What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Rosario Gennaro
Google Scholar
86
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/joc
Natively Compatible Super-Efficient Lookup Arguments and How to Apply Them.
Matteo Campanelli
Dario Fiore
Rosario Gennaro
2024
journals/cic
How to Make Rational Arguments Practical and Extractable.
Matteo Campanelli
Chaya Ganesh
Rosario Gennaro
2023
conf/latincrypt
sfTestudo: Linear Time Prover SNARKs with Constant Size Proofs and Square Root Size Universal Setup.
Matteo Campanelli
Nicolas Gailly
Rosario Gennaro
Philipp Jovanovic
Mara Mihali
Justin Thaler
2023
conf/fc
Witness-Authenticated Key Exchange, Revisited: Extensions to Groups, Improved Models, Simpler Constructions.
Matteo Campanelli
Rosario Gennaro
Kelsey Melissaris
Luca Nizzardo
2022
conf/tcc
On the Impossibility of Algebraic Vector Commitments in Pairing-Free Groups.
Dario Catalano
Dario Fiore
Rosario Gennaro
Emanuele Giunta
2020
conf/ccs
UC Non-Interactive, Proactive, Threshold ECDSA with Identifiable Aborts.
Ran Canetti
Rosario Gennaro
Steven Goldfeder
Nikolaos Makriyannis
Udi Peled
2020
conf/acns
On the Cryptographic Deniability of the Signal Protocol.
Nihal Vatandas
Rosario Gennaro
Bertrand Ithurburn
Hugo Krawczyk
2020
conf/acns
Publicly Evaluatable Perceptual Hashing.
Rosario Gennaro
David Hadaller
Tahereh Jafarikhah
Zhuobang Liu
William E. Skeith III
Anastasiia Timashova
2018
conf/ccs
Fast Multiparty Threshold ECDSA with Fast Trustless Setup.
Rosario Gennaro
Steven Goldfeder
2018
conf/ccs
Lattice-Based zk-SNARKs from Square Span Programs.
Rosario Gennaro
Michele Minelli
Anca Nitulescu
Michele Orrù
2018
conf/crypto
Threshold Cryptosystems from Threshold Fully Homomorphic Encryption.
Dan Boneh
Rosario Gennaro
Steven Goldfeder
Aayush Jain
Sam Kim
Peter M. R. Rasmussen
Amit Sahai
2018
conf/tcc
Fine-Grained Secure Computation.
Matteo Campanelli
Rosario Gennaro
2017
conf/latincrypt
Using Level-1 Homomorphic Encryption to Improve Threshold DSA Signatures for Bitcoin Wallet Security.
Dan Boneh
Rosario Gennaro
Steven Goldfeder
2017
conf/ccs
Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for Services.
Matteo Campanelli
Rosario Gennaro
Steven Goldfeder
Luca Nizzardo
2017
conf/fc
Escrow Protocols for Cryptocurrencies: How to Buy Physical Goods Using Bitcoin.
Steven Goldfeder
Joseph Bonneau
Rosario Gennaro
Arvind Narayanan
2017
conf/provsec
Homomorphic Secret Sharing from Paillier Encryption.
Nelly Fazio
Rosario Gennaro
Tahereh Jafarikhah
William E. Skeith III
2016
journals/joc
Automata Evaluation and Text Search Protocols with Simulation-Based Security.
Rosario Gennaro
Carmit Hazay
Jeffrey S. Sorensen
2016
conf/acns
Threshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet Security.
Rosario Gennaro
Steven Goldfeder
Arvind Narayanan
2015
conf/cns
Highly scalable verifiable encrypted search.
Whitney A. Drazen
Emmanuel Ekwedike
Rosario Gennaro
2014
conf/ccs
Efficiently Verifiable Computation on Encrypted Data.
Dario Fiore
Rosario Gennaro
Valerio Pastro
2014
conf/pkc
Generalizing Homomorphic MACs for Arithmetic Circuits.
Dario Catalano
Dario Fiore
Rosario Gennaro
Luca Nizzardo
2013
conf/crypto
Hard-Core Predicates for a Diffie-Hellman Problem over Finite Fields.
Nelly Fazio
Rosario Gennaro
Irippuge Milinda Perera
William E. Skeith III
2013
conf/eurocrypt
Quadratic Span Programs and Succinct NIZKs without PCPs.
Rosario Gennaro
Craig Gentry
Bryan Parno
Mariana Raykova
2013
conf/asiacrypt
Fully Homomorphic Message Authenticators.
Rosario Gennaro
Daniel Wichs
2013
conf/tcc
Algebraic (Trapdoor) One-Way Functions and Their Applications.
Dario Catalano
Dario Fiore
Rosario Gennaro
Konstantinos Vamvourellis
2012
conf/ccs
Publicly verifiable delegation of large polynomials and matrix computations, with applications.
Dario Fiore
Rosario Gennaro
2012
conf/asiacrypt
The Generalized Randomized Iterate and Its Application to New Efficient Constructions of UOWHFs from Regular One-Way Functions.
Scott Ames
Rosario Gennaro
Muthuramakrishnan Venkitasubramaniam
2012
conf/tcc
Computational Extractors and Pseudorandomness.
Dana Dachman-Soled
Rosario Gennaro
Hugo Krawczyk
Tal Malkin
2011
conf/crypto
Verifiable Delegation of Computation over Large Datasets.
Siavosh Benabbas
Rosario Gennaro
Yevgeniy Vahlis
2011
conf/acns
Fully Non-interactive Onion Routing with Forward-Secrecy.
Dario Catalano
Mario Di Raimondo
Dario Fiore
Rosario Gennaro
Orazio Puglisi
2010
journals/joc
A New and Improved Paradigm for Hybrid Encryption Secure Against Chosen-Ciphertext Attack.
Yvo Desmedt
Rosario Gennaro
Kaoru Kurosawa
Victor Shoup
2010
conf/crypto
Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers.
Rosario Gennaro
Craig Gentry
Bryan Parno
2010
conf/acns
Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead.
Rosario Gennaro
Hugo Krawczyk
Tal Rabin
2010
conf/pkc
Text Search Protocols with Simulation Based Security.
Rosario Gennaro
Carmit Hazay
Jeffrey S. Sorensen
2010
conf/pkc
Secure Network Coding over the Integers.
Rosario Gennaro
Jonathan Katz
Hugo Krawczyk
Tal Rabin
2010
conf/ctrsa
Making the Diffie-Hellman Protocol Identity-Based.
Dario Fiore
Rosario Gennaro
2009
journals/joc
New Approaches for Deniable Authentication.
Mario Di Raimondo
Rosario Gennaro
2009
conf/ccs
Certificateless onion routing.
Dario Catalano
Dario Fiore
Rosario Gennaro
2009
conf/sacrypt
More on Key Wrapping.
Rosario Gennaro
Shai Halevi
2008
journals/joc
Tag-KEM/DEM: A New Framework for Hybrid Encryption.
Masayuki Abe
Rosario Gennaro
Kaoru Kurosawa
2008
conf/esorics
Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs.
Rosario Gennaro
Shai Halevi
Hugo Krawczyk
Tal Rabin
Steffen Reidt
Stephen D. Wolthusen
2008
conf/pkc
Off-Line/On-Line Signatures: Theoretical Aspects and Experimental Results.
Dario Catalano
Mario Di Raimondo
Dario Fiore
Rosario Gennaro
2008
conf/eurocrypt
Threshold RSA for Dynamic and Ad-Hoc Groups.
Rosario Gennaro
Shai Halevi
Hugo Krawczyk
Tal Rabin
2008
conf/tcc
Faster and Shorter Password-Authenticated Key Exchange.
Rosario Gennaro
2007
journals/joc
Robust and Efficient Sharing of RSA Functions.
Rosario Gennaro
Tal Rabin
Stanislaw Jarecki
Hugo Krawczyk
2007
journals/joc
RSA-Based Undeniable Signatures.
Rosario Gennaro
Tal Rabin
Hugo Krawczyk
2007
journals/joc
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems.
Rosario Gennaro
Stanislaw Jarecki
Hugo Krawczyk
Tal Rabin
2007
conf/pkc
Improved On-Line/Off-Line Threshold Signatures.
Emmanuel Bresson
Dario Catalano
Rosario Gennaro
2006
conf/ccs
Deniable authentication and key exchange.
Mario Di Raimondo
Rosario Gennaro
Hugo Krawczyk
2005
journals/joc
An Improved Pseudo-Random Generator Based on the Discrete Logarithm Problem.
Rosario Gennaro
2005
conf/ccs
New approaches for deniable authentication.
Mario Di Raimondo
Rosario Gennaro
2005
conf/pkc
Cramer-Damgård Signatures Revisited: Efficient Flat-Tree Signatures Based on Factoring.
Dario Catalano
Rosario Gennaro
2005
conf/eurocrypt
Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM.
Masayuki Abe
Rosario Gennaro
Kaoru Kurosawa
Victor Shoup
2004
conf/crypto
Multi-trapdoor Commitments and Their Applications to Proofs of Knowledge Secure Under Concurrent Man-in-the-Middle Attacks.
Rosario Gennaro
2004
conf/crypto
Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes.
Yevgeniy Dodis
Rosario Gennaro
Johan Håstad
Hugo Krawczyk
Tal Rabin
2004
conf/eurocrypt
Secure Hashed Diffie-Hellman over Non-DDH Groups.
Rosario Gennaro
Hugo Krawczyk
Tal Rabin
2004
conf/asiacrypt
Batching Schnorr Identification Scheme with Applications to Privacy-Preserving Authorization and Low-Bandwidth Communication Devices.
Rosario Gennaro
Darren Leigh
Ravi Sundaram
William S. Yerazunis
2004
conf/tcc
Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering.
Rosario Gennaro
Anna Lysyanskaya
Tal Malkin
Silvio Micali
Tal Rabin
2003
conf/ctrsa
Secure Applications of Pedersen's Distributed Key Generation Protocol.
Rosario Gennaro
Stanislaw Jarecki
Hugo Krawczyk
Tal Rabin
2003
conf/eurocrypt
Provably Secure Threshold Password-Authenticated Key Exchange.
Mario Di Raimondo
Rosario Gennaro
2003
conf/eurocrypt
A Framework for Password-Based Authenticated Key Exchange.
Rosario Gennaro
Yehuda Lindell
2002
journals/joc
) Bits.
Dario Catalano
Rosario Gennaro
Nick Howgrave-Graham
2002
journals/joc
Securing Threshold Cryptosystems against Chosen Ciphertext Attack.
Victor Shoup
Rosario Gennaro
2002
conf/crypto
On 2-Round Secure Multiparty Computation.
Rosario Gennaro
Yuval Ishai
Eyal Kushilevitz
Tal Rabin
2002
conf/eurocrypt
Cryptanalysis of a Pseudorandom Generator Based on Braid Groups.
Rosario Gennaro
Daniele Micciancio
2001
conf/ccs
Paillier's cryptosystem revisited.
Dario Catalano
Rosario Gennaro
Nick Howgrave-Graham
Phong Q. Nguyen
2001
conf/ches
Pseudo-random Number Generation on the IBM 4758 Secure Crypto Coprocessor.
Nick Howgrave-Graham
Joan G. Dyer
Rosario Gennaro
2001
conf/eurocrypt
The Bit Security of Paillier's Encryption Scheme and Its Applications.
Dario Catalano
Rosario Gennaro
Nick Howgrave-Graham
2000
journals/joc
RSA-Based Undeniable Signatures.
Rosario Gennaro
Tal Rabin
Hugo Krawczyk
2000
journals/joc
Robust and Efficient Sharing of RSA Functions.
Rosario Gennaro
Tal Rabin
Stanislaw Jarecki
Hugo Krawczyk
2000
conf/crypto
An Improved Pseudo-random Generator Based on Discrete Log.
Rosario Gennaro
2000
conf/eurocrypt
Computing Inverses over a Shared Secret Modulus.
Dario Catalano
Rosario Gennaro
Shai Halevi
1999
conf/crypto
Adaptive Security for Threshold Cryptosystems.
Ran Canetti
Rosario Gennaro
Stanislaw Jarecki
Hugo Krawczyk
Tal Rabin
1999
conf/ih
Robust Watermarking for Images Based on Color Manipulation.
Sebastiano Battiato
Dario Catalano
Giovanni Gallo
Rosario Gennaro
1999
conf/eurocrypt
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems.
Rosario Gennaro
Stanislaw Jarecki
Hugo Krawczyk
Tal Rabin
1999
conf/eurocrypt
Secure Hash-and-Sign Signatures Without the Random Oracle.
Rosario Gennaro
Shai Halevi
Tal Rabin
1998
conf/ccs
An Efficient Non-Interactive Statistical Zero-Knowledge Proof System for Quasi-Safe Prime Products.
Rosario Gennaro
Daniele Micciancio
Tal Rabin
1998
conf/crypto
New Efficient and Secure Protocols for Verifiable Signature Sharing and Other Applications.
Dario Catalano
Rosario Gennaro
1998
conf/eurocrypt
Securing Threshold Cryptosystems against Chosen Ciphertext Attack.
Victor Shoup
Rosario Gennaro
1997
journals/compsec
Two-phase cryptographic key recovery system.
Rosario Gennaro
Paul A. Karger
Stephen M. Matyas
Mohammad Peyravian
Allen Roginsky
David Safford
Michael Willett
Nevenko Zunic
1997
conf/crypto
RSA-Based Undeniable Signatures.
Rosario Gennaro
Hugo Krawczyk
Tal Rabin
1997
conf/crypto
How to Sign Digital Streams.
Rosario Gennaro
Pankaj Rohatgi
1997
conf/eurocrypt
A Secure and Optimally Efficient Multi-Authority Election Scheme.
Ronald Cramer
Rosario Gennaro
Berry Schoenmakers
1996
conf/crypto
Robust and Efficient Sharing of RSA Functions.
Rosario Gennaro
Stanislaw Jarecki
Hugo Krawczyk
Tal Rabin
1996
conf/eurocrypt
Robust Threshold DSS Signatures.
Rosario Gennaro
Stanislaw Jarecki
Hugo Krawczyk
Tal Rabin
1995
conf/eurocrypt
Verifiable Secret Sharing as Secure Computation.
Rosario Gennaro
Silvio Micali
Coauthors
Aayush Jain
(1)
Allen Roginsky
(1)
Amit Sahai
(1)
Anastasiia Timashova
(1)
Anca Nitulescu
(1)
Anna Lysyanskaya
(1)
Arvind Narayanan
(2)
Berry Schoenmakers
(1)
Bertrand Ithurburn
(1)
Bryan Parno
(2)
Carmit Hazay
(2)
Chaya Ganesh
(1)
Craig Gentry
(2)
Dan Boneh
(2)
Dana Dachman-Soled
(1)
Daniel Wichs
(1)
Daniele Micciancio
(2)
Dario Catalano
(14)
Dario Fiore
(10)
Darren Leigh
(1)
David Hadaller
(1)
David Safford
(1)
Emanuele Giunta
(1)
Emmanuel Bresson
(1)
Emmanuel Ekwedike
(1)
Eyal Kushilevitz
(1)
Giovanni Gallo
(1)
Hugo Krawczyk
(20)
Irippuge Milinda Perera
(1)
Jeffrey S. Sorensen
(2)
Joan G. Dyer
(1)
Johan Håstad
(1)
Jonathan Katz
(1)
Joseph Bonneau
(1)
Justin Thaler
(1)
Kaoru Kurosawa
(3)
Kelsey Melissaris
(1)
Konstantinos Vamvourellis
(1)
Luca Nizzardo
(3)
Mara Mihali
(1)
Mariana Raykova
(1)
Mario Di Raimondo
(6)
Masayuki Abe
(2)
Matteo Campanelli
(6)
Michael Willett
(1)
Michele Minelli
(1)
Michele Orrù
(1)
Mohammad Peyravian
(1)
Muthuramakrishnan Venkitasubramaniam
(1)
Nelly Fazio
(2)
Nevenko Zunic
(1)
Nick Howgrave-Graham
(4)
Nicolas Gailly
(1)
Nihal Vatandas
(1)
Nikolaos Makriyannis
(1)
Orazio Puglisi
(1)
Pankaj Rohatgi
(1)
Paul A. Karger
(1)
Peter M. R. Rasmussen
(1)
Philipp Jovanovic
(1)
Phong Q. Nguyen
(1)
Ran Canetti
(2)
Ravi Sundaram
(1)
Ronald Cramer
(1)
Rosario Gennaro
(86)
Sam Kim
(1)
Scott Ames
(1)
Sebastiano Battiato
(1)
Shai Halevi
(5)
Siavosh Benabbas
(1)
Silvio Micali
(2)
Stanislaw Jarecki
(8)
Steffen Reidt
(1)
Stephen D. Wolthusen
(1)
Stephen M. Matyas
(1)
Steven Goldfeder
(7)
Tahereh Jafarikhah
(2)
Tal Malkin
(2)
Tal Rabin
(21)
Udi Peled
(1)
Valerio Pastro
(1)
Victor Shoup
(4)
Whitney A. Drazen
(1)
William E. Skeith III
(3)
William S. Yerazunis
(1)
Yehuda Lindell
(1)
Yevgeniy Dodis
(1)
Yevgeniy Vahlis
(1)
Yuval Ishai
(1)
Yvo Desmedt
(1)
Zhuobang Liu
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to