ZOLLINGER, M.-L., RYAN, P. Y. A., ROENNE, P., IOVINO, V., RIAL, A., & DAMODARAN, A. S. S. (11 May 2023). Selene: A Usable Voting System with Transparent Verifiability and Coercion Mitigation [Poster presentation]. SnT Partnership Day 2023, Luxembourg City, Luxembourg. |
IOVINO, V., & Visconti, I. (2019). Non-interactive Zero Knowledge Proofs in the Random Oracle Model. In Codes, Cryptology and Information Security (pp. 118-141). Springer, Cham. doi:10.1007/978-3-030-16458-4 Peer reviewed |
LOPEZ BECERRA, J. M., IOVINO, V., OSTREV, D., & Skrobot, M. (2019). On the Relation Between SIM and IND-RoR Security Models for PAKEs with Forward Secrecy. E-Business and Telecommunications - 2019, 173-198. doi:10.1007/978-3-030-11039-0_9 Peer reviewed |
LOPEZ BECERRA, J. M., IOVINO, V., OSTREV, D., SALA, P., & SKROBOT, M. (2017). Tightly-Secure PAK(E). In Cryptology and Network Security. Springer. Peer reviewed |
IOVINO, V., RIAL, A., ROENNE, P., & RYAN, P. (2017). Using Selene to Verify your Vote in JCJ. In Workshop on Advances in Secure Electronic Voting (VOTING'17) (pp. 17). Peer reviewed |
LOPEZ BECERRA, J. M., IOVINO, V., & SKROBOT, M. (09 March 2017). On the Relation Between SIM and IND-RoR Security Models for PAKEs [Paper presentation]. Grande Region Security and Reliability Day 2017, Luxembourg Ville, Luxembourg. |
Desmedt, Y., IOVINO, V., Persiano, G., & Visconti, I. (2017). Controlled Homomorphic Encryption: Definition and Construction. In FC 2017 International Workshops - WAHC'17 - 5th Workshop on Encrypted Computing and Applied Homomorphic Cryptography. Peer reviewed |
LOPEZ BECERRA, J. M., IOVINO, V., OSTREV, D., & SKROBOT, M. (2017). On the Relation Between SIM and IND-RoR Security Models for PAKEs. In Proceedings of the International Conference on Security and Cryptography (pp. 12). SCITEPRESS. Peer reviewed |
De Caro, A.* , IOVINO, V.* , & O'Neill, A.*. (2017). Receiver and Sender Deniable Functional Encryption. IET Information Security. doi:10.1049/iet-ifs.2017.0040 Peer Reviewed verified by ORBi * These authors have contributed equally to this work. |
Giustolisi, R., IOVINO, V., & LENZINI, G. (2017). Privacy-Preserving Verifiability: A Case for an Electronic Exam Protocol. In R. Giustolisi, V. IOVINO, ... G. LENZINI, Privacy-Preserving Verifiability: A Case for an Electronic Exam Protocol. SCITEPRESS. Peer reviewed |
IOVINO, V., Tang, Q., & Zebrowski, K. (2017). On the power of Public-key Function-Private Functional Encryption. IET Information Security. doi:10.1049/iet-ifs.2016.0459 Peer Reviewed verified by ORBi |
DELERUE ARRIAGA, A., IOVINO, V., & Tang, Q. (2016). Updatable Functional Encryption. In Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers (pp. 347-363). Springer. doi:10.1007/978-3-319-61273-7_17 Peer reviewed |
De Caro, A.* , & IOVINO, V.*. (2016). On the Power of Rewinding Simulators in Functional Encryption. Designs, Codes and Cryptography. doi:10.1007/s10623-016-0272-x Peer Reviewed verified by ORBi * These authors have contributed equally to this work. |
Gallegos-Garcia, G., IOVINO, V., ROENNE, P., & RYAN, P. (2016). (Universal) Unconditional Verifiability in E-Voting without Trusted Parties. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/31726. |
De caro, A., IOVINO, V., & O'Neill, A. (2016). Deniable Functional Encryption. In Public-key Cryptography - PKC 2016, 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I (1, pp. 27). Springer. Peer reviewed |
Giustolisi, R., IOVINO, V., & Rønne, P. (2016). On the Possibility of Non-Interactive E-Voting in the Public-key Setting. In Financial Cryptography and Data Security, FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papers. Springer. doi:10.1007/978-3-662-53357-4_13 Peer reviewed |
IOVINO, V., TANG, Q., & Zebrowski, K. (2016). On the power of Public-key Function-Private Functional Encryption. In 15th International Conference on Cryptology and Network Security. Springer Seciurity and Cryptology. doi:10.1007/978-3-319-48965-0 Peer reviewed |
IOVINO, V., & Żebrowski, K. (11 September 2015). Mergeable Functional Encryption [Paper presentation]. 16th Italian Conference on Theoretical Computer Science (ICTCS), Firenze, Italy. |
Giustolisi, R., IOVINO, V., & ROENNE, P. (2015). On the Possibility of Non-Interactive E-Voting in the Public-key Setting. IACR Cryptology ePrint Archive, 2015, 1119. |
IOVINO, V., & Żebrowski, K. (2015). Simulation-Based Secure Functional Encryption in the Random Oracle Model. In Progress in Cryptology -- LATINCRYPT 2015 (pp. 19). Springer. doi:10.1007/978-3-319-22174-8_2 Peer reviewed |
RYAN, P., ROENNE, P., & IOVINO, V. (2015). Selene: Voting with Transparent Verifiability and Coercion-Mitigation. Abstract book of 1st Workshop on Advances in Secure Electronic Voting, 2015, 1105. Peer reviewed |
De caro, A., IOVINO, V., Jain, A., O'Neill, A., Paneth, O., & Persiano, G. (2013). On the Achievability of Simulation-Based Security for Functional Encryption. In Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part II. Springer. Peer reviewed |