Search the dblp DataBase
Rosario Gennaro :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Giuseppa Carrà Ferro , Giovanni Gallo , Rosario Gennaro Probabilistic Verification of Elementary Geometry Statements. [Citation Graph (0, 0)][DBLP ] Automated Deduction in Geometry, 1996, pp:87-101 [Conf ] Don Coppersmith , Rosario Gennaro , Shai Halevi , Charanjit S. Jutla , Stephen M. Matyas , Mohammad Peyravian , David Safford , Nevenko Zunic IBM Comments. [Citation Graph (0, 0)][DBLP ] AES Candidate Conference, 2000, pp:333-336 [Conf ] Rosario Gennaro , Darren Leigh , Ravi Sundaram , William S. Yerazunis Batching Schnorr Identification Scheme with Applications to Privacy-Preserving Authorization and Low-Bandwidth Communication Devices. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2004, pp:276-292 [Conf ] Dario Catalano , Rosario Gennaro , Nick Howgrave-Graham , Phong Q. Nguyen Paillier's cryptosystem revisited. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2001, pp:206-214 [Conf ] Rosario Gennaro , Daniele Micciancio , Tal Rabin An Efficient Non-Interactive Statistical Zero-Knowledge Proof System for Quasi-Safe Prime Products. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1998, pp:67-72 [Conf ] Mario Di Raimondo , Rosario Gennaro New approaches for deniable authentication. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2005, pp:112-121 [Conf ] Mario Di Raimondo , Rosario Gennaro , Hugo Krawczyk Deniable authentication and key exchange. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:400-409 [Conf ] Nick Howgrave-Graham , Joan G. Dyer , Rosario Gennaro Pseudo-random Number Generation on the IBM 4758 Secure Crypto Coprocessor. [Citation Graph (0, 0)][DBLP ] CHES, 2001, pp:93-102 [Conf ] Scott E. Decatur , Rosario Gennaro On Learning from Noisy and Incomplete Examples. [Citation Graph (0, 0)][DBLP ] COLT, 1995, pp:353-360 [Conf ] Ran Canetti , Rosario Gennaro , Stanislaw Jarecki , Hugo Krawczyk , Tal Rabin Adaptive Security for Threshold Cryptosystems. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1999, pp:98-115 [Conf ] Dario Catalano , Rosario Gennaro New Efficient and Secure Protocols for Verifiable Signature Sharing and Other Applications. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1998, pp:105-120 [Conf ] Yevgeniy Dodis , Rosario Gennaro , Johan Håstad , Hugo Krawczyk , Tal Rabin Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2004, pp:494-510 [Conf ] Rosario Gennaro An Improved Pseudo-random Generator Based on Discrete Log. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2000, pp:469-481 [Conf ] Rosario Gennaro Multi-trapdoor Commitments and Their Applications to Proofs of Knowledge Secure Under Concurrent Man-in-the-Middle Attacks. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2004, pp:220-236 [Conf ] Rosario Gennaro , Yuval Ishai , Eyal Kushilevitz , Tal Rabin On 2-Round Secure Multiparty Computation. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2002, pp:178-193 [Conf ] Rosario Gennaro , Stanislaw Jarecki , Hugo Krawczyk , Tal Rabin Robust and Efficient Sharing of RSA Functions. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1996, pp:157-172 [Conf ] Rosario Gennaro , Hugo Krawczyk , Tal Rabin RSA-Based Undeniable Signatures. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1997, pp:132-149 [Conf ] Rosario Gennaro , Pankaj Rohatgi How to Sign Digital Streams. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1997, pp:180-197 [Conf ] Rosario Gennaro , Stanislaw Jarecki , Hugo Krawczyk , Tal Rabin Secure Applications of Pedersen's Distributed Key Generation Protocol. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2003, pp:373-390 [Conf ] Masayuki Abe , Rosario Gennaro , Kaoru Kurosawa , Victor Shoup Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2005, pp:128-146 [Conf ] Ronald Cramer , Rosario Gennaro , Berry Schoenmakers A Secure and Optimally Efficient Multi-Authority Election Scheme. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1997, pp:103-118 [Conf ] Dario Catalano , Rosario Gennaro , Shai Halevi Computing Inverses over a Shared Secret Modulus. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2000, pp:190-206 [Conf ] Dario Catalano , Rosario Gennaro , Nick Howgrave-Graham The Bit Security of Paillier's Encryption Scheme and Its Applications. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2001, pp:229-243 [Conf ] Rosario Gennaro , Shai Halevi , Tal Rabin Secure Hash-and-Sign Signatures Without the Random Oracle. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1999, pp:123-139 [Conf ] Rosario Gennaro , Stanislaw Jarecki , Hugo Krawczyk , Tal Rabin Robust Threshold DSS Signatures. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1996, pp:354-371 [Conf ] Rosario Gennaro , Stanislaw Jarecki , Hugo Krawczyk , Tal Rabin Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1999, pp:295-310 [Conf ] Rosario Gennaro , Hugo Krawczyk , Tal Rabin Secure Hashed Diffie-Hellman over Non-DDH Groups. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2004, pp:361-381 [Conf ] Rosario Gennaro , Yehuda Lindell A Framework for Password-Based Authenticated Key Exchange. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2003, pp:524-543 [Conf ] Rosario Gennaro , Daniele Micciancio Cryptanalysis of a Pseudorandom Generator Based on Braid Groups. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2002, pp:1-13 [Conf ] Rosario Gennaro , Silvio Micali Verifiable Secret Sharing as Secure Computation. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1995, pp:168-182 [Conf ] Mario Di Raimondo , Rosario Gennaro Provably Secure Threshold Password-Authenticated Key Exchange. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2003, pp:507-523 [Conf ] Victor Shoup , Rosario Gennaro Securing Threshold Cryptosystems against Chosen Ciphertext Attack. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1998, pp:1-16 [Conf ] Ran Canetti , Rosario Gennaro Incoercible Multiparty Computation (extended abstract). [Citation Graph (0, 0)][DBLP ] FOCS, 1996, pp:504-513 [Conf ] Rosario Gennaro , Luca Trevisan Lower Bounds on the Efficiency of Generic Cryptographic Constructions. [Citation Graph (0, 0)][DBLP ] FOCS, 2000, pp:305-313 [Conf ] Rosario Gennaro Cryptographic Algorithms for Multimedia Traffic. [Citation Graph (0, 0)][DBLP ] FOSAD, 2002, pp:186-206 [Conf ] Rosario Gennaro , Silvio Micali Independent Zero-Knowledge Sets. [Citation Graph (0, 0)][DBLP ] ICALP (2), 2006, pp:34-45 [Conf ] Sebastiano Battiato , Dario Catalano , Giovanni Gallo , Rosario Gennaro Robust Watermarking for Images Based on Color Manipulation. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1999, pp:302-317 [Conf ] Dario Catalano , Rosario Gennaro Cramer-Damgård Signatures Revisited: Efficient Flat-Tree Signatures Based on Factoring. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2005, pp:313-327 [Conf ] Rosario Gennaro Achieving Independence Efficiently and Securely. [Citation Graph (0, 0)][DBLP ] PODC, 1995, pp:130-136 [Conf ] Rosario Gennaro , Michael O. Rabin , Tal Rabin Simplified VSS and Fact-Track Multiparty Computations with Applications to Threshold Cryptography. [Citation Graph (0, 0)][DBLP ] PODC, 1998, pp:101-111 [Conf ] Rosario Gennaro , Yael Gertner , Jonathan Katz Lower bounds on the efficiency of encryption and digital signature schemes. [Citation Graph (0, 0)][DBLP ] STOC, 2003, pp:417-425 [Conf ] Rosario Gennaro , Yuval Ishai , Eyal Kushilevitz , Tal Rabin The round complexity of verifiable secret sharing and secure multicast. [Citation Graph (0, 0)][DBLP ] STOC, 2001, pp:580-589 [Conf ] Rosario Gennaro , Anna Lysyanskaya , Tal Malkin , Silvio Micali , Tal Rabin Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering. [Citation Graph (0, 0)][DBLP ] TCC, 2004, pp:258-277 [Conf ] Juan A. Garay , Rosario Gennaro , Charanjit S. Jutla , Tal Rabin Secure Distributed Storage and Retrieval. [Citation Graph (0, 0)][DBLP ] WDAG, 1997, pp:275-289 [Conf ] Mario Di Raimondo , Rosario Gennaro , Hugo Krawczyk Secure off-the-record messaging. [Citation Graph (0, 0)][DBLP ] WPES, 2005, pp:81-89 [Conf ] Rosario Gennaro , Paul A. Karger , Stephen M. Matyas , Mohammad Peyravian , Allen Roginsky , David Safford , Michael Willett , Nevenko Zunic Two-phase cryptographic key recovery system. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1997, v:16, n:6, pp:481-506 [Journal ] Rosario Gennaro , Luca Trevisan Lower Bounds on the Efficiency of Generic Cryptographic Constructions [Citation Graph (0, 0)][DBLP ] Electronic Colloquium on Computational Complexity (ECCC), 2000, v:7, n:22, pp:- [Journal ] Rosario Gennaro , Stanislaw Jarecki , Hugo Krawczyk , Tal Rabin Robust Threshold DSS Signatures. [Citation Graph (0, 0)][DBLP ] Inf. Comput., 2001, v:164, n:1, pp:54-84 [Journal ] Rosario Gennaro , Pankaj Rohatgi How to Sign Digital Streams. [Citation Graph (0, 0)][DBLP ] Inf. Comput., 2001, v:165, n:1, pp:100-116 [Journal ] Rosario Gennaro Randomness in Cryptography. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2006, v:4, n:2, pp:64-67 [Journal ] Rosario Gennaro , Mario Di Raimondo Secure multiplication of shared secrets in the exponent. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 2005, v:96, n:2, pp:71-79 [Journal ] Dario Catalano , Rosario Gennaro New Efficient and Secure Protocols for Verifiable Signature Sharing and Other Applications. [Citation Graph (0, 0)][DBLP ] J. Comput. Syst. Sci., 2000, v:61, n:1, pp:51-80 [Journal ] Mario Di Raimondo , Rosario Gennaro Provably secure threshold password-authenticated key exchange. [Citation Graph (0, 0)][DBLP ] J. Comput. Syst. Sci., 2006, v:72, n:6, pp:978-1001 [Journal ] Rosario Gennaro An Improved Pseudo-Random Generator Based on the Discrete Logarithm Problem. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 2005, v:18, n:2, pp:91-110 [Journal ] Rosario Gennaro , Tal Rabin , Stanislaw Jarecki , Hugo Krawczyk Robust and Efficient Sharing of RSA Functions. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 2000, v:13, n:2, pp:273-300 [Journal ] Rosario Gennaro , Tal Rabin , Hugo Krawczyk RSA-Based Undeniable Signatures. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 2000, v:13, n:4, pp:397-416 [Journal ] Dario Catalano , Rosario Gennaro , Nick Howgrave-Graham Paillier's Trapdoor Function Hides up to O (n ) Bits. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 2002, v:15, n:4, pp:251-269 [Journal ] Victor Shoup , Rosario Gennaro Securing Threshold Cryptosystems against Chosen Ciphertext Attack. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 2002, v:15, n:2, pp:75-96 [Journal ] Rosario Gennaro , Yael Gertner , Jonathan Katz , Luca Trevisan Bounds on the Efficiency of Generic Cryptographic Constructions. [Citation Graph (0, 0)][DBLP ] SIAM J. Comput., 2005, v:35, n:1, pp:217-246 [Journal ] Juan A. Garay , Rosario Gennaro , Charanjit S. Jutla , Tal Rabin Secure distributed storage and retrieval. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 2000, v:243, n:1-2, pp:363-389 [Journal ] Dario Catalano , Rosario Gennaro Cramer-Damgård signatures revisited: Efficient flat-tree signatures based on factoring. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 2007, v:370, n:1-3, pp:186-200 [Journal ] Rosario Gennaro , Yehuda Lindell A framework for password-based authenticated key exchange1 . [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2006, v:9, n:2, pp:181-234 [Journal ] Rosario Gennaro A Protocol to Achieve Independence in Constant Rounds. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Parallel Distrib. Syst., 2000, v:11, n:7, pp:636-647 [Journal ] Emmanuel Bresson , Dario Catalