Nelly Fazio
Nelly Fazio
Associate Professor, City College & Graduate Center of CUNY
Verified email at - Homepage
Cited by
Cited by
Dynamic and efficient key management for access hierarchies
MJ Atallah, M Blanton, N Fazio, KB Frikken
ACM Transactions on Information and System Security (TISSEC) 12 (3), 1-43, 2009
Public key broadcast encryption for stateless receivers
Y Dodis, N Fazio
ACM Workshop on Digital Rights Management, 61-80, 2002
ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption
D Yao, N Fazio, Y Dodis, A Lysyanskaya
Proceedings of the 11th ACM conference on Computer and communications …, 2004
Public key trace and revoke scheme secure against adaptive chosen ciphertext attack
Y Dodis, N Fazio
International Workshop on Public Key Cryptography, 100-115, 2003
Outsider-anonymous broadcast encryption with sublinear ciphertexts
N Fazio, IM Perera
International Workshop on Public Key Cryptography, 225-242, 2012
Non-interactive zero-knowledge from homomorphic encryption
I Damgård, N Fazio, A Nicolosi
Theory of Cryptography Conference, 41-59, 2006
Scalable public-key tracing and revoking
Y Dodis, N Fazio, A Kiayias, M Yung
Distributed Computing 17 (4), 323-347, 2005
Cryptographic accumulators: Definitions, constructions and applications
N Fazio, A Nicolosi
Paper written for course at New York University: www. cs. nyu. edu/nicolosi …, 2002
Method for authenticated communication in dynamic federated environments
N Fazio, RA Golding, TMT Wong
US Patent 9,130,757, 2015
Traitor tracing with optimal transmission rate
N Fazio, A Nicolosi, DH Phan
International Conference on Information Security, 71-88, 2007
Homomorphic secret sharing from paillier encryption
N Fazio, R Gennaro, T Jafarikhah, WE Skeith
International Conference on Provable Security, 381-399, 2017
Broadcast steganography
N Fazio, AR Nicolosi, IM Perera
Cryptographers’ Track at the RSA Conference, 64-84, 2014
Public Key Cryptography--PKC 2011: 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011, Proceedings
D Catalano, N Fazio, R Gennaro, A Nicolosi
Springer Science & Business Media, 2011
Hard-core predicates for a Diffie-Hellman problem over finite fields
N Fazio, R Gennaro, IM Perera, WE Skeith
Annual Cryptology Conference, 148-165, 2013
On cryptographic techniques for digital rights management
N Fazio
New York University, 2006
Dynamic and efficient key management for access hierarchies
M Blanton, N Fazio, KB Frikken
Proceedings of the ACM Conference on Computer and Communications Security, 2005
Generalized learning problems and applications to non-commutative cryptography
G Baumslag, N Fazio, AR Nicolosi, V Shpilrain, WE Skeith
International Conference on Provable Security, 324-339, 2011
Hardness of learning problems over Burnside groups of exponent 3
N Fazio, K Iga, AR Nicolosi, L Perret, WE Skeith
Designs, Codes and Cryptography 75 (1), 59-70, 2015
Fully scalable public-key traitor tracing
Y Dodis, N Fazio, A Kiayias, M Yung
proceeding of PODC, 2003
Output privacy in secure multiparty computation
E Bresson, D Catalano, N Fazio, A Nicolosi, M Yung
Proc. YACC, 2006
The system can't perform the operation now. Try again later.
Articles 1–20