Campanelli, Matteo; Gennaro, Rosario Sequentially composable rational proofs. (English) Zbl 1448.68239 Khouzani, MHR (ed.) et al., Decision and game theory for security. 6th international conference, GameSec 2015, London, UK, November 4–5, 2015. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9406, 270-288 (2015). MSC: 68Q10 68Q06 91A80 94A60 PDFBibTeX XMLCite \textit{M. Campanelli} and \textit{R. Gennaro}, Lect. Notes Comput. Sci. 9406, 270--288 (2015; Zbl 1448.68239) Full Text: DOI
Catalano, Dario; Fiore, Dario; Gennaro, Rosario; Vamvourellis, Konstantinos Algebraic (trapdoor) one-way functions: constructions and applications. (English) Zbl 1397.94053 Theor. Comput. Sci. 592, 143-165 (2015). MSC: 94A60 68M12 PDFBibTeX XMLCite \textit{D. Catalano} et al., Theor. Comput. Sci. 592, 143--165 (2015; Zbl 1397.94053) Full Text: DOI
Gennaro, Rosario (ed.); Robshaw, Matthew (ed.) Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part II. (English) Zbl 1319.94003 Lecture Notes in Computer Science 9216. Berlin: Springer (ISBN 978-3-662-47999-5/pbk; 978-3-662-48000-7/ebook). xviii, 783 p. (2015). MSC: 94-06 94A60 00B25 PDFBibTeX XMLCite \textit{R. Gennaro} (ed.) and \textit{M. Robshaw} (ed.), Advances in cryptology -- CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16--20, 2015. Proceedings. Part II. Berlin: Springer (2015; Zbl 1319.94003) Full Text: DOI
Gennaro, Rosario (ed.); Robshaw, Matthew (ed.) Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part I. (English) Zbl 1319.94002 Lecture Notes in Computer Science 9215. Berlin: Springer (ISBN 978-3-662-47988-9/pbk; 978-3-662-47989-6/ebook). xviii, 787 p. (2015). MSC: 94-06 94A60 00B25 PDFBibTeX XMLCite \textit{R. Gennaro} (ed.) and \textit{M. Robshaw} (ed.), Advances in cryptology -- CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16--20, 2015. Proceedings. Part I. Berlin: Springer (2015; Zbl 1319.94002) Full Text: DOI
Garay, Juan A. (ed.); Gennaro, Rosario (ed.) Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part I. (English) Zbl 1292.94002 Lecture Notes in Computer Science 8616. Berlin: Springer (ISBN 978-3-662-44370-5/pbk). xviii, 574 p. (2014). MSC: 94-06 94A60 00B25 PDFBibTeX XMLCite \textit{J. A. Garay} (ed.) and \textit{R. Gennaro} (ed.), Advances in cryptology -- CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17--21, 2014. Proceedings, Part I. Berlin: Springer (2014; Zbl 1292.94002) Full Text: DOI
Garay, Juan A. (ed.); Gennaro, Rosario (ed.) Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part II. (English) Zbl 1292.94001 Lecture Notes in Computer Science 8617. Berlin: Springer (ISBN 978-3-662-44380-4/pbk). xviii, 532 p. (2014). MSC: 94-06 94A60 00B25 PDFBibTeX XMLCite \textit{J. A. Garay} (ed.) and \textit{R. Gennaro} (ed.), Advances in cryptology -- CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17--21, 2014. Proceedings, Part II. Berlin: Springer (2014; Zbl 1292.94001) Full Text: DOI
Catalano, Dario; Fiore, Dario; Gennaro, Rosario; Nizzardo, Luca Generalizing homomorphic MACs for arithmetic circuits. (English) Zbl 1335.94036 Krawczyk, Hugo (ed.), Public-key cryptography – PKC 2014. 17th international conference on practice and theory in public-key cryptography, Buenos Aires, Argentina, March 26–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54630-3/pbk). Lecture Notes in Computer Science 8383, 538-555 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Catalano} et al., Lect. Notes Comput. Sci. 8383, 538--555 (2014; Zbl 1335.94036) Full Text: DOI
Alwen, Joël; Barbosa, Manuel; Farshim, Pooya; Gennaro, Rosario; Gordon, S. Dov; Tessaro, Stefano; Wilson, David A. On the relationship between functional encryption, obfuscation, and fully homomorphic encryption. (English) Zbl 1317.94080 Stam, Martijn (ed.), Cryptography and coding. 14th IMA international conference, IMACC 2013, Oxford, UK, December 17–19, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-45238-3/pbk). Lecture Notes in Computer Science 8308, 65-84 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Alwen} et al., Lect. Notes Comput. Sci. 8308, 65--84 (2013; Zbl 1317.94080) Full Text: DOI Link
Gennaro, Rosario; Wichs, Daniel Fully homomorphic message authenticators. (English) Zbl 1326.94126 Sako, Kazue (ed.) et al., Advances in cryptology – ASIACRYPT 2013. 19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1–5, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-42044-3/pbk). Lecture Notes in Computer Science 8270, 301-320 (2013). MSC: 94A62 PDFBibTeX XMLCite \textit{R. Gennaro} and \textit{D. Wichs}, Lect. Notes Comput. Sci. 8270, 301--320 (2013; Zbl 1326.94126) Full Text: DOI
Fazio, Nelly; Gennaro, Rosario; Perera, Irippuge Milinda; Skeith, William E. III Hard-core predicates for a Diffie-Hellman problem over finite fields. (English) Zbl 1316.94071 Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-40083-4/pbk). Lecture Notes in Computer Science 8043, 148-165 (2013). MSC: 94A60 14G50 PDFBibTeX XMLCite \textit{N. Fazio} et al., Lect. Notes Comput. Sci. 8043, 148--165 (2013; Zbl 1316.94071) Full Text: DOI
Gennaro, Rosario; Gentry, Craig; Parno, Bryan; Raykova, Mariana Quadratic span programs and succinct NIZKs without PCPs. (English) Zbl 1300.94056 Johansson, Thomas (ed.) et al., Advances in cryptology – EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26–30, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38347-2/pbk). Lecture Notes in Computer Science 7881, 626-645 (2013). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{R. Gennaro} et al., Lect. Notes Comput. Sci. 7881, 626--645 (2013; Zbl 1300.94056) Full Text: DOI
Catalano, Dario; Fiore, Dario; Gennaro, Rosario; Vamvourellis, Konstantinos Algebraic (Trapdoor) one-way functions and their applications. (English) Zbl 1315.94065 Sahai, Amit (ed.), Theory of cryptography. 10th theory of cryptography conference, TCC 2013, Tokyo, Japan, March 3–6, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36593-5/pbk). Lecture Notes in Computer Science 7785, 680-699 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Catalano} et al., Lect. Notes Comput. Sci. 7785, 680--699 (2013; Zbl 1315.94065) Full Text: DOI
Ames, Scott; Gennaro, Rosario; Venkitasubramaniam, Muthuramakrishnan The generalized randomized iterate and its application to new efficient constructions of uowhfs from regular one-way functions. (English) Zbl 1292.94019 Wang, Xiaoyun (ed.) et al., Advances in cryptology – ASIACRYPT 2012. 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2–6, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34960-7/pbk). Lecture Notes in Computer Science 7658, 154-171 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Ames} et al., Lect. Notes Comput. Sci. 7658, 154--171 (2012; Zbl 1292.94019) Full Text: DOI
Dachman-Soled, Dana; Gennaro, Rosario; Krawczyk, Hugo; Malkin, Tal Computational extractors and pseudorandomness. (English) Zbl 1304.68136 Cramer, Ronald (ed.), Theory of cryptography. 9th theory of cryptography conference, TCC 2012, Taormina, Sicily, Italy, March 19–21, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-28913-2/pbk). Lecture Notes in Computer Science 7194, 383-403 (2012). MSC: 68Q87 68P25 94A15 94A60 PDFBibTeX XMLCite \textit{D. Dachman-Soled} et al., Lect. Notes Comput. Sci. 7194, 383--403 (2012; Zbl 1304.68136) Full Text: DOI
Benabbas, Siavosh; Gennaro, Rosario; Vahlis, Yevgeniy Verifiable delegation of computation over large datasets. (English) Zbl 1288.68159 Rogaway, Phillip (ed.), Advances in cryptology – CRYPTO 2011. 31st annual cryptology conference, Santa Barbara, CA, USA, August 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22791-2/pbk). Lecture Notes in Computer Science 6841, 111-131 (2011). MSC: 68Q60 94A60 PDFBibTeX XMLCite \textit{S. Benabbas} et al., Lect. Notes Comput. Sci. 6841, 111--131 (2011; Zbl 1288.68159) Full Text: DOI
Catalano, Dario (ed.); Fazio, Nelly (ed.); Gennaro, Rosario (ed.); Nicolosi, Antonio (ed.) Public key cryptography – PKC 2011. 14th international conference on practice and theory in public key cryptography, Taormina, Italy, March 6–9, 2011. Proceedings. (English) Zbl 1208.94009 Lecture Notes in Computer Science 6571. Berlin: Springer (ISBN 978-3-642-19378-1/pbk). xiii, 495 p. (2011). MSC: 94-06 94A60 00B25 PDFBibTeX XMLCite \textit{D. Catalano} (ed.) et al., Public key cryptography -- PKC 2011. 14th international conference on practice and theory in public key cryptography, Taormina, Italy, March 6--9, 2011. Proceedings. Berlin: Springer (2011; Zbl 1208.94009) Full Text: DOI
Fiore, Dario; Gennaro, Rosario; Smart, Nigel P. Constructing certificateless encryption and ID-based encryption from ID-based key agreement. (English) Zbl 1252.94062 Joye, Marc (ed.) et al., Pairing-based cryptography – Pairing 2010. 4th international conference, Yamanaka Hot Spring, Japan, December 13–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17454-4/pbk). Lecture Notes in Computer Science 6487, 167-186 (2010). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{D. Fiore} et al., Lect. Notes Comput. Sci. 6487, 167--186 (2010; Zbl 1252.94062) Full Text: DOI
Gennaro, Rosario; Gentry, Craig; Parno, Bryan Non-interactive verifiable computing: outsourcing computation to untrusted workers. (English) Zbl 1284.68065 Rabin, Tal (ed.), Advances in cryptology - CRYPTO 2010. 30th annual cryptology conference, Santa Barbara, CA, USA, August 15–19, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14622-0/pbk). Lecture Notes in Computer Science 6223, 465-482 (2010). MSC: 68M12 94A62 PDFBibTeX XMLCite \textit{R. Gennaro} et al., Lect. Notes Comput. Sci. 6223, 465--482 (2010; Zbl 1284.68065) Full Text: DOI
Gennaro, Rosario; Krawczyk, Hugo; Rabin, Tal Okamoto-Tanaka revisited: fully authenticated Diffie-Hellman with minimal overhead. (English) Zbl 1350.94034 Zhou, Jianying (ed.) et al., Applied cryptography and network security. 8th international conference, ACNS 2010, Beijing, China, June 22–25, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13707-5/pbk). Lecture Notes in Computer Science 6123, 309-328 (2010). MSC: 94A60 68M12 PDFBibTeX XMLCite \textit{R. Gennaro} et al., Lect. Notes Comput. Sci. 6123, 309--328 (2010; Zbl 1350.94034) Full Text: DOI
Gennaro, Rosario; Hazay, Carmit; Sorensen, Jeffrey S. Text search protocols with simulation based security. (English) Zbl 1281.94025 Nguyen, Phong Q. (ed.) et al., Public key cryptography – PKC 2010. 13th international conference on practice and theory in public key cryptography, Paris, France, May 26–28, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13012-0/pbk). Lecture Notes in Computer Science 6056, 332-350 (2010). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Gennaro} et al., Lect. Notes Comput. Sci. 6056, 332--350 (2010; Zbl 1281.94025) Full Text: DOI
Gennaro, Rosario; Katz, Jonathan; Krawczyk, Hugo; Rabin, Tal Secure network coding over the integers. (English) Zbl 1279.94075 Nguyen, Phong Q. (ed.) et al., Public key cryptography – PKC 2010. 13th international conference on practice and theory in public key cryptography, Paris, France, May 26–28, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13012-0/pbk). Lecture Notes in Computer Science 6056, 142-160 (2010). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Gennaro} et al., Lect. Notes Comput. Sci. 6056, 142--160 (2010; Zbl 1279.94075) Full Text: DOI
Fiore, Dario; Gennaro, Rosario Making the Diffie-Hellman protocol identity-based. (English) Zbl 1272.94030 Pieprzyk, Josef (ed.), Topics in cryptology – CT-RSA 2010. The cryptographers’ track at the RSA conference 2010, San Francisco, CA, USA, March 1–5, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-11924-8/pbk). Lecture Notes in Computer Science 5985, 165-178 (2010). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Fiore} and \textit{R. Gennaro}, Lect. Notes Comput. Sci. 5985, 165--178 (2010; Zbl 1272.94030) Full Text: DOI
Desmedt, Yvo; Gennaro, Rosario; Kurosawa, Kaoru; Shoup, Victor A new and improved paradigm for hybrid encryption secure against chosen-ciphertext attack. (English) Zbl 1191.94087 J. Cryptology 23, No. 1, 91-120 (2010). Reviewer: Jerzy Żurawiecki (Lublin) MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{Y. Desmedt} et al., J. Cryptology 23, No. 1, 91--120 (2010; Zbl 1191.94087) Full Text: DOI
Gennaro, Rosario; Halevi, Shai More on key wrapping. (English) Zbl 1267.94061 Jacobson, Michael J. jun. (ed.) et al., Selected areas in cryptography. 16th annual international workshop, SAC 2009, Calgary, Alberta, Canada, August 13–14, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-05443-3/pbk). Lecture Notes in Computer Science 5867, 53-70 (2009). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Gennaro} and \textit{S. Halevi}, Lect. Notes Comput. Sci. 5867, 53--70 (2009; Zbl 1267.94061) Full Text: DOI
Di Raimondo, Mario; Gennaro, Rosario New approaches for deniable authentication. (English) Zbl 1178.94187 J. Cryptology 22, No. 4, 572-615 (2009). Reviewer: Jaak Henno (Tallinn) MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{M. Di Raimondo} and \textit{R. Gennaro}, J. Cryptology 22, No. 4, 572--615 (2009; Zbl 1178.94187) Full Text: DOI
Bellovin, Steven M. (ed.); Gennaro, Rosario (ed.); Keromytis, Angelos (ed.); Yung, Moti (ed.) Applied cryptography and network security. 6th international conference, ACNS 2008, New York, NY, USA, June 3–6, 2008. Proceedings. (English) Zbl 1137.94301 Lecture Notes in Computer Science 5037. Berlin: Springer (ISBN 978-3-540-68913-3/pbk). xi, 508 p. (2008). MSC: 94-06 94A60 68P25 00B25 PDFBibTeX XMLCite \textit{S. M. Bellovin} (ed.) et al., Applied cryptography and network security. 6th international conference, ACNS 2008, New York, NY, USA, June 3--6, 2008. Proceedings. Berlin: Springer (2008; Zbl 1137.94301) Full Text: DOI
Gennaro, Rosario; Halevi, Shai; Krawczyk, Hugo; Rabin, Tal Threshold RSA for dynamic and ad-hoc groups. (English) Zbl 1149.94316 Smart, Nigel (ed.), Advances in cryptology – EUROCRYPT 2008. 27th annual international conference on the theory and applications of cryptographic techniques, Istanbul, Turkey, April 13–17, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78966-6/pbk). Lecture Notes in Computer Science 4965, 88-107 (2008). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{R. Gennaro} et al., Lect. Notes Comput. Sci. 4965, 88--107 (2008; Zbl 1149.94316) Full Text: DOI
Gennaro, Rosario Faster and shorter password-authenticated key exchange. (English) Zbl 1162.94360 Canetti, Ran (ed.), Theory of cryptography. Fifth theory of cryptography conference, TCC 2008, New York, USA, March 19–21, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78524-8/pbk). Lecture Notes in Computer Science 4948, 589-606 (2008). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{R. Gennaro}, Lect. Notes Comput. Sci. 4948, 589--606 (2008; Zbl 1162.94360) Full Text: DOI
Catalano, Dario; Di Raimondo, Mario; Fiore, Dario; Gennaro, Rosario Off-line/On-line signatures: Theoretical aspects and experimental results. (English) Zbl 1162.94344 Cramer, Ronald (ed.), Public key cryptography – PKC 2008. 11th international workshop on practice and theory in public-key cryptography, Barcelona, Spain, March 9–12, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78440-1/pbk). Lecture Notes in Computer Science 4939, 101-120 (2008). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{D. Catalano} et al., Lect. Notes Comput. Sci. 4939, 101--120 (2008; Zbl 1162.94344) Full Text: DOI
