Daniele Venturi

From MaRDI portal
Revision as of 10:02, 6 October 2023 by Import231006081045 (talk | contribs) (Created automatically from import231006081045)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Person:329719

Available identifiers

zbMath Open venturi.danieleDBLP98/7881WikidataQ60643197 ScholiaQ60643197MaRDI QIDQ329719

List of research outcomes





PublicationDate of PublicationType
Compact proofs of partial knowledge for overlapping CNF formulae2024-12-27Paper
Improved reductions from noisy to bounded and probing leakages via hockey-stick divergences2024-12-13Paper
Registered (inner-product) functional encryption2024-09-13Paper
Multi-key and multi-input predicate encryption (for conjunctions) from learning with errors2024-07-10Paper
From privacy-only to simulatable OT: black-box, round-optimal, information-theoretic2024-06-25Paper
Non-malleable fuzzy extractors2024-05-31Paper
The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free2024-03-14Paper
Multi-key and multi-input predicate encryption from learning with errors2023-12-12Paper
Tensor rank reduction via coordinate flows2023-11-27Paper
On the complete non-malleability of the Fujisaki-Okamoto transform2023-11-10Paper
Implicit integration of nonlinear evolution equations on tensor manifolds2023-10-17Paper
Continuously non-malleable codes against bounded-depth tampering2023-08-21Paper
Coordinate-adaptive integration of PDEs on tensor manifolds2023-08-04Paper
The Mori-Zwanzig formulation of deep learning2023-06-16Paper
Identity-based matchmaking encryption without random oracles2023-05-12Paper
Continuously non-malleable secret sharing: joint tampering, plain model and capacity2023-04-13Paper
On adaptive security of delayed-input sigma protocols and Fiat-Shamir NIZKs2022-12-16Paper
Non-malleable secret sharing against bounded joint-tampering attacks in the plain model2022-12-07Paper
Universally composable subversion-resilient cryptography2022-08-30Paper
Adaptive integration of nonlinear evolution equations on tensor manifolds2022-08-04Paper
Shielded computations in smart contracts overcoming forks2022-06-17Paper
Tensor methods for the Boltzmann-BGK equation2022-04-14Paper
A new scalable algorithm for computational optimal control under uncertainty2022-04-11Paper
Dynamic tensor approximation of high-dimensional nonlinear PDEs2022-04-08Paper
The mother of all leakages: how to simulate noisy leakages via bounded leakage (almost) for free2021-12-08Paper
Hypoellipticity and the Mori–Zwanzig formulation of stochastic differential equations2021-11-08Paper
Rank-adaptive tensor methods for high-dimensional nonlinear PDEs2021-08-24Paper
Match me if you can: matchmaking encryption and its applications2021-07-02Paper
Spectral methods for nonlinear functionals and functional differential equations2021-06-01Paper
Immunization against complete subversion without random oracles2021-02-15Paper
Dynamically orthogonal tensor methods for high-dimensional nonlinear PDEs2021-01-28Paper
Cryptographic reverse firewalls for interactive proof systems2021-01-25Paper
Non-malleable encryption: simpler, shorter, stronger2020-11-06Paper
Continuously non-malleable codes in the split-state model2020-11-06Paper
Dynamic tensor approximation of high-dimensional nonlinear PDEs2020-07-18Paper
Stability analysis of hierarchical tensor methods for time-dependent PDEs2020-07-02Paper
Continuously non-malleable codes in the split-state model from minimal assumptions2020-06-30Paper
A black-box construction of fully-simulatable, round-optimal oblivious transfer from strongly uniform key agreement2020-04-30Paper
Continuously non-malleable secret sharing for general access structures2020-04-30Paper
Subversion-resilient signatures: definitions, constructions and applications2020-04-21Paper
Generalized Langevin equations for systems with local interactions2020-04-07Paper
Non-malleable secret sharing in the computational setting: adaptive tampering, noisy-leakage resilience, and improved rate2020-03-09Paper
Match me if you can: matchmaking encryption and its applications2020-03-09Paper
Rate-optimizing compilers for continuously non-malleable codes2020-01-30Paper
Public immunization against complete subversion without random oracles2020-01-30Paper
Density Propagation with Characteristics-based Deep Learning2019-11-21Paper
A new scalable algorithm for computational optimal control under uncertainty2019-09-17Paper
Parallel tensor methods for high-dimensional linear PDEs2019-07-11Paper
Data-driven closures for stochastic dynamical systems2019-06-28Paper
Faber approximation of the Mori-Zwanzig equation2019-06-28Paper
Continuously non-malleable codes with split-state refresh2019-01-18Paper
Numerical methods for high-dimensional kinetic equations2018-11-22Paper
On the estimation of the Mori-Zwanzig memory integral2018-11-16Paper
Secure outsourcing of cryptographic circuits manufacturing2018-11-07Paper
Continuously non-malleable codes with split-state refresh2018-08-10Paper
Fiat-Shamir for highly sound protocols is instantiable2018-06-08Paper
The numerical approximation of nonlinear functionals and functional differential equations2018-03-26Paper
Efficient authentication from hard learning problems2018-02-15Paper
Multi-fidelity Gaussian process regression for prediction of random fields2017-12-14Paper
Non-malleable codes for space-bounded tampering2017-11-15Paper
Wick–Malliavin approximation to nonlinear stochastic partial differential equations: analysis and simulations2017-09-29Paper
Convolutionless Nakajima–Zwanzig equations for stochastic analysis in nonlinear dynamical systems2017-09-29Paper
Statistical analysis and simulation of random shocks in stochastic Burgers equation2017-09-29Paper
Duality and conditional expectations in the Nakajima-Mori-Zwanzig formulation2017-09-11Paper
Naor-Yung paradigm with shared randomness and applications2017-09-05Paper
Predictable Arguments of Knowledge2017-06-13Paper
A computable evolution equation for the joint response-excitation probability density function of stochastic dynamical systems2017-06-07Paper
Efficient Non-Malleable Codes and Key Derivation for Poly-Size Tampering Circuits2017-04-28Paper
Bounded tamper resilience: how to go beyond the algebraic barrier2017-03-02Paper
Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience2017-02-01Paper
Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model2016-12-22Paper
Exact PDF equations and closure approximations for advective-reactive transport2016-12-05Paper
Numerical methods for high-dimensional probability density function equations2016-12-05Paper
Rate-limited secure function evaluation2016-10-21Paper
Naor-Yung Paradigm with Shared Randomness and Applications2016-10-21Paper
Fiat–Shamir for Highly Sound Protocols Is Instantiable2016-10-21Paper
Multifidelity Information Fusion Algorithms for High-Dimensional Systems and Massive Data sets2016-07-20Paper
Chosen-Ciphertext Security from Subset Sum2016-04-13Paper
Non-Malleable Encryption: Simpler, Shorter, Stronger2016-03-23Paper
(De-)Constructing TLS 1.32016-01-12Paper
Algorithms for Propagating Uncertainty Across Heterogeneous Domains2015-12-18Paper
Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation2015-10-27Paper
The Chaining Lemma and Its Application2015-09-24Paper
A Multi-Party Protocol for Privacy-Preserving Cooperative Linear Systems of Equations2015-09-21Paper
A Tamper and Leakage Resilient von Neumann Architecture2015-08-27Paper
From Single-Bit to Multi-bit Public-Key Encryption via Non-malleable Codes2015-07-06Paper
On the Non-malleability of the Fiat-Shamir Transform2014-08-20Paper
A Second Look at Fischlin’s Transformation2014-06-24Paper
Efficient Non-malleable Codes and Key-Derivation for Poly-size Tampering Circuits2014-05-27Paper
DIFFERENTIAL CONSTRAINTS FOR THE PROBABILITY DENSITY FUNCTION OF STOCHASTIC SOLUTIONS TO THE WAVE EQUATION2014-04-25Paper
New evolution equations for the joint response-excitation probability density function of stochastic solutions to first-order nonlinear PDEs2014-04-22Paper
Conjugate flow action functionals2014-04-17Paper
Leakage-Resilient Signatures with Graceful Degradation2014-03-25Paper
Continuous Non-malleable Codes2014-02-18Paper
Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier2013-12-10Paper
Adaptive Discontinuous Galerkin Method for Response-Excitation PDF Equations2013-10-28Paper
Outsourced Pattern Matching2013-08-07Paper
Rate-Limited Secure Function Evaluation: Definitions and Constructions2013-04-19Paper
On the Connection between Leakage Tolerance and Adaptive Security2013-04-19Paper
Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience2011-07-06Paper
Efficient Authentication from Hard Learning Problems2011-05-27Paper
A fully symmetric nonlinear biorthogonal decomposition theory for random fields2011-03-08Paper
Leakage-Resilient Storage2010-09-10Paper
Stochastic bifurcation analysis of Rayleigh–Bénard convection2010-06-30Paper
Convective derivatives and Reynolds transport in curvilinear time-dependent coordinates2009-04-08Paper
Stochastic low-dimensional modelling of a random laminar wake past a circular cylinder2008-10-24Paper
On proper orthogonal decomposition of randomly perturbed fields with applications to flow past a cylinder and natural convection over a horizontal plate2006-08-24Paper
Gappy data and reconstruction procedures for flow past a cylinder2005-04-23Paper
Tensor approximation of functional differential equationsN/APaper

Research outcomes over time

This page was built for person: Daniele Venturi