![](https://dblp.org/img/logo.320x120.png)
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://dblp.org/img/search.dark.16x16.png)
default search action
Rosario Gennaro
Person information
- affiliation: City College of New York, New York, NY, USA
- affiliation (former): IBM Research
Refine list
![note](https://dblp.org/img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j34]Matteo Campanelli
, Chaya Ganesh
, Rosario Gennaro
:
How to Make Rational Arguments Practical and Extractable. IACR Commun. Cryptol. 1(1): 19 (2024) - [i50]Matteo Campanelli, Dario Fiore, Rosario Gennaro:
Natively Compatible Super-Efficient Lookup Arguments and How to Apply Them. IACR Cryptol. ePrint Arch. 2024: 1058 (2024) - 2023
- [j33]Steven D. Galbraith, Rosario Gennaro, Carla Ràfols, Ron Steinfeld:
Guest editorial: Special issue on Mathematics of Zero-Knowledge. Des. Codes Cryptogr. 91(11): 3331-3332 (2023) - [j32]Nada Amin
, John Burnham
, François Garillot
, Rosario Gennaro
, Chhi'mèd Künzang
, Daniel Rogozin
, Cameron Wong
:
LURK: Lambda, the Ultimate Recursive Knowledge (Experience Report). Proc. ACM Program. Lang. 7(ICFP): 259-274 (2023) - [c91]Matteo Campanelli
, Rosario Gennaro
, Kelsey Melissaris
, Luca Nizzardo
:
Witness-Authenticated Key Exchange, Revisited: Extensions to Groups, Improved Models, Simpler Constructions. FC (1) 2023: 112-128 - [c90]Matteo Campanelli
, Nicolas Gailly, Rosario Gennaro, Philipp Jovanovic, Mara Mihali, Justin Thaler:
sfTestudo: Linear Time Prover SNARKs with Constant Size Proofs and Square Root Size Universal Setup. LATINCRYPT 2023: 331-351 - [i49]Nada Amin, John Burnham, François Garillot, Rosario Gennaro, Chhi'mèd Künzang, Daniel Rogozin, Cameron Wong:
LURK: Lambda, the Ultimate Recursive Knowledge. IACR Cryptol. ePrint Arch. 2023: 369 (2023) - [i48]Matteo Campanelli, Nicolas Gailly, Rosario Gennaro, Philipp Jovanovic, Mara Mihali, Justin Thaler:
Testudo: Linear Time Prover SNARKs with Constant Size Proofs and Square Root Size Universal Setup. IACR Cryptol. ePrint Arch. 2023: 961 (2023) - [i47]Matteo Campanelli, Chaya Ganesh, Rosario Gennaro:
How to Make Rational Arguments Practical and Extractable. IACR Cryptol. ePrint Arch. 2023: 1966 (2023) - 2022
- [c89]Dario Catalano
, Dario Fiore
, Rosario Gennaro
, Emanuele Giunta
:
On the Impossibility of Algebraic Vector Commitments in Pairing-Free Groups. TCC (2) 2022: 274-299 - [i46]Matteo Campanelli, Rosario Gennaro, Kelsey Melissaris, Luca Nizzardo:
Witness-Authenticated Key Exchange Revisited: Improved Models, Simpler Constructions, Extensions to Groups. IACR Cryptol. ePrint Arch. 2022: 382 (2022) - [i45]Dario Catalano, Dario Fiore, Rosario Gennaro, Emanuele Giunta:
On the Impossibility of Algebraic Vector Commitments in Pairing-Free Groups. IACR Cryptol. ePrint Arch. 2022: 696 (2022) - 2021
- [i44]Ran Canetti, Rosario Gennaro, Steven Goldfeder, Nikolaos Makriyannis, Udi Peled:
UC Non-Interactive, Proactive, Threshold ECDSA with Identifiable Aborts. IACR Cryptol. ePrint Arch. 2021: 60 (2021) - [i43]Nihal Vatandas, Rosario Gennaro, Bertrand Ithurburn, Hugo Krawczyk:
On the Cryptographic Deniability of the Signal Protocol. IACR Cryptol. ePrint Arch. 2021: 642 (2021) - 2020
- [c88]Nihal Vatandas, Rosario Gennaro, Bertrand Ithurburn, Hugo Krawczyk:
On the Cryptographic Deniability of the Signal Protocol. ACNS (2) 2020: 188-209 - [c87]Rosario Gennaro, David Hadaller, Tahereh Jafarikhah, Zhuobang Liu, William E. Skeith III, Anastasiia Timashova:
Publicly Evaluatable Perceptual Hashing. ACNS (2) 2020: 436-455 - [c86]Ran Canetti, Rosario Gennaro, Steven Goldfeder, Nikolaos Makriyannis, Udi Peled:
UC Non-Interactive, Proactive, Threshold ECDSA with Identifiable Aborts. CCS 2020: 1769-1787 - [i42]Rosario Gennaro, Steven Goldfeder:
One Round Threshold ECDSA with Identifiable Abort. IACR Cryptol. ePrint Arch. 2020: 540 (2020)
2010 – 2019
- 2019
- [i41]Rosario Gennaro, Steven Goldfeder:
Fast Multiparty Threshold ECDSA with Fast Trustless Setup. IACR Cryptol. ePrint Arch. 2019: 114 (2019) - 2018
- [c85]Rosario Gennaro, Michele Minelli, Anca Nitulescu, Michele Orrù:
Lattice-Based zk-SNARKs from Square Span Programs. CCS 2018: 556-573 - [c84]Rosario Gennaro, Steven Goldfeder:
Fast Multiparty Threshold ECDSA with Fast Trustless Setup. CCS 2018: 1179-1194 - [c83]Dan Boneh, Rosario Gennaro, Steven Goldfeder, Aayush Jain, Sam Kim, Peter M. R. Rasmussen
, Amit Sahai:
Threshold Cryptosystems from Threshold Fully Homomorphic Encryption. CRYPTO (1) 2018: 565-596 - [c82]Matteo Campanelli
, Rosario Gennaro:
Fine-Grained Secure Computation. TCC (2) 2018: 66-97 - [i40]Rosario Gennaro, Michele Minelli, Anca Nitulescu, Michele Orrù:
Lattice-Based zk-SNARKs from Square Span Programs. IACR Cryptol. ePrint Arch. 2018: 275 (2018) - [i39]Matteo Campanelli, Rosario Gennaro:
Fine-Grained Secure Computation. IACR Cryptol. ePrint Arch. 2018: 297 (2018) - 2017
- [j31]Dario Catalano, Dario Fiore, Rosario Gennaro:
A certificateless approach to onion routing. Int. J. Inf. Sec. 16(3): 327-343 (2017) - [c81]Matteo Campanelli
, Rosario Gennaro, Steven Goldfeder, Luca Nizzardo:
Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for Services. CCS 2017: 229-243 - [c80]Steven Goldfeder, Joseph Bonneau, Rosario Gennaro, Arvind Narayanan:
Escrow Protocols for Cryptocurrencies: How to Buy Physical Goods Using Bitcoin. Financial Cryptography 2017: 321-339 - [c79]Matteo Campanelli
, Rosario Gennaro:
Efficient Rational Proofs for Space Bounded Computations. GameSec 2017: 53-73 - [c78]Dan Boneh, Rosario Gennaro, Steven Goldfeder:
Using Level-1 Homomorphic Encryption to Improve Threshold DSA Signatures for Bitcoin Wallet Security. LATINCRYPT 2017: 352-377 - [c77]Rosario Gennaro:
Verifiable Outsourced Computation: A Survey. PODC 2017: 313 - [c76]Nelly Fazio, Rosario Gennaro, Tahereh Jafarikhah, William E. Skeith III:
Homomorphic Secret Sharing from Paillier Encryption. ProvSec 2017: 381-399 - [i38]Dan Boneh, Rosario Gennaro, Steven Goldfeder, Sam Kim:
A Lattice-Based Universal Thresholdizer for Cryptographic Systems. IACR Cryptol. ePrint Arch. 2017: 251 (2017) - [i37]Matteo Campanelli, Rosario Gennaro, Steven Goldfeder, Luca Nizzardo:
Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for Services. IACR Cryptol. ePrint Arch. 2017: 566 (2017) - [i36]Dan Boneh, Rosario Gennaro, Steven Goldfeder, Aayush Jain, Sam Kim, Peter M. R. Rasmussen, Amit Sahai:
Threshold Cryptosystems From Threshold Fully Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2017: 956 (2017) - 2016
- [j30]Rosario Gennaro, Carmit Hazay, Jeffrey S. Sorensen:
Automata Evaluation and Text Search Protocols with Simulation-Based Security. J. Cryptol. 29(2): 243-282 (2016) - [c75]Rosario Gennaro, Steven Goldfeder, Arvind Narayanan:
Threshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet Security. ACNS 2016: 156-174 - [i35]Rosario Gennaro, Steven Goldfeder, Arvind Narayanan:
Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security. IACR Cryptol. ePrint Arch. 2016: 13 (2016) - 2015
- [j29]Dario Catalano, Dario Fiore, Rosario Gennaro, Konstantinos Vamvourellis:
Algebraic (trapdoor) one-way functions: Constructions and applications. Theor. Comput. Sci. 592: 143-165 (2015) - [c74]Whitney A. Drazen, Emmanuel Ekwedike, Rosario Gennaro:
Highly scalable verifiable encrypted search. CNS 2015: 497-505 - [c73]Matteo Campanelli
, Rosario Gennaro:
Sequentially Composable Rational Proofs. GameSec 2015: 270-288 - [e6]Rosario Gennaro, Matthew Robshaw:
Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part I. Lecture Notes in Computer Science 9215, Springer 2015, ISBN 978-3-662-47988-9 [contents] - [e5]Rosario Gennaro, Matthew Robshaw:
Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II. Lecture Notes in Computer Science 9216, Springer 2015, ISBN 978-3-662-47999-5 [contents] - [i34]Dario Catalano, Dario Fiore, Rosario Gennaro, Luca Nizzardo:
Generalizing Homomorphic MACs for Arithmetic Circuits. IACR Cryptol. ePrint Arch. 2015: 396 (2015) - 2014
- [c72]Joseph Soryal, Irippuge Milinda Perera, Ihab Darwish, Nelly Fazio, Rosario Gennaro, Tarek N. Saadawi:
Combating Insider Attacks in IEEE 802.11 Wireless Networks with Broadcast Encryption. AINA 2014: 472-479 - [c71]Dario Fiore, Rosario Gennaro, Valerio Pastro:
Efficiently Verifiable Computation on Encrypted Data. CCS 2014: 844-855 - [c70]Dario Catalano, Dario Fiore, Rosario Gennaro, Luca Nizzardo:
Generalizing Homomorphic MACs for Arithmetic Circuits. Public Key Cryptography 2014: 538-555 - [e4]Juan A. Garay, Rosario Gennaro:
Advances in Cryptology - CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I. Lecture Notes in Computer Science 8616, Springer 2014, ISBN 978-3-662-44370-5 [contents] - [e3]Juan A. Garay, Rosario Gennaro:
Advances in Cryptology - CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part II. Lecture Notes in Computer Science 8617, Springer 2014, ISBN 978-3-662-44380-4 [contents] - [i33]Rosario Gennaro, Valerio Pastro:
Verifiable Computation over Encrypted Data in the Presence of Verification Queries. IACR Cryptol. ePrint Arch. 2014: 202 (2014) - 2013
- [j28]Dario Catalano, Mario Di Raimondo, Dario Fiore, Rosario Gennaro, Orazio Puglisi:
Fully non-interactive onion routing with forward secrecy. Int. J. Inf. Sec. 12(1): 33-47 (2013) - [j27]Emmanuel Bresson, Dario Catalano, Mario Di Raimondo, Dario Fiore, Rosario Gennaro:
Off-line/on-line signatures revisited: a general unifying paradigm, efficient threshold variants and experimental results. Int. J. Inf. Sec. 12(6): 439-465 (2013) - [c69]Rosario Gennaro, Daniel Wichs:
Fully Homomorphic Message Authenticators. ASIACRYPT (2) 2013: 301-320 - [c68]Nelly Fazio, Rosario Gennaro, Irippuge Milinda Perera, William E. Skeith III:
Hard-Core Predicates for a Diffie-Hellman Problem over Finite Fields. CRYPTO (2) 2013: 148-165 - [c67]Rosario Gennaro, Craig Gentry, Bryan Parno, Mariana Raykova:
Quadratic Span Programs and Succinct NIZKs without PCPs. EUROCRYPT 2013: 626-645 - [c66]Joël Alwen, Manuel Barbosa, Pooya Farshim, Rosario Gennaro, S. Dov Gordon, Stefano Tessaro, David A. Wilson:
On the Relationship between Functional Encryption, Obfuscation, and Fully Homomorphic Encryption. IMACC 2013: 65-84 - [c65]Dario Catalano, Dario Fiore, Rosario Gennaro, Konstantinos Vamvourellis:
Algebraic (Trapdoor) One-Way Functions and Their Applications. TCC 2013: 680-699 - [i32]Nelly Fazio, Rosario Gennaro, Irippuge Milinda Perera, William E. Skeith III:
Hardcore Predicates for a Diffie-Hellman Problem over Finite Fields. IACR Cryptol. ePrint Arch. 2013: 134 (2013) - 2012
- [j26]Dario Fiore, Rosario Gennaro, Nigel P. Smart:
Relations between the security models for certificateless encryption and ID-based key agreement. Int. J. Inf. Sec. 11(1): 1-22 (2012) - [c64]Scott Ames, Rosario Gennaro, Muthuramakrishnan Venkitasubramaniam:
The Generalized Randomized Iterate and Its Application to New Efficient Constructions of UOWHFs from Regular One-Way Functions. ASIACRYPT 2012: 154-171 - [c63]Dario Fiore, Rosario Gennaro:
Publicly verifiable delegation of large polynomials and matrix computations, with applications. CCS 2012: 501-512 - [c62]Dana Dachman-Soled, Rosario Gennaro, Hugo Krawczyk, Tal Malkin:
Computational Extractors and Pseudorandomness. TCC 2012: 383-403 - [i31]Rosario Gennaro, Craig Gentry, Bryan Parno, Mariana Raykova:
Quadratic Span Programs and Succinct NIZKs without PCPs. IACR Cryptol. ePrint Arch. 2012: 215 (2012) - [i30]Dario Fiore, Rosario Gennaro:
Publicly Verifiable Delegation of Large Polynomials and Matrix Computations, with Applications. IACR Cryptol. ePrint Arch. 2012: 281 (2012) - [i29]Rosario Gennaro, Daniel Wichs:
Fully Homomorphic Message Authenticators. IACR Cryptol. ePrint Arch. 2012: 290 (2012) - [i28]Dario Fiore, Rosario Gennaro:
Improved Publicly Verifiable Delegation of Large Polynomials and Matrix Computations. IACR Cryptol. ePrint Arch. 2012: 434 (2012) - 2011
- [c61]Dario Catalano, Mario Di Raimondo, Dario Fiore, Rosario Gennaro, Orazio Puglisi:
Fully Non-interactive Onion Routing with Forward-Secrecy. ACNS 2011: 255-273 - [c60]Siavosh Benabbas, Rosario Gennaro, Yevgeniy Vahlis:
Verifiable Delegation of Computation over Large Datasets. CRYPTO 2011: 111-131 - [e2]Dario Catalano, Nelly Fazio, Rosario Gennaro, Antonio Nicolosi:
Public Key Cryptography - PKC 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings. Lecture Notes in Computer Science 6571, Springer 2011, ISBN 978-3-642-19378-1 [contents] - [i27]Siavosh Benabbas, Rosario Gennaro, Yevgeniy Vahlis:
Verifiable Delegation of Computation over Large Datasets. IACR Cryptol. ePrint Arch. 2011: 132 (2011) - [i26]Dana Dachman-Soled, Rosario Gennaro, Hugo Krawczyk, Tal Malkin:
Computational Extractors and Pseudorandomness. IACR Cryptol. ePrint Arch. 2011: 708 (2011) - 2010
- [j25]Yvo Desmedt, Rosario Gennaro, Kaoru Kurosawa, Victor Shoup:
A New and Improved Paradigm for Hybrid Encryption Secure Against Chosen-Ciphertext Attack. J. Cryptol. 23(1): 91-120 (2010) - [j24]Dario Fiore, Rosario Gennaro:
Identity-Based Key Exchange Protocols without Pairings. Trans. Comput. Sci. 10: 42-77 (2010) - [c59]Rosario Gennaro, Hugo Krawczyk, Tal Rabin:
Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead. ACNS 2010: 309-328 - [c58]Rosario Gennaro, Craig Gentry, Bryan Parno:
Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers. CRYPTO 2010: 465-482 - [c57]Dario Fiore, Rosario Gennaro:
Making the Diffie-Hellman Protocol Identity-Based. CT-RSA 2010: 165-178 - [c56]Dario Fiore, Rosario Gennaro, Nigel P. Smart:
Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement. Pairing 2010: 167-186 - [c55]Rosario Gennaro, Jonathan Katz, Hugo Krawczyk, Tal Rabin:
Secure Network Coding over the Integers. Public Key Cryptography 2010: 142-160 - [c54]Rosario Gennaro, Carmit Hazay
, Jeffrey S. Sorensen:
Text Search Protocols with Simulation Based Security. Public Key Cryptography 2010: 332-350 - [i25]Rosario Gennaro, Hugo Krawczyk, Tal Rabin:
Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead. IACR Cryptol. ePrint Arch. 2010: 68 (2010) - [i24]Rosario Gennaro, Carmit Hazay, Jeffrey S. Sorensen:
Automata Evaluation and Text Search Protocols with Simulation Based Security. IACR Cryptol. ePrint Arch. 2010: 484 (2010)
2000 – 2009
- 2009
- [j23]Mario Di Raimondo, Rosario Gennaro:
New Approaches for Deniable Authentication. J. Cryptol. 22(4): 572-615 (2009) - [c53]Dario Catalano, Dario Fiore, Rosario Gennaro:
Certificateless onion routing. CCS 2009: 151-160 - [c52]Rosario Gennaro, Shai Halevi:
More on Key Wrapping. Selected Areas in Cryptography 2009: 53-70 - [i23]Dario Fiore, Rosario Gennaro:
Making the Diffie-Hellman Protocol Identity-Based. IACR Cryptol. ePrint Arch. 2009: 174 (2009) - [i22]Rosario Gennaro, Shai Halevi:
More on Key Wrapping. IACR Cryptol. ePrint Arch. 2009: 372 (2009) - [i21]Rosario Gennaro, Craig Gentry, Bryan Parno:
Non-Interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers. IACR Cryptol. ePrint Arch. 2009: 547 (2009) - [i20]Rosario Gennaro, Jonathan Katz, Hugo Krawczyk, Tal Rabin:
Secure Network Coding Over the Integers. IACR Cryptol. ePrint Arch. 2009: 569 (2009) - [i19]Dario Fiore, Rosario Gennaro, Nigel P. Smart:
Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement. IACR Cryptol. ePrint Arch. 2009: 600 (2009) - 2008
- [j22]Masayuki Abe, Rosario Gennaro, Kaoru Kurosawa:
Tag-KEM/DEM: A New Framework for Hybrid Encryption. J. Cryptol. 21(1): 97-130 (2008) - [c51]Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin, Steffen Reidt, Stephen D. Wolthusen:
Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs. ESORICS 2008: 49-65 - [c50]Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin:
Threshold RSA for Dynamic and Ad-Hoc Groups. EUROCRYPT 2008: 88-107 - [c49]Dario Catalano, Mario Di Raimondo, Dario Fiore, Rosario Gennaro:
Off-Line/On-Line Signatures: Theoretical Aspects and Experimental Results. Public Key Cryptography 2008: 101-120 - [c48]Rosario Gennaro:
Faster and Shorter Password-Authenticated Key Exchange. TCC 2008: 589-606 - [e1]Steven M. Bellovin, Rosario Gennaro, Angelos D. Keromytis, Moti Yung:
Applied Cryptography and Network Security, 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings. Lecture Notes in Computer Science 5037, 2008, ISBN 978-3-540-68913-3 [contents] - [i18]Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin:
Threshold RSA for Dynamic and Ad-Hoc Groups. IACR Cryptol. ePrint Arch. 2008: 45 (2008) - [i17]Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin, Steffen Reidt, Stephen D. Wolthusen:
Strongly-Resilient and Non-Interactive Hierarchical Key-Agreement in MANETs. IACR Cryptol. ePrint Arch. 2008: 308 (2008) - 2007
- [j21]Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin:
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. J. Cryptol. 20(1): 51-83 (2007) - [j20]Rosario Gennaro, Tal Rabin, Stanislaw Jarecki, Hugo Krawczyk:
Robust and Efficient Sharing of RSA Functions. J. Cryptol. 20(3): 393 (2007) - [j19]Rosario Gennaro, Tal Rabin, Hugo Krawczyk:
RSA-Based Undeniable Signatures. J. Cryptol. 20(3): 394 (2007) - [j18]Dario Catalano, Rosario Gennaro:
Cramer-Damgård signatures revisited: Efficient flat-tree signatures based on factoring. Theor. Comput. Sci. 370(1-3): 186-200 (2007) - [c47]Emmanuel Bresson, Dario Catalano, Rosario Gennaro:
Improved On-Line/Off-Line Threshold Signatures. Public Key Cryptography 2007: 217-232 - [i16]Rosario Gennaro:
Faster and Shorter Password-Authenticated Key Exchange. IACR Cryptol. ePrint Arch. 2007: 325 (2007) - 2006
- [j17]Rosario Gennaro:
Randomness in Cryptography. IEEE Secur. Priv. 4(2): 64-67 (2006) - [j16]Mario Di Raimondo, Rosario Gennaro:
Provably secure threshold password-authenticated key exchange. J. Comput. Syst. Sci. 72(6): 978-1001 (2006) - [j15]Rosario Gennaro, Yehuda Lindell
:
A framework for password-based authenticated key exchange1. ACM Trans. Inf. Syst. Secur. 9(2): 181-234 (2006) - [c46]Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk:
Deniable authentication and key exchange. CCS 2006: 400-409 - [c45]Rosario Gennaro, Silvio Micali:
Independent Zero-Knowledge Sets. ICALP (2) 2006: 34-45 - [i15]Rosario Gennaro, Silvio Micali:
Independent Zero-Knowledge Sets. IACR Cryptol. ePrint Arch. 2006: 155 (2006) - [i14]Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk:
Deniable Authentication and Key Exchange. IACR Cryptol. ePrint Arch. 2006: 280 (2006) - 2005
- [j14]Rosario Gennaro, Mario Di Raimondo:
Secure multiplication of shared secrets in the exponent. Inf. Process. Lett. 96(2): 71-79 (2005) - [j13]Rosario Gennaro:
An Improved Pseudo-Random Generator Based on the Discrete Logarithm Problem. J. Cryptol. 18(2): 91-110 (2005) - [j12]Rosario Gennaro, Yael Gertner, Jonathan Katz, Luca Trevisan
:
Bounds on the Efficiency of Generic Cryptographic Constructions. SIAM J. Comput. 35(1): 217-246 (2005) - [c44]Mario Di Raimondo, Rosario Gennaro:
New approaches for deniable authentication. CCS 2005: 112-121 - [c43]Masayuki Abe, Rosario Gennaro, Kaoru Kurosawa, Victor Shoup:
Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM. EUROCRYPT 2005: 128-146 - [c42]Dario Catalano, Rosario Gennaro:
Cramer-Damgård Signatures Revisited: Efficient Flat-Tree Signatures Based on Factoring. Public Key Cryptography 2005: 313-327 - [c41]Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk:
Secure off-the-record messaging. WPES 2005: 81-89 - [i13]Masayuki Abe, Rosario Gennaro, Kaoru Kurosawa:
Tag-KEM/DEM: A New Framework for Hybrid Encryption. IACR Cryptol. ePrint Arch. 2005: 27 (2005) - [i12]Mario Di Raimondo, Rosario Gennaro:
New Approaches for Deniable Authentication. IACR Cryptol. ePrint Arch. 2005: 46 (2005) - 2004
- [c40]Rosario Gennaro, Darren Leigh, Ravi Sundaram, William S. Yerazunis:
Batching Schnorr Identification Scheme with Applications to Privacy-Preserving Authorization and Low-Bandwidth Communication Devices. ASIACRYPT 2004: 276-292 - [c39]Rosario Gennaro:
Multi-trapdoor Commitments and Their Applications to Proofs of Knowledge Secure Under Concurrent Man-in-the-Middle Attacks. CRYPTO 2004: 220-236 - [c38]Yevgeniy Dodis, Rosario Gennaro, Johan Håstad, Hugo Krawczyk, Tal Rabin:
Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes. CRYPTO 2004: 494-510 - [c37]Rosario Gennaro, Hugo Krawczyk, Tal Rabin:
Secure Hashed Diffie-Hellman over Non-DDH Groups. EUROCRYPT 2004: 361-381 - [c36]Rosario Gennaro, Anna Lysyanskaya, Tal Malkin, Silvio Micali, Tal Rabin:
Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering. TCC 2004: 258-277 - [i11]