Daniele Venturi

From MaRDI portal
Person:329719

Available identifiers

zbMath Open venturi.danieleWikidataQ60643197 ScholiaQ60643197MaRDI QIDQ329719

List of research outcomes

PublicationDate of PublicationType
The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free2024-03-14Paper
Multi-key and multi-input predicate encryption from learning with errors2023-12-12Paper
Tensor rank reduction via coordinate flows2023-11-27Paper
Implicit integration of nonlinear evolution equations on tensor manifolds2023-10-17Paper
Continuously non-malleable codes against bounded-depth tampering2023-08-21Paper
Coordinate-adaptive integration of PDEs on tensor manifolds2023-08-04Paper
The Mori-Zwanzig formulation of deep learning2023-06-16Paper
Identity-based matchmaking encryption without random oracles2023-05-12Paper
Continuously non-malleable secret sharing: joint tampering, plain model and capacity2023-04-13Paper
On adaptive security of delayed-input sigma protocols and Fiat-Shamir NIZKs2022-12-16Paper
Non-malleable secret sharing against bounded joint-tampering attacks in the plain model2022-12-07Paper
Universally composable subversion-resilient cryptography2022-08-30Paper
Adaptive integration of nonlinear evolution equations on tensor manifolds2022-08-04Paper
Shielded computations in smart contracts overcoming forks2022-06-17Paper
Tensor methods for the Boltzmann-BGK equation2022-04-14Paper
A new scalable algorithm for computational optimal control under uncertainty2022-04-11Paper
Dynamic tensor approximation of high-dimensional nonlinear PDEs2022-04-08Paper
The mother of all leakages: how to simulate noisy leakages via bounded leakage (almost) for free2021-12-08Paper
Hypoellipticity and the Mori–Zwanzig formulation of stochastic differential equations2021-11-08Paper
Rank-adaptive tensor methods for high-dimensional nonlinear PDEs2021-08-24Paper
Match me if you can: matchmaking encryption and its applications2021-07-02Paper
Spectral methods for nonlinear functionals and functional differential equations2021-06-01Paper
Immunization against complete subversion without random oracles2021-02-15Paper
Dynamically orthogonal tensor methods for high-dimensional nonlinear PDEs2021-01-28Paper
Cryptographic reverse firewalls for interactive proof systems2021-01-25Paper
Non-malleable encryption: simpler, shorter, stronger2020-11-06Paper
Continuously non-malleable codes in the split-state model2020-11-06Paper
Dynamic tensor approximation of high-dimensional nonlinear PDEs2020-07-18Paper
Stability analysis of hierarchical tensor methods for time-dependent PDEs2020-07-02Paper
Continuously non-malleable codes in the split-state model from minimal assumptions2020-06-30Paper
A black-box construction of fully-simulatable, round-optimal oblivious transfer from strongly uniform key agreement2020-04-30Paper
Continuously non-malleable secret sharing for general access structures2020-04-30Paper
Subversion-resilient signatures: definitions, constructions and applications2020-04-21Paper
Generalized Langevin equations for systems with local interactions2020-04-07Paper
Non-malleable secret sharing in the computational setting: adaptive tampering, noisy-leakage resilience, and improved rate2020-03-09Paper
Match me if you can: matchmaking encryption and its applications2020-03-09Paper
Rate-optimizing compilers for continuously non-malleable codes2020-01-30Paper
Public immunization against complete subversion without random oracles2020-01-30Paper
Density Propagation with Characteristics-based Deep Learning2019-11-21Paper
A new scalable algorithm for computational optimal control under uncertainty2019-09-17Paper
Parallel tensor methods for high-dimensional linear PDEs2019-07-11Paper
Data-driven closures for stochastic dynamical systems2019-06-28Paper
Faber approximation of the Mori-Zwanzig equation2019-06-28Paper
Continuously non-malleable codes with split-state refresh2019-01-18Paper
Numerical methods for high-dimensional kinetic equations2018-11-22Paper
On the estimation of the Mori-Zwanzig memory integral2018-11-16Paper
Secure outsourcing of cryptographic circuits manufacturing2018-11-07Paper
Continuously non-malleable codes with split-state refresh2018-08-10Paper
Fiat-Shamir for highly sound protocols is instantiable2018-06-08Paper
The numerical approximation of nonlinear functionals and functional differential equations2018-03-26Paper
Efficient authentication from hard learning problems2018-02-15Paper
Multi-fidelity Gaussian process regression for prediction of random fields2017-12-14Paper
Non-malleable codes for space-bounded tampering2017-11-15Paper
Wick–Malliavin approximation to nonlinear stochastic partial differential equations: analysis and simulations2017-09-29Paper
Convolutionless Nakajima–Zwanzig equations for stochastic analysis in nonlinear dynamical systems2017-09-29Paper
Statistical analysis and simulation of random shocks in stochastic Burgers equation2017-09-29Paper
Duality and conditional expectations in the Nakajima-Mori-Zwanzig formulation2017-09-11Paper
Naor-Yung paradigm with shared randomness and applications2017-09-05Paper
Predictable Arguments of Knowledge2017-06-13Paper
A computable evolution equation for the joint response-excitation probability density function of stochastic dynamical systems2017-06-07Paper
Efficient Non-Malleable Codes and Key Derivation for Poly-Size Tampering Circuits2017-04-28Paper
Bounded tamper resilience: how to go beyond the algebraic barrier2017-03-02Paper
Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience2017-02-01Paper
Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model2016-12-22Paper
Exact PDF equations and closure approximations for advective-reactive transport2016-12-05Paper
Numerical methods for high-dimensional probability density function equations2016-12-05Paper
Rate-limited secure function evaluation2016-10-21Paper
Naor-Yung Paradigm with Shared Randomness and Applications2016-10-21Paper
Fiat–Shamir for Highly Sound Protocols Is Instantiable2016-10-21Paper
Multifidelity Information Fusion Algorithms for High-Dimensional Systems and Massive Data sets2016-07-20Paper
Chosen-Ciphertext Security from Subset Sum2016-04-13Paper
Non-Malleable Encryption: Simpler, Shorter, Stronger2016-03-23Paper
(De-)Constructing TLS 1.32016-01-12Paper
Algorithms for Propagating Uncertainty Across Heterogeneous Domains2015-12-18Paper
Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation2015-10-27Paper
The Chaining Lemma and Its Application2015-09-24Paper
A Multi-Party Protocol for Privacy-Preserving Cooperative Linear Systems of Equations2015-09-21Paper
A Tamper and Leakage Resilient von Neumann Architecture2015-08-27Paper
From Single-Bit to Multi-bit Public-Key Encryption via Non-malleable Codes2015-07-06Paper
On the Non-malleability of the Fiat-Shamir Transform2014-08-20Paper
A Second Look at Fischlin’s Transformation2014-06-24Paper
Efficient Non-malleable Codes and Key-Derivation for Poly-size Tampering Circuits2014-05-27Paper
DIFFERENTIAL CONSTRAINTS FOR THE PROBABILITY DENSITY FUNCTION OF STOCHASTIC SOLUTIONS TO THE WAVE EQUATION2014-04-25Paper
New evolution equations for the joint response-excitation probability density function of stochastic solutions to first-order nonlinear PDEs2014-04-22Paper
Conjugate flow action functionals2014-04-17Paper
Leakage-Resilient Signatures with Graceful Degradation2014-03-25Paper
Continuous Non-malleable Codes2014-02-18Paper
Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier2013-12-10Paper
Adaptive Discontinuous Galerkin Method for Response-Excitation PDF Equations2013-10-28Paper
Outsourced Pattern Matching2013-08-07Paper
Rate-Limited Secure Function Evaluation: Definitions and Constructions2013-04-19Paper
On the Connection between Leakage Tolerance and Adaptive Security2013-04-19Paper
Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience2011-07-06Paper
Efficient Authentication from Hard Learning Problems2011-05-27Paper
A fully symmetric nonlinear biorthogonal decomposition theory for random fields2011-03-08Paper
Leakage-Resilient Storage2010-09-10Paper
Stochastic bifurcation analysis of Rayleigh–Bénard convection2010-06-30Paper
Convective derivatives and Reynolds transport in curvilinear time-dependent coordinates2009-04-08Paper
Stochastic low-dimensional modelling of a random laminar wake past a circular cylinder2008-10-24Paper
On proper orthogonal decomposition of randomly perturbed fields with applications to flow past a cylinder and natural convection over a horizontal plate2006-08-24Paper
Gappy data and reconstruction procedures for flow past a cylinder2005-04-23Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Daniele Venturi