Rosario Gennaro

From MaRDI portal
Revision as of 15:14, 10 December 2023 by AuthorDisambiguator (talk | contribs) (AuthorDisambiguator moved page Rosario Gennaro to Rosario Gennaro: Duplicate)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Person:290377

Available identifiers

zbMath Open gennaro.rosarioMaRDI QIDQ290377

List of research outcomes

PublicationDate of PublicationType
On the impossibility of algebraic vector commitments in pairing-free groups2023-08-14Paper
Escrow Protocols for Cryptocurrencies: How to Buy Physical Goods Using Bitcoin2021-03-17Paper
On the cryptographic deniability of the Signal protocol2021-02-23Paper
Publicly evaluatable perceptual hashing2021-02-23Paper
Using level-1 homomorphic encryption to improve threshold DSA signatures for Bitcoin wallet security2020-03-02Paper
Fine-grained secure computation2018-12-06Paper
Homomorphic secret sharing from Paillier encryption2018-11-07Paper
Efficient rational proofs for space bounded computations2017-10-27Paper
Achieving independence efficiently and securely2017-09-29Paper
Threshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet Security2016-10-04Paper
Automata evaluation and text search protocols with simulation-based security2016-06-01Paper
Simplified VSS and fast-track multiparty computations with applications to threshold cryptography2016-03-02Paper
Sequentially Composable Rational Proofs2015-12-11Paper
Robust and Efficient Sharing of RSA Functions2015-11-11Paper
Algebraic (trapdoor) one-way functions: constructions and applications2015-10-08Paper
The round complexity of verifiable secret sharing and secure multicast2015-02-27Paper
Robust Threshold DSS Signatures2014-08-20Paper
Generalizing Homomorphic MACs for Arithmetic Circuits2014-03-25Paper
On the Relationship between Functional Encryption, Obfuscation, and Fully Homomorphic Encryption2014-01-17Paper
Fully Homomorphic Message Authenticators2013-12-10Paper
Hard-Core Predicates for a Diffie-Hellman Problem over Finite Fields2013-09-17Paper
Quadratic Span Programs and Succinct NIZKs without PCPs2013-05-31Paper
The Generalized Randomized Iterate and Its Application to New Efficient Constructions of UOWHFs from Regular One-Way Functions2013-03-19Paper
Algebraic (Trapdoor) One-Way Functions and Their Applications2013-03-18Paper
Computational Extractors and Pseudorandomness2012-06-15Paper
Verifiable Delegation of Computation over Large Datasets2011-08-12Paper
Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement2010-11-26Paper
Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers2010-08-24Paper
Lower bounds on the efficiency of encryption and digital signature schemes2010-08-16Paper
Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead2010-07-06Paper
Secure Network Coding over the Integers2010-05-28Paper
Text Search Protocols with Simulation Based Security2010-05-28Paper
Making the Diffie-Hellman Protocol Identity-Based2010-03-16Paper
A new and improved paradigm for hybrid encryption secure against chosen-ciphertext attack2010-03-01Paper
Secure multiplication of shared secrets in the exponent2009-12-18Paper
More on Key Wrapping2009-12-09Paper
New approaches for deniable authentication2009-11-13Paper
Theory of Cryptography2009-05-14Paper
Foundations of Security Analysis and Design II2009-05-14Paper
Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM2008-05-06Paper
Tag-KEM/DEM: A new framework for hybrid encryption2008-04-16Paper
Threshold RSA for Dynamic and Ad-Hoc Groups2008-04-15Paper
Off-Line/On-Line Signatures: Theoretical Aspects and Experimental Results2008-03-05Paper
Faster and Shorter Password-Authenticated Key Exchange2008-03-05Paper
Advances in Cryptology - EUROCRYPT 20042007-09-25Paper
Independent Zero-Knowledge Sets2007-09-11Paper
Improved On-Line/Off-Line Threshold Signatures2007-09-04Paper
Secure distributed key generation for discrete-log based cryptosystems2007-05-24Paper
Cramer-Damgård signatures revisited: Efficient flat-tree signatures based on factoring2007-02-26Paper
Provably secure threshold password-authenticated key exchange2006-10-05Paper
https://portal.mardi4nfdi.de/entity/Q33749092006-03-01Paper
An improved pseudo-random generator based on the discrete logarithm problem2006-02-08Paper
Public Key Cryptography - PKC 20052005-12-07Paper
Bounds on the Efficiency of Generic Cryptographic Constructions2005-10-28Paper
Advances in Cryptology – CRYPTO 20042005-08-23Paper
Advances in Cryptology – CRYPTO 20042005-08-23Paper
https://portal.mardi4nfdi.de/entity/Q47372322004-08-11Paper
https://portal.mardi4nfdi.de/entity/Q44348962003-11-26Paper
https://portal.mardi4nfdi.de/entity/Q44348972003-11-26Paper
https://portal.mardi4nfdi.de/entity/Q44185502003-08-10Paper
https://portal.mardi4nfdi.de/entity/Q44091172003-06-30Paper
Paillier's trapdoor function hides up to \(O(n)\) bits2003-03-25Paper
https://portal.mardi4nfdi.de/entity/Q47977882003-03-09Paper
Robust threshold DSS signatures2003-01-14Paper
How to sign digital streams2003-01-14Paper
https://portal.mardi4nfdi.de/entity/Q45368192002-08-06Paper
Securing threshold cryptosystems against chosen ciphertext attack2002-06-27Paper
https://portal.mardi4nfdi.de/entity/Q27788522002-03-21Paper
https://portal.mardi4nfdi.de/entity/Q27572412001-11-25Paper
New efficient and secure protocols for verifiable signature sharing and other applications2001-06-10Paper
RSA-based undeniable signatures2000-12-21Paper
Secure distributed storage and retrieval2000-08-21Paper
https://portal.mardi4nfdi.de/entity/Q49418502000-07-19Paper
https://portal.mardi4nfdi.de/entity/Q42493242000-03-09Paper
https://portal.mardi4nfdi.de/entity/Q42507692000-03-07Paper
Robust and efficient sharing of RSA functions.2000-01-01Paper
Securing threshold cryptosystems against chosen ciphertext attack1999-09-09Paper
Secure Hash-and-Sign Signatures Without the Random Oracle1999-01-01Paper
https://portal.mardi4nfdi.de/entity/Q38387731998-08-13Paper
https://portal.mardi4nfdi.de/entity/Q43645471998-05-12Paper
https://portal.mardi4nfdi.de/entity/Q43645511998-03-17Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Rosario Gennaro