Bresson, Emmanuel; Catalano, Dario; Gennaro, Rosario Improved on-line/off-line threshold signatures. (English) Zbl 1127.94021 Okamoto, Tatsuaki (ed.) et al., Public key cryptography – PKC 2007. 10th international conference on practice and theory in public-key cryptography, Beijing, China, April 16–20, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-71676-1/pbk). Lecture Notes in Computer Science 4450, 217-232 (2007). MSC: 94A62 PDFBibTeX XMLCite \textit{E. Bresson} et al., Lect. Notes Comput. Sci. 4450, 217--232 (2007; Zbl 1127.94021) Full Text: DOI
Gennaro, Rosario; Jarecki, Stanislaw; Krawczyk, Hugo; Rabin, Tal Secure distributed key generation for discrete-log based cryptosystems. (English) Zbl 1115.68075 J. Cryptology 20, No. 1, 51-83 (2007). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{R. Gennaro} et al., J. Cryptology 20, No. 1, 51--83 (2007; Zbl 1115.68075) Full Text: DOI
Catalano, Dario; Gennaro, Rosario Cramer-Damgård signatures revisited: Efficient flat-tree signatures based on factoring. (English) Zbl 1117.94009 Theor. Comput. Sci. 370, No. 1-3, 186-200 (2007). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{D. Catalano} and \textit{R. Gennaro}, Theor. Comput. Sci. 370, No. 1--3, 186--200 (2007; Zbl 1117.94009) Full Text: DOI
Gennaro, Rosario; Micali, Silvio Independent zero-knowledge sets. (English) Zbl 1133.94344 Bugliesi, Michele (ed.) et al., Automata, languages and programming. 33rd international colloquium, ICALP 2006, Venice, Italy, July 10–14, 2006. Proceedings, Part II. Berlin: Springer (ISBN 978-3-540-35907-4/pbk). Lecture Notes in Computer Science 4052, 34-45 (2006). MSC: 94A62 PDFBibTeX XMLCite \textit{R. Gennaro} and \textit{S. Micali}, Lect. Notes Comput. Sci. 4052, 34--45 (2006; Zbl 1133.94344) Full Text: DOI
Di Raimondo, Mario; Gennaro, Rosario Provably secure threshold password-authenticated key exchange. (English) Zbl 1100.68571 J. Comput. Syst. Sci. 72, No. 6, 978-1001 (2006). MSC: 68P25 94A60 94A62 PDFBibTeX XMLCite \textit{M. Di Raimondo} and \textit{R. Gennaro}, J. Comput. Syst. Sci. 72, No. 6, 978--1001 (2006; Zbl 1100.68571) Full Text: DOI
Abe, Masayuki; Gennaro, Rosario; Kurosawa, Kaoru; Shoup, Victor Tag-KEM/DEM: A new framework for hybrid encryption and a new analysis of Kurosawa-Desmedt KEM. (English) Zbl 1137.94336 Cramer, Ronald (ed.), Advances in cryptology – EUROCRYPT 2005. 24th annual international conference on the theory and applications of cryptographic techniques, Aarhus, Denmark, May 22–26, 2005. Proceedings. Berlin: Springer (ISBN 3-540-25910-4/pbk). Lecture Notes in Computer Science 3494, 128-146 (2005). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Abe} et al., Lect. Notes Comput. Sci. 3494, 128--146 (2005; Zbl 1137.94336) Full Text: DOI
Catalano, Dario; Gennaro, Rosario Cramer-Damgård signatures revisited: Efficient flat-tree signatures based on factoring. (English) Zbl 1081.94547 Vaudenay, Serge (ed.), Public key cryptography – PKC 2005. 8th international workshop on theory and practice in public key cryptography, Les Diablerets, Switzerland, January 23–26, 2005. Proceedings. Berlin: Springer (ISBN 3-540-24454-9/pbk). Lecture Notes in Computer Science 3386, 313-327 (2005). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{D. Catalano} and \textit{R. Gennaro}, Lect. Notes Comput. Sci. 3386, 313--327 (2005; Zbl 1081.94547) Full Text: DOI
Gennaro, Rosario; Gertner, Yael; Katz, Jonathan; Trevisan, Luca Bounds on the efficiency of generic cryptographic constructions. (English) Zbl 1087.94019 SIAM J. Comput. 35, No. 1, 217-246 (2005). MSC: 94A60 68Q17 68P25 PDFBibTeX XMLCite \textit{R. Gennaro} et al., SIAM J. Comput. 35, No. 1, 217--246 (2005; Zbl 1087.94019) Full Text: DOI
Gennaro, Rosario Cryptographic algorithms for multimedia traffic. (English) Zbl 1202.68169 Focardi, Riccardo (ed.) et al., Foundations of security analysis and design II. FOSAD 2001/2002 tutorial lectures. Berlin: Springer (ISBN 3-540-20955-7/pbk). Lect. Notes Comput. Sci. 2946, 186-206 (2004). MSC: 68P25 68M11 94A62 PDFBibTeX XMLCite \textit{R. Gennaro}, Lect. Notes Comput. Sci. 2946, 186--206 (2004; Zbl 1202.68169) Full Text: DOI
Gennaro, Rosario; Lysyanskaya, Anna; Malkin, Tal; Micali, Silvio; Rabin, Tal Algorithmic tamper-proof (ATP) security: Theoretical foundations for security against hardware tampering. (English) Zbl 1197.94187 Naor, Moni (ed.), Theory of cryptography. First theory of cryptography conference, TCC 2004, Cambridge, MA, USA, February 19–21, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21000-8/pbk). Lecture Notes in Computer Science 2951, 258-277 (2004). MSC: 94A60 68M12 94A62 PDFBibTeX XMLCite \textit{R. Gennaro} et al., Lect. Notes Comput. Sci. 2951, 258--277 (2004; Zbl 1197.94187) Full Text: DOI
Gennaro, Rosario; Krawczyk, Hugo; Rabin, Tal Secure hashed Diffie-Hellman over non-DDH groups. (English) Zbl 1122.94418 Cachin, Christian (ed.) et al., Advances in cryptology – EUROCRYPT 2004. International conference on the theory and applications of cryptographic techniques, Interlaken, Switzerland, May 2–6, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21935-8/pbk). Lecture Notes in Computer Science 3027, 361-381 (2004). MSC: 94A62 20F99 PDFBibTeX XMLCite \textit{R. Gennaro} et al., Lect. Notes Comput. Sci. 3027, 361--381 (2004; Zbl 1122.94418) Full Text: DOI
Dodis, Yevgeniy; Gennaro, Rosario; Håstad, Johan; Krawczyk, Hugo; Rabin, Tal Randomness extraction and key derivation using the CBC, cascade and HMAC modes. (English) Zbl 1104.68470 Franklin, Matt (ed.), Advances in cryptology – CRYPTO 2004. 24th annual international cryptology conference, Santa Barbara, California, USA, August 15–19, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22668-0/pbk). Lecture Notes in Computer Science 3152, 494-510 (2004). MSC: 68P25 68P30 94A60 94A62 PDFBibTeX XMLCite \textit{Y. Dodis} et al., Lect. Notes Comput. Sci. 3152, 494--510 (2004; Zbl 1104.68470) Full Text: DOI
Gennaro, Rosario Multi-trapdoor commitments and their applications to proofs of knowledge secure under concurrent man-in-the-middle attacks. (English) Zbl 1104.94050 Franklin, Matt (ed.), Advances in cryptology – CRYPTO 2004. 24th annual international cryptology conference, Santa Barbara, California, USA, August 15–19, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22668-0/pbk). Lecture Notes in Computer Science 3152, 220-236 (2004). MSC: 94A62 68P25 PDFBibTeX XMLCite \textit{R. Gennaro}, Lect. Notes Comput. Sci. 3152, 220--236 (2004; Zbl 1104.94050) Full Text: DOI
Gennaro, R.; Leigh, D.; Sundaram, R.; Yerazunis, W. Batching Schnorr identification scheme with applications to privacy-preserving authorization and low-bandwidth communication devices. (English) Zbl 1094.94527 Lee, Pil Joong, Advances in cryptology – ASIACRYPT 2004. 10th international conference on the theory and application of cryptology and information security, Jeju Island, Korea, December 5–9, 2004. Proceedings. Berlin: Springer (ISBN 3-540-23975-8/pbk). Lecture Notes in Computer Science 3329, 276-292 (2004). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{R. Gennaro} et al., Lect. Notes Comput. Sci. 3329, 276--292 (2004; Zbl 1094.94527) Full Text: DOI
Gennaro, Rosario; Gertner, Yael; Katz, Jonathan Lower bounds on the efficiency of encryption and digital signature schemes. (English) Zbl 1192.94095 Proceedings of the thirty-fifth annual ACM symposium on theory of computing (STOC 2003), San Diego, CA, USA,. New York, NY: ACM Press (ISBN 1-58113-674-9). 417-425, electronic only (2003). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Gennaro} et al., in: Proceedings of the thirty-fifth annual ACM symposium on theory of computing, STOC 2003. San Diego, CA, USA. New York, NY: ACM Press. 417--425 (2003; Zbl 1192.94095) Full Text: DOI
Gennaro, Rosario; Lindell, Yehuda A framework for password-based authenticated key exchange. (English) Zbl 1038.94534 Biham, Eli (ed.), Advances in cryptology – EUROCRYPT 2003. International conference on the theory and applications of cryptographic techniques, Warsaw, Poland, May 4–8, 2003. Proceedings. Berlin: Springer (ISBN 3-540-14039-5/pbk). Lect. Notes Comput. Sci. 2656, 524-543 (2003). MSC: 94A60 94A62 68P25 PDFBibTeX XMLCite \textit{R. Gennaro} and \textit{Y. Lindell}, Lect. Notes Comput. Sci. 2656, 524--543 (2003; Zbl 1038.94534) Full Text: Link
Di Raimondo, Mario; Gennaro, Rosario Provably secure threshold password authenticated key exchange. (English) Zbl 1038.94527 Biham, Eli (ed.), Advances in cryptology – EUROCRYPT 2003. International conference on the theory and applications of cryptographic techniques, Warsaw, Poland, May 4–8, 2003. Proceedings. Berlin: Springer (ISBN 3-540-14039-5/pbk). Lect. Notes Comput. Sci. 2656, 507-523 (2003). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{M. Di Raimondo} and \textit{R. Gennaro}, Lect. Notes Comput. Sci. 2656, 507--523 (2003; Zbl 1038.94527) Full Text: Link
Gennaro, Rosario; Jarecki, Stanisław; Krawczyk, Hugo; Rabin, Tal Secure applications of Pedersen’s distributed key generation protocol. (English) Zbl 1039.94516 Joye, Marc (ed.), Topics in cryptology – CT-RSA 2003. The cryptographers’ track at the RSA conference 2003, San Francisco, CA, USA, April 13–17, 2003. Proceedings. Berlin: Springer (ISBN 3-540-00847-0/pbk). Lect. Notes Comput. Sci. 2612, 373-390 (2003). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{R. Gennaro} et al., Lect. Notes Comput. Sci. 2612, 373--390 (2003; Zbl 1039.94516) Full Text: Link
Gennaro, Rosario; Micciancio, Daniele Cryptanalysis of a pseudorandom generator based on braid groups. (English) Zbl 1055.94014 Knudsen, Lars (ed.), Advances in cryptology - EUROCRYPT 2002. 21st international conference on the theory and applications of cryptographic techniques, Amsterdam, the Netherlands, April 28 – May 2, 2002. Proceedings. Berlin: Springer (ISBN 3-540-43553-0). Lect. Notes Comput. Sci. 2332, 1-13 (2002). MSC: 94A60 20F36 PDFBibTeX XMLCite \textit{R. Gennaro} and \textit{D. Micciancio}, Lect. Notes Comput. Sci. 2332, 1--13 (2002; Zbl 1055.94014) Full Text: Link
Gennaro, Rosario; Ishai, Yuval; Kushilevitz, Eyal; Rabin, Tal On 2-round secure multiparty computation. (English) Zbl 1026.94527 Yung, Moti (ed.), Advances in cryptology - CRYPTO 2002. 22nd annual international cryptology conference, Santa Barbara, CA, USA, August 18-22, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2442, 178-193 (2002). MSC: 94A60 68Q25 PDFBibTeX XMLCite \textit{R. Gennaro} et al., Lect. Notes Comput. Sci. 2442, 178--193 (2002; Zbl 1026.94527) Full Text: Link
Catalano, Dario; Gennaro, Rosario; Howgrave-Graham, Nick Paillier’s trapdoor function hides up to \(O(n)\) bits. (English) Zbl 1024.94008 J. Cryptology 15, No. 4, 251-269 (2002). MSC: 94A60 11T71 PDFBibTeX XMLCite \textit{D. Catalano} et al., J. Cryptology 15, No. 4, 251--269 (2002; Zbl 1024.94008) Full Text: DOI
Shoup, Victor; Gennaro, Rosario Securing threshold cryptosystems against chosen ciphertext attack. (English) Zbl 0997.94016 J. Cryptology 15, No. 2, 75-96 (2002). Reviewer: Jozef Vyskoč (Bratislava) MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{V. Shoup} and \textit{R. Gennaro}, J. Cryptology 15, No. 2, 75--96 (2002; Zbl 0997.94016) Full Text: DOI
Gennaro, Rosario; Ishai, Yuval; Kushilevitz, Eyal; Rabin, Tal The round complexity of verifiable secret sharing and secure multicast. (English) Zbl 1317.68072 Proceedings of the thirty-third annual ACM symposium on theory of computing, STOC 2001. Hersonissos, Crete, Greece, July 6–8, 2001. New York, NY: ACM Press (ISBN 1-581-13349-9). 580-589 (2001). MSC: 68Q25 94A60 94A62 PDFBibTeX XMLCite \textit{R. Gennaro} et al., in: Proceedings of the thirty-third annual ACM symposium on theory of computing, STOC 2001. Hersonissos, Crete, Greece, July 6--8, 2001. New York, NY: ACM Press. 580--589 (2001; Zbl 1317.68072) Full Text: DOI
Howgrave-Graham, Nick; Dyer, Joan; Gennaro, Rosario Pseudo-random number generation on the IBM 4758 secure crypto coprocessor. (English) Zbl 1006.68711 Koç, Çetin K. (ed.) et al., Cryptographic hardware and embedded systems - CHES 2001. 3rd international workshop, Paris, France, May 14-16, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2162, 93-102 (2001). MSC: 68U99 94A60 68P25 65C10 PDFBibTeX XMLCite \textit{N. Howgrave-Graham} et al., Lect. Notes Comput. Sci. 2162, 93--102 (2001; Zbl 1006.68711) Full Text: Link
Gennaro, Rosario; Rohatgi, Pankaj How to sign digital streams. (English) Zbl 1013.94018 Inf. Comput. 165, No. 1, 100-116 (2001). MSC: 94A62 PDFBibTeX XMLCite \textit{R. Gennaro} and \textit{P. Rohatgi}, Inf. Comput. 165, No. 1, 100--116 (2001; Zbl 1013.94018) Full Text: DOI Link
Gennaro, Rosario; Jarecki, Stanisław; Krawczyk, Hugo; Rabin, Tal Robust threshold DSS signatures. (English) Zbl 1021.94527 Inf. Comput. 164, No. 1, 54-84 (2001). MSC: 94A62 68P25 91A12 94A60 PDFBibTeX XMLCite \textit{R. Gennaro} et al., Inf. Comput. 164, No. 1, 54--84 (2001; Zbl 1021.94527) Full Text: DOI
Catalano, Dario; Gennaro, Rosario; Howgrave-Graham, Nick The bit security of Paillier’s encryption scheme and its applications. (English) Zbl 0981.94016 Pfitzmann, Birgit (ed.), Advances in cryptology - EUROCRYPT 2001. 20th international conference on theory and application of cryptographic techniques, Innsbruck, Austria, May 6-10, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2045, 229-243 (2001). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{D. Catalano} et al., Lect. Notes Comput. Sci. 2045, 229--243 (2001; Zbl 0981.94016) Full Text: Link
Catalano, Dario; Gennaro, Rosario; Halevi, Shai Computing inverses over a shared secret modulus. (English) Zbl 1082.94538 Preneel, Bart (ed.), Advances in cryptology - EUROCRYPT 2000. 19th international conference on the theory and application of cryptographic techniques, Bruges, Belgium, May 14–18, 2000. Proceedings. Berlin: Springer (ISBN 3-540-67517-5). Lect. Notes Comput. Sci. 1807, 190-206 (2000). MSC: 94A62 PDFBibTeX XMLCite \textit{D. Catalano} et al., Lect. Notes Comput. Sci. 1807, 190--206 (2000; Zbl 1082.94538)
Gennaro, Rosario An improved pseudo-random generator based on discrete log. (English) Zbl 0989.68508 Bellare, Mihir (ed.), Advances in cryptology - CRYPTO 2000. 20th annual international conference, Santa Barbara, CA, USA, August 20-24, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1880, 469-481 (2000). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{R. Gennaro}, Lect. Notes Comput. Sci. 1880, 469--481 (2000; Zbl 0989.68508)
Gennaro, Rosario; Rabin, Tal; Krawczyk, Hugo RSA-based undeniable signatures. (English) Zbl 1106.94314 J. Cryptology 13, No. 4, 397-416 (2000). MSC: 94A62 PDFBibTeX XMLCite \textit{R. Gennaro} et al., J. Cryptology 13, No. 4, 397--416 (2000; Zbl 1106.94314) Full Text: DOI
Gennaro, Rosario; Rabin, Tal; Jarecki, Stanislav; Krawczyk, Hugo Robust and efficient sharing of RSA functions. (English) Zbl 1059.94022 J. Cryptology 13, No. 2, 273-300 (2000). MSC: 94A62 PDFBibTeX XMLCite \textit{R. Gennaro} et al., J. Cryptology 13, No. 2, 273--300 (2000; Zbl 1059.94022) Full Text: DOI