Follow
Gennaro Avitabile
Gennaro Avitabile
Verified email at imdea.org
Title
Cited by
Cited by
Year
Privacy and integrity threats in contact tracing systems and their mitigations
G Avitabile, V Botta, V Iovino, I Visconti
IEEE Internet Computing 27 (2), 13-19, 2022
91*2022
Terrorist attacks for fake exposure notifications in contact tracing systems
G Avitabile, D Friolo, I Visconti
International Conference on Applied Cryptography and Network Security, 220-247, 2021
23*2021
Efficient proofs of knowledge for threshold relations
G Avitabile, V Botta, D Friolo, I Visconti
European Symposium on Research in Computer Security, 42-62, 2022
122022
Extendable threshold ring signatures with enhanced anonymity
G Avitabile, V Botta, D Fiore
IACR International Conference on Public-Key Cryptography, 281-311, 2023
92023
Compact proofs of partial knowledge for overlapping CNF formulae
G Avitabile, V Botta, D Friolo, D Venturi, I Visconti
Journal of Cryptology 38 (1), 7, 2025
22025
Signature-based witness encryption with compact ciphertext
G Avitabile, N Döttling, B Magri, C Sakkas, S Wohnig
International Conference on the Theory and Application of Cryptology and …, 2025
22025
Data Redaction in Smart-Contract-Enabled Permissioned Blockchains
G Avitabile, V Botta, D Friolo, I Visconti
CEUR WORKSHOP PROCEEDINGS 3791, 2024
12024
Towards Secure E-Voting with Everlasting Privacy
A Gennaro, S Heiberg, H Lipmaa, J Siim, I Visconti
media. voog. com. https://media. voog. com/0000/0042/1115/files/Towards …, 0
1
Black-Box Timed Commitments from Time-Lock Puzzles
H Abusalah, G Avitabile
Theory of Cryptography Conference, 460-493, 2024
2024
Provable Security: the Good, the Bad, and the Ugly
G Avitabile
Universita degli studi di Salerno, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–10