default search action
Antonio Faonio
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c26]Matteo Campanelli, Antonio Faonio, Dario Fiore, Tianyu Li, Helger Lipmaa:
Lookup Arguments: Improvements, Extensions and Applications to Zero-Knowledge Decision Trees. Public Key Cryptography (2) 2024: 337-369 - [i28]Antonio Faonio, Dario Fiore, Luigi Russo:
Real-world Universal zkSNARKs are non-malleable. IACR Cryptol. ePrint Arch. 2024: 721 (2024) - [i27]Matteo Campanelli, Antonio Faonio, Luigi Russo:
SNARKs for Virtual Machines are Non-Malleable. IACR Cryptol. ePrint Arch. 2024: 1551 (2024) - 2023
- [c25]Antonio Faonio, Dennis Hofheinz, Luigi Russo:
Almost Tightly-Secure Re-randomizable and Replayable CCA-Secure Public Key Encryption. Public Key Cryptography (2) 2023: 275-305 - [c24]Antonio Faonio, Dario Fiore, Markulf Kohlweiss, Luigi Russo, Michal Zajac:
From Polynomial IOP and Commitments to Non-malleable zkSNARKs. TCC (3) 2023: 455-485 - [i26]Antonio Faonio, Dennis Hofheinz, Luigi Russo:
Almost Tightly-Secure Re-Randomizable and Replayable CCA-secure Public Key Encryption. IACR Cryptol. ePrint Arch. 2023: 152 (2023) - [i25]Antonio Faonio, Dario Fiore, Markulf Kohlweiss, Luigi Russo, Michal Zajac:
From Polynomial IOP and Commitments to Non-malleable zkSNARKs. IACR Cryptol. ePrint Arch. 2023: 569 (2023) - [i24]Matteo Campanelli, Antonio Faonio, Dario Fiore, Tianyu Li, Helger Lipmaa:
Lookup Arguments: Improvements, Extensions and Applications to Zero-Knowledge Decision Trees. IACR Cryptol. ePrint Arch. 2023: 1518 (2023) - 2022
- [j4]Gianluca Brian, Antonio Faonio, Maciej Obremski, João Ribeiro, Mark Simkin, Maciej Skórski, Daniele Venturi:
The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free. IEEE Trans. Inf. Theory 68(12): 8197-8227 (2022) - [j3]Gianluca Brian, Antonio Faonio, João Ribeiro, Daniele Venturi:
Short Non-Malleable Codes from Related-Key Secure Block Ciphers, Revisited. IACR Trans. Symmetric Cryptol. 2022(3): 1-19 (2022) - [c23]Antonio Faonio, María Isabel González Vasco, Claudio Soriente, Hien Thi Thu Truong:
Auditable Asymmetric Password Authenticated Public Key Establishment. CANS 2022: 122-142 - [c22]Antonio Faonio, Dario Fiore, Luca Nizzardo, Claudio Soriente:
Subversion-Resilient Enhanced Privacy ID. CT-RSA 2022: 562-588 - [c21]Antonio Faonio, Luigi Russo:
Mix-Nets from Re-randomizable and Replayable CCA-Secure Public-Key Encryption. SCN 2022: 172-196 - [i23]Antonio Faonio, Luigi Russo:
Mix-Nets from Re-Randomizable and Replayable CCA-secure Public-Key Encryption. IACR Cryptol. ePrint Arch. 2022: 856 (2022) - [i22]Gianluca Brian, Antonio Faonio, João Ribeiro, Daniele Venturi:
Short Non-Malleable Codes from Related-Key Secure Block Ciphers, Revisited. IACR Cryptol. ePrint Arch. 2022: 1100 (2022) - 2021
- [c20]Matteo Campanelli, Antonio Faonio, Dario Fiore, Anaïs Querol, Hadrián Rodríguez:
Lunar: A Toolbox for More Efficient Universal and Updatable zkSNARKs and Commit-and-Prove Extensions. ASIACRYPT (3) 2021: 3-33 - [c19]Antonio Faonio:
Practical Continuously Non-malleable Randomness Encoders in the Random Oracle Model. CANS 2021: 273-291 - [c18]Gianluca Brian, Antonio Faonio, Maciej Obremski, João Ribeiro, Mark Simkin, Maciej Skórski, Daniele Venturi:
The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free. EUROCRYPT (2) 2021: 408-437 - [c17]Gianluca Brian, Antonio Faonio, Daniele Venturi:
Continuously Non-malleable Secret Sharing: Joint Tampering, Plain Model and Capacity. TCC (2) 2021: 333-364 - [i21]Gianluca Brian, Antonio Faonio, Daniele Venturi:
Continuously Non-Malleable Secret Sharing: Joint Tampering, Plain Model and Capacity. IACR Cryptol. ePrint Arch. 2021: 1128 (2021) - [i20]Antonio Faonio:
Practical Continuously Non-Malleable Randomness Encoders in the Random Oracle Model. IACR Cryptol. ePrint Arch. 2021: 1269 (2021) - 2020
- [c16]Antonio Faonio, Dario Fiore:
Improving the Efficiency of Re-randomizable and Replayable CCA Secure Public Key Encryption. ACNS (1) 2020: 271-291 - [c15]Gianluca Brian, Antonio Faonio, Maciej Obremski, Mark Simkin, Daniele Venturi:
Non-malleable Secret Sharing Against Bounded Joint-Tampering Attacks in the Plain Model. CRYPTO (3) 2020: 127-155 - [i19]Antonio Faonio, María Isabel González Vasco, Claudio Soriente, Hien Thi Thu Truong:
Auditable Asymmetric Password Authenticated Public Key Establishment. IACR Cryptol. ePrint Arch. 2020: 60 (2020) - [i18]Gianluca Brian, Antonio Faonio, Maciej Obremski, Mark Simkin, Daniele Venturi:
Non-Malleable Secret Sharing against Bounded Joint-Tampering Attacks in the Plain Model. IACR Cryptol. ePrint Arch. 2020: 725 (2020) - [i17]Matteo Campanelli, Antonio Faonio, Dario Fiore, Anaïs Querol, Hadrián Rodríguez:
Lunar: a Toolbox for More Efficient Universal and Updatable zkSNARKs and Commit-and-Prove Extensions. IACR Cryptol. ePrint Arch. 2020: 1069 (2020) - [i16]Gianluca Brian, Antonio Faonio, Maciej Obremski, João Ribeiro, Mark Simkin, Maciej Skórski, Daniele Venturi:
The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free. IACR Cryptol. ePrint Arch. 2020: 1246 (2020) - [i15]Antonio Faonio, Dario Fiore, Luca Nizzardo, Claudio Soriente:
Subversion-Resilient Enhanced Privacy ID. IACR Cryptol. ePrint Arch. 2020: 1450 (2020)
2010 – 2019
- 2019
- [j2]Antonio Faonio, Jesper Buus Nielsen, Mark Simkin, Daniele Venturi:
Continuously non-malleable codes with split-state refresh. Theor. Comput. Sci. 759: 98-132 (2019) - [c14]Sandro Coretti, Antonio Faonio, Daniele Venturi:
Rate-Optimizing Compilers for Continuously Non-malleable Codes. ACNS 2019: 3-23 - [c13]Antonio Faonio, Dario Fiore, Javier Herranz, Carla Ràfols:
Structure-Preserving and Re-randomizable RCCA-Secure Public Key Encryption and Its Applications. ASIACRYPT (3) 2019: 159-190 - [c12]Antonio Faonio, Daniele Venturi:
Non-malleable Secret Sharing in the Computational Setting: Adaptive Tampering, Noisy-Leakage Resilience, and Improved Rate. CRYPTO (2) 2019: 448-479 - [c11]Antonio Faonio:
Efficient Fully-Leakage Resilient One-More Signature Schemes. CT-RSA 2019: 350-371 - [c10]Gianluca Brian, Antonio Faonio, Daniele Venturi:
Continuously Non-malleable Secret Sharing for General Access Structures. TCC (2) 2019: 211-232 - [i14]Sandro Coretti, Antonio Faonio, Daniele Venturi:
Rate-Optimizing Compilers for Continuously Non-Malleable Codes. IACR Cryptol. ePrint Arch. 2019: 55 (2019) - [i13]Antonio Faonio, Daniele Venturi:
Non-Malleable Secret Sharing in the Computational Setting: Adaptive Tampering, Noisy-Leakage Resilience, and Improved Rate. IACR Cryptol. ePrint Arch. 2019: 105 (2019) - [i12]Gianluca Brian, Antonio Faonio, Daniele Venturi:
Continuously Non-Malleable Secret Sharing for General Access Structures. IACR Cryptol. ePrint Arch. 2019: 602 (2019) - [i11]Antonio Faonio, Dario Fiore, Javier Herranz, Carla Ràfols:
Structure-Preserving and Re-randomizable RCCA-secure Public Key Encryption and its Applications. IACR Cryptol. ePrint Arch. 2019: 955 (2019) - 2018
- [c9]Antonio Faonio, Jesper Buus Nielsen, Mark Simkin, Daniele Venturi:
Continuously Non-malleable Codes with Split-State Refresh. ACNS 2018: 121-139 - [i10]Antonio Faonio, Jesper Buus Nielsen, Mark Simkin, Daniele Venturi:
Continuously Non-Malleable Codes with Split-State Refresh. IACR Cryptol. ePrint Arch. 2018: 606 (2018) - [i9]Antonio Faonio:
Efficient Fully-Leakage Resilient One-More Signature Schemes. IACR Cryptol. ePrint Arch. 2018: 1140 (2018) - 2017
- [j1]Antonio Faonio, Jesper Buus Nielsen, Daniele Venturi:
Fully leakage-resilient signatures revisited: Graceful degradation, noisy leakage, and construction in the bounded-retrieval model. Theor. Comput. Sci. 660: 23-56 (2017) - [c8]Antonio Faonio, Jesper Buus Nielsen, Daniele Venturi:
Predictable Arguments of Knowledge. Public Key Cryptography (1) 2017: 121-150 - [c7]Antonio Faonio, Jesper Buus Nielsen:
Non-malleable Codes with Split-State Refresh. Public Key Cryptography (1) 2017: 279-309 - [c6]Antonio Faonio, Jesper Buus Nielsen:
Fully Leakage-Resilient Codes. Public Key Cryptography (1) 2017: 333-358 - 2016
- [c5]Antonio Faonio, Daniele Venturi:
Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience. ASIACRYPT (1) 2016: 877-907 - [i8]Antonio Faonio, Daniele Venturi:
Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience. IACR Cryptol. ePrint Arch. 2016: 529 (2016) - [i7]Antonio Faonio, Jesper Buus Nielsen:
Non-Malleable Codes with Split-State Refresh. IACR Cryptol. ePrint Arch. 2016: 1192 (2016) - 2015
- [c4]Antonio Faonio, Jesper Buus Nielsen, Daniele Venturi:
Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation. ICALP (1) 2015: 456-468 - [c3]Giuseppe Ateniese, Antonio Faonio, Seny Kamara:
Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage. IMACC 2015: 311-328 - [i6]Antonio Faonio, Jesper Buus Nielsen, Daniele Venturi:
Predictable Arguments of Knowledge. IACR Cryptol. ePrint Arch. 2015: 740 (2015) - [i5]Giuseppe Ateniese, Antonio Faonio, Seny Kamara:
Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage. IACR Cryptol. ePrint Arch. 2015: 920 (2015) - [i4]Antonio Faonio, Jesper Buus Nielsen:
Fully Leakage-Resilient Codes. IACR Cryptol. ePrint Arch. 2015: 1151 (2015) - 2014
- [c2]Giuseppe Ateniese, Antonio Faonio, Bernardo Magri, Breno de Medeiros:
Certified Bitcoins. ACNS 2014: 80-96 - [c1]Giuseppe Ateniese, Ilario Bonacina, Antonio Faonio, Nicola Galesi:
Proofs of Space: When Space Is of the Essence. SCN 2014: 538-557 - [i3]Giuseppe Ateniese, Antonio Faonio, Bernardo Magri, Breno de Medeiros:
Certified Bitcoins. IACR Cryptol. ePrint Arch. 2014: 76 (2014) - [i2]Antonio Faonio, Jesper Buus Nielsen, Daniele Venturi:
Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation. IACR Cryptol. ePrint Arch. 2014: 913 (2014) - 2013
- [i1]Giuseppe Ateniese, Ilario Bonacina, Antonio Faonio, Nicola Galesi:
Proofs of Space: When Space is of the Essence. IACR Cryptol. ePrint Arch. 2013: 805 (2013)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 22:26 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint