Dynamic and efficient key management for access hierarchies MJ Atallah, M Blanton, N Fazio, KB Frikken ACM Transactions on Information and System Security (TISSEC) 12 (3), 1-43, 2009 | 589 | 2009 |
Public key broadcast encryption for stateless receivers Y Dodis, N Fazio ACM Workshop on Digital Rights Management, 61-80, 2002 | 398 | 2002 |
ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption D Yao, N Fazio, Y Dodis, A Lysyanskaya Proceedings of the 11th ACM conference on Computer and communications …, 2004 | 190 | 2004 |
Public key trace and revoke scheme secure against adaptive chosen ciphertext attack Y Dodis, N Fazio International Workshop on Public Key Cryptography, 100-115, 2003 | 169 | 2003 |
Outsider-anonymous broadcast encryption with sublinear ciphertexts N Fazio, IM Perera International Workshop on Public Key Cryptography, 225-242, 2012 | 97 | 2012 |
Non-interactive zero-knowledge from homomorphic encryption I Damgård, N Fazio, A Nicolosi Theory of Cryptography Conference, 41-59, 2006 | 76 | 2006 |
Scalable public-key tracing and revoking Y Dodis, N Fazio, A Kiayias, M Yung Distributed Computing 17 (4), 323-347, 2005 | 69 | 2005 |
Cryptographic accumulators: Definitions, constructions and applications N Fazio, A Nicolosi Paper written for course at New York University: www. cs. nyu. edu/nicolosi …, 2002 | 51 | 2002 |
Method for authenticated communication in dynamic federated environments N Fazio, RA Golding, TMT Wong US Patent 9,130,757, 2015 | 33 | 2015 |
Traitor tracing with optimal transmission rate N Fazio, A Nicolosi, DH Phan International Conference on Information Security, 71-88, 2007 | 30 | 2007 |
Homomorphic secret sharing from paillier encryption N Fazio, R Gennaro, T Jafarikhah, WE Skeith International Conference on Provable Security, 381-399, 2017 | 27 | 2017 |
Broadcast steganography N Fazio, AR Nicolosi, IM Perera Cryptographers’ Track at the RSA Conference, 64-84, 2014 | 22 | 2014 |
Public Key Cryptography--PKC 2011: 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011, Proceedings D Catalano, N Fazio, R Gennaro, A Nicolosi Springer Science & Business Media, 2011 | 18* | 2011 |
Hard-core predicates for a Diffie-Hellman problem over finite fields N Fazio, R Gennaro, IM Perera, WE Skeith Annual Cryptology Conference, 148-165, 2013 | 17 | 2013 |
On cryptographic techniques for digital rights management N Fazio New York University, 2006 | 17 | 2006 |
Dynamic and efficient key management for access hierarchies M Blanton, N Fazio, KB Frikken Proceedings of the ACM Conference on Computer and Communications Security, 2005 | 16 | 2005 |
Generalized learning problems and applications to non-commutative cryptography G Baumslag, N Fazio, AR Nicolosi, V Shpilrain, WE Skeith International Conference on Provable Security, 324-339, 2011 | 10 | 2011 |
Hardness of learning problems over Burnside groups of exponent 3 N Fazio, K Iga, AR Nicolosi, L Perret, WE Skeith Designs, Codes and Cryptography 75 (1), 59-70, 2015 | 7 | 2015 |
Fully scalable public-key traitor tracing Y Dodis, N Fazio, A Kiayias, M Yung proceeding of PODC, 2003 | 7 | 2003 |
Output privacy in secure multiparty computation E Bresson, D Catalano, N Fazio, A Nicolosi, M Yung Proc. YACC, 2006 | 6 | 2006 |