The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Rosario Gennaro: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Giuseppa Carrà Ferro, Giovanni Gallo, Rosario Gennaro
    Probabilistic Verification of Elementary Geometry Statements. [Citation Graph (0, 0)][DBLP]
    Automated Deduction in Geometry, 1996, pp:87-101 [Conf]
  2. Don Coppersmith, Rosario Gennaro, Shai Halevi, Charanjit S. Jutla, Stephen M. Matyas, Mohammad Peyravian, David Safford, Nevenko Zunic
    IBM Comments. [Citation Graph (0, 0)][DBLP]
    AES Candidate Conference, 2000, pp:333-336 [Conf]
  3. Rosario Gennaro, Darren Leigh, Ravi Sundaram, William S. Yerazunis
    Batching Schnorr Identification Scheme with Applications to Privacy-Preserving Authorization and Low-Bandwidth Communication Devices. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:276-292 [Conf]
  4. Dario Catalano, Rosario Gennaro, Nick Howgrave-Graham, Phong Q. Nguyen
    Paillier's cryptosystem revisited. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2001, pp:206-214 [Conf]
  5. Rosario Gennaro, Daniele Micciancio, Tal Rabin
    An Efficient Non-Interactive Statistical Zero-Knowledge Proof System for Quasi-Safe Prime Products. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1998, pp:67-72 [Conf]
  6. Mario Di Raimondo, Rosario Gennaro
    New approaches for deniable authentication. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:112-121 [Conf]
  7. Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk
    Deniable authentication and key exchange. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:400-409 [Conf]
  8. Nick Howgrave-Graham, Joan G. Dyer, Rosario Gennaro
    Pseudo-random Number Generation on the IBM 4758 Secure Crypto Coprocessor. [Citation Graph (0, 0)][DBLP]
    CHES, 2001, pp:93-102 [Conf]
  9. Scott E. Decatur, Rosario Gennaro
    On Learning from Noisy and Incomplete Examples. [Citation Graph (0, 0)][DBLP]
    COLT, 1995, pp:353-360 [Conf]
  10. Ran Canetti, Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin
    Adaptive Security for Threshold Cryptosystems. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:98-115 [Conf]
  11. Dario Catalano, Rosario Gennaro
    New Efficient and Secure Protocols for Verifiable Signature Sharing and Other Applications. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1998, pp:105-120 [Conf]
  12. Yevgeniy Dodis, Rosario Gennaro, Johan Håstad, Hugo Krawczyk, Tal Rabin
    Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2004, pp:494-510 [Conf]
  13. Rosario Gennaro
    An Improved Pseudo-random Generator Based on Discrete Log. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2000, pp:469-481 [Conf]
  14. Rosario Gennaro
    Multi-trapdoor Commitments and Their Applications to Proofs of Knowledge Secure Under Concurrent Man-in-the-Middle Attacks. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2004, pp:220-236 [Conf]
  15. Rosario Gennaro, Yuval Ishai, Eyal Kushilevitz, Tal Rabin
    On 2-Round Secure Multiparty Computation. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2002, pp:178-193 [Conf]
  16. Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin
    Robust and Efficient Sharing of RSA Functions. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1996, pp:157-172 [Conf]
  17. Rosario Gennaro, Hugo Krawczyk, Tal Rabin
    RSA-Based Undeniable Signatures. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1997, pp:132-149 [Conf]
  18. Rosario Gennaro, Pankaj Rohatgi
    How to Sign Digital Streams. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1997, pp:180-197 [Conf]
  19. Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin
    Secure Applications of Pedersen's Distributed Key Generation Protocol. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2003, pp:373-390 [Conf]
  20. Masayuki Abe, Rosario Gennaro, Kaoru Kurosawa, Victor Shoup
    Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2005, pp:128-146 [Conf]
  21. Ronald Cramer, Rosario Gennaro, Berry Schoenmakers
    A Secure and Optimally Efficient Multi-Authority Election Scheme. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1997, pp:103-118 [Conf]
  22. Dario Catalano, Rosario Gennaro, Shai Halevi
    Computing Inverses over a Shared Secret Modulus. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2000, pp:190-206 [Conf]
  23. Dario Catalano, Rosario Gennaro, Nick Howgrave-Graham
    The Bit Security of Paillier's Encryption Scheme and Its Applications. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2001, pp:229-243 [Conf]
  24. Rosario Gennaro, Shai Halevi, Tal Rabin
    Secure Hash-and-Sign Signatures Without the Random Oracle. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1999, pp:123-139 [Conf]
  25. Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin
    Robust Threshold DSS Signatures. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1996, pp:354-371 [Conf]
  26. Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin
    Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1999, pp:295-310 [Conf]
  27. Rosario Gennaro, Hugo Krawczyk, Tal Rabin
    Secure Hashed Diffie-Hellman over Non-DDH Groups. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:361-381 [Conf]
  28. Rosario Gennaro, Yehuda Lindell
    A Framework for Password-Based Authenticated Key Exchange. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2003, pp:524-543 [Conf]
  29. Rosario Gennaro, Daniele Micciancio
    Cryptanalysis of a Pseudorandom Generator Based on Braid Groups. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:1-13 [Conf]
  30. Rosario Gennaro, Silvio Micali
    Verifiable Secret Sharing as Secure Computation. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1995, pp:168-182 [Conf]
  31. Mario Di Raimondo, Rosario Gennaro
    Provably Secure Threshold Password-Authenticated Key Exchange. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2003, pp:507-523 [Conf]
  32. Victor Shoup, Rosario Gennaro
    Securing Threshold Cryptosystems against Chosen Ciphertext Attack. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:1-16 [Conf]
  33. Ran Canetti, Rosario Gennaro
    Incoercible Multiparty Computation (extended abstract). [Citation Graph (0, 0)][DBLP]
    FOCS, 1996, pp:504-513 [Conf]
  34. Rosario Gennaro, Luca Trevisan
    Lower Bounds on the Efficiency of Generic Cryptographic Constructions. [Citation Graph (0, 0)][DBLP]
    FOCS, 2000, pp:305-313 [Conf]
  35. Rosario Gennaro
    Cryptographic Algorithms for Multimedia Traffic. [Citation Graph (0, 0)][DBLP]
    FOSAD, 2002, pp:186-206 [Conf]
  36. Rosario Gennaro, Silvio Micali
    Independent Zero-Knowledge Sets. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:34-45 [Conf]
  37. Sebastiano Battiato, Dario Catalano, Giovanni Gallo, Rosario Gennaro
    Robust Watermarking for Images Based on Color Manipulation. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1999, pp:302-317 [Conf]
  38. Dario Catalano, Rosario Gennaro
    Cramer-Damgård Signatures Revisited: Efficient Flat-Tree Signatures Based on Factoring. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2005, pp:313-327 [Conf]
  39. Rosario Gennaro
    Achieving Independence Efficiently and Securely. [Citation Graph (0, 0)][DBLP]
    PODC, 1995, pp:130-136 [Conf]
  40. Rosario Gennaro, Michael O. Rabin, Tal Rabin
    Simplified VSS and Fact-Track Multiparty Computations with Applications to Threshold Cryptography. [Citation Graph (0, 0)][DBLP]
    PODC, 1998, pp:101-111 [Conf]
  41. Rosario Gennaro, Yael Gertner, Jonathan Katz
    Lower bounds on the efficiency of encryption and digital signature schemes. [Citation Graph (0, 0)][DBLP]
    STOC, 2003, pp:417-425 [Conf]
  42. Rosario Gennaro, Yuval Ishai, Eyal Kushilevitz, Tal Rabin
    The round complexity of verifiable secret sharing and secure multicast. [Citation Graph (0, 0)][DBLP]
    STOC, 2001, pp:580-589 [Conf]
  43. Rosario Gennaro, Anna Lysyanskaya, Tal Malkin, Silvio Micali, Tal Rabin
    Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering. [Citation Graph (0, 0)][DBLP]
    TCC, 2004, pp:258-277 [Conf]
  44. Juan A. Garay, Rosario Gennaro, Charanjit S. Jutla, Tal Rabin
    Secure Distributed Storage and Retrieval. [Citation Graph (0, 0)][DBLP]
    WDAG, 1997, pp:275-289 [Conf]
  45. Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk
    Secure off-the-record messaging. [Citation Graph (0, 0)][DBLP]
    WPES, 2005, pp:81-89 [Conf]
  46. Rosario Gennaro, Paul A. Karger, Stephen M. Matyas, Mohammad Peyravian, Allen Roginsky, David Safford, Michael Willett, Nevenko Zunic
    Two-phase cryptographic key recovery system. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1997, v:16, n:6, pp:481-506 [Journal]
  47. Rosario Gennaro, Luca Trevisan
    Lower Bounds on the Efficiency of Generic Cryptographic Constructions [Citation Graph (0, 0)][DBLP]
    Electronic Colloquium on Computational Complexity (ECCC), 2000, v:7, n:22, pp:- [Journal]
  48. Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin
    Robust Threshold DSS Signatures. [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 2001, v:164, n:1, pp:54-84 [Journal]
  49. Rosario Gennaro, Pankaj Rohatgi
    How to Sign Digital Streams. [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 2001, v:165, n:1, pp:100-116 [Journal]
  50. Rosario Gennaro
    Randomness in Cryptography. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2006, v:4, n:2, pp:64-67 [Journal]
  51. Rosario Gennaro, Mario Di Raimondo
    Secure multiplication of shared secrets in the exponent. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2005, v:96, n:2, pp:71-79 [Journal]
  52. Dario Catalano, Rosario Gennaro
    New Efficient and Secure Protocols for Verifiable Signature Sharing and Other Applications. [Citation Graph (0, 0)][DBLP]
    J. Comput. Syst. Sci., 2000, v:61, n:1, pp:51-80 [Journal]
  53. Mario Di Raimondo, Rosario Gennaro
    Provably secure threshold password-authenticated key exchange. [Citation Graph (0, 0)][DBLP]
    J. Comput. Syst. Sci., 2006, v:72, n:6, pp:978-1001 [Journal]
  54. Rosario Gennaro
    An Improved Pseudo-Random Generator Based on the Discrete Logarithm Problem. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2005, v:18, n:2, pp:91-110 [Journal]
  55. Rosario Gennaro, Tal Rabin, Stanislaw Jarecki, Hugo Krawczyk
    Robust and Efficient Sharing of RSA Functions. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2000, v:13, n:2, pp:273-300 [Journal]
  56. Rosario Gennaro, Tal Rabin, Hugo Krawczyk
    RSA-Based Undeniable Signatures. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2000, v:13, n:4, pp:397-416 [Journal]
  57. Dario Catalano, Rosario Gennaro, Nick Howgrave-Graham
    Paillier's Trapdoor Function Hides up to O(n) Bits. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2002, v:15, n:4, pp:251-269 [Journal]
  58. Victor Shoup, Rosario Gennaro
    Securing Threshold Cryptosystems against Chosen Ciphertext Attack. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2002, v:15, n:2, pp:75-96 [Journal]
  59. Rosario Gennaro, Yael Gertner, Jonathan Katz, Luca Trevisan
    Bounds on the Efficiency of Generic Cryptographic Constructions. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 2005, v:35, n:1, pp:217-246 [Journal]
  60. Juan A. Garay, Rosario Gennaro, Charanjit S. Jutla, Tal Rabin
    Secure distributed storage and retrieval. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2000, v:243, n:1-2, pp:363-389 [Journal]
  61. Dario Catalano, Rosario Gennaro
    Cramer-Damgård signatures revisited: Efficient flat-tree signatures based on factoring. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2007, v:370, n:1-3, pp:186-200 [Journal]
  62. Rosario Gennaro, Yehuda Lindell
    A framework for password-based authenticated key exchange1. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2006, v:9, n:2, pp:181-234 [Journal]
  63. Rosario Gennaro
    A Protocol to Achieve Independence in Constant Rounds. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 2000, v:11, n:7, pp:636-647 [Journal]
  64. Emmanuel Bresson, Dario Catalano, Rosario Gennaro
    Improved On-Line/Off-Line Threshold Signatures. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:217-232 [Conf]
  65. Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin
    Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2007, v:20, n:1, pp:51-83 [Journal]
  66. Rosario Gennaro, Tal Rabin, Stanislaw Jarecki, Hugo Krawczyk
    Robust and Efficient Sharing of RSA Functions. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2007, v:20, n:3, pp:393- [Journal]
  67. Rosario Gennaro, Tal Rabin, Hugo Krawczyk
    RSA-Based Undeniable Signatures. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2007, v:20, n:3, pp:394- [Journal]

  68. Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead. [Citation Graph (, )][DBLP]


  69. Certificateless onion routing. [Citation Graph (, )][DBLP]


  70. Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers. [Citation Graph (, )][DBLP]


  71. Making the Diffie-Hellman Protocol Identity-Based. [Citation Graph (, )][DBLP]


  72. Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs. [Citation Graph (, )][DBLP]


  73. Threshold RSA for Dynamic and Ad-Hoc Groups. [Citation Graph (, )][DBLP]


  74. Off-Line/On-Line Signatures: Theoretical Aspects and Experimental Results. [Citation Graph (, )][DBLP]


  75. Secure Network Coding over the Integers. [Citation Graph (, )][DBLP]


  76. Text Search Protocols with Simulation Based Security. [Citation Graph (, )][DBLP]


  77. More on Key Wrapping. [Citation Graph (, )][DBLP]


  78. Faster and Shorter Password-Authenticated Key Exchange. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.457secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002