Analysis of a consensus protocol for extending consistent subchains on the bitcoin blockchain R Longo, AS Podda, R Saia Computation 8 (3), 67, 2020 | 28 | 2020 |
Threshold ECDSA with an Offline Recovery Party M Battagliola, R Longo, A Meneghetti, M Sala Mediterranean Journal of Mathematics 19 (1), 1-29, 2022 | 17 | 2022 |
On the security of the blockchain BIX protocol and certificates R Longo, F Pintore, G Rinaldo, M Sala 2017 9th International Conference on Cyber Conflict (CyCon), 1-16, 2017 | 15 | 2017 |
Key-policy multi-authority attribute-based encryption R Longo, C Marcolla, M Sala Algebraic Informatics: 6th International Conference, CAI 2015, Stuttgart …, 2015 | 14 | 2015 |
A coercion-resistant blockchain-based E-voting protocol with receipts C Spadafora, R Longo, M Sala Advances in Mathematics of Communications, -, 2021 | 9* | 2021 |
Resilient Custody of Crypto-Assets, and Threshold Multisignatures V Di Nicola, R Longo, F Mazzone, G Russo Mathematics 8 (10), 1773, 2020 | 9 | 2020 |
Adaptable Cryptographic Primitives in Blockchains via Smart Contracts R Longo, C Mascia, A Meneghetti, G Santilli, G Tognolini Cryptography 6 (3), 32, 2022 | 6 | 2022 |
Multidimensional Byzantine agreement in a synchronous setting A Flamini, R Longo, A Meneghetti Applicable Algebra in Engineering, Communication and Computing, 1-19, 2022 | 6 | 2022 |
A survey on NIST PQ signatures N Di Chiano, R Longo, A Meneghetti, G Santilli arXiv preprint arXiv:2107.11082, 2021 | 6 | 2021 |
A Provably-Unforgeable Threshold EdDSA with an Offline Recovery Party M Battagliola, R Longo, A Meneghetti, M Sala arXiv preprint arXiv:2009.01631, 2020 | 6 | 2020 |
Searchable encryption with randomized ciphertext and randomized keyword search M Calderini, R Longo, M Sala, I Villa Journal of Mathematical Cryptology 18 (1), 20230029, 2024 | 4 | 2024 |
Provably Unforgeable Threshold EdDSA with an Offline Participant and Trustless Setup M Battagliola, R Longo, A Meneghetti, M Sala Mediterranean Journal of Mathematics 20 (5), 253, 2023 | 4 | 2023 |
Extensible decentralized secret sharing and application to schnorr signatures M Battagliola, R Longo, A Meneghetti Cryptology ePrint Archive, 2022 | 4 | 2022 |
A provably-unforgeable threshold schnorr signature with an offline recovery party M Battagliola, A Galli, R Longo, A Meneghetti CEUR WORKSHOP PROCEEDINGS 3166, 60-76, 2022 | 4 | 2022 |
Formal Proofs of Security for Privacy-Preserving Blockchains and other Cryptographic Protocols R Longo Università degli studi di Trento, 2018 | 4 | 2018 |
Collaborative Multi-Authority KP-ABE for Shorter Keys and Parameters. R Longo, C Marcolla, M Sala IACR Cryptol. ePrint Arch. 2016, 262, 2016 | 4* | 2016 |
Threshold Multi-Signature with an Offline Recovery Party. R Longo, A Meneghetti, M Sala IACR Cryptol. ePrint Arch. 2020, 23, 2020 | 3 | 2020 |
Several proofs of security for a tokenization algorithm R Aragona, R Longo, M Sala Applicable Algebra in Engineering, Communication and Computing 28 (5), 425-436, 2017 | 3 | 2017 |
Cob: a leaderless protocol for parallel Byzantine agreement in incomplete networks A Flamini, R Longo, A Meneghetti Distributed and Parallel Databases, 1-38, 2022 | 2* | 2022 |
Adaptation of an i-voting scheme to Italian Elections for Citizens Abroad R Longo, U Morelli, C Spadafora, A Tomasi E-Vote-ID 2022, 2022 | 2 | 2022 |