Public key encryption with keyword search D Boneh, G Di Crescenzo, R Ostrovsky, G Persiano Advances in Cryptology-EUROCRYPT 2004: International Conference on the …, 2004 | 4305 | 2004 |
Noninteractive zero-knowledge M Blum, A De Santis, S Micali, G Persiano SIAM Journal on Computing 20 (6), 1084-1118, 1991 | 592 | 1991 |
Robust non-interactive zero knowledge A De Santis, G Di Crescenzo, R Ostrovsky, G Persiano, A Sahai Advances in Cryptology—CRYPTO 2001: 21st Annual International Cryptology …, 2001 | 379 | 2001 |
The Design and Implementation of a Transparent Cryptographic File System for UNIX. G Cattaneo, L Catuogno, A Del Sorbo, P Persiano USENIX Annual Technical Conference, FREENIX Track, 10-3, 2001 | 293 | 2001 |
Zero-knowledge proofs of knowledge without interaction A De Santis, G Persiano Proceedings., 33rd Annual Symposium on Foundations of Computer Science, 427-436, 1992 | 228 | 1992 |
Non-interactive zero-knowledge proof systems A De Santis, S Micali, G Persiano Advances in Cryptology—CRYPTO’87: Proceedings 7, 52-72, 1988 | 190 | 1988 |
On monotone formula closure of SZK A De Santis, G Di Crescenzo, G Persiano, M Yung Proceedings 35th Annual Symposium on Foundations of Computer Science, 454-465, 1994 | 183 | 1994 |
Hidden-vector encryption with groups of prime order V Iovino, G Persiano Pairing-Based Cryptography–Pairing 2008: Second International Conference …, 2008 | 123 | 2008 |
Mitigating leakage in secure cloud-hosted data structures: Volume-hiding for multi-maps via hashing S Patel, G Persiano, K Yeo, M Yung Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019 | 117 | 2019 |
On the achievability of simulation-based security for functional encryption A De Caro, V Iovino, A Jain, A O’Neill, O Paneth, G Persiano Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013 | 114 | 2013 |
PanORAMa: Oblivious RAM with logarithmic overhead S Patel, G Persiano, M Raykova, K Yeo 2018 IEEE 59th Annual Symposium on Foundations of Computer Science (FOCS …, 2018 | 101 | 2018 |
A linear-time algorithm for the feasibility of pebble motion on trees V Auletta, A Monti, M Parente, P Persiano Algorithmica 23 (3), 223-245, 1999 | 99 | 1999 |
Optimal wavelength routing on directed fiber trees T Erlebach, K Jansen, C Kaklamanis, M Mihail, P Persiano Theoretical Computer Science 221 (1-2), 119-137, 1999 | 93 | 1999 |
Constrained bipartite edge coloring with applications to wavelength routing C Kaklamanis, P Persiano, T Erlebach, K Jansen Automata, Languages and Programming: 24th International Colloquium, ICALP'97 …, 1997 | 90 | 1997 |
Fully secure anonymous HIBE and secret-key anonymous IBE with short ciphertexts A De Caro, V Iovino, G Persiano Pairing-Based Cryptography-Pairing 2010: 4th International Conference …, 2010 | 88 | 2010 |
Non-interactive zero-knowledge with preprocessing A De Santis, S Micali, G Persiano Advances in Cryptology—CRYPTO’88: Proceedings 8, 269-282, 1990 | 82 | 1990 |
Deterministic truthful approximation mechanisms for scheduling related machines V Auletta, R De Prisco, P Penna, G Persiano STACS 2004: 21st Annual Symposium on Theoretical Aspects of Computer Science …, 2004 | 80 | 2004 |
Branch-and-bound and backtrack search on mesh-connected arrays of processors C Kaklamanis, G Persiano Proceedings of the Fourth Annual ACM Symposium on Parallel Algorithms and …, 1992 | 72 | 1992 |
Private stateful information retrieval S Patel, G Persiano, K Yeo Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018 | 69 | 2018 |
Constant-round resettable zero knowledge with concurrent soundness in the bare public-key model G Di Crescenzo, G Persiano, I Visconti Annual International Cryptology Conference, 237-253, 2004 | 69 | 2004 |