, Ruggero Donida Labati, Pierluigi Failla, Dario Fiore, Riccardo Lazzeretti, Vincenzo Piuri, Alessandro Piva, Fabio Scotti:
A privacy-compliant fingerprint recognition system based on homomorphic encryption and Fingercode templates. BTAS 2010: 1-7 - [c29]Mauro Barni, Tiziano Bianchi, Dario Catalano, Mario Di Raimondo, Ruggero Donida Labati, Pierluigi Failla, Dario Fiore, Riccardo Lazzeretti, Vincenzo Piuri, Fabio Scotti, Alessandro Piva:
Privacy-preserving fingercode authentication. MM&Sec 2010: 231-240 - [c28]Ari Juels, Dario Catalano, Markus Jakobsson:
Coercion-Resistant Electronic Elections. Towards Trustworthy Elections 2010: 37-63
2000 – 2009
- 2009
- [c27]Michel Abdalla, Dario Catalano, Céline Chevalier, David Pointcheval:
Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness. AFRICACRYPT 2009: 254-271 - [c26]Dario Catalano, Dario Fiore, Rosario Gennaro:
Certificateless onion routing. CCS 2009: 151-160 - [c25]Michel Abdalla, Dario Catalano, Dario Fiore:
Verifiable Random Functions from Identity-Based Key Encapsulation. EUROCRYPT 2009: 554-571 - 2008
- [j6]Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi:
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. J. Cryptol. 21(3): 350-391 (2008) - [c24]Michel Abdalla, Dario Catalano, Céline Chevalier, David Pointcheval:
Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework. CT-RSA 2008: 335-351 - [c23]Dario Catalano, Dario Fiore, Mariagrazia Messina:
Zero-Knowledge Sets with Short Proofs. EUROCRYPT 2008: 433-450 - [c22]Dario Catalano, Mario Di Raimondo, Dario Fiore, Rosario Gennaro:
Off-Line/On-Line Signatures: Theoretical Aspects and Experimental Results. Public Key Cryptography 2008: 101-120 - 2007
- [j5]Dario Catalano, David Pointcheval, Thomas Pornin:
Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication. J. Cryptol. 20(1): 115-149 (2007) - [j4]Dario Catalano, Rosario Gennaro:
Cramer-Damgård signatures revisited: Efficient flat-tree signatures based on factoring. Theor. Comput. Sci. 370(1-3): 186-200 (2007) - [j3]Dario Catalano, Ivan Visconti:
Hybrid commitments and their applications to zero-knowledge proof systems. Theor. Comput. Sci. 374(1-3): 229-260 (2007) - [c21]Emmanuel Bresson, Dario Catalano, Rosario Gennaro:
Improved On-Line/Off-Line Threshold Signatures. Public Key Cryptography 2007: 217-232 - 2006
- [c20]Michel Abdalla, Dario Catalano, Alexander W. Dent, John Malone-Lee, Gregory Neven, Nigel P. Smart:
Identity-Based Encryption Gone Wild. ICALP (2) 2006: 300-311 - [c19]Dario Catalano, Yevgeniy Dodis, Ivan Visconti:
Mercurial Commitments: Minimal Assumptions and Efficient Constructions. TCC 2006: 120-144 - [i3]Michel Abdalla, Dario Catalano, Alexander W. Dent, John Malone-Lee, Gregory Neven, Nigel P. Smart:
Identity-Based Encryption Gone Wild. IACR Cryptol. ePrint Arch. 2006: 304 (2006) - 2005
- [b1]Dario Catalano, Ronald Cramer, Ivan Bjerre Damgård, Giovanni Di Crescenzo, David Pointcheval:
Contemporary cryptology. Advanced courses in mathematics : CRM Barcelona, Birkhäuser 2005, ISBN 978-3-7643-7294-1, pp. I-VIII, 1-237 - [c18]Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi:
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. CRYPTO 2005: 205-222 - [c17]Dario Catalano, Ivan Visconti:
Hybrid Trapdoor Commitments and Their Applications. ICALP 2005: 298-310 - [c16]Dario Catalano, Giancarlo Ruffo, Rossano Schifanella:
A P2P Market Place Based on Aggregate Signatures. ISPA Workshops 2005: 54-63 - [c15]Dario Catalano, Rosario Gennaro:
Cramer-Damgård Signatures Revisited: Efficient Flat-Tree Signatures Based on Factoring. Public Key Cryptography 2005: 313-327 - [c14]Ari Juels, Dario Catalano, Markus Jakobsson:
Coercion-resistant electronic elections. WPES 2005: 61-70 - [i2]Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi:
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. IACR Cryptol. ePrint Arch. 2005: 254 (2005) - 2004
- [c13]Dario Catalano, David Pointcheval, Thomas Pornin:
IPAKE: Isomorphisms for Password-Based Authenticated Key Exchange. CRYPTO 2004: 477-493 - [c12]Dario Catalano, Giancarlo Ruffo:
A fair micro-payment scheme for profit sharing in P2P networks. HOT-P2P 2004: 32-39 - [c11]Emmanuel Bresson, Dario Catalano:
Constant Round Authenticated Group Key Agreement via Distributed Computation. Public Key Cryptography 2004: 115-129 - 2003
- [c10]Emmanuel Bresson, Dario Catalano, David Pointcheval:
A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications. ASIACRYPT 2003: 37-54 - 2002
- [j2]Dario Catalano, Rosario Gennaro, Nick Howgrave-Graham:
Paillier's Trapdoor Function Hides up to O(n) Bits. J. Cryptol. 15(4): 251-269 (2002) - [c9]Dario Catalano, Phong Q. Nguyen, Jacques Stern:
The Hardness of Hensel Lifting: The Case of RSA and Discrete Logarithm. ASIACRYPT 2002: 299-310 - [i1]Ari Juels, Dario Catalano, Markus Jakobsson:
Coercion-Resistant Electronic Elections. IACR Cryptol. ePrint Arch. 2002: 165 (2002) - 2001
- [c8]Dario Catalano, Rosario Gennaro, Nick Howgrave-Graham, Phong Q. Nguyen:
Paillier's cryptosystem revisited. CCS 2001: 206-214 - [c7]Dario Catalano, Rosario Gennaro, Nick Howgrave-Graham:
The Bit Security of Paillier's Encryption Scheme and Its Applications. EUROCRYPT 2001: 229-243 - 2000
- [j1]Dario Catalano, Rosario Gennaro:
New Efficient and Secure Protocols for Verifiable Signature Sharing and Other Applications. J. Comput. Syst. Sci. 61(1): 51-80 (2000) - [c6]Sebastiano Battiato, Domenico Cantone, Dario Catalano, Gianluca Cincotti, Micha Hofri:
An Efficient Algorithm for the Approximate Median Selection Problem. CIAC 2000: 226-238 - [c5]Dario Catalano, Rosario Gennaro, Shai Halevi:
Computing Inverses over a Shared Secret Modulus. EUROCRYPT 2000: 190-206 - [c4]Sebastiano Battiato, Dario Catalano, Giovanni Gallo, Rosario Gennaro:
Color opponency watermarking scheme for digital images. Security and Watermarking of Multimedia Contents 2000: 510-515
1990 – 1999
- 1999
- [c3]Sebastiano Battiato, Dario Catalano, Giovanni Gallo, Rosario Gennaro:
Robust Watermarking for Images Based on Color Manipulation. Information Hiding 1999: 302-317 - 1998
- [c2]Dario Catalano, Rosario Gennaro:
New Efficient and Secure Protocols for Verifiable Signature Sharing and Other Applications. CRYPTO 1998: 105-120 - 1996
- [c1]Francesco Bergadano, Dario Catalano, Stefano Varricchio:
Learning Sat-k-DNF Formulas from Membership Queries. STOC 1996: 126-130
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-23 18:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint