Edit Profile Gennaro, Rosario Compute Distance To: Compute Author ID: gennaro.rosario Published as: Gennaro, R.; Gennaro, Rosario Documents Indexed: 85 Publications since 1995, including 6 Books all top 5 Co-Authors 6 single-authored 21 Rabin, Tal 16 Krawczyk, Hugo 13 Catalano, Dario 8 Jarecki, Stanisław 6 Fiore, Dario 5 Di Raimondo, Mario 4 Halevi, Shai 4 Shoup, Victor 3 Campanelli, Matteo 3 Fazio, Nelly 3 Garay, Juan A. 3 Goldfeder, Steven 3 Howgrave-Graham, Nick A. 3 Katz, Jonathan N. 3 Kurosawa, Kaoru 3 Micali, Silvio 2 Abe, Masayuki 2 Boneh, Dan 2 Gentry, Craig 2 Gertner, Yael 2 Hazay, Carmit 2 Ishai, Yuval 2 Kushilevitz, Eyal 2 Malkin, Tal G. 2 Parno, Bryan 2 Robshaw, Matthew J. B. 2 Rohatgi, Pankaj 2 Sorensen, Jeffrey S. 2 Vamvourellis, Konstantinos 1 Alwen, Joël 1 Ames, Scott 1 Barbosa, Manuel 1 Bellovin, Steven M. 1 Benabbas, Siavosh 1 Bresson, Emmanuel 1 Canetti, Ran 1 Carrà Ferro, Giuseppa 1 Dachman-Soled, Dana 1 Desmedt, Yvo G. 1 Dodis, Yevgeniy 1 Dyer, Joan 1 Farshim, Pooya 1 Gallo, Giovanni 1 Gordon, S. Dov 1 Håstad, Johan Torkel 1 Jafarikhah, Tahereh 1 Jain, Aayush 1 Jutla, Charanjit S. 1 Keromytis, Angelos D. 1 Kim, Sam-Tae 1 Leigh, D. C. F. 1 Lindell, Yehuda 1 Lysyanskaya, Anna 1 Micciancio, Daniele 1 Narayanan, Arvind 1 Nicolosi, Antonio R. 1 Nizzardo, Luca 1 Perera, Irippuge Milinda 1 Rabin, Michael O. 1 Rasmussen, Peter Michael Reichstein 1 Raykova, Mariana 1 Sahai, Amit 1 Skeith III., William E. 1 Skeith, William E. III 1 Smart, Nigel P. 1 Sundaram, Ravi 1 Tessaro, Stefano 1 Trevisan, Luca 1 Vahlis, Yevgeniy 1 Venkitasubramaniam, Muthuramakrishnan 1 Wichs, Daniel 1 Wilson, David A. 1 Yerazunis, W. 1 Yung, Moti all top 5 Serials 10 Journal of Cryptology 6 Lecture Notes in Computer Science 3 Theoretical Computer Science 2 Journal of Computer and System Sciences 2 Information and Computation 1 Information Processing Letters 1 SIAM Journal on Computing all top 5 Fields 78 Information and communication theory, circuits (94-XX) 37 Computer science (68-XX) 6 General and overarching topics; collections (00-XX) 2 Algebraic geometry (14-XX) 2 Group theory and generalizations (20-XX) 2 Game theory, economics, finance, and other social and behavioral sciences (91-XX) 1 Mathematical logic and foundations (03-XX) 1 Number theory (11-XX) 1 Numerical analysis (65-XX) Publications by Year all cited Publications top 5 cited Publications Citations contained in zbMATH 70 Publications have been cited 581 times in 407 Documents Cited by ▼ Year ▼ Non-interactive verifiable computing: outsourcing computation to untrusted workers. Zbl 1284.68065Gennaro, Rosario; Gentry, Craig; Parno, Bryan 46 2010 Secure hash-and-sign signatures without the random oracle. Zbl 1038.94533Gennaro, Rosario; Halevi, Shai; Rabin, Tal 30 1999 Verifiable delegation of computation over large datasets. Zbl 1288.68159Benabbas, Siavosh; Gennaro, Rosario; Vahlis, Yevgeniy 27 2011 A framework for password-based authenticated key exchange. Zbl 1038.94534Gennaro, Rosario; Lindell, Yehuda 24 2003 Algorithmic tamper-proof (ATP) security: Theoretical foundations for security against hardware tampering. Zbl 1197.94187Gennaro, Rosario; Lysyanskaya, Anna; Malkin, Tal; Micali, Silvio; Rabin, Tal 21 2004 Quadratic span programs and succinct NIZKs without PCPs. Zbl 1300.94056Gennaro, Rosario; Gentry, Craig; Parno, Bryan; Raykova, Mariana 20 2013 Multi-trapdoor commitments and their applications to proofs of knowledge secure under concurrent man-in-the-middle attacks. Zbl 1104.94050Gennaro, Rosario 20 2004 Secure distributed key generation for discrete-log based cryptosystems. Zbl 0931.94021Gennaro, Rosario; Jarecki, Stanisław; Krawczyk, Hugo; Rabin, Tal 20 1999 Securing threshold cryptosystems against chosen ciphertext attack. Zbl 0919.94031Shoup, Victor; Gennaro, Rosario 20 1998 Bounds on the efficiency of generic cryptographic constructions. Zbl 1087.94019Gennaro, Rosario; Gertner, Yael; Katz, Jonathan; Trevisan, Luca 17 2005 Secure distributed key generation for discrete-log based cryptosystems. Zbl 1115.68075Gennaro, Rosario; Jarecki, Stanislaw; Krawczyk, Hugo; Rabin, Tal 16 2007 Robust threshold DSS signatures. Zbl 1304.94101Gennaro, Rosario; Jarecki, Stanisław; Krawczyk, Hugo; Rabin, Tal 16 1996 Adaptive security for threshold cryptosystems. Zbl 0972.94031Canetti, Ran; Gennaro, Rosario; Jarecki, Stanisław; Krawczyk, Hugo; Rabin, Tal 15 1999 Secure network coding over the integers. Zbl 1279.94075Gennaro, Rosario; Katz, Jonathan; Krawczyk, Hugo; Rabin, Tal 13 2010 Tag-KEM/DEM: A new framework for hybrid encryption and a new analysis of Kurosawa-Desmedt KEM. Zbl 1137.94336Abe, Masayuki; Gennaro, Rosario; Kurosawa, Kaoru; Shoup, Victor 13 2005 The round complexity of verifiable secret sharing and secure multicast. Zbl 1317.68072Gennaro, Rosario; Ishai, Yuval; Kushilevitz, Eyal; Rabin, Tal 13 2001 Simplified VSS and fast-track multiparty computations with applications to threshold cryptography. Zbl 1333.94036Gennaro, Rosario; Rabin, Michael O.; Rabin, Tal 13 1998 Robust threshold DSS signatures. Zbl 1021.94527Gennaro, Rosario; Jarecki, Stanisław; Krawczyk, Hugo; Rabin, Tal 12 2001 RSA-based undeniable signatures. Zbl 1106.94314Gennaro, Rosario; Rabin, Tal; Krawczyk, Hugo 12 2000 Robust and efficient sharing of RSA functions. Zbl 1329.94060Gennaro, Rosario; Jarecki, Stanisław; Krawczyk, Hugo; Rabin, Tal 12 1996 Randomness extraction and key derivation using the CBC, cascade and HMAC modes. Zbl 1104.68470Dodis, Yevgeniy; Gennaro, Rosario; Håstad, Johan; Krawczyk, Hugo; Rabin, Tal 11 2004 Securing threshold cryptosystems against chosen ciphertext attack. Zbl 0997.94016Shoup, Victor; Gennaro, Rosario 11 2002 Fully homomorphic message authenticators. Zbl 1326.94126Gennaro, Rosario; Wichs, Daniel 10 2013 Tag-KEM/DEM: A new framework for hybrid encryption. Zbl 1147.68498Abe, Masayuki; Gennaro, Rosario; Kurosawa, Kaoru 10 2008 Robust and efficient sharing of RSA functions. Zbl 1059.94022Gennaro, Rosario; Rabin, Tal; Jarecki, Stanislav; Krawczyk, Hugo 9 2000 Independent zero-knowledge sets. Zbl 1133.94344Gennaro, Rosario; Micali, Silvio 8 2006 An improved pseudo-random generator based on discrete log. Zbl 0989.68508Gennaro, Rosario 8 2000 Algebraic (Trapdoor) one-way functions and their applications. Zbl 1315.94065Catalano, Dario; Fiore, Dario; Gennaro, Rosario; Vamvourellis, Konstantinos 7 2013 Making the Diffie-Hellman protocol identity-based. Zbl 1272.94030Fiore, Dario; Gennaro, Rosario 7 2010 Secure hashed Diffie-Hellman over non-DDH groups. Zbl 1122.94418Gennaro, Rosario; Krawczyk, Hugo; Rabin, Tal 7 2004 Okamoto-Tanaka revisited: fully authenticated Diffie-Hellman with minimal overhead. Zbl 1350.94034Gennaro, Rosario; Krawczyk, Hugo; Rabin, Tal 6 2010 Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part II. Zbl 1319.94003Gennaro, Rosario (ed.); Robshaw, Matthew (ed.) 5 2015 Generalizing homomorphic MACs for arithmetic circuits. Zbl 1335.94036Catalano, Dario; Fiore, Dario; Gennaro, Rosario; Nizzardo, Luca 5 2014 New approaches for deniable authentication. Zbl 1178.94187Di Raimondo, Mario; Gennaro, Rosario 5 2009 An improved pseudo-random generator based on the discrete logarithm problem. Zbl 1084.68046Gennaro, Rosario 5 2005 The bit security of Paillier’s encryption scheme and its applications. Zbl 0981.94016Catalano, Dario; Gennaro, Rosario; Howgrave-Graham, Nick 5 2001 Text search protocols with simulation based security. Zbl 1281.94025Gennaro, Rosario; Hazay, Carmit; Sorensen, Jeffrey S. 4 2010 Off-line/On-line signatures: Theoretical aspects and experimental results. Zbl 1162.94344Catalano, Dario; Di Raimondo, Mario; Fiore, Dario; Gennaro, Rosario 4 2008 Improved on-line/off-line threshold signatures. Zbl 1127.94021Bresson, Emmanuel; Catalano, Dario; Gennaro, Rosario 4 2007 Secure distributed storage and retrieval. Zbl 0944.68055Garay, J. A.; Gennaro, R.; Jutla, C.; Rabin, T. 4 2000 How to sign digital streams. Zbl 0884.68047Gennaro, Rosario; Rohatgi, Pankaj 4 1997 RSA-based undeniable signatures. Zbl 0886.94007Gennaro, Rosario; Krawczyk, Hugo; Rabin, Tal 4 1997 Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part I. Zbl 1319.94002Gennaro, Rosario (ed.); Robshaw, Matthew (ed.) 3 2015 On the relationship between functional encryption, obfuscation, and fully homomorphic encryption. Zbl 1317.94080Alwen, Joël; Barbosa, Manuel; Farshim, Pooya; Gennaro, Rosario; Gordon, S. Dov; Tessaro, Stefano; Wilson, David A. 3 2013 Faster and shorter password-authenticated key exchange. Zbl 1162.94360Gennaro, Rosario 3 2008 Cramer-Damgård signatures revisited: Efficient flat-tree signatures based on factoring. Zbl 1081.94547Catalano, Dario; Gennaro, Rosario 3 2005 Secure applications of Pedersen’s distributed key generation protocol. Zbl 1039.94516Gennaro, Rosario; Jarecki, Stanisław; Krawczyk, Hugo; Rabin, Tal 3 2003 Paillier’s trapdoor function hides up to \(O(n)\) bits. Zbl 1024.94008Catalano, Dario; Gennaro, Rosario; Howgrave-Graham, Nick 3 2002 How to sign digital streams. Zbl 1013.94018Gennaro, Rosario; Rohatgi, Pankaj 3 2001 Verifiable secret sharing as secure computation. Zbl 0973.94543Gennaro, Rosario; Micali, Silvio 3 1995 Algebraic (trapdoor) one-way functions: constructions and applications. Zbl 1397.94053Catalano, Dario; Fiore, Dario; Gennaro, Rosario; Vamvourellis, Konstantinos 2 2015 Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part I. Zbl 1292.94002Garay, Juan A. (ed.); Gennaro, Rosario (ed.) 2 2014 Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part II. Zbl 1292.94001Garay, Juan A. (ed.); Gennaro, Rosario (ed.) 2 2014 Hard-core predicates for a Diffie-Hellman problem over finite fields. Zbl 1316.94071Fazio, Nelly; Gennaro, Rosario; Perera, Irippuge Milinda; Skeith, William E. III 2 2013 Computational extractors and pseudorandomness. Zbl 1304.68136Dachman-Soled, Dana; Gennaro, Rosario; Krawczyk, Hugo; Malkin, Tal 2 2012 Constructing certificateless encryption and ID-based encryption from ID-based key agreement. Zbl 1252.94062Fiore, Dario; Gennaro, Rosario; Smart, Nigel P. 2 2010 A new and improved paradigm for hybrid encryption secure against chosen-ciphertext attack. Zbl 1191.94087Desmedt, Yvo; Gennaro, Rosario; Kurosawa, Kaoru; Shoup, Victor 2 2010 More on key wrapping. Zbl 1267.94061Gennaro, Rosario; Halevi, Shai 2 2009 Threshold RSA for dynamic and ad-hoc groups. Zbl 1149.94316Gennaro, Rosario; Halevi, Shai; Krawczyk, Hugo; Rabin, Tal 2 2008 Provably secure threshold password-authenticated key exchange. Zbl 1100.68571Di Raimondo, Mario; Gennaro, Rosario 2 2006 Batching Schnorr identification scheme with applications to privacy-preserving authorization and low-bandwidth communication devices. Zbl 1094.94527Gennaro, R.; Leigh, D.; Sundaram, R.; Yerazunis, W. 2 2004 Lower bounds on the efficiency of encryption and digital signature schemes. Zbl 1192.94095Gennaro, Rosario; Gertner, Yael; Katz, Jonathan 2 2003 On 2-round secure multiparty computation. Zbl 1026.94527Gennaro, Rosario; Ishai, Yuval; Kushilevitz, Eyal; Rabin, Tal 2 2002 Achieving independence efficiently and securely. Zbl 1373.68098Gennaro, Rosario 2 1995 Homomorphic secret sharing from Paillier encryption. Zbl 1439.94082Fazio, Nelly; Gennaro, Rosario; Jafarikhah, Tahereh; Skeith III., William E. 1 2017 Threshold-optimal DSA/ECDSA signatures and an application to bitcoin wallet security. Zbl 1346.94143Gennaro, Rosario; Goldfeder, Steven; Narayanan, Arvind 1 2016 The generalized randomized iterate and its application to new efficient constructions of uowhfs from regular one-way functions. Zbl 1292.94019Ames, Scott; Gennaro, Rosario; Venkitasubramaniam, Muthuramakrishnan 1 2012 Provably secure threshold password authenticated key exchange. Zbl 1038.94527Di Raimondo, Mario; Gennaro, Rosario 1 2003 Pseudo-random number generation on the IBM 4758 secure crypto coprocessor. Zbl 1006.68711Howgrave-Graham, Nick; Dyer, Joan; Gennaro, Rosario 1 2001 Computing inverses over a shared secret modulus. Zbl 1082.94538Catalano, Dario; Gennaro, Rosario; Halevi, Shai 1 2000 Homomorphic secret sharing from Paillier encryption. Zbl 1439.94082Fazio, Nelly; Gennaro, Rosario; Jafarikhah, Tahereh; Skeith III., William E. 1 2017 Threshold-optimal DSA/ECDSA signatures and an application to bitcoin wallet security. Zbl 1346.94143Gennaro, Rosario; Goldfeder, Steven; Narayanan, Arvind 1 2016 Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part II. Zbl 1319.94003Gennaro, Rosario (ed.); Robshaw, Matthew (ed.) 5 2015 Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part I. Zbl 1319.94002Gennaro, Rosario (ed.); Robshaw, Matthew (ed.) 3 2015 Algebraic (trapdoor) one-way functions: constructions and applications. Zbl 1397.94053Catalano, Dario; Fiore, Dario; Gennaro, Rosario; Vamvourellis, Konstantinos 2 2015 Generalizing homomorphic MACs for arithmetic circuits. Zbl 1335.94036Catalano, Dario; Fiore, Dario; Gennaro, Rosario; Nizzardo, Luca 5 2014 Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part I. Zbl 1292.94002Garay, Juan A. (ed.); Gennaro, Rosario (ed.) 2 2014 Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part II. Zbl 1292.94001Garay, Juan A. (ed.); Gennaro, Rosario (ed.) 2 2014 Quadratic span programs and succinct NIZKs without PCPs. Zbl 1300.94056Gennaro, Rosario; Gentry, Craig; Parno, Bryan; Raykova, Mariana 20 2013 Fully homomorphic message authenticators. Zbl 1326.94126Gennaro, Rosario; Wichs, Daniel 10 2013 Algebraic (Trapdoor) one-way functions and their applications. Zbl 1315.94065Catalano, Dario; Fiore, Dario; Gennaro, Rosario; Vamvourellis, Konstantinos 7 2013 On the relationship between functional encryption, obfuscation, and fully homomorphic encryption. Zbl 1317.94080Alwen, Joël; Barbosa, Manuel; Farshim, Pooya; Gennaro, Rosario; Gordon, S. Dov; Tessaro, Stefano; Wilson, David A. 3 2013 Hard-core predicates for a Diffie-Hellman problem over finite fields. Zbl 1316.94071Fazio, Nelly; Gennaro, Rosario; Perera, Irippuge Milinda; Skeith, William E. III 2 2013 Computational extractors and pseudorandomness. Zbl 1304.68136Dachman-Soled, Dana; Gennaro, Rosario; Krawczyk, Hugo; Malkin, Tal 2 2012 The generalized randomized iterate and its application to new efficient constructions of uowhfs from regular one-way functions. Zbl 1292.94019Ames, Scott; Gennaro, Rosario; Venkitasubramaniam, Muthuramakrishnan 1 2012 Verifiable delegation of computation over large datasets. Zbl 1288.68159Benabbas, Siavosh; Gennaro, Rosario; Vahlis, Yevgeniy 27 2011 Non-interactive verifiable computing: outsourcing computation to untrusted workers. Zbl 1284.68065Gennaro, Rosario; Gentry, Craig; Parno, Bryan 46 2010 Secure network coding over the integers. Zbl 1279.94075Gennaro, Rosario; Katz, Jonathan; Krawczyk, Hugo; Rabin, Tal 13 2010 Making the Diffie-Hellman protocol identity-based. Zbl 1272.94030Fiore, Dario; Gennaro, Rosario 7 2010 Okamoto-Tanaka revisited: fully authenticated Diffie-Hellman with minimal overhead. Zbl 1350.94034Gennaro, Rosario; Krawczyk, Hugo; Rabin, Tal 6 2010 Text search protocols with simulation based security. Zbl 1281.94025Gennaro, Rosario; Hazay, Carmit; Sorensen, Jeffrey S. 4 2010 Constructing certificateless encryption and ID-based encryption from ID-based key agreement. Zbl 1252.94062Fiore, Dario; Gennaro, Rosario; Smart, Nigel P. 2 2010 A new and improved paradigm for hybrid encryption secure against chosen-ciphertext attack. Zbl 1191.94087Desmedt, Yvo; Gennaro, Rosario; Kurosawa, Kaoru; Shoup, Victor 2 2010 New approaches for deniable authentication. Zbl 1178.94187Di Raimondo, Mario; Gennaro, Rosario 5 2009 More on key wrapping. Zbl 1267.94061Gennaro, Rosario; Halevi, Shai 2 2009 Tag-KEM/DEM: A new framework for hybrid encryption. Zbl 1147.68498Abe, Masayuki; Gennaro, Rosario; Kurosawa, Kaoru 10 2008 Off-line/On-line signatures: Theoretical aspects and experimental results. Zbl 1162.94344Catalano, Dario; Di Raimondo, Mario; Fiore, Dario; Gennaro, Rosario 4 2008 Faster and shorter password-authenticated key exchange. Zbl 1162.94360Gennaro, Rosario 3 2008 Threshold RSA for dynamic and ad-hoc groups. Zbl 1149.94316Gennaro, Rosario; Halevi, Shai; Krawczyk, Hugo; Rabin, Tal 2 2008 Secure distributed key generation for discrete-log based cryptosystems. Zbl 1115.68075Gennaro, Rosario; Jarecki, Stanislaw; Krawczyk, Hugo; Rabin, Tal 16 2007 Improved on-line/off-line threshold signatures. Zbl 1127.94021Bresson, Emmanuel; Catalano, Dario; Gennaro, Rosario 4 2007 Independent zero-knowledge sets. Zbl 1133.94344Gennaro, Rosario; Micali, Silvio 8 2006 Provably secure threshold password-authenticated key exchange. Zbl 1100.68571Di Raimondo, Mario; Gennaro, Rosario 2 2006 Bounds on the efficiency of generic cryptographic constructions. Zbl 1087.94019Gennaro, Rosario; Gertner, Yael; Katz, Jonathan; Trevisan, Luca 17 2005 Tag-KEM/DEM: A new framework for hybrid encryption and a new analysis of Kurosawa-Desmedt KEM. Zbl 1137.94336Abe, Masayuki; Gennaro, Rosario; Kurosawa, Kaoru; Shoup, Victor 13 2005 An improved pseudo-random generator based on the discrete logarithm problem. Zbl 1084.68046Gennaro, Rosario 5 2005 Cramer-Damgård signatures revisited: Efficient flat-tree signatures based on factoring. Zbl 1081.94547Catalano, Dario; Gennaro, Rosario 3 2005 Algorithmic tamper-proof (ATP) security: Theoretical foundations for security against hardware tampering. Zbl 1197.94187Gennaro, Rosario; Lysyanskaya, Anna; Malkin, Tal; Micali, Silvio; Rabin, Tal 21 2004 Multi-trapdoor commitments and their applications to proofs of knowledge secure under concurrent man-in-the-middle attacks. Zbl 1104.94050Gennaro, Rosario 20 2004 Randomness extraction and key derivation using the CBC, cascade and HMAC modes. Zbl 1104.68470Dodis, Yevgeniy; Gennaro, Rosario; Håstad, Johan; Krawczyk, Hugo; Rabin, Tal 11 2004 Secure hashed Diffie-Hellman over non-DDH groups. Zbl 1122.94418Gennaro, Rosario; Krawczyk, Hugo; Rabin, Tal 7 2004 Batching Schnorr identification scheme with applications to privacy-preserving authorization and low-bandwidth communication devices. Zbl 1094.94527Gennaro, R.; Leigh, D.; Sundaram, R.; Yerazunis, W. 2 2004 A framework for password-based authenticated key exchange. Zbl 1038.94534Gennaro, Rosario; Lindell, Yehuda 24 2003 Secure applications of Pedersen’s distributed key generation protocol. Zbl 1039.94516Gennaro, Rosario; Jarecki, Stanisław; Krawczyk, Hugo; Rabin, Tal 3 2003 Lower bounds on the efficiency of encryption and digital signature schemes. Zbl 1192.94095Gennaro, Rosario; Gertner, Yael; Katz, Jonathan 2 2003 Provably secure threshold password authenticated key exchange. Zbl 1038.94527Di Raimondo, Mario; Gennaro, Rosario 1 2003 Securing threshold cryptosystems against chosen ciphertext attack. Zbl 0997.94016Shoup, Victor; Gennaro, Rosario 11 2002 Paillier’s trapdoor function hides up to \(O(n)\) bits. Zbl 1024.94008Catalano, Dario; Gennaro, Rosario; Howgrave-Graham, Nick 3 2002 On 2-round secure multiparty computation. Zbl 1026.94527Gennaro, Rosario; Ishai, Yuval; Kushilevitz, Eyal; Rabin, Tal 2 2002 The round complexity of verifiable secret sharing and secure multicast. Zbl 1317.68072Gennaro, Rosario; Ishai, Yuval; Kushilevitz, Eyal; Rabin, Tal 13 2001 Robust threshold DSS signatures. Zbl 1021.94527Gennaro, Rosario; Jarecki, Stanisław; Krawczyk, Hugo; Rabin, Tal 12 2001 The bit security of Paillier’s encryption scheme and its applications. Zbl 0981.94016Catalano, Dario; Gennaro, Rosario; Howgrave-Graham, Nick 5 2001 How to sign digital streams. Zbl 1013.94018Gennaro, Rosario; Rohatgi, Pankaj 3 2001 Pseudo-random number generation on the IBM 4758 secure crypto coprocessor. Zbl 1006.68711Howgrave-Graham, Nick; Dyer, Joan; Gennaro, Rosario 1 2001 RSA-based undeniable signatures. Zbl 1106.94314Gennaro, Rosario; Rabin, Tal; Krawczyk, Hugo 12 2000 Robust and efficient sharing of RSA functions. Zbl 1059.94022Gennaro, Rosario; Rabin, Tal; Jarecki, Stanislav; Krawczyk, Hugo 9 2000 An improved pseudo-random generator based on discrete log. Zbl 0989.68508Gennaro, Rosario 8 2000 Secure distributed storage and retrieval. Zbl 0944.68055Garay, J. A.; Gennaro, R.; Jutla, C.; Rabin, T. 4 2000 Computing inverses over a shared secret modulus. Zbl 1082.94538Catalano, Dario; Gennaro, Rosario; Halevi, Shai 1 2000 Secure hash-and-sign signatures without the random oracle. Zbl 1038.94533Gennaro, Rosario; Halevi, Shai; Rabin, Tal 30 1999 Secure distributed key generation for discrete-log based cryptosystems. Zbl 0931.94021Gennaro, Rosario; Jarecki, Stanisław; Krawczyk, Hugo; Rabin, Tal 20 1999 Adaptive security for threshold cryptosystems. Zbl 0972.94031Canetti, Ran; Gennaro, Rosario; Jarecki, Stanisław; Krawczyk, Hugo; Rabin, Tal 15 1999 Securing threshold cryptosystems against chosen ciphertext attack. Zbl 0919.94031Shoup, Victor; Gennaro, Rosario 20 1998 Simplified VSS and fast-track multiparty computations with applications to threshold cryptography. Zbl 1333.94036Gennaro, Rosario; Rabin, Michael O.; Rabin, Tal 13 1998 How to sign digital streams. Zbl 0884.68047Gennaro, Rosario; Rohatgi, Pankaj 4 1997 RSA-based undeniable signatures. Zbl 0886.94007Gennaro, Rosario; Krawczyk, Hugo; Rabin, Tal 4 1997 Robust threshold DSS signatures. Zbl 1304.94101Gennaro, Rosario; Jarecki, Stanisław; Krawczyk, Hugo; Rabin, Tal 16 1996 Robust and efficient sharing of RSA functions. Zbl 1329.94060Gennaro, Rosario; Jarecki, Stanisław; Krawczyk, Hugo; Rabin, Tal 12 1996 Verifiable secret sharing as secure computation. Zbl 0973.94543Gennaro, Rosario; Micali, Silvio 3 1995 Achieving independence efficiently and securely. Zbl 1373.68098Gennaro, Rosario 2 1995 all cited Publications top 5 cited Publications all top 5 Cited by 766 Authors 12 Susilo, Willy 11 Gennaro, Rosario 10 Catalano, Dario 10 Hofheinz, Dennis 10 Mu, Yi 8 Hanaoka, Goichiro 8 Kiltz, Eike 8 Venturi, Daniele 8 Yung, Moti 7 Chen, Xiaofeng 7 Herranz, Javier 7 Libert, Benoît 7 Yang, Guomin 6 Canetti, Ran 6 Cao, Zhenfu 6 Fiore, Dario 6 Hazay, Carmit 6 Katz, Jonathan N. 6 Zhang, Fangguo 5 Abe, Masayuki 5 Chen, Rongmao 5 Chevalier, Céline 5 Chiesa, Alessandro 5 Guo, Fuchun 5 Joye, Marc 5 Li, Jin 5 Patra, Arpita 5 Rabin, Tal 5 Segev, Gil 4 Abdalla, Michel 4 Albrecht, Martin R. 4 Asharov, Gilad 4 Boneh, Dan 4 Boyen, Xavier 4 Camenisch, Jan L. 4 Chen, Kefei 4 Choudhary, Ashish 4 Di Raimondo, Mario 4 Gu, Dawu 4 Ishai, Yuval 4 Kim, Kwangjo 4 Kurosawa, Kaoru 4 Lindell, Yehuda 4 Liu, Shengli 4 Ma, Jianfeng 4 Mohassel, Payman 4 Nielsen, Jesper Buus 4 Pointcheval, David 4 Reyzin, Leonid 4 Sáez, Germán 4 Safavi-Naini, Reihaneh 4 Tian, Haibo 4 Tromer, Eran 4 Vaikuntanathan, Vinod 4 Wu, Qianhong 3 Bellare, Mihir 3 Ben-Sasson, Eli 3 Bitansky, Nir 3 Brakerski, Zvika 3 Cash, David M. 3 Damgård, Ivan Bjerre 3 Desmedt, Yvo G. 3 Di Crescenzo, Giovanni 3 Dinur, Itai 3 Dodis, Yevgeniy 3 Emura, Keita 3 Farshim, Pooya 3 Faust, Sebastian 3 Fischlin, Marc 3 Fujisaki, Eiichiro 3 He, Debiao 3 Hohenberger, Susan 3 Holmgren, Justin 3 Huang, Xinyi 3 Juang, Wen-Shenq 3 Kaya, Kamer 3 Kunihiro, Noboru 3 Li, Xiangxue 3 Lin, Dongdai 3 Long, Yu 3 Matsuda, Takahiro 3 Mitchell, John C. 3 Nizzardo, Luca 3 Peters, Thomas J. 3 Pieprzyk, Josef P. 3 Ruiz, Alexandre 3 Sahai, Amit 3 Scedrov, Andre 3 Selçuk, Ali Aydın 3 Shoup, Victor 3 Steinwandt, Rainer 3 Warinschi, Bogdan 3 Waters, Brent 3 Wei, Baodian 3 Weng, Jian 3 Wong, Duncan S. 3 Wu, David J. 3 Xu, Qiuliang 3 Xue, Rui 3 Yamada, Shota ...and 666 more Authors all top 5 Cited in 53 Serials 53 Journal of Cryptology 29 Designs, Codes and Cryptography 27 Information Sciences 26 Theoretical Computer Science 11 Journal of Computer and System Sciences 9 Information and Computation 7 Information Processing Letters 7 SIAM Journal on Computing 6 Applied Mathematics and Computation 5 Algorithmica 4 Distributed Computing 4 Journal of Mathematical Cryptology 3 Journal of Parallel and Distributed Computing 3 Applicable Algebra in Engineering, Communication and Computing 3 Soft Computing 3 Wuhan University Journal of Natural Sciences (WUJNS) 3 Science China. Information Sciences 2 Computers & Mathematics with Applications 2 Journal of Systems Science and Complexity 2 Science in China. Series F 2 Journal of Shanghai Jiaotong University (Science) 2 Journal of Zhejiang University. Science A 1 ACM Computing Surveys 1 Discrete Applied Mathematics 1 Mathematics of Computation 1 Journal of Computational and Applied Mathematics 1 Journal of Number Theory 1 Journal of Complexity 1 Journal of Computer Science and Technology 1 Journal of Automated Reasoning 1 Mathematical and Computer Modelling 1 MSCS. Mathematical Structures in Computer Science 1 International Journal of Foundations of Computer Science 1 Cybernetics and Systems Analysis 1 Computational Complexity 1 Finite Fields and their Applications 1 Computational & Mathematical Organization Theory 1 Mathematical Problems in Engineering 1 Theory of Computing Systems 1 Nonlinear Dynamics 1 Chicago Journal of Theoretical Computer Science 1 Interdisciplinary Information Sciences (IIS) 1 International Journal of Applied Mathematics and Computer Science 1 The Journal of Logic and Algebraic Programming 1 Electronic Commerce Research 1 1 Journal of Discrete Algorithms 1 Mathematics in Computer Science 1 Advances in Mathematics of Communications 1 Cryptography and Communications 1 RAIRO. Theoretical Informatics and Applications 1 Symmetry 1 Frontiers of Computer Science all top 5 Cited in 11 Fields 371 Information and communication theory, circuits (94-XX) 141 Computer science (68-XX) 17 Number theory (11-XX) 7 Game theory, economics, finance, and other social and behavioral sciences (91-XX) 4 Algebraic geometry (14-XX) 4 Numerical analysis (65-XX) 3 Group theory and generalizations (20-XX) 3 Quantum theory (81-XX) 1 Combinatorics (05-XX) 1 Dynamical systems and ergodic theory (37-XX) 1 Operations research, mathematical programming (90-XX) Citations by Year