Giovanni Di Crescenzo
Giovanni Di Crescenzo
Peraton Labs also formerly known as Applied Communication Sciences, Vencore Labs, BellCore
Verified email at
Cited by
Cited by
Public key encryption with keyword search
D Boneh, GD Crescenzo, R Ostrovsky, G Persiano
International conference on the theory and applications of cryptographic …, 2004
Halftone visual cryptography
Z Zhou, GR Arce, G Di Crescenzo
IEEE transactions on image processing 15 (8), 2441-2453, 2006
Robust non-interactive zero knowledge
AD Santis, GD Crescenzo, R Ostrovsky, G Persiano, A Sahai
Annual International Cryptology Conference, 566-598, 2001
Halftone visual cryptography via error diffusion
Z Wang, GR Arce, G Di Crescenzo
IEEE transactions on information forensics and security 4 (3), 383-396, 2009
Non-interactive and non-malleable commitment
G Di Crescenzo, Y Ishai, R Ostrovsky
Proceedings of the thirtieth annual ACM symposium on Theory of computing …, 1998
Single database private information retrieval implies oblivious transfer
GD Crescenzo, T Malkin, R Ostrovsky
International Conference on the Theory and Applications of Cryptographic …, 2000
Providing secure, instantaneous, directory-integrated, multiparty, communications services
C Chung, S Dalal, G Crescenzo, R Graveman, M Long, G Patton, H Shim
US Patent App. 10/002,882, 2002
Perfectly secure password protocols in the bounded retrieval model
GD Crescenzo, R Lipton, S Walfish
Theory of Cryptography Conference, 225-244, 2006
On monotone formula closure of SZK
A De Santis, G Di Crescenzo, G Persiano, M Yung
Proceedings 35th Annual Symposium on Foundations of Computer Science, 454-465, 1994
Conditional oblivious transfer and timed-release encryption
GD Crescenzo, R Ostrovsky, S Rajagopalan
International Conference on the Theory and Applications of Cryptographic …, 1999
Public key encryption with searchable keywords based on Jacobi symbols
GD Crescenzo, V Saraswat
International Conference on Cryptology in India, 282-296, 2007
Efficient and non-interactive non-malleable commitment
GD Crescenzo, J Katz, R Ostrovsky, A Smith
International Conference on the Theory and Applications of Cryptographic …, 2001
Multi-secret sharing schemes
C Blundo, AD Santis, GD Crescenzo, AG Gaggia, U Vaccaro
Annual International Cryptology Conference, 150-163, 1994
Universal service-providers for database private information retrieval
G Di-Crescenzo, Y Ishai, R Ostrovsky
Proceedings of the seventeenth annual ACM symposium on Principles of …, 1998
How to forget a secret
GD Crescenzo, N Ferguson, R Impagliazzo, M Jakobsson
Annual Symposium on Theoretical Aspects of Computer Science, 500-509, 1999
Method and system for secure session establishment using identity-based encryption (VDTLS)
G Di Crescenzo, S Pietrowicz, HS Shim, T Zhang
US Patent 9,094,206, 2015
On concurrent zero-knowledge with pre-processing
GD Crescenzo, R Ostrovsky
Annual International Cryptology Conference, 485-502, 1999
Constant-round resettable zero knowledge with concurrent soundness in the bare public-key model
GD Crescenzo, G Persiano, I Visconti
Annual International Cryptology Conference, 237-253, 2004
Security amplification by composition: The case of doubly-iterated, ideal ciphers
W Aiello, M Bellare, GD Crescenzo, R Venkatesan
Annual International Cryptology Conference, 390-407, 1998
Multiplicative non-abelian sharing schemes and their application to threshold cryptography
Y Desmedt, GD Crescenzo, M Burmester
International Conference on the Theory and Application of Cryptology, 19-32, 1994
The system can't perform the operation now. Try again later.
Articles 1–20