What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Sandro Coretti
Google Scholar
19
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/crypto
High-Throughput Permissionless Blockchain Consensus Under Realistic Network Assumptions.
Sandro Coretti
Matthias Fitzi
Aggelos Kiayias
Giorgos Panagiotakos
Alexander Russell
2022
conf/ccs
The Generals' Scuttlebutt: Byzantine-Resilient Gossip Protocols.
Sandro Coretti
Aggelos Kiayias
Cristopher Moore
Alexander Russell
2021
journals/joc
Round-Preserving Parallel Composition of Probabilistic-Termination Cryptographic Protocols.
Ran Cohen
Sandro Coretti
Juan A. Garay
Vassilis Zikas
2021
conf/ccs
Modular Design of Secure Group Messaging Protocols and the Security of MLS.
Joël Alwen
Sandro Coretti
Yevgeniy Dodis
Yiannis Tselekounis
2021
conf/fc
Fast Isomorphic State Channels.
Manuel M. T. Chakravarty
Sandro Coretti
Matthias Fitzi
Peter Gazi
Philipp Kant
Aggelos Kiayias
Alexander Russell
2020
journals/joc
Non-malleable Encryption: Simpler, Shorter, Stronger.
Sandro Coretti
Yevgeniy Dodis
Ueli Maurer
Björn Tackmann
Daniele Venturi
2020
conf/crypto
Security Analysis and Improvements for the IETF MLS Standard for Group Messaging.
Joël Alwen
Sandro Coretti
Yevgeniy Dodis
Yiannis Tselekounis
2020
conf/tcc
Continuous Group Key Agreement with Active Security.
Joël Alwen
Sandro Coretti
Daniel Jost
Marta Mularczyk
2019
journals/joc
Probabilistic Termination and Composability of Cryptographic Protocols.
Ran Cohen
Sandro Coretti
Juan A. Garay
Vassilis Zikas
2019
conf/crypto
Seedless Fruit Is the Sweetest: Random Number Generation, Revisited.
Sandro Coretti
Yevgeniy Dodis
Harish Karthikeyan
Stefano Tessaro
2019
conf/acns
Rate-Optimizing Compilers for Continuously Non-malleable Codes.
Sandro Coretti
Antonio Faonio
Daniele Venturi
2019
conf/eurocrypt
The Double Ratchet: Security Notions, Proofs, and Modularization for the Signal Protocol.
Joël Alwen
Sandro Coretti
Yevgeniy Dodis
2018
conf/crypto
Non-Uniform Bounds in the Random-Permutation, Ideal-Cipher, and Generic-Group Models.
Sandro Coretti
Yevgeniy Dodis
Siyao Guo
2018
conf/eurocrypt
Random Oracles and Non-uniformity.
Sandro Coretti
Yevgeniy Dodis
Siyao Guo
John P. Steinberger
2016
conf/crypto
Probabilistic Termination and Composability of Cryptographic Protocols.
Ran Cohen
Sandro Coretti
Juan A. Garay
Vassilis Zikas
2016
conf/asiacrypt
Constant-Round Asynchronous Multi-Party Computation Based on One-Way Functions.
Sandro Coretti
Juan A. Garay
Martin Hirt
Vassilis Zikas
2016
conf/tcc
Non-Malleable Encryption: Simpler, Shorter, Stronger.
Sandro Coretti
Yevgeniy Dodis
Björn Tackmann
Daniele Venturi
2015
conf/tcc
From Single-Bit to Multi-bit Public-Key Encryption via Non-malleable Codes.
Sandro Coretti
Ueli Maurer
Björn Tackmann
Daniele Venturi
2013
conf/asiacrypt
Constructing Confidential Channels from Authenticated Channels - Public-Key Encryption Revisited.
Sandro Coretti
Ueli Maurer
Björn Tackmann
Coauthors
Aggelos Kiayias
(3)
Alexander Russell
(3)
Antonio Faonio
(1)
Björn Tackmann
(4)
Cristopher Moore
(1)
Daniel Jost
(1)
Daniele Venturi
(4)
Giorgos Panagiotakos
(1)
Harish Karthikeyan
(1)
Joël Alwen
(4)
John P. Steinberger
(1)
Juan A. Garay
(4)
Manuel M. T. Chakravarty
(1)
Marta Mularczyk
(1)
Martin Hirt
(1)
Matthias Fitzi
(2)
Peter Gazi
(1)
Philipp Kant
(1)
Ran Cohen
(3)
Sandro Coretti
(19)
Siyao Guo
(2)
Stefano Tessaro
(1)
Ueli Maurer
(3)
Vassilis Zikas
(4)
Yevgeniy Dodis
(8)
Yiannis Tselekounis
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to