Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Alfredo De Santis - MaRDI portal

Alfredo De Santis

From MaRDI portal
Person:240098

Available identifiers

zbMath Open de-santis.alfredoWikidataQ21704685 ScholiaQ21704685MaRDI QIDQ240098

List of research outcomes

PublicationDate of PublicationType
Communication efficient Zero-knowledge Proofs of knowledge2022-08-18Paper
Probabilistic secret sharing2021-08-04Paper
Secret sharing schemes for infinite sets of participants: a new design technique2021-02-15Paper
Supporting dynamic updates in storage clouds with the Akl-Taylor scheme2020-02-06Paper
One-message statistical Zero-Knowledge Proofs and space-bounded verifier2019-12-04Paper
Randomness in distribution protocols2019-04-29Paper
On the number of random bits in totally private computation2019-01-10Paper
Randomness-efficient non-interactive zero knowledge2018-07-04Paper
Security of public-key cryptosystems based on Chebyshev polynomials2017-11-20Paper
https://portal.mardi4nfdi.de/entity/Q52714272017-07-11Paper
https://portal.mardi4nfdi.de/entity/Q52714302017-07-11Paper
https://portal.mardi4nfdi.de/entity/Q52714342017-07-11Paper
On the Relations Between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structures2016-09-02Paper
How to share a function securely2016-09-01Paper
The graph clustering problem has a perfect zero-knowledge interactive proof2016-06-16Paper
On secret set schemes2016-06-16Paper
Visual cryptography for grey level images2016-06-16Paper
On secret sharing schemes2016-06-09Paper
Lower bounds for robust secret sharing schemes2016-05-26Paper
Measure-Independent Characterization of Contrast Optimal Visual Cryptography Schemes2015-09-30Paper
Modeling energy-efficient secure communications in multi-mode wireless mobile devices2015-08-31Paper
Anonymous protocols: notions and equivalence2015-05-22Paper
Color visual cryptography schemes for black and white secret images2014-01-13Paper
A note on time-bound hierarchical key assignment schemes2013-03-21Paper
Provably-secure time-bound hierarchical key assignment schemes2012-07-03Paper
Efficient provably-secure hierarchical key assignment schemes2011-10-10Paper
Using Colors to Improve Visual Cryptography for Black and White Images2011-05-19Paper
Optimising SD and LSD in Presence of Non-uniform Probabilities of Revocation2009-12-03Paper
Variations on a theme by Akl and Taylor: security and tradeoffs2009-12-01Paper
Security and Tradeoffs of the Akl-Taylor Scheme and Its Variants2009-10-16Paper
Cryptographic key assignment schemes for any access control policy2009-08-27Paper
Ideal contrast visual cryptography schemes with reversing2009-08-27Paper
On Monotone Formula Composition of Perfect Zero-Knowledge Languages2009-08-20Paper
Colored visual cryptography without color darkening2009-06-22Paper
On Self-Healing Key Distribution Schemes2008-12-21Paper
Cheating Immune (2,n)-Threshold Visual Secret Sharing2008-11-27Paper
New constructions for provably-secure time-bound hierarchical key assignment schemes2008-11-18Paper
Efficient Provably-Secure Hierarchical Key Assignment Schemes2008-09-17Paper
Weaknesses in a Recent Ultra-Lightweight RFID Authentication Protocol2008-06-13Paper
An attack on a payment scheme2008-03-12Paper
On unconditionally secure distributed oblivious transfer2007-08-20Paper
Coding and Cryptography2007-05-02Paper
Visual cryptography schemes with optimal pixel expansion2007-01-09Paper
Security in Communication Networks2006-10-10Paper
Visual cryptography for general access structures2006-10-10Paper
Enforcing the security of a time-bound hierarchical key assignment scheme2006-05-16Paper
Unconditionally secure key assignment schemes2006-04-28Paper
Automata, Languages and Programming2005-08-24Paper
Mathematical Foundations of Computer Science 20042005-08-22Paper
Optimal colored threshold visual cryptography schemes2005-08-17Paper
https://portal.mardi4nfdi.de/entity/Q48188542004-09-24Paper
Design of self-healing key distribution schemes2004-08-16Paper
Anonymous membership broadcast schemes2004-08-16Paper
Randomness in secret sharing and visual cryptography schemes2004-08-06Paper
https://portal.mardi4nfdi.de/entity/Q44483872004-02-18Paper
Contrast Optimal Threshold Visual Cryptography Schemes2004-01-08Paper
https://portal.mardi4nfdi.de/entity/Q44404372003-12-17Paper
https://portal.mardi4nfdi.de/entity/Q44138692003-07-21Paper
https://portal.mardi4nfdi.de/entity/Q47837452002-12-08Paper
Bounds on entropy in a guessing game2002-08-04Paper
Probability of shares in secret sharing schemes2002-07-25Paper
https://portal.mardi4nfdi.de/entity/Q45015682002-05-14Paper
Randomness complexity of private computation2002-04-21Paper
Improved schemes for visual cryptography2002-04-15Paper
https://portal.mardi4nfdi.de/entity/Q27541632001-12-06Paper
https://portal.mardi4nfdi.de/entity/Q27086232001-07-17Paper
A t-private k-database information retrieval scheme2001-01-01Paper
Extended capabilities for visual cryptography2000-12-12Paper
On the contrast in visual cryptography schemes2000-09-24Paper
https://portal.mardi4nfdi.de/entity/Q49544142000-06-07Paper
On a fallacious bound for authentication codes2000-05-22Paper
On the Data Expansion of the Huffman Compression Algorithm2000-03-19Paper
https://portal.mardi4nfdi.de/entity/Q49406932000-03-01Paper
https://portal.mardi4nfdi.de/entity/Q49386302000-02-23Paper
A lower bound on the encoding length in lossy transmission2000-01-05Paper
Multiple ramp schemes1999-11-21Paper
On lower bounds for the redundancy of optimal codes1999-06-27Paper
A new bound for the data expansion of Huffman codes1999-05-05Paper
https://portal.mardi4nfdi.de/entity/Q42303671999-04-22Paper
Perfectly secure key distribution for dynamic conferences1999-03-30Paper
https://portal.mardi4nfdi.de/entity/Q43417891998-01-04Paper
Tight bounds on the information rate of secret sharing schemes1997-12-18Paper
Randomness in distribution protocols1997-10-13Paper
On the redundancy achieved by Huffman codes1997-09-04Paper
Catastrophic faults in reconfigurable systolic linear arrays1997-08-10Paper
https://portal.mardi4nfdi.de/entity/Q43417341997-07-20Paper
https://portal.mardi4nfdi.de/entity/Q43417371997-07-20Paper
On the information rate of secret sharing schemes1997-02-28Paper
Fully dynamic secret sharing schemes1997-02-27Paper
New lower bounds on the cost of binary search trees1997-02-27Paper
The power of preprocessing in zero-knowledge proofs of knowledge1997-01-14Paper
New bounds on the information rate of secret sharing schemes1995-12-17Paper
https://portal.mardi4nfdi.de/entity/Q48584511995-12-13Paper
Zero-knowledge arguments and public-key cryptography1995-11-05Paper
Graph decompositions and secret sharing schemes1995-07-16Paper
https://portal.mardi4nfdi.de/entity/Q43187161995-07-16Paper
https://portal.mardi4nfdi.de/entity/Q43186911995-03-30Paper
Binary prefix codes ending in a "1"1995-03-01Paper
https://portal.mardi4nfdi.de/entity/Q42815711994-10-04Paper
The knowledge complexity of quadratic residuosity languages1994-09-25Paper
Tight Upper and Lower Bounds on the Path Length of Binary Trees1994-03-27Paper
Cryptographic Applications of the Non-Interactive Metaproof and Many-prover Systems1994-03-07Paper
https://portal.mardi4nfdi.de/entity/Q42796561994-02-22Paper
On the size of shares for secret sharing schemes1994-01-03Paper
On binary search trees1993-06-29Paper
https://portal.mardi4nfdi.de/entity/Q40356941993-05-18Paper
https://portal.mardi4nfdi.de/entity/Q40357101993-05-18Paper
https://portal.mardi4nfdi.de/entity/Q40368581993-05-18Paper
https://portal.mardi4nfdi.de/entity/Q40368971993-05-18Paper
On the construction of statistically synchronizable codes1992-06-28Paper
On the redundancy of optimal codes with limited word length1992-06-28Paper
Noninteractive Zero-Knowledge1992-06-27Paper
A note on D-ary Huffman codes1991-01-01Paper
New bounds on the redundancy of Huffman codes1991-01-01Paper
Removing Interaction from Zero-Knowledge Proofs1990-01-01Paper
Tight upper bounds on the redundancy of Huffman codes1989-01-01Paper
https://portal.mardi4nfdi.de/entity/Q37891041988-01-01Paper
Bounds on the entropy series1988-01-01Paper
Regular universal codeword sets (Corresp.)1986-01-01Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Alfredo De Santis