Follow
Giulio Malavolta
Giulio Malavolta
Max Planck Institute for Security and Privacy
Verified email at csp.mpg.de - Homepage
Title
Cited by
Cited by
Year
Concurrency and privacy with payment-channel networks
G Malavolta, P Moreno-Sanchez, A Kate, M Maffei, S Ravi
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
2402017
Anonymous multi-hop locks for blockchain scalability and interoperability
G Malavolta, P Moreno-Sanchez, C Schneidewind, A Kate, M Maffei
Cryptology ePrint Archive, 2018
2052018
Silentwhispers: Enforcing security and privacy in decentralized credit networks
G Malavolta, P Moreno-Sanchez, A Kate, M Maffei
Cryptology ePrint Archive, 2016
1502016
Privacy and access control for outsourced personal records
M Maffei, G Malavolta, M Reinert, D Schröder
2015 IEEE Symposium on Security and Privacy, 341-358, 2015
842015
Subvector commitments with application to succinct arguments
RWF Lai, G Malavolta
Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019
802019
Trapdoor hash functions and their applications
N Döttling, S Garg, Y Ishai, G Malavolta, T Mour, R Ostrovsky
Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019
712019
Homomorphic time-lock puzzles and applications
G Malavolta, SAK Thyagarajan
Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019
652019
Leveraging linear decryption: Rate-1 fully-homomorphic encryption and time-lock puzzles
Z Brakerski, N Döttling, S Garg, G Malavolta
Theory of Cryptography: 17th International Conference, TCC 2019, Nuremberg …, 2019
632019
Efficient unlinkable sanitizable signatures from signatures with re-randomizable keys
N Fleischhacker, J Krupp, G Malavolta, J Schneider, D Schröder, ...
Public-Key Cryptography–PKC 2016: 19th IACR International Conference on …, 2016
622016
Factoring and pairings are not necessary for io: Circular-secure lwe suffices
Z Brakerski, N Döttling, S Garg, G Malavolta
Cryptology ePrint Archive, 2020
492020
Candidate iO from homomorphic encryption schemes
Z Brakerski, N Döttling, S Garg, G Malavolta
Advances in Cryptology–EUROCRYPT 2020: 39th Annual International Conference …, 2020
482020
Multi-key fully-homomorphic encryption in the plain model
P Ananth, A Jain, Z Jin, G Malavolta
Theory of Cryptography: 18th International Conference, TCC 2020, Durham, NC …, 2020
342020
Statistical zaps and new oblivious transfer protocols
V Goyal, A Jain, Z Jin, G Malavolta
Advances in Cryptology–EUROCRYPT 2020: 39th Annual International Conference …, 2020
342020
Maliciously secure multi-client ORAM
M Maffei, G Malavolta, M Reinert, D Schröder
Applied Cryptography and Network Security: 15th International Conference …, 2017
282017
Tight verifiable delay functions
N Döttling, S Garg, G Malavolta, PN Vasudevan
Security and Cryptography for Networks: 12th International Conference, SCN …, 2020
272020
Efficient ring signatures in the standard model
G Malavolta, D Schröder
Advances in Cryptology–ASIACRYPT 2017: 23rd International Conference on the …, 2017
272017
Verifiable timed signatures made practical
SAK Thyagarajan, A Bhat, G Malavolta, N Döttling, A Kate, D Schröder
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
262020
Succinct arguments for bilinear group arithmetic: practical structure-preserving cryptography
RWF Lai, G Malavolta, V Ronge
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
242019
Post-quantum multi-party computation
A Agarwal, J Bartusek, V Goyal, D Khurana, G Malavolta
Advances in Cryptology–EUROCRYPT 2021: 40th Annual International Conference …, 2021
232021
Homomorphic secret sharing for low degree polynomials
RWF Lai, G Malavolta, D Schröder
Advances in Cryptology–ASIACRYPT 2018: 24th International Conference on the …, 2018
232018
The system can't perform the operation now. Try again later.
Articles 1–20