jPBC: Java pairing based cryptography A De Caro, V Iovino 2011 IEEE symposium on computers and communications (ISCC), 850-855, 2011 | 814 | 2011 |
Selene: Voting with transparent verifiability and coercion-mitigation PYA Ryan, PB Rønne, V Iovino Financial Cryptography and Data Security: FC 2016 International Workshops …, 2016 | 148 | 2016 |
Hidden-vector encryption with groups of prime order V Iovino, G Persiano Pairing-Based Cryptography–Pairing 2008: Second International Conference …, 2008 | 123 | 2008 |
On the achievability of simulation-based security for functional encryption A De Caro, V Iovino, A Jain, A O’Neill, O Paneth, G Persiano Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013 | 114 | 2013 |
Fully secure anonymous HIBE and secret-key anonymous IBE with short ciphertexts A De Caro, V Iovino, G Persiano Pairing-Based Cryptography-Pairing 2010: 4th International Conference …, 2010 | 89 | 2010 |
Privacy and integrity threats in contact tracing systems and their mitigations G Avitabile, V Botta, V Iovino, I Visconti IEEE Internet Computing 27 (2), 13-19, 2022 | 86* | 2022 |
Private-key hidden vector encryption with key confidentiality C Blundo, V Iovino, G Persiano International Conference on Cryptology and Network Security, 259-277, 2009 | 52 | 2009 |
Does impaired glucose tolerance predict hypertension? A prospective analysis O Vaccaro, G Imperatore, V Iovino, C Iovine, AA Rivellese, G Riccardi Diabetologia 39, 70-76, 1996 | 49 | 1996 |
Java pairing-based cryptography library AD Caro, V Iovino | 32 | 2013 |
Fully secure hidden vector encryption A De Caro, V Iovino, G Persiano International Conference on Pairing-Based Cryptography, 102-121, 2012 | 31* | 2012 |
Using Selene to Verify your Vote in JCJ V Iovino, A Rial, PB Rønne, PYA Ryan | 26 | 2017 |
Predicate encryption with partial public keys C Blundo, V Iovino, G Persiano International Conference on Cryptology and Network Security, 298-313, 2010 | 25 | 2010 |
Deniable Functional Encryption V Iovino, A O'Neill 19th IACR International Conference on Practice and Theory in Public-Key …, 2016 | 24* | 2016 |
On the effectiveness of time travel to inject COVID-19 alerts V Iovino, S Vaudenay, M Vuagnoux Cryptographers’ Track at the RSA Conference, 422-443, 2021 | 22 | 2021 |
Incidence of fibroblastic sleeve and of catheter-related venous thrombosis in peripherally inserted central catheters: a prospective study on oncological and hematological patients C Trezza, C Califano, V Iovino, C D’Ambrosio, G Grimaldi, M Pittiruti The Journal of Vascular Access 22 (3), 444-449, 2021 | 22 | 2021 |
On the Power of Rewinding Simulators in Functional Encryption A De Caro, V Iovino Design, Codes and Cryptography, 2016 | 19 | 2016 |
“The Simplest Protocol for Oblivious Transfer” Revisited ZA Genç, V Iovino, A Rial | 18 | 2017 |
On the Possibility of Non-Interactive E-Voting in the Public-key Setting R Giustolisi, V Iovino, P Rønne VOTING 2016 9604 (Financial Cryptography and Data Security), 193-208, 2015 | 15 | 2015 |
Simulation-Based Secure Functional Encryption in the Random Oracle Model V Iovino, K Zebrowski LATINCRYPT 2015 9320 (LNCS), 21-39, 2015 | 15 | 2015 |
Verifiable inner product encryption scheme N Soroush, V Iovino, A Rial, PB Roenne, PYA Ryan Public-Key Cryptography–PKC 2020: 23rd IACR International Conference on …, 2020 | 12 | 2020 |