Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Scafuro, Alessandra
add a person with the name Scafuro, Alessandra
 

Other publications of authors with the same name

Revisiting Lower and Upper Bounds for Selective Decommitments., , , and . TCC, volume 7785 of Lecture Notes in Computer Science, page 559-578. Springer, (2013)Black-box non-black-box zero knowledge., , , and . STOC, page 515-524. ACM, (2014)Revisiting DoS Attacks and Privacy in RFID-Enabled Networks., , and . ALGOSENSORS, volume 5804 of Lecture Notes in Computer Science, page 76-87. Springer, (2009)TumbleBit: An Untrusted Tumbler for Bitcoin-Compatible Anonymous Payments., , , , and . IACR Cryptology ePrint Archive, (2016)Preserving Buyer-Privacy in Decentralized Supply Chain Marketplaces., , , , , and . IACR Cryptol. ePrint Arch., (2022)Practical Yet Composably Secure Cryptographic Protocols (Dagstuhl Seminar 19042)., , , and . Dagstuhl Reports, 9 (1): 88-103 (2019)Adaptively Secure Garbled Circuits from One-Way Functions., , , , and . IACR Cryptology ePrint Archive, (2015)Revisiting Lower and Upper Bounds for Selective Decommitments., , , and . IACR Cryptology ePrint Archive, (2011)Improved OR Composition of Sigma-Protocols., , , , and . IACR Cryptology ePrint Archive, (2015)Resettably Sound Zero-Knowledge Arguments from OWFs - The (Semi) Black-Box Way., , and . TCC (1), volume 9014 of Lecture Notes in Computer Science, page 345-374. Springer, (2015)