Giovanni Di Crescenzo
Giovanni Di Crescenzo
Peraton Labs also formerly known as Applied Communication Sciences, Vencore Labs, BellCore
Verified email at
Cited by
Cited by
Public key encryption with keyword search
D Boneh, G Di Crescenzo, R Ostrovsky, G Persiano
Advances in Cryptology-EUROCRYPT 2004: International Conference on the …, 2004
Halftone visual cryptography
Z Zhou, GR Arce, G Di Crescenzo
IEEE transactions on image processing 15 (8), 2441-2453, 2006
Robust non-interactive zero knowledge
A De Santis, G Di Crescenzo, R Ostrovsky, G Persiano, A Sahai
Advances in Cryptology—CRYPTO 2001: 21st Annual International Cryptology …, 2001
Halftone visual cryptography via error diffusion
Z Wang, GR Arce, G Di Crescenzo
IEEE transactions on information forensics and security 4 (3), 383-396, 2009
Non-interactive and non-malleable commitment
G Di Crescenzo, Y Ishai, R Ostrovsky
Proceedings of the thirtieth annual ACM symposium on Theory of computing …, 1998
Single database private information retrieval implies oblivious transfer
G Di Crescenzo, T Malkin, R Ostrovsky
Advances in Cryptology—EUROCRYPT 2000: International Conference on the …, 2000
Providing secure, instantaneous, directory-integrated, multiparty, communications services
C Chung, S Dalal, G Crescenzo, R Graveman, M Long, G Patton, H Shim
US Patent App. 10/002,882, 2002
On monotone formula closure of SZK
A De Santis, G Di Crescenzo, G Persiano, M Yung
Proceedings 35th Annual Symposium on Foundations of Computer Science, 454-465, 1994
Perfectly secure password protocols in the bounded retrieval model
G Di Crescenzo, R Lipton, S Walfish
Theory of Cryptography Conference, 225-244, 2006
Conditional oblivious transfer and timed-release encryption
G Di Crescenzo, R Ostrovsky, S Rajagopalan
Advances in Cryptology—EUROCRYPT’99: International Conference on the Theory …, 1999
Public key encryption with searchable keywords based on Jacobi symbols
G Di Crescenzo, V Saraswat
International conference on cryptology in India, 282-296, 2007
Efficient and non-interactive non-malleable commitment
G Di Crescenzo, J Katz, R Ostrovsky, A Smith
International Conference on the Theory and Applications of Cryptographic …, 2001
Multi-secret sharing schemes
C Blundo, A De Santis, G Di Crescenzo, AG Gaggia, U Vaccaro
Annual International Cryptology Conference, 150-163, 1994
Multiparty computation, an introduction
D Catalano, R Cramer, G Di Crescenzo, I Darmgård, D Pointcheval, ...
Contemporary cryptology, 41-87, 2005
Universal service-providers for database private information retrieval
G Di-Crescenzo, Y Ishai, R Ostrovsky
Proceedings of the seventeenth annual ACM symposium on Principles of …, 1998
Method and system for secure session establishment using identity-based encryption (VDTLS)
G Di Crescenzo, S Pietrowicz, HS Shim, T Zhang
US Patent 9,094,206, 2015
How to forget a secret
G Di Crescenzo, N Ferguson, R Impagliazzo, M Jakobsson
Annual Symposium on Theoretical Aspects of Computer Science, 500-509, 1999
On concurrent zero-knowledge with pre-processing
G Di Crescenzo, R Ostrovsky
Annual International Cryptology Conference, 485-502, 1999
Security amplification by composition: The case of doubly-iterated, ideal ciphers
W Aiello, M Bellare, G Di Crescenzo, R Venkatesan
Annual International Cryptology Conference, 390-407, 1998
Constant-round resettable zero knowledge with concurrent soundness in the bare public-key model
G Di Crescenzo, G Persiano, I Visconti
Annual International Cryptology Conference, 237-253, 2004
The system can't perform the operation now. Try again later.
Articles 1–20