Follow
Luca Nizzardo
Luca Nizzardo
Cryptography Researcher @Protocol Labs
Verified email at protocol.ai
Title
Cited by
Cited by
Year
Zero-knowledge contingent payments revisited: Attacks and payments for services
M Campanelli, R Gennaro, S Goldfeder, L Nizzardo
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
1872017
Multi-key homomorphic authenticators
D Fiore, A Mitrokotsa, L Nizzardo, E Pagnin
International conference on the theory and application of cryptology and …, 2016
632016
Incrementally aggregatable vector commitments and applications to verifiable decentralized storage
M Campanelli, D Fiore, N Greco, D Kolonelos, L Nizzardo
Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the …, 2020
482020
Generalizing homomorphic MACs for arithmetic circuits
D Catalano, D Fiore, R Gennaro, L Nizzardo
Public-Key Cryptography–PKC 2014: 17th International Conference on Practice …, 2014
472014
Programmable hash functions go private: constructions and applications to (homomorphic) signatures with shorter public keys
D Catalano, D Fiore, L Nizzardo
Advances in Cryptology--CRYPTO 2015: 35th Annual Cryptology Conference …, 2015
422015
On the security notions for homomorphic signatures
D Catalano, D Fiore, L Nizzardo
International Conference on Applied Cryptography and Network Security, 183-201, 2018
132018
Vector Commitment Techniques and Applications to Verifiable Decentralized Storage.
M Campanelli, D Fiore, N Greco, D Kolonelos, L Nizzardo
IACR Cryptol. ePrint Arch. 2020, 149, 2020
122020
Multi‐key homomorphic authenticators
D Fiore, A Mitrokotsa, L Nizzardo, E Pagnin
IET Information Security 13 (6), 618-638, 2019
122019
Transferable Anonymous Payments via TumbleBit in Permissioned Blockchains.
C Ferretti, A Leporati, L Mariot, L Nizzardo
DLT@ ITASEC 2334, 56-67, 2019
52019
Subversion-resilient enhanced privacy ID
A Faonio, D Fiore, L Nizzardo, C Soriente
Cryptographers’ Track at the RSA Conference, 562-588, 2022
22022
Homomorphic signatures with sublinear public keys via asymmetric programmable hash functions
D Catalano, D Fiore, L Nizzardo
Designs, Codes and Cryptography 86, 2197-2246, 2018
22018
Witness-authenticated key exchange revisited: Improved models, simpler constructions, extensions to groups
M Campanelli, R Gennaro, K Melissaris, L Nizzardo
Cryptology ePrint Archive, 2022
12022
Witness-Authenticated Key Exchange, Revisited: Extensions to Groups, Improved Models, Simpler Constructions
M Campanelli, R Gennaro, K Melissaris, L Nizzardo
International Conference on Financial Cryptography and Data Security, 112-128, 2023
2023
Subversion resilient attestation for trusted execution environments
C Soriente, A Faonio, D Fiore, L Nizzardo
US Patent 11,361,069, 2022
2022
Cryptographic techniques for the security of cloud and blockchain systems
L Nizzardo
ETSI_Informatica, 2018
2018
Programmable Hash Functions go Private: Constructions and Applications to (Homomorphic) Signatures with Shorter Public Keys
D Fiore, D Catalano, L Nizzardo
Actas de las primeras Jornadas Nacionales de Investigación en Ciberseguridad …, 2015
2015
Witness-Authenticated Key Exchange Revisited
M Campanelli, R Gennaro, K Melissaris, L Nizzardo
Appunti di Algebra I
P Magoni, L Nizzardo, F Pasini, A Savoldi
The system can't perform the operation now. Try again later.
Articles 1–18