default search action
Sandro Coretti
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c19]Sandro Coretti, Aggelos Kiayias, Cristopher Moore, Alexander Russell:
The Generals' Scuttlebutt: Byzantine-Resilient Gossip Protocols. CCS 2022: 595-608 - [c18]Sandro Coretti, Yevgeniy Dodis, Harish Karthikeyan, Noah Stephens-Davidowitz, Stefano Tessaro:
On Seedless PRNGs and Premature Next. ITC 2022: 9:1-9:20 - [i18]Sandro Coretti, Aggelos Kiayias, Cristopher Moore, Alexander Russell:
The Generalsâ Scuttlebutt: Byzantine-Resilient Gossip Protocols. IACR Cryptol. ePrint Arch. 2022: 541 (2022) - [i17]Sandro Coretti, Yevgeniy Dodis, Harish Karthikeyan, Noah Stephens-Davidowitz, Stefano Tessaro:
On Seedless PRNGs and Premature Next. IACR Cryptol. ePrint Arch. 2022: 558 (2022) - 2021
- [j3]Ran Cohen, Sandro Coretti, Juan A. Garay, Vassilis Zikas:
Round-Preserving Parallel Composition of Probabilistic-Termination Cryptographic Protocols. J. Cryptol. 34(2): 12 (2021) - [c17]Joël Alwen, Sandro Coretti, Yevgeniy Dodis, Yiannis Tselekounis:
Modular Design of Secure Group Messaging Protocols and the Security of MLS. CCS 2021: 1463-1483 - [c16]Manuel M. T. Chakravarty, Sandro Coretti, Matthias Fitzi, Peter Gazi, Philipp Kant, Aggelos Kiayias, Alexander Russell:
Fast Isomorphic State Channels. Financial Cryptography (2) 2021: 339-358 - [i16]Joël Alwen, Sandro Coretti, Yevgeniy Dodis, Yiannis Tselekounis:
Modular Design of Secure Group Messaging Protocols and the Security of MLS. IACR Cryptol. ePrint Arch. 2021: 1083 (2021) - 2020
- [j2]Sandro Coretti, Yevgeniy Dodis, Ueli Maurer, Björn Tackmann, Daniele Venturi:
Non-malleable Encryption: Simpler, Shorter, Stronger. J. Cryptol. 33(4): 1984-2033 (2020) - [c15]Joël Alwen, Sandro Coretti, Yevgeniy Dodis, Yiannis Tselekounis:
Security Analysis and Improvements for the IETF MLS Standard for Group Messaging. CRYPTO (1) 2020: 248-277 - [c14]Joël Alwen, Sandro Coretti, Daniel Jost, Marta Mularczyk:
Continuous Group Key Agreement with Active Security. TCC (2) 2020: 261-290 - [i15]Manuel M. T. Chakravarty, Sandro Coretti, Matthias Fitzi, Peter Gazi, Philipp Kant, Aggelos Kiayias, Alexander Russell:
Hydra: Fast Isomorphic State Channels. IACR Cryptol. ePrint Arch. 2020: 299 (2020) - [i14]Joël Alwen, Sandro Coretti, Daniel Jost, Marta Mularczyk:
Continuous Group Key Agreement with Active Security. IACR Cryptol. ePrint Arch. 2020: 752 (2020)
2010 – 2019
- 2019
- [j1]Ran Cohen, Sandro Coretti, Juan A. Garay, Vassilis Zikas:
Probabilistic Termination and Composability of Cryptographic Protocols. J. Cryptol. 32(3): 690-741 (2019) - [c13]Sandro Coretti, Antonio Faonio, Daniele Venturi:
Rate-Optimizing Compilers for Continuously Non-malleable Codes. ACNS 2019: 3-23 - [c12]Sandro Coretti, Yevgeniy Dodis, Harish Karthikeyan, Stefano Tessaro:
Seedless Fruit Is the Sweetest: Random Number Generation, Revisited. CRYPTO (1) 2019: 205-234 - [c11]Joël Alwen, Sandro Coretti, Yevgeniy Dodis:
The Double Ratchet: Security Notions, Proofs, and Modularization for the Signal Protocol. EUROCRYPT (1) 2019: 129-158 - [i13]Sandro Coretti, Antonio Faonio, Daniele Venturi:
Rate-Optimizing Compilers for Continuously Non-Malleable Codes. IACR Cryptol. ePrint Arch. 2019: 55 (2019) - [i12]Sandro Coretti, Yevgeniy Dodis, Harish Karthikeyan, Stefano Tessaro:
Seedless Fruit is the Sweetest: Random Number Generation, Revisited. IACR Cryptol. ePrint Arch. 2019: 198 (2019) - [i11]Joël Alwen, Sandro Coretti, Yevgeniy Dodis, Yiannis Tselekounis:
Security Analysis and Improvements for the IETF MLS Standard for Group Messaging. IACR Cryptol. ePrint Arch. 2019: 1189 (2019) - 2018
- [c10]Sandro Coretti, Yevgeniy Dodis, Siyao Guo:
Non-Uniform Bounds in the Random-Permutation, Ideal-Cipher, and Generic-Group Models. CRYPTO (1) 2018: 693-721 - [c9]Sandro Coretti, Yevgeniy Dodis, Siyao Guo, John P. Steinberger:
Random Oracles and Non-uniformity. EUROCRYPT (1) 2018: 227-258 - [i10]Sandro Coretti, Yevgeniy Dodis, Siyao Guo:
Non-Uniform Bounds in the Random-Permutation, Ideal-Cipher, and Generic-Group Models. IACR Cryptol. ePrint Arch. 2018: 226 (2018) - [i9]Joël Alwen, Sandro Coretti, Yevgeniy Dodis:
The Double Ratchet: Security Notions, Proofs, and Modularization for the Signal Protocol. IACR Cryptol. ePrint Arch. 2018: 1037 (2018) - 2017
- [c8]Ran Cohen, Sandro Coretti, Juan A. Garay, Vassilis Zikas:
Round-Preserving Parallel Composition of Probabilistic-Termination Cryptographic Protocols. ICALP 2017: 37:1-37:15 - [c7]Christian Badertscher, Sandro Coretti, Chen-Da Liu Zhang, Ueli Maurer:
Efficiency lower bounds for commit-and-prove constructions. ISIT 2017: 1788-1792 - [i8]Ran Cohen, Sandro Coretti, Juan A. Garay, Vassilis Zikas:
Round-Preserving Parallel Composition of Probabilistic-Termination Cryptographic Protocols. IACR Cryptol. ePrint Arch. 2017: 364 (2017) - [i7]Sandro Coretti, Yevgeniy Dodis, Siyao Guo, John P. Steinberger:
Random Oracles and Non-Uniformity. IACR Cryptol. ePrint Arch. 2017: 937 (2017) - 2016
- [c6]Sandro Coretti, Juan A. Garay, Martin Hirt, Vassilis Zikas:
Constant-Round Asynchronous Multi-Party Computation Based on One-Way Functions. ASIACRYPT (2) 2016: 998-1021 - [c5]Ran Cohen, Sandro Coretti, Juan A. Garay, Vassilis Zikas:
Probabilistic Termination and Composability of Cryptographic Protocols. CRYPTO (3) 2016: 240-269 - [c4]Sandro Coretti, Yevgeniy Dodis, Björn Tackmann, Daniele Venturi:
Non-Malleable Encryption: Simpler, Shorter, Stronger. TCC (A1) 2016: 306-335 - [i6]Sandro Coretti, Juan A. Garay, Martin Hirt, Vassilis Zikas:
Constant-Round Asynchronous Multi-Party Computation. IACR Cryptol. ePrint Arch. 2016: 208 (2016) - [i5]Ran Cohen, Sandro Coretti, Juan A. Garay, Vassilis Zikas:
Probabilistic Termination and Composability of Cryptographic Protocols. IACR Cryptol. ePrint Arch. 2016: 350 (2016) - 2015
- [c3]Sandro Coretti, Ueli Maurer, Björn Tackmann, Daniele Venturi:
From Single-Bit to Multi-bit Public-Key Encryption via Non-malleable Codes. TCC (1) 2015: 532-560 - [i4]Sandro Coretti, Yevgeniy Dodis, Björn Tackmann, Daniele Venturi:
Non-Malleable Encryption: Simpler, Shorter, Stronger. IACR Cryptol. ePrint Arch. 2015: 772 (2015) - 2014
- [i3]Sandro Coretti, Ueli Maurer, Björn Tackmann, Daniele Venturi:
From Single-Bit to Multi-Bit Public-Key Encryption via Non-Malleable Codes. IACR Cryptol. ePrint Arch. 2014: 324 (2014) - 2013
- [c2]Sandro Coretti, Ueli Maurer, Björn Tackmann:
Constructing Confidential Channels from Authenticated Channels - Public-Key Encryption Revisited. ASIACRYPT (1) 2013: 134-153 - [c1]Sandro Coretti, Ueli Maurer, Björn Tackmann:
A Constructive Perspective on Key Encapsulation. Number Theory and Cryptography 2013: 226-239 - [i2]Ueli Maurer, Björn Tackmann, Sandro Coretti:
Key Exchange with Unilateral Authentication: Composable Security Definition and Modular Protocol Design. IACR Cryptol. ePrint Arch. 2013: 555 (2013) - [i1]Sandro Coretti, Ueli Maurer, Björn Tackmann:
Constructing Confidential Channels from Authenticated Channels - Public-Key Encryption Revisited. IACR Cryptol. ePrint Arch. 2013: 719 (2013)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:55 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint