D. Venturi

From MaRDI portal
(Redirected from Person:329719)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Cryptographic reverse firewalls for interactive proof systems2026-03-18Paper
Compact proofs of partial knowledge for overlapping CNF formulae
Journal of Cryptology
2024-12-27Paper
Improved reductions from noisy to bounded and probing leakages via hockey-stick divergences2024-12-13Paper
Registered (inner-product) functional encryption2024-09-13Paper
Multi-key and multi-input predicate encryption (for conjunctions) from learning with errors
Journal of Cryptology
2024-07-10Paper
From privacy-only to simulatable OT: black-box, round-optimal, information-theoretic2024-06-25Paper
Non-malleable fuzzy extractors2024-05-31Paper
The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free
IEEE Transactions on Information Theory
2024-03-14Paper
Multi-key and multi-input predicate encryption from learning with errors
Advances in Cryptology – EUROCRYPT 2023
2023-12-12Paper
Tensor rank reduction via coordinate flows
Journal of Computational Physics
2023-11-27Paper
On the complete non-malleability of the Fujisaki-Okamoto transform2023-11-10Paper
Implicit integration of nonlinear evolution equations on tensor manifolds
Journal of Scientific Computing
2023-10-17Paper
Continuously non-malleable codes against bounded-depth tampering
Advances in Cryptology – ASIACRYPT 2022
2023-08-21Paper
Coordinate-adaptive integration of PDEs on tensor manifolds2023-08-04Paper
The Mori-Zwanzig formulation of deep learning
Research in the Mathematical Sciences
2023-06-16Paper
Identity-based matchmaking encryption without random oracles
Lecture Notes in Computer Science
2023-05-12Paper
Continuously non-malleable secret sharing: joint tampering, plain model and capacity2023-04-13Paper
On adaptive security of delayed-input sigma protocols and Fiat-Shamir NIZKs2022-12-16Paper
Non-malleable secret sharing against bounded joint-tampering attacks in the plain model2022-12-07Paper
Universally composable subversion-resilient cryptography2022-08-30Paper
Adaptive integration of nonlinear evolution equations on tensor manifolds
Journal of Scientific Computing
2022-08-04Paper
Shielded computations in smart contracts overcoming forks2022-06-17Paper
Tensor methods for the Boltzmann-BGK equation
Journal of Computational Physics
2022-04-14Paper
A new scalable algorithm for computational optimal control under uncertainty
Journal of Computational Physics
2022-04-11Paper
Dynamic tensor approximation of high-dimensional nonlinear PDEs
Journal of Computational Physics
2022-04-08Paper
The mother of all leakages: how to simulate noisy leakages via bounded leakage (almost) for free2021-12-08Paper
Hypoellipticity and the Mori-Zwanzig formulation of stochastic differential equations
Journal of Mathematical Physics
2021-11-08Paper
Rank-adaptive tensor methods for high-dimensional nonlinear PDEs
Journal of Scientific Computing
2021-08-24Paper
Match me if you can: matchmaking encryption and its applications
Journal of Cryptology
2021-07-02Paper
Spectral methods for nonlinear functionals and functional differential equations
Research in the Mathematical Sciences
2021-06-01Paper
Immunization against complete subversion without random oracles
Theoretical Computer Science
2021-02-15Paper
Dynamically orthogonal tensor methods for high-dimensional nonlinear PDEs
Journal of Computational Physics
2021-01-28Paper
Cryptographic reverse firewalls for interactive proof systems
Theoretical Computer Science
2021-01-25Paper
Non-malleable encryption: simpler, shorter, stronger
Journal of Cryptology
2020-11-06Paper
Continuously non-malleable codes in the split-state model
Journal of Cryptology
2020-11-06Paper
Dynamic tensor approximation of high-dimensional nonlinear PDEs
(available as arXiv preprint)
2020-07-18Paper
Stability analysis of hierarchical tensor methods for time-dependent PDEs
Journal of Computational Physics
2020-07-02Paper
Continuously non-malleable codes in the split-state model from minimal assumptions2020-06-30Paper
Continuously non-malleable secret sharing for general access structures2020-04-30Paper
A black-box construction of fully-simulatable, round-optimal oblivious transfer from strongly uniform key agreement2020-04-30Paper
Subversion-resilient signatures: definitions, constructions and applications
Theoretical Computer Science
2020-04-21Paper
Generalized Langevin equations for systems with local interactions
Journal of Statistical Physics
2020-04-07Paper
Non-malleable secret sharing in the computational setting: adaptive tampering, noisy-leakage resilience, and improved rate2020-03-09Paper
Match me if you can: matchmaking encryption and its applications
Advances in Cryptology – CRYPTO 2019
2020-03-09Paper
Public immunization against complete subversion without random oracles2020-01-30Paper
Rate-optimizing compilers for continuously non-malleable codes2020-01-30Paper
Density Propagation with Characteristics-based Deep Learning2019-11-21Paper
A new scalable algorithm for computational optimal control under uncertainty
(available as arXiv preprint)
2019-09-17Paper
Parallel tensor methods for high-dimensional linear PDEs
Journal of Computational Physics
2019-07-11Paper
Data-driven closures for stochastic dynamical systems
Journal of Computational Physics
2019-06-28Paper
Faber approximation of the Mori-Zwanzig equation
Journal of Computational Physics
2019-06-28Paper
Continuously non-malleable codes with split-state refresh
Theoretical Computer Science
2019-01-18Paper
Numerical methods for high-dimensional kinetic equations2018-11-22Paper
On the estimation of the Mori-Zwanzig memory integral
Journal of Mathematical Physics
2018-11-16Paper
Secure outsourcing of cryptographic circuits manufacturing2018-11-07Paper
Continuously non-malleable codes with split-state refresh
Applied Cryptography and Network Security
2018-08-10Paper
Fiat-Shamir for highly sound protocols is instantiable
Theoretical Computer Science
2018-06-08Paper
The numerical approximation of nonlinear functionals and functional differential equations
Physics Reports
2018-03-26Paper
Efficient authentication from hard learning problems
Journal of Cryptology
2018-02-15Paper
Multi-fidelity Gaussian process regression for prediction of random fields
Journal of Computational Physics
2017-12-14Paper
Non-malleable codes for space-bounded tampering2017-11-15Paper
Wick–Malliavin approximation to nonlinear stochastic partial differential equations: analysis and simulations
Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences
2017-09-29Paper
Convolutionless Nakajima-Zwanzig equations for stochastic analysis in nonlinear dynamical systems
Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences
2017-09-29Paper
Statistical analysis and simulation of random shocks in stochastic Burgers equation
Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences
2017-09-29Paper
Duality and conditional expectations in the Nakajima-Mori-Zwanzig formulation
Journal of Mathematical Physics
2017-09-11Paper
Naor-Yung paradigm with shared randomness and applications
Theoretical Computer Science
2017-09-05Paper
Predictable arguments of knowledge
Lecture Notes in Computer Science
2017-06-13Paper
A computable evolution equation for the joint response-excitation probability density function of stochastic dynamical systems
Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences
2017-06-07Paper
Efficient Non-Malleable Codes and Key Derivation for Poly-Size Tampering Circuits
IEEE Transactions on Information Theory
2017-04-28Paper
Bounded tamper resilience: how to go beyond the algebraic barrier
Journal of Cryptology
2017-03-02Paper
Efficient public-key cryptography with bounded leakage and tamper resilience
Advances in Cryptology – ASIACRYPT 2016
2017-02-01Paper
Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model
Theoretical Computer Science
2016-12-22Paper
Exact PDF equations and closure approximations for advective-reactive transport
Journal of Computational Physics
2016-12-05Paper
Numerical methods for high-dimensional probability density function equations
Journal of Computational Physics
2016-12-05Paper
Rate-limited secure function evaluation
Theoretical Computer Science
2016-10-21Paper
Fiat-Shamir for highly sound protocols is instantiable
Lecture Notes in Computer Science
2016-10-21Paper
Naor-Yung Paradigm with Shared Randomness and Applications
Lecture Notes in Computer Science
2016-10-21Paper
Multifidelity information fusion algorithms for high-dimensional systems and massive data sets
SIAM Journal on Scientific Computing
2016-07-20Paper
Chosen-ciphertext security from subset sum
Public-Key Cryptography – PKC 2016
2016-04-13Paper
Non-malleable encryption: simpler, shorter, stronger
Theory of Cryptography
2016-03-23Paper
(De-)constructing TLS 1.3
Progress in Cryptology -- INDOCRYPT 2015
2016-01-12Paper
Algorithms for propagating uncertainty across heterogeneous domains
SIAM Journal on Scientific Computing
2015-12-18Paper
Mind your coins: fully leakage-resilient signatures with graceful degradation
Automata, Languages, and Programming
2015-10-27Paper
The Chaining Lemma and its application
Lecture Notes in Computer Science
2015-09-24Paper
A Multi-Party Protocol for Privacy-Preserving Cooperative Linear Systems of Equations
Cryptography and Information Security in the Balkans
2015-09-21Paper
A tamper and leakage resilient von Neumann architecture
Lecture Notes in Computer Science
2015-08-27Paper
From single-bit to multi-bit public-key encryption via non-malleable codes
Theory of Cryptography
2015-07-06Paper
On the Non-malleability of the Fiat-Shamir Transform
Lecture Notes in Computer Science
2014-08-20Paper
A second look at Fischlin's transformation
Progress in Cryptology – AFRICACRYPT 2014
2014-06-24Paper
Efficient non-malleable codes and key-derivation for poly-size tampering circuits
Advances in Cryptology – EUROCRYPT 2014
2014-05-27Paper
DIFFERENTIAL CONSTRAINTS FOR THE PROBABILITY DENSITY FUNCTION OF STOCHASTIC SOLUTIONS TO THE WAVE EQUATION
International Journal for Uncertainty Quantification
2014-04-25Paper
New evolution equations for the joint response-excitation probability density function of stochastic solutions to first-order nonlinear PDEs
Journal of Computational Physics
2014-04-22Paper
Conjugate flow action functionals
Journal of Mathematical Physics
2014-04-17Paper
Leakage-Resilient Signatures with Graceful Degradation
Public-Key Cryptography – PKC 2014
2014-03-25Paper
Continuous non-malleable codes
Theory of Cryptography
2014-02-18Paper
Bounded tamper resilience: how to go beyond the algebraic barrier
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
Adaptive discontinuous Galerkin method for response-excitation PDF equations
SIAM Journal on Scientific Computing
2013-10-28Paper
Outsourced pattern matching
Automata, Languages, and Programming
2013-08-07Paper
Rate-limited secure function evaluation: definitions and constructions
Public-Key Cryptography – PKC 2013
2013-04-19Paper
On the connection between leakage tolerance and adaptive security
Public-Key Cryptography – PKC 2013
2013-04-19Paper
Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience
Automata, Languages and Programming
2011-07-06Paper
Efficient Authentication from Hard Learning Problems
Advances in Cryptology – EUROCRYPT 2011
2011-05-27Paper
A fully symmetric nonlinear biorthogonal decomposition theory for random fields
Physica D
2011-03-08Paper
Leakage-resilient storage
Lecture Notes in Computer Science
2010-09-10Paper
Stochastic bifurcation analysis of Rayleigh-Bénard convection
Journal of Fluid Mechanics
2010-06-30Paper
Convective derivatives and Reynolds transport in curvilinear time-dependent coordinates
Journal of Physics A: Mathematical and Theoretical
2009-04-08Paper
Stochastic low-dimensional modelling of a random laminar wake past a circular cylinder
Journal of Fluid Mechanics
2008-10-24Paper
On proper orthogonal decomposition of randomly perturbed fields with applications to flow past a cylinder and natural convection over a horizontal plate
Journal of Fluid Mechanics
2006-08-24Paper
Gappy data and reconstruction procedures for flow past a cylinder
Journal of Fluid Mechanics
2005-04-23Paper
Tensor approximation of functional differential equations
(available as arXiv preprint)
N/APaper


Research outcomes over time


This page was built for person: D. Venturi