Proofs of space: When space is of the essence G Ateniese, I Bonacina, A Faonio, N Galesi Security and Cryptography for Networks: 9th International Conference, SCN …, 2014 | 164 | 2014 |
Certified bitcoins G Ateniese, A Faonio, B Magri, B De Medeiros Applied Cryptography and Network Security: 12th International Conference …, 2014 | 75 | 2014 |
Lunar: A Toolbox for More Efficient Universal and Updatable zkSNARKs and Commit-and-Prove Extensions M Campanelli, A Faonio, D Fiore, A Querol, H Rodríguez Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021 | 66 | 2021 |
Efficient public-key cryptography with bounded leakage and tamper resilience A Faonio, D Venturi Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the …, 2016 | 30 | 2016 |
Non-malleable secret sharing in the computational setting: Adaptive tampering, noisy-leakage resilience, and improved rate A Faonio, D Venturi Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019 | 28 | 2019 |
Continuously non-malleable codes with split-state refresh A Faonio, JB Nielsen, M Simkin, D Venturi Theoretical Computer Science 759, 98-132, 2019 | 25 | 2019 |
Predictable arguments of knowledge A Faonio, JB Nielsen, D Venturi Public-Key Cryptography–PKC 2017: 20th IACR International Conference on …, 2017 | 23 | 2017 |
Non-malleable secret sharing against bounded joint-tampering attacks in the plain model G Brian, A Faonio, M Obremski, M Simkin, D Venturi Annual International Cryptology Conference, 127-155, 2020 | 22 | 2020 |
Mind your coins: Fully leakage-resilient signatures with graceful degradation A Faonio, JB Nielsen, D Venturi International Colloquium on Automata, Languages, and Programming, 456-468, 2015 | 20 | 2015 |
Structure-preserving and re-randomizable RCCA-secure public key encryption and its applications A Faonio, D Fiore, J Herranz, C Ràfols International Conference on the Theory and Application of Cryptology and …, 2019 | 19 | 2019 |
Continuously non-malleable secret sharing for general access structures G Brian, A Faonio, D Venturi Theory of Cryptography Conference, 211-232, 2019 | 16 | 2019 |
Rate-optimizing compilers for continuously non-malleable codes S Coretti, A Faonio, D Venturi International Conference on Applied Cryptography and Network Security, 3-23, 2019 | 15 | 2019 |
Leakage-resilient identification schemes from zero-knowledge proofs of storage G Ateniese, A Faonio, S Kamara Cryptography and Coding: 15th IMA International Conference, IMACC 2015 …, 2015 | 12 | 2015 |
Non-malleable codes with split-state refresh A Faonio, JB Nielsen Public-Key Cryptography–PKC 2017: 20th IACR International Conference on …, 2017 | 10 | 2017 |
Continuously non-malleable secret sharing: joint tampering, plain model and capacity G Brian, A Faonio, D Venturi Theory of Cryptography Conference, 333-364, 2021 | 9 | 2021 |
From polynomial IOP and commitments to non-malleable zkSNARKs A Faonio, D Fiore, M Kohlweiss, L Russo, M Zajac Theory of Cryptography Conference, 455-485, 2023 | 8 | 2023 |
Improving the efficiency of re-randomizable and replayable CCA secure public key encryption A Faonio, D Fiore Applied Cryptography and Network Security: 18th International Conference …, 2020 | 8 | 2020 |
Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model A Faonio, JB Nielsen, D Venturi Theoretical Computer Science 660, 23-56, 2017 | 8 | 2017 |
Password-authenticated public key establishment C Soriente, A Faonio, MIG VASCO, AP del Pozo US Patent 11,296,875, 2022 | 7 | 2022 |
Lookup arguments: improvements, extensions and applications to zero-knowledge decision trees M Campanelli, A Faonio, D Fiore, T Li, H Lipmaa IACR International Conference on Public-Key Cryptography, 337-369, 2024 | 6 | 2024 |