The copyright of these contributions has been transferred to the editors. The copyright transfer covers the exclusive right to reproduce and distribute the contribution, including reprints, translations, photographic reproductions, microform, electronic form (offline, online), or any other reproductions of similar nature.

Journals

  • P. D'Arco, Z. Ebadi Ansaroudi and F. Mogavero
    Multi-stage Proof-of-Works: Properties and Vulnerabilities
    Theoretical Compute Science, vol. 976, pp. x-x, 2023.
  • Z. Ebadi Ansaroudi, R. Zaccagnino, and P. D'Arco.
    On Pseudorandomness and Deep Learning: A Case Study.
    Applied Sciences, vol. 13, pp. 1-13, 2023
  • P. D'Arco, R. De Prisco, Z. Ebadi Ansaroudi, and R. Zaccagnino.
    Gossamer: weaknesses and performance.
    International Journal of Information Security, N.21, pp. 669 - 687, 2022.
  • P. D'Arco, R. De Prisco, and A. De Santis.
    Secret sharing schemes for infinite sets of participants: A new design technique.
    Theorical Computer Science, N. 859, pp. 149-161, 2021.
  • P. D'Arco, M.I. Gonzalez Vasco, A.L. Perez del Pozo, C. Soriente, R. Steinwandt.
    Private Set Intersection: New Generic Constructions and Feasability Results.
    Advances in Mathematics of Communications, pp. 481 - 502, Vol. 11, Issue 3, 2017.
  • A. Castiglione, P. D'Arco, A. De Santis, R. Russo
    Secure group communication schemes for dynamic heterogeneous distributed computing
    Future Generation Computer Systems, pp. 313-324, Vol. 74, 2017.
  • P. D'Arco and R. De Prisco
    Secure Computation without Computers
    Theoretical Computer Science, Vol. 651, pp. 11-36, 2016.
  • P. D'Arco, N. N. Esfahani, D. R. Stinson
    All or Nothing at All.
    The Electronic Journal of Combinatorics, Vol. 23, Issue 4, 2016.
    Available here.
  • P. D'Arco and A. De Santis
    Anonymous Protocols: Notions and Equivalence
    Theoretical Computer Science, Vol. 581, pp. 9–25, May 2015.
  • P. D'Arco, A. De Santis, and R. De Prisco
    Measure-independent Characterization of Contrast Optimal Visual Cryptography Schemes
    Journal of Systems and Software, Vol. 95, pp. 89-99, 2014
  • P. D'Arco and A. P. Del Pozo.
    Towards tracing and revoking schemes secure against collusion and any form of secret information leakage.
    International Journal of Information Security, Vol. 12, N. 1, pp. 1-17, Springer-Verlag, 2013.
  • P. D'Arco and A. De Santis.
    On Ultra-Lightweight RFID Authentication Protocols.
    IEEE Transactions on Dependable and Secure Computing, Vol. 8, N. 4, pp. 548-563, 2011.
  • P. D'Arco, A. De Santis, A. L. Ferrara and B. Masucci.
    Variations on a Theme by Akl and Taylor: Security and Tradeoffs.
    Theoretical Computer Science, N. 441, pp. 213--227, 2010.
  • C. Blundo, P. D'Arco, A. De Santis, and D. Stinson.
    On Unconditionally Secure Distributed Oblivious Transfer.
    Journal of Cryptology, Vol 20, N. 3, pp. 323-375, 2007.
    abstract, postscript, pdf.
  • C. Blundo, P. D'Arco, and A. De Santis.
    On Self-healing Key Distribution Schemes.
    IEEE Transactions on Information Theory, Vol. 52, N. 12, pp., 5455-5468, 2006.
    abstract, postscript, pdf.
  • A. Ciaramella, P. D'Arco, A. De Santis, C. Galdi, and R. Tagliaferri.
    Neural Network Techniques for Proactive Password Checking.
    IEEE Transactions on Dependable and Secure Computing, Vol. 3, N. 4, pp. 219-233, 2006.
  • P. D'Arco, W. Kishimoto, and D. Stinson.
    Properties and Constraints of Cheating-Immune Secret Sharing Scheme.
    Discrete Applied Mathematics, Vol. 154, pp. 219-233, 2006.
    abstract, postscript, pdf.
  • S. Cimato, A. Cresti, and P. D'Arco.
    A Unified Model for Unconditionally Secure Key Distribution.
    Journal of Computer Security, Vol. 14, N. 1, pp. 45-64, 2006.
    abstract, postscript, pdf.
  • P. Bergamo, P. D'Arco, A. De Santis, and L. Kocarev.
    Security of Public Key Cryptosystems based on Chebyshev Polynomials.
    IEEE Transactions on Circuits and Systems I, Vol. 52, N. 7, pp. 1382-1393, 2005.
    Available also at the arXiv.org e-Print archive as cs.CR/0411030, http://arxiv.org/abs/cs.CR/0411030.
    abstract, postscript, pdf. .
  • C. Blundo and P. D'Arco.
    Analysis and Design of Distributed Key Distribution Centers.
    Journal of Cryptology, Vol. 18, N. 4, pp., 391-414, 2005.
    abstract, postscript, pdf. .
  • C. Blundo, P. D'Arco V. Daza, and C. Padrò .
    Bounds and Constructions for Unconditionally Secure Distributed
    Key Distribution Schemes for General Access Structures.

    Theoretical Computer Science, Vol. 320, pp. 269-291, 2004
    abstract, postscript, pdf .
  • C. Blundo, P. D'Arco, A. De Santis, and M. Listo.
    Design of Self-healing Key Distribution Schemes.
    Design, Codes, and Cryptography, N. 32, pp. 15-44, 2004.
    abstract, postscript, pdf. .
  • C. Blundo, P. D'Arco, A. De Santis, and C. Galdi.
    Hyppocrates: A New Proactive Password Checker.
    The Journal of Systems and Software, N. 71, pp. 163-175, 2004.
    abstract, postscript, pdf.
  • C. Blundo, P. D'Arco, and C. Padrò .
    A Ramp Model for Distributed Key Distribution Schemes.
    Discrete Applied Mathematics, N. 128, pp. 47-64, 2003.
    abstract, postscript, pdf.
  • C. Blundo, P. D'Arco, A. De Santis, and D. R. Stinson.
    Contrast Optimal Threshold Visual Cryptography ScheMes.
    SIAM Journal on Discrete Mathematics, Vol. 16, N. 2, pp. 224-261, 2003.
    abstract, postscript, pdf. .
  • C. Blundo, P. D'Arco, and A. De Santis.
    A t-Private k-Database Information Retrieval Scheme.
    International Journal of Information Security (IJIS), Vol. 1, N. 1, pp. 64-68, 2001.
    abstract, postscript, pdf.
  • C. Blundo, P. D'Arco, A. Giorgio Gaggia.
    A [tau]-restricted Key Agreement Scheme.,
    The Computer Journal, Vol. 42, N. 1, pp. 51-61, 1999.
    abstract, postscript, pdf.

Conference Proceedings

  • P. D'Arco and A. De Santis
    Private computations on set intersection
    Proc. of the Stinson66 Conference, Springer, to appear, 2023.
  • P. D'Arco and F. Mogavero.
    On multi-stage Proof-of-Works.
    Blockchain and Applications. BLOCKCHAIN 2021. Lecture Notes in Networks and Systems, vol 320, pp. 91-105, Springer, 2022.
  • X. Carpenter, P. D'Arco and R. De Prisco
    Ultra-lightweight Authentication
    Security of Ubiquitous Computing Systems: Selected Topics, pp. 99–112, Springer, 2021.
  • P. D'Arco and Z. Ebadi Ansaroudi.
    Security Attacks on Multi-stage Proof-of-Work.
    Proc. of the IEEE Percom Workshop on Security, Privacy, and Trust in the Internet of Things (SPT-IoT), 2021.
  • P. D'Arco and Z. Ebadi Ansaroudi.
    Secret disclosure attacks on a recent ultra-lightweight mutual RFID authentication protocol for blockchain-enabled supply chains.
    Proc. of the 16th International Conference on Information Assurance and Security (IAS 2020), 2020.
  • Paolo D'Arco and Marco Nilo
    A New Instance of a Lightweight Authentication Protocol Based on the LPN Problem.
    Proc. of I-SPAN 2019, Communications in Computer and Information Science, Vol. 1080, pp. 118-132, Springer Verlag, 2019.
  • P. D'Arco.
    Ultralightweight Cryptography - Some Thoughts on Ten Years of Efforts.
    Proc. of the 11th International Conference on Information Technology and Communications Security (secITC 2018), Lecture Notes in Computer Science, Vol. 11359, pp. 1-16, Springer Verlag, 2018.
  • P. D'Arco, R. De Prisco, and A. De Santis.
    On the Equivalence of 2-Threshold Secret Sharing Schemes and Prefix Codes}.
    Proc. of CSS 2018, Lecture Notes in Computer Science, Springer Verlag, Vol. 11161, pp. 157--167, 2018.
  • P. D'Arco, R. De Prisco, and A. L. Peres del Pozo.
    An Efficient and Reliable Two-Level Lightweight Authentication Protocol}.
    Proc. of CSS 2018, Lecture Notes in Computer Science, Springer Verlag, Vol. 11161,pp. 168--180, 2018.
  • P. D'Arco and R. De Prisco.
    Design Weaknesses in Recent Ultralightweight RFID Authentication Protocols.
    In ICT Systems Security and Privacy Protection. Vol. 529, pp. 3--17, 2018.
  • P. D'Arco, R. De Prisco, A. De Santis, A. P. Del Pozo and U. Vaccaro.
    Probabilistic Secret Sharing.
    Proc. of the 43rd International Symposium on Mathematical Foundations of Computer Science (MFCS 2018), Dagstuhl Publishing Vol. 117, pp.1-16, 2018.
  • P. D'Arco, R. De Prisco and Y. Desmedt
    Private Visual Share-Homomorphic Computation and Randomness Reduction in Visual Cryptography
    Proc. of the 9th International Conference on Information Theoretic Security (ICITS 2016), Lecture Notes in Computer Science, Vol. 10015, pp. 95-113, Springer Verlag, 2016.
  • P. D'Arco and R. De Prisco
    Visual Cryptography: Models, Issues, Applications and New Directions
    Proc. of the International Conference on Information Technology and Communications Security, Lecture Notes in Computer Science, Vol, 10006, pp. 20-39, Springer Verlag, 2016.
  • P. D'Arco and R. De Prisco
    Secure two-party computation: a visual way
    Proc. of the 7th International Conference on Information Theoretic Security (ICITS 2013), Lecture Notes in Computer Science, Vol. 8317, pp. 18-34, Springer Verlag, 2014.
    Slides of the talk.
  • P. D'Arco, A. De Santis, and R. De Prisco
    Measure-independent Characterization of Contrast Optimal Visual Cryptography Schemes
    Proc. of the 7th International Conference on Information Theoretic Security (ICITS 2013), Lecture Notes in Computer Science, Vol. 8317, pp. 39-55, Springer Verlag, 2014.
  • P. D'Arco and A. De Santis
    Key Privacy and Anonymous Protocols
    Proc. of the IEEE 11th International Conference on Privacy, Security and Trust (PST2013), July 10-12, 2013. ISBN 978-1-4673-5839-2.
    Slides of the talk.
  • P. D'Arco, M. I. Gonzalez Vasco, A. L. Perez del Pozo, and C. Soriente
    Size-Hiding in Private Set Intersection: Existential Results and Constructions
    Proc. of the 5th International Conference on Cryptology (Africacrypt 2012). Lecture Notes in Computer Science, Vol. 7374, pp. 378-394, Springer Verlag, 2012.
  • P. D'Arco and Angel L. Perez del Pozo
    Fighting Pirates 2.0
    Proc. of the 9th International Conference on Applied Cryptography and Network Security (ACNS 2011). Lecture Notes in Computer Science, Vol. 6715, pp. 359-376, Springer Verlag, 2011.
  • P. D'Arco
    An Almost-Optimal Forward-Private Rfid Mutual Authentication Protocol with Tag Control.
    Proc. of the 5th Workshop in Information Security Theory and Practise (WISTP 2011), Lecture Notes in Computer Science, Vol. 6633, pp. 69-84, Springer Verlag, 2011.
  • P. D'Arco, A. De Santis, A. L. Ferrara, and B. Masucci.
    Security and Tradeoffs of the Akl-Taylor Scheme and its Variants.
    Proc. of the 34th International Symposium on Mathematical Foundations of Computer Science - MFCS 2009, Lecture Notes in Computer Science, Vol. 5734, pp. 247-257, Springer Verlag, 2009.
  • P. D'Arco, A. Scafuro and I. Visconti.
    Semi-Destructive Privacy in RFID Systems.
    Proc. of the 5-th Workshop on RFID Security (RFIDSec '09).
  • P. D'Arco, A. Scafuro and I. Visconti.
    Revisiting DoS Attacks and Privacy in RFID-Enabled Networks.
    5th International Workshop on Algorithmic Aspects of Wireless Sensor Networks (ALGOSENSORS '09). Lecture Notes in Computer Science, Vol.5304, pp. 76--87, 2009.
  • P. D'Arco and A. De Santis.
    Weaknesses in a Recent Ultra-lightweight RFID Authentication Protocol.
    Progress in Cryptology - AfricaCrypt 2008, Lecture Notes in Computer Science, Vol. 5023, pp. 27--39, 2008.
    Slidesi of the talk.
  • P. D'Arco and A. De Santis.
    Optimising SD and LSD in presence of non-uniform probabilities of revocation.
    International Conference on Information Theoretic Security (ICITS)
    Lecture Notes in Computer Science, Vol. 4883, pp. 46--64, 2009.
    Slides of the talk.
  • C. Blundo, P. D'Arco, and A. De Santis.
    Definitions and Bounds for Self-healing Key Distribution Schemes.
    31st International Colloquium on Automata, Languages, and Programming (ICALP 2004)
    Lecture Notes in Computer Science, Vol. 3142, pp. 234-246, Springer-Verlag, 2004.
    abstract.
  • S. Cimato, P. D'Arco, and I. Visconti.
    Anonymous Group Communication for Mobile Networks.
    Italian Conference on Theoretical Computer Science (ICTCS 2003)
    lecture Notes in Computer Science, Vol. 2814, pp. 316-328, Springer-Verlag, 2003.
    abstract, gzipped postscript.
  • C. Blundo, P. D'Arco, and M. Listo.
    A New Self-healing Key Distribution Scheme.
    Proceedings of the IEEE Symposium on Computers and Communications (ISCC 2003), pp. 803-808, 2003. abstract.
  • P. D'Arco and D. Stinson.
    Fault Tolerant and Distributed Broadcast Encryption.
    Proceedings of the Cryptographers' Track RSA Conference 2003 (CT-RSA 2003),
    Lecture Notes in Computer Science, Vol. 2612, pp. 262-279, Springer-Verlag, 2003.
    abstract, postscript, pdf.
  • C. Blundo, P. D'Arco, and M. Listo.
    A Flaw in a Self-Healing Key Distribution Scheme.
    Proceedings of the 2003 Information Theory Workshop (ITW 2003), pp. 163-166, 2003.
    abstract.
  • P. D'Arco, W. Kishimoto, and D. Stinson.
    On Cheating-Immune Secret Sharing.
    Proceedings of the International Workshop on Coding and Cryptography (WCC 2003), pp. 111-120, 2003.
    abstract.
  • P. D'Arco and D. Stinson.
    On Unconditionally Secure Robust Distributed Key Distribution Centers © IACR.
    Advances in Cryptology, Proceedings of ASIACRYPT 2002,
    Lecture Notes in Computer Science, Vol. 2501, pp. 346-363, Springer-Verlag, 2002.
    abstract, postscript, pdf. .
  • C. Blundo, P. D'Arco, A. De Santis, and C. Galdi.
    A Novel Approach to Proactive Password Checking.
    Proceedings of INFRASEC 2002,
    Lecture Notes in Computer Science, Vol. 2437, pp.30-39, Springer-Verlag,2002.
    abstract, postscript, pdf.
  • C. Blundo, P. D'Arco, A. De Santis, and D. Stinson.
    New Results on Unconditionally Secure Distributed Oblivious Transfer.
    Proceedings of SAC 2002,
    Lecture Notes in Computer Science, Vol. 2595, pp. 291-309, Springer-Verlag, 2003.
    abstract, postscript, pdf.
  • C. Blundo, P. D'Arco, A. De Santis, and C. Galdi.
    A New Proactive Password Checker.
    Proceedings of the Information Security Conference (ISC 2001),
    Lecture Notes in Computer Science, vol. 2200, pp. 63-80, Springer-Verlag, 2001.
    abstract.
  • C. Blundo, P. D'Arco, V. Daza, and C. Padrò .
    Bounds and Constructions for Unconditionally Secure Distributed
    Key Distribution Schemes for General Access Structures.

    Proceedings of the Information Security Conference (ISC 2001),
    Lecture Notes in Computer Science, vol. 2200, pp. 1-17, Springer-Verlag, 2001.
    abstract .
  • P. D'Arco and D. Stinson.
    Generalized Zig-zag Functions and Oblivious Transfer Reductions.
    Proceedings of Selected Areas in Cryptography (SAC2001),
    Lecture Notes in Computer Science, vol. 2259, pp. 87-102, Springer-Verlag, 2002.
    abstract, postscript, pdf.
  • P. D'Arco.
    On the Distribution of a Key Distribution Center.
    Proceedings of the Italian Conference on Theoretical Computer Science (ICTCS 2001),
    Lecture Notes in Computer Science, vol. 2202, pp. 357-369, Springer-Verlag, 2001.
    abstract.
  • C. Blundo, P. D'Arco, and C. Padrò .
    A Ramp Model for Distributed Key Distribution Schemes.
    Proceedings of the International Workshop on Coding and Cryptography (WCC2001),
    January 8-12, 2001, PARIS (France).
    abstract.
  • C. Blundo and P. D'Arco.
    An Information Theoretic Model for Distributed Key Distribution.
    Proceedings of 2000 IEEE International Symposium on Information Theory (ISIT2000), pp. 267.

Book Chapters

  • C. Blundo and P. D'Arco.
    The Key Establishment Problem
    Foundations of Security Analysis and Design II,
    Lecture Notes in Computer Science, vol. 2946, pp. 44-90, 2004.
    pdf.
  • P. D'Arco and A. De Santis. (In Italian)
    Crittografia Classica. Scritture e Codici Segreti.
    Manoscritto mai pubblicato. Anno 1998.
    pdf.

Citations

If you like numbers, metrics and statistics, or you are an evaluator and need to get a rough idea of the interest within the community of the above papers, please have a look at my Scholar Google Profile.