default search action
Rosario Gennaro
Person information
- affiliation: City College of New York, New York, NY, USA
- affiliation (former): IBM Research
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j34]Matteo Campanelli, Chaya Ganesh, Rosario Gennaro:
How to Make Rational Arguments Practical and Extractable. IACR Commun. Cryptol. 1(1): 19 (2024) - [i50]Matteo Campanelli, Dario Fiore, Rosario Gennaro:
Natively Compatible Super-Efficient Lookup Arguments and How to Apply Them. IACR Cryptol. ePrint Arch. 2024: 1058 (2024) - 2023
- [j33]Steven D. Galbraith, Rosario Gennaro, Carla Ràfols, Ron Steinfeld:
Guest editorial: Special issue on Mathematics of Zero-Knowledge. Des. Codes Cryptogr. 91(11): 3331-3332 (2023) - [j32]Nada Amin, John Burnham, François Garillot, Rosario Gennaro, Chhi'mèd Künzang, Daniel Rogozin, Cameron Wong:
LURK: Lambda, the Ultimate Recursive Knowledge (Experience Report). Proc. ACM Program. Lang. 7(ICFP): 259-274 (2023) - [c91]Matteo Campanelli, Rosario Gennaro, Kelsey Melissaris, Luca Nizzardo:
Witness-Authenticated Key Exchange, Revisited: Extensions to Groups, Improved Models, Simpler Constructions. FC (1) 2023: 112-128 - [c90]Matteo Campanelli, Nicolas Gailly, Rosario Gennaro, Philipp Jovanovic, Mara Mihali, Justin Thaler:
sfTestudo: Linear Time Prover SNARKs with Constant Size Proofs and Square Root Size Universal Setup. LATINCRYPT 2023: 331-351 - [i49]Nada Amin, John Burnham, François Garillot, Rosario Gennaro, Chhi'mèd Künzang, Daniel Rogozin, Cameron Wong:
LURK: Lambda, the Ultimate Recursive Knowledge. IACR Cryptol. ePrint Arch. 2023: 369 (2023) - [i48]Matteo Campanelli, Nicolas Gailly, Rosario Gennaro, Philipp Jovanovic, Mara Mihali, Justin Thaler:
Testudo: Linear Time Prover SNARKs with Constant Size Proofs and Square Root Size Universal Setup. IACR Cryptol. ePrint Arch. 2023: 961 (2023) - [i47]Matteo Campanelli, Chaya Ganesh, Rosario Gennaro:
How to Make Rational Arguments Practical and Extractable. IACR Cryptol. ePrint Arch. 2023: 1966 (2023) - 2022
- [c89]Dario Catalano, Dario Fiore, Rosario Gennaro, Emanuele Giunta:
On the Impossibility of Algebraic Vector Commitments in Pairing-Free Groups. TCC (2) 2022: 274-299 - [i46]Matteo Campanelli, Rosario Gennaro, Kelsey Melissaris, Luca Nizzardo:
Witness-Authenticated Key Exchange Revisited: Improved Models, Simpler Constructions, Extensions to Groups. IACR Cryptol. ePrint Arch. 2022: 382 (2022) - [i45]Dario Catalano, Dario Fiore, Rosario Gennaro, Emanuele Giunta:
On the Impossibility of Algebraic Vector Commitments in Pairing-Free Groups. IACR Cryptol. ePrint Arch. 2022: 696 (2022) - 2021
- [i44]Ran Canetti, Rosario Gennaro, Steven Goldfeder, Nikolaos Makriyannis, Udi Peled:
UC Non-Interactive, Proactive, Threshold ECDSA with Identifiable Aborts. IACR Cryptol. ePrint Arch. 2021: 60 (2021) - [i43]Nihal Vatandas, Rosario Gennaro, Bertrand Ithurburn, Hugo Krawczyk:
On the Cryptographic Deniability of the Signal Protocol. IACR Cryptol. ePrint Arch. 2021: 642 (2021) - 2020
- [c88]Nihal Vatandas, Rosario Gennaro, Bertrand Ithurburn, Hugo Krawczyk:
On the Cryptographic Deniability of the Signal Protocol. ACNS (2) 2020: 188-209 - [c87]Rosario Gennaro, David Hadaller, Tahereh Jafarikhah, Zhuobang Liu, William E. Skeith III, Anastasiia Timashova:
Publicly Evaluatable Perceptual Hashing. ACNS (2) 2020: 436-455 - [c86]Ran Canetti, Rosario Gennaro, Steven Goldfeder, Nikolaos Makriyannis, Udi Peled:
UC Non-Interactive, Proactive, Threshold ECDSA with Identifiable Aborts. CCS 2020: 1769-1787 - [i42]Rosario Gennaro, Steven Goldfeder:
One Round Threshold ECDSA with Identifiable Abort. IACR Cryptol. ePrint Arch. 2020: 540 (2020)
2010 – 2019
- 2019
- [i41]Rosario Gennaro, Steven Goldfeder:
Fast Multiparty Threshold ECDSA with Fast Trustless Setup. IACR Cryptol. ePrint Arch. 2019: 114 (2019) - 2018
- [c85]Rosario Gennaro, Michele Minelli, Anca Nitulescu, Michele Orrù:
Lattice-Based zk-SNARKs from Square Span Programs. CCS 2018: 556-573 - [c84]Rosario Gennaro, Steven Goldfeder:
Fast Multiparty Threshold ECDSA with Fast Trustless Setup. CCS 2018: 1179-1194 - [c83]Dan Boneh, Rosario Gennaro, Steven Goldfeder, Aayush Jain, Sam Kim, Peter M. R. Rasmussen, Amit Sahai:
Threshold Cryptosystems from Threshold Fully Homomorphic Encryption. CRYPTO (1) 2018: 565-596 - [c82]Matteo Campanelli, Rosario Gennaro:
Fine-Grained Secure Computation. TCC (2) 2018: 66-97 - [i40]Rosario Gennaro, Michele Minelli, Anca Nitulescu, Michele Orrù:
Lattice-Based zk-SNARKs from Square Span Programs. IACR Cryptol. ePrint Arch. 2018: 275 (2018) - [i39]Matteo Campanelli, Rosario Gennaro:
Fine-Grained Secure Computation. IACR Cryptol. ePrint Arch. 2018: 297 (2018) - 2017
- [j31]Dario Catalano, Dario Fiore, Rosario Gennaro:
A certificateless approach to onion routing. Int. J. Inf. Sec. 16(3): 327-343 (2017) - [c81]Matteo Campanelli, Rosario Gennaro, Steven Goldfeder, Luca Nizzardo:
Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for Services. CCS 2017: 229-243 - [c80]Steven Goldfeder, Joseph Bonneau, Rosario Gennaro, Arvind Narayanan:
Escrow Protocols for Cryptocurrencies: How to Buy Physical Goods Using Bitcoin. Financial Cryptography 2017: 321-339 - [c79]Matteo Campanelli, Rosario Gennaro:
Efficient Rational Proofs for Space Bounded Computations. GameSec 2017: 53-73 - [c78]Dan Boneh, Rosario Gennaro, Steven Goldfeder:
Using Level-1 Homomorphic Encryption to Improve Threshold DSA Signatures for Bitcoin Wallet Security. LATINCRYPT 2017: 352-377 - [c77]Rosario Gennaro:
Verifiable Outsourced Computation: A Survey. PODC 2017: 313 - [c76]Nelly Fazio, Rosario Gennaro, Tahereh Jafarikhah, William E. Skeith III:
Homomorphic Secret Sharing from Paillier Encryption. ProvSec 2017: 381-399 - [i38]Dan Boneh, Rosario Gennaro, Steven Goldfeder, Sam Kim:
A Lattice-Based Universal Thresholdizer for Cryptographic Systems. IACR Cryptol. ePrint Arch. 2017: 251 (2017) - [i37]Matteo Campanelli, Rosario Gennaro, Steven Goldfeder, Luca Nizzardo:
Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for Services. IACR Cryptol. ePrint Arch. 2017: 566 (2017) - [i36]Dan Boneh, Rosario Gennaro, Steven Goldfeder, Aayush Jain, Sam Kim, Peter M. R. Rasmussen, Amit Sahai:
Threshold Cryptosystems From Threshold Fully Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2017: 956 (2017) - 2016
- [j30]Rosario Gennaro, Carmit Hazay, Jeffrey S. Sorensen:
Automata Evaluation and Text Search Protocols with Simulation-Based Security. J. Cryptol. 29(2): 243-282 (2016) - [c75]Rosario Gennaro, Steven Goldfeder, Arvind Narayanan:
Threshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet Security. ACNS 2016: 156-174 - [i35]Rosario Gennaro, Steven Goldfeder, Arvind Narayanan:
Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security. IACR Cryptol. ePrint Arch. 2016: 13 (2016) - 2015
- [j29]Dario Catalano, Dario Fiore, Rosario Gennaro, Konstantinos Vamvourellis:
Algebraic (trapdoor) one-way functions: Constructions and applications. Theor. Comput. Sci. 592: 143-165 (2015) - [c74]Whitney A. Drazen, Emmanuel Ekwedike, Rosario Gennaro:
Highly scalable verifiable encrypted search. CNS 2015: 497-505 - [c73]Matteo Campanelli, Rosario Gennaro:
Sequentially Composable Rational Proofs. GameSec 2015: 270-288 - [e6]Rosario Gennaro, Matthew Robshaw:
Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part I. Lecture Notes in Computer Science 9215, Springer 2015, ISBN 978-3-662-47988-9 [contents] - [e5]Rosario Gennaro, Matthew Robshaw:
Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II. Lecture Notes in Computer Science 9216, Springer 2015, ISBN 978-3-662-47999-5 [contents] - [i34]Dario Catalano, Dario Fiore, Rosario Gennaro, Luca Nizzardo:
Generalizing Homomorphic MACs for Arithmetic Circuits. IACR Cryptol. ePrint Arch. 2015: 396 (2015) - 2014
- [c72]Joseph Soryal, Irippuge Milinda Perera, Ihab Darwish, Nelly Fazio, Rosario Gennaro, Tarek N. Saadawi:
Combating Insider Attacks in IEEE 802.11 Wireless Networks with Broadcast Encryption. AINA 2014: 472-479 - [c71]Dario Fiore, Rosario Gennaro, Valerio Pastro:
Efficiently Verifiable Computation on Encrypted Data. CCS 2014: 844-855 - [c70]Dario Catalano, Dario Fiore, Rosario Gennaro, Luca Nizzardo:
Generalizing Homomorphic MACs for Arithmetic Circuits. Public Key Cryptography 2014: 538-555 - [e4]Juan A. Garay, Rosario Gennaro:
Advances in Cryptology - CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I. Lecture Notes in Computer Science 8616, Springer 2014, ISBN 978-3-662-44370-5 [contents] - [e3]Juan A. Garay, Rosario Gennaro:
Advances in Cryptology - CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part II. Lecture Notes in Computer Science 8617, Springer 2014, ISBN 978-3-662-44380-4 [contents] - [i33]Rosario Gennaro, Valerio Pastro:
Verifiable Computation over Encrypted Data in the Presence of Verification Queries. IACR Cryptol. ePrint Arch. 2014: 202 (2014) - 2013
- [j28]Dario Catalano, Mario Di Raimondo, Dario Fiore, Rosario Gennaro, Orazio Puglisi:
Fully non-interactive onion routing with forward secrecy. Int. J. Inf. Sec. 12(1): 33-47 (2013) - [j27]Emmanuel Bresson, Dario Catalano, Mario Di Raimondo, Dario Fiore, Rosario Gennaro:
Off-line/on-line signatures revisited: a general unifying paradigm, efficient threshold variants and experimental results. Int. J. Inf. Sec. 12(6): 439-465 (2013) - [c69]Rosario Gennaro, Daniel Wichs:
Fully Homomorphic Message Authenticators. ASIACRYPT (2) 2013: 301-320 - [c68]Nelly Fazio, Rosario Gennaro, Irippuge Milinda Perera, William E. Skeith III:
Hard-Core Predicates for a Diffie-Hellman Problem over Finite Fields. CRYPTO (2) 2013: 148-165 - [c67]Rosario Gennaro, Craig Gentry, Bryan Parno, Mariana Raykova:
Quadratic Span Programs and Succinct NIZKs without PCPs. EUROCRYPT 2013: 626-645 - [c66]Joël Alwen, Manuel Barbosa, Pooya Farshim, Rosario Gennaro, S. Dov Gordon, Stefano Tessaro, David A. Wilson:
On the Relationship between Functional Encryption, Obfuscation, and Fully Homomorphic Encryption. IMACC 2013: 65-84 - [c65]Dario Catalano, Dario Fiore, Rosario Gennaro, Konstantinos Vamvourellis:
Algebraic (Trapdoor) One-Way Functions and Their Applications. TCC 2013: 680-699 - [i32]Nelly Fazio, Rosario Gennaro, Irippuge Milinda Perera, William E. Skeith III:
Hardcore Predicates for a Diffie-Hellman Problem over Finite Fields. IACR Cryptol. ePrint Arch. 2013: 134 (2013) - 2012
- [j26]Dario Fiore, Rosario Gennaro, Nigel P. Smart:
Relations between the security models for certificateless encryption and ID-based key agreement. Int. J. Inf. Sec. 11(1): 1-22 (2012) - [c64]Scott Ames, Rosario Gennaro, Muthuramakrishnan Venkitasubramaniam:
The Generalized Randomized Iterate and Its Application to New Efficient Constructions of UOWHFs from Regular One-Way Functions. ASIACRYPT 2012: 154-171 - [c63]Dario Fiore, Rosario Gennaro:
Publicly verifiable delegation of large polynomials and matrix computations, with applications. CCS 2012: 501-512 - [c62]Dana Dachman-Soled, Rosario Gennaro, Hugo Krawczyk, Tal Malkin:
Computational Extractors and Pseudorandomness. TCC 2012: 383-403 - [i31]Rosario Gennaro, Craig Gentry, Bryan Parno, Mariana Raykova:
Quadratic Span Programs and Succinct NIZKs without PCPs. IACR Cryptol. ePrint Arch. 2012: 215 (2012) - [i30]Dario Fiore, Rosario Gennaro:
Publicly Verifiable Delegation of Large Polynomials and Matrix Computations, with Applications. IACR Cryptol. ePrint Arch. 2012: 281 (2012) - [i29]Rosario Gennaro, Daniel Wichs:
Fully Homomorphic Message Authenticators. IACR Cryptol. ePrint Arch. 2012: 290 (2012) - [i28]Dario Fiore, Rosario Gennaro:
Improved Publicly Verifiable Delegation of Large Polynomials and Matrix Computations. IACR Cryptol. ePrint Arch. 2012: 434 (2012) - 2011
- [c61]Dario Catalano, Mario Di Raimondo, Dario Fiore, Rosario Gennaro, Orazio Puglisi:
Fully Non-interactive Onion Routing with Forward-Secrecy. ACNS 2011: 255-273 - [c60]Siavosh Benabbas, Rosario Gennaro, Yevgeniy Vahlis:
Verifiable Delegation of Computation over Large Datasets. CRYPTO 2011: 111-131 - [e2]Dario Catalano, Nelly Fazio, Rosario Gennaro, Antonio Nicolosi:
Public Key Cryptography - PKC 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings. Lecture Notes in Computer Science 6571, Springer 2011, ISBN 978-3-642-19378-1 [contents] - [i27]Siavosh Benabbas, Rosario Gennaro, Yevgeniy Vahlis:
Verifiable Delegation of Computation over Large Datasets. IACR Cryptol. ePrint Arch. 2011: 132 (2011) - [i26]Dana Dachman-Soled, Rosario Gennaro, Hugo Krawczyk, Tal Malkin:
Computational Extractors and Pseudorandomness. IACR Cryptol. ePrint Arch. 2011: 708 (2011) - 2010
- [j25]Yvo Desmedt, Rosario Gennaro, Kaoru Kurosawa, Victor Shoup:
A New and Improved Paradigm for Hybrid Encryption Secure Against Chosen-Ciphertext Attack. J. Cryptol. 23(1): 91-120 (2010) - [j24]Dario Fiore, Rosario Gennaro:
Identity-Based Key Exchange Protocols without Pairings. Trans. Comput. Sci. 10: 42-77 (2010) - [c59]Rosario Gennaro, Hugo Krawczyk, Tal Rabin:
Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead. ACNS 2010: 309-328 - [c58]Rosario Gennaro, Craig Gentry, Bryan Parno:
Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers. CRYPTO 2010: 465-482 - [c57]Dario Fiore, Rosario Gennaro:
Making the Diffie-Hellman Protocol Identity-Based. CT-RSA 2010: 165-178 - [c56]Dario Fiore, Rosario Gennaro, Nigel P. Smart:
Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement. Pairing 2010: 167-186 - [c55]Rosario Gennaro, Jonathan Katz, Hugo Krawczyk, Tal Rabin:
Secure Network Coding over the Integers. Public Key Cryptography 2010: 142-160 - [c54]Rosario Gennaro, Carmit Hazay, Jeffrey S. Sorensen:
Text Search Protocols with Simulation Based Security. Public Key Cryptography 2010: 332-350 - [i25]Rosario Gennaro, Hugo Krawczyk, Tal Rabin:
Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead. IACR Cryptol. ePrint Arch. 2010: 68 (2010) - [i24]Rosario Gennaro, Carmit Hazay, Jeffrey S. Sorensen:
Automata Evaluation and Text Search Protocols with Simulation Based Security. IACR Cryptol. ePrint Arch. 2010: 484 (2010)
2000 – 2009
- 2009
- [j23]Mario Di Raimondo, Rosario Gennaro:
New Approaches for Deniable Authentication. J. Cryptol. 22(4): 572-615 (2009) - [c53]Dario Catalano, Dario Fiore, Rosario Gennaro:
Certificateless onion routing. CCS 2009: 151-160 - [c52]Rosario Gennaro, Shai Halevi:
More on Key Wrapping. Selected Areas in Cryptography 2009: 53-70 - [i23]Dario Fiore, Rosario Gennaro:
Making the Diffie-Hellman Protocol Identity-Based. IACR Cryptol. ePrint Arch. 2009: 174 (2009) - [i22]Rosario Gennaro, Shai Halevi:
More on Key Wrapping. IACR Cryptol. ePrint Arch. 2009: 372 (2009) - [i21]Rosario Gennaro, Craig Gentry, Bryan Parno:
Non-Interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers. IACR Cryptol. ePrint Arch. 2009: 547 (2009) - [i20]Rosario Gennaro, Jonathan Katz, Hugo Krawczyk, Tal Rabin:
Secure Network Coding Over the Integers. IACR Cryptol. ePrint Arch. 2009: 569 (2009) - [i19]Dario Fiore, Rosario Gennaro, Nigel P. Smart:
Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement. IACR Cryptol. ePrint Arch. 2009: 600 (2009) - 2008
- [j22]Masayuki Abe, Rosario Gennaro, Kaoru Kurosawa:
Tag-KEM/DEM: A New Framework for Hybrid Encryption. J. Cryptol. 21(1): 97-130 (2008) - [c51]Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin, Steffen Reidt, Stephen D. Wolthusen:
Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs. ESORICS 2008: 49-65 - [c50]Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin:
Threshold RSA for Dynamic and Ad-Hoc Groups. EUROCRYPT 2008: 88-107 - [c49]Dario Catalano, Mario Di Raimondo, Dario Fiore, Rosario Gennaro:
Off-Line/On-Line Signatures: Theoretical Aspects and Experimental Results. Public Key Cryptography 2008: 101-120 - [c48]Rosario Gennaro:
Faster and Shorter Password-Authenticated Key Exchange. TCC 2008: 589-606 - [e1]Steven M. Bellovin, Rosario Gennaro, Angelos D. Keromytis, Moti Yung:
Applied Cryptography and Network Security, 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings. Lecture Notes in Computer Science 5037, 2008, ISBN 978-3-540-68913-3 [contents] - [i18]Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin:
Threshold RSA for Dynamic and Ad-Hoc Groups. IACR Cryptol. ePrint Arch. 2008: 45 (2008) - [i17]Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin, Steffen Reidt, Stephen D. Wolthusen:
Strongly-Resilient and Non-Interactive Hierarchical Key-Agreement in MANETs. IACR Cryptol. ePrint Arch. 2008: 308 (2008) - 2007
- [j21]Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin:
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. J. Cryptol. 20(1): 51-83 (2007) - [j20]Rosario Gennaro, Tal Rabin, Stanislaw Jarecki, Hugo Krawczyk:
Robust and Efficient Sharing of RSA Functions. J. Cryptol. 20(3): 393 (2007) - [j19]Rosario Gennaro, Tal Rabin, Hugo Krawczyk:
RSA-Based Undeniable Signatures. J. Cryptol. 20(3): 394 (2007) - [j18]Dario Catalano, Rosario Gennaro:
Cramer-Damgård signatures revisited: Efficient flat-tree signatures based on factoring. Theor. Comput. Sci. 370(1-3): 186-200 (2007) - [c47]Emmanuel Bresson, Dario Catalano, Rosario Gennaro:
Improved On-Line/Off-Line Threshold Signatures. Public Key Cryptography 2007: 217-232 - [i16]Rosario Gennaro:
Faster and Shorter Password-Authenticated Key Exchange. IACR Cryptol. ePrint Arch. 2007: 325 (2007) - 2006
- [j17]Rosario Gennaro:
Randomness in Cryptography. IEEE Secur. Priv. 4(2): 64-67 (2006) - [j16]Mario Di Raimondo, Rosario Gennaro:
Provably secure threshold password-authenticated key exchange. J. Comput. Syst. Sci. 72(6): 978-1001 (2006) - [j15]Rosario Gennaro, Yehuda Lindell:
A framework for password-based authenticated key exchange1. ACM Trans. Inf. Syst. Secur. 9(2): 181-234 (2006) - [c46]Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk:
Deniable authentication and key exchange. CCS 2006: 400-409 - [c45]Rosario Gennaro, Silvio Micali:
Independent Zero-Knowledge Sets. ICALP (2) 2006: 34-45 - [i15]Rosario Gennaro, Silvio Micali:
Independent Zero-Knowledge Sets. IACR Cryptol. ePrint Arch. 2006: 155 (2006) - [i14]Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk:
Deniable Authentication and Key Exchange. IACR Cryptol. ePrint Arch. 2006: 280 (2006) - 2005
- [j14]Rosario Gennaro, Mario Di Raimondo:
Secure multiplication of shared secrets in the exponent. Inf. Process. Lett. 96(2): 71-79 (2005) - [j13]Rosario Gennaro:
An Improved Pseudo-Random Generator Based on the Discrete Logarithm Problem. J. Cryptol. 18(2): 91-110 (2005) - [j12]Rosario Gennaro, Yael Gertner, Jonathan Katz, Luca Trevisan:
Bounds on the Efficiency of Generic Cryptographic Constructions. SIAM J. Comput. 35(1): 217-246 (2005) - [c44]Mario Di Raimondo, Rosario Gennaro:
New approaches for deniable authentication. CCS 2005: 112-121 - [c43]Masayuki Abe, Rosario Gennaro, Kaoru Kurosawa, Victor Shoup:
Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM. EUROCRYPT 2005: 128-146 - [c42]Dario Catalano, Rosario Gennaro:
Cramer-Damgård Signatures Revisited: Efficient Flat-Tree Signatures Based on Factoring. Public Key Cryptography 2005: 313-327 - [c41]Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk:
Secure off-the-record messaging. WPES 2005: 81-89 - [i13]Masayuki Abe, Rosario Gennaro, Kaoru Kurosawa:
Tag-KEM/DEM: A New Framework for Hybrid Encryption. IACR Cryptol. ePrint Arch. 2005: 27 (2005) - [i12]Mario Di Raimondo, Rosario Gennaro:
New Approaches for Deniable Authentication. IACR Cryptol. ePrint Arch. 2005: 46 (2005) - 2004
- [c40]Rosario Gennaro, Darren Leigh, Ravi Sundaram, William S. Yerazunis:
Batching Schnorr Identification Scheme with Applications to Privacy-Preserving Authorization and Low-Bandwidth Communication Devices. ASIACRYPT 2004: 276-292 - [c39]Rosario Gennaro:
Multi-trapdoor Commitments and Their Applications to Proofs of Knowledge Secure Under Concurrent Man-in-the-Middle Attacks. CRYPTO 2004: 220-236 - [c38]Yevgeniy Dodis, Rosario Gennaro, Johan Håstad, Hugo Krawczyk, Tal Rabin:
Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes. CRYPTO 2004: 494-510 - [c37]Rosario Gennaro, Hugo Krawczyk, Tal Rabin:
Secure Hashed Diffie-Hellman over Non-DDH Groups. EUROCRYPT 2004: 361-381 - [c36]Rosario Gennaro, Anna Lysyanskaya, Tal Malkin, Silvio Micali, Tal Rabin:
Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering. TCC 2004: 258-277 - [i11]Rosario Gennaro, Hugo Krawczyk, Tal Rabin:
Secure Hashed Diffie-Hellman over Non-DDH Groups. IACR Cryptol. ePrint Arch. 2004: 99 (2004) - [i10]Rosario Gennaro, Victor Shoup:
A Note on An Encryption Scheme of Kurosawa and Desmedt. IACR Cryptol. ePrint Arch. 2004: 194 (2004) - 2003
- [c35]Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin:
Secure Applications of Pedersen's Distributed Key Generation Protocol. CT-RSA 2003: 373-390 - [c34]Mario Di Raimondo, Rosario Gennaro:
Provably Secure Threshold Password-Authenticated Key Exchange. EUROCRYPT 2003: 507-523 - [c33]Rosario Gennaro, Yehuda Lindell:
A Framework for Password-Based Authenticated Key Exchange. EUROCRYPT 2003: 524-543 - [c32]Rosario Gennaro, Yael Gertner, Jonathan Katz:
Lower bounds on the efficiency of encryption and digital signature schemes. STOC 2003: 417-425 - [i9]Rosario Gennaro, Yehuda Lindell:
A Framework for Password-Based Authenticated Key Exchange. IACR Cryptol. ePrint Arch. 2003: 32 (2003) - [i8]Mario Di Raimondo, Rosario Gennaro:
Secure Multiplication of Shared Secrets in the Exponent. IACR Cryptol. ePrint Arch. 2003: 57 (2003) - [i7]Rosario Gennaro:
Multi-Trapdoor Commitments and their Applications to Non-Malleable Protocols. IACR Cryptol. ePrint Arch. 2003: 214 (2003) - 2002
- [j11]Victor Shoup, Rosario Gennaro:
Securing Threshold Cryptosystems against Chosen Ciphertext Attack. J. Cryptol. 15(2): 75-96 (2002) - [j10]Dario Catalano, Rosario Gennaro, Nick Howgrave-Graham:
Paillier's Trapdoor Function Hides up to O(n) Bits. J. Cryptol. 15(4): 251-269 (2002) - [c31]Rosario Gennaro, Yuval Ishai, Eyal Kushilevitz, Tal Rabin:
On 2-Round Secure Multiparty Computation. CRYPTO 2002: 178-193 - [c30]Rosario Gennaro, Daniele Micciancio:
Cryptanalysis of a Pseudorandom Generator Based on Braid Groups. EUROCRYPT 2002: 1-13 - [c29]Rosario Gennaro:
Cryptographic Algorithms for Multimedia Traffic. FOSAD 2002: 186-206 - 2001
- [j9]Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin:
Robust Threshold DSS Signatures. Inf. Comput. 164(1): 54-84 (2001) - [j8]Rosario Gennaro, Pankaj Rohatgi:
How to Sign Digital Streams. Inf. Comput. 165(1): 100-116 (2001) - [c28]Dario Catalano, Rosario Gennaro, Nick Howgrave-Graham, Phong Q. Nguyen:
Paillier's cryptosystem revisited. CCS 2001: 206-214 - [c27]Nick Howgrave-Graham, Joan G. Dyer, Rosario Gennaro:
Pseudo-random Number Generation on the IBM 4758 Secure Crypto Coprocessor. CHES 2001: 93-102 - [c26]Dario Catalano, Rosario Gennaro, Nick Howgrave-Graham:
The Bit Security of Paillier's Encryption Scheme and Its Applications. EUROCRYPT 2001: 229-243 - [c25]Rosario Gennaro, Yuval Ishai, Eyal Kushilevitz, Tal Rabin:
The round complexity of verifiable secret sharing and secure multicast. STOC 2001: 580-589 - 2000
- [j7]Dario Catalano, Rosario Gennaro:
New Efficient and Secure Protocols for Verifiable Signature Sharing and Other Applications. J. Comput. Syst. Sci. 61(1): 51-80 (2000) - [j6]Rosario Gennaro, Tal Rabin, Stanislaw Jarecki, Hugo Krawczyk:
Robust and Efficient Sharing of RSA Functions. J. Cryptol. 13(2): 273-300 (2000) - [j5]Rosario Gennaro, Tal Rabin, Hugo Krawczyk:
RSA-Based Undeniable Signatures. J. Cryptol. 13(4): 397-416 (2000) - [j4]Juan A. Garay, Rosario Gennaro, Charanjit S. Jutla, Tal Rabin:
Secure distributed storage and retrieval. Theor. Comput. Sci. 243(1-2): 363-389 (2000) - [j3]Rosario Gennaro:
A Protocol to Achieve Independence in Constant Rounds. IEEE Trans. Parallel Distributed Syst. 11(7): 636-647 (2000) - [c24]Don Coppersmith, Rosario Gennaro, Shai Halevi, Charanjit S. Jutla, Stephen M. Matyas, Mohammad Peyravian, David Safford, Nevenko Zunic:
IBM Comments. AES Candidate Conference 2000: 333-336 - [c23]Rosario Gennaro:
An Improved Pseudo-random Generator Based on Discrete Log. CRYPTO 2000: 469-481 - [c22]Dario Catalano, Rosario Gennaro, Shai Halevi:
Computing Inverses over a Shared Secret Modulus. EUROCRYPT 2000: 190-206 - [c21]Rosario Gennaro, Luca Trevisan:
Lower Bounds on the Efficiency of Generic Cryptographic Constructions. FOCS 2000: 305-313 - [c20]Sebastiano Battiato, Dario Catalano, Giovanni Gallo, Rosario Gennaro:
Color opponency watermarking scheme for digital images. Security and Watermarking of Multimedia Contents 2000: 510-515 - [i6]Rosario Gennaro, Luca Trevisan:
Lower Bounds on the Efficiency of Generic Cryptographic Constructions. Electron. Colloquium Comput. Complex. TR00 (2000) - [i5]Rosario Gennaro, Luca Trevisan:
Lower Bounds on the Efficiency of Generic Cryptographic Constructions. IACR Cryptol. ePrint Arch. 2000: 17 (2000)
1990 – 1999
- 1999
- [c19]Ran Canetti, Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin:
Adaptive Security for Threshold Cryptosystems. CRYPTO 1999: 98-115 - [c18]Rosario Gennaro, Shai Halevi, Tal Rabin:
Secure Hash-and-Sign Signatures Without the Random Oracle. EUROCRYPT 1999: 123-139 - [c17]Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin:
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. EUROCRYPT 1999: 295-310 - [c16]Sebastiano Battiato, Dario Catalano, Giovanni Gallo, Rosario Gennaro:
Robust Watermarking for Images Based on Color Manipulation. Information Hiding 1999: 302-317 - [i4]Rosario Gennaro, Shai Halevi, Tal Rabin:
Secure Hash-and-Sign Signatures without the Random Oracle. IACR Cryptol. ePrint Arch. 1999: 13 (1999) - 1998
- [c15]Rosario Gennaro, Daniele Micciancio, Tal Rabin:
An Efficient Non-Interactive Statistical Zero-Knowledge Proof System for Quasi-Safe Prime Products. CCS 1998: 67-72 - [c14]Dario Catalano, Rosario Gennaro:
New Efficient and Secure Protocols for Verifiable Signature Sharing and Other Applications. CRYPTO 1998: 105-120 - [c13]Victor Shoup, Rosario Gennaro:
Securing Threshold Cryptosystems against Chosen Ciphertext Attack. EUROCRYPT 1998: 1-16 - [c12]Rosario Gennaro, Michael O. Rabin, Tal Rabin:
Simplified VSS and Fast-Track Multiparty Computations with Applications to Threshold Cryptography. PODC 1998: 101-111 - [i3]Rosario Gennaro, Daniele Micciancio, Tal Rabin:
An Efficient Non-Interactive Statistical Zero-Knowledge Proof System for Quasi-Safe Prime Products. IACR Cryptol. ePrint Arch. 1998: 8 (1998) - [i2]Juan A. Garay, Rosario Gennaro, Charanjit S. Jutla, Tal Rabin:
Secure Distributed Storage and Retrieval. IACR Cryptol. ePrint Arch. 1998: 25 (1998) - 1997
- [j2]Rosario Gennaro, Paul A. Karger, Stephen M. Matyas, Mohammad Peyravian, Allen Roginsky, David Safford, Michael Willett, Nevenko Zunic:
Two-phase cryptographic key recovery system. Comput. Secur. 16(6): 481-506 (1997) - [j1]Ronald Cramer, Rosario Gennaro, Berry Schoenmakers:
A secure and optimally efficient multi-authority election scheme. Eur. Trans. Telecommun. 8(5): 481-490 (1997) - [c11]Rosario Gennaro, Hugo Krawczyk, Tal Rabin:
RSA-Based Undeniable Signatures. CRYPTO 1997: 132-149 - [c10]Rosario Gennaro, Pankaj Rohatgi:
How to Sign Digital Streams. CRYPTO 1997: 180-197 - [c9]Ronald Cramer, Rosario Gennaro, Berry Schoenmakers:
A Secure and Optimally Efficient Multi-Authority Election Scheme. EUROCRYPT 1997: 103-118 - [c8]Juan A. Garay, Rosario Gennaro, Charanjit S. Jutla, Tal Rabin:
Secure Distributed Storage and Retrieval. WDAG 1997: 275-289 - 1996
- [b1]Rosario Gennaro:
Theory and practice of verifiable secret sharing. Massachusetts Institute of Technology, Cambridge, MA, USA, 1996 - [c7]Giuseppa Carrà Ferro, Giovanni Gallo, Rosario Gennaro:
Probabilistic Verification of Elementary Geometry Statements. Automated Deduction in Geometry 1996: 87-101 - [c6]Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin:
Robust and Efficient Sharing of RSA Functions. CRYPTO 1996: 157-172 - [c5]Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin:
Robust Threshold DSS Signatures. EUROCRYPT 1996: 354-371 - [c4]Ran Canetti, Rosario Gennaro:
Incoercible Multiparty Computation (extended abstract). FOCS 1996: 504-513 - [i1]Ran Canetti, Rosario Gennaro:
Incoercible Multiparty Computation. IACR Cryptol. ePrint Arch. 1996: 1 (1996) - 1995
- [c3]Scott E. Decatur, Rosario Gennaro:
On Learning from Noisy and Incomplete Examples. COLT 1995: 353-360 - [c2]Rosario Gennaro, Silvio Micali:
Verifiable Secret Sharing as Secure Computation. EUROCRYPT 1995: 168-182 - [c1]Rosario Gennaro:
Achieving Independence Efficiently and Securely. PODC 1995: 130-136
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-03 20:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint