The following pages link to Daniele Venturi (Q329719):
Displaying 50 items.
- Rate-limited secure function evaluation (Q329720) (← links)
- Exact PDF equations and closure approximations for advective-reactive transport (Q347680) (← links)
- Bounded tamper resilience: how to go beyond the algebraic barrier (Q514469) (← links)
- A fully symmetric nonlinear biorthogonal decomposition theory for random fields (Q629030) (← links)
- Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model (Q729893) (← links)
- Continuously non-malleable codes in the split-state model from minimal assumptions (Q776002) (← links)
- Stability analysis of hierarchical tensor methods for time-dependent PDEs (Q778308) (← links)
- Secure outsourcing of cryptographic circuits manufacturing (Q1616639) (← links)
- Numerical methods for high-dimensional kinetic equations (Q1627226) (← links)
- Fiat-Shamir for highly sound protocols is instantiable (Q1637340) (← links)
- Non-malleable codes for space-bounded tampering (Q1678365) (← links)
- Multi-fidelity Gaussian process regression for prediction of random fields (Q1685592) (← links)
- Efficient authentication from hard learning problems (Q1698400) (← links)
- The numerical approximation of nonlinear functionals and functional differential equations (Q1708692) (← links)
- Generalized Langevin equations for systems with local interactions (Q1984824) (← links)
- Subversion-resilient signatures: definitions, constructions and applications (Q1989360) (← links)
- Data-driven closures for stochastic dynamical systems (Q2000433) (← links)
- Faber approximation of the Mori-Zwanzig equation (Q2000458) (← links)
- Parallel tensor methods for high-dimensional linear PDEs (Q2002269) (← links)
- Spectral methods for nonlinear functionals and functional differential equations (Q2028689) (← links)
- Rank-adaptive tensor methods for high-dimensional nonlinear PDEs (Q2049083) (← links)
- The mother of all leakages: how to simulate noisy leakages via bounded leakage (almost) for free (Q2056741) (← links)
- Non-malleable secret sharing against bounded joint-tampering attacks in the plain model (Q2102060) (← links)
- On adaptive security of delayed-input sigma protocols and Fiat-Shamir NIZKs (Q2106675) (← links)
- Tensor methods for the Boltzmann-BGK equation (Q2123758) (← links)
- Dynamic tensor approximation of high-dimensional nonlinear PDEs (Q2124324) (← links)
- A new scalable algorithm for computational optimal control under uncertainty (Q2125017) (← links)
- Shielded computations in smart contracts overcoming forks (Q2145367) (← links)
- Adaptive integration of nonlinear evolution equations on tensor manifolds (Q2161542) (← links)
- Universally composable subversion-resilient cryptography (Q2170002) (← links)
- A black-box construction of fully-simulatable, round-optimal oblivious transfer from strongly uniform key agreement (Q2175906) (← links)
- Continuously non-malleable secret sharing for general access structures (Q2175937) (← links)
- Non-malleable encryption: simpler, shorter, stronger (Q2210445) (← links)
- Continuously non-malleable codes in the split-state model (Q2210446) (← links)
- Cryptographic reverse firewalls for interactive proof systems (Q2220883) (← links)
- Dynamically orthogonal tensor methods for high-dimensional nonlinear PDEs (Q2223023) (← links)
- Immunization against complete subversion without random oracles (Q2227487) (← links)
- Rate-optimizing compilers for continuously non-malleable codes (Q2291374) (← links)
- Public immunization against complete subversion without random oracles (Q2291403) (← links)
- Non-malleable secret sharing in the computational setting: adaptive tampering, noisy-leakage resilience, and improved rate (Q2304990) (← links)
- Numerical methods for high-dimensional probability density function equations (Q2374964) (← links)
- Naor-Yung paradigm with shared randomness and applications (Q2401764) (← links)
- New evolution equations for the joint response-excitation probability density function of stochastic solutions to first-order nonlinear PDEs (Q2446759) (← links)
- Continuously non-malleable secret sharing: joint tampering, plain model and capacity (Q2697864) (← links)
- Non-Malleable Encryption: Simpler, Shorter, Stronger (Q2796130) (← links)
- Chosen-Ciphertext Security from Subset Sum (Q2798769) (← links)
- Naor-Yung Paradigm with Shared Randomness and Applications (Q2827710) (← links)
- Fiat–Shamir for Highly Sound Protocols Is Instantiable (Q2827720) (← links)
- Adaptive Discontinuous Galerkin Method for Response-Excitation PDF Equations (Q2855663) (← links)
- Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier (Q2867150) (← links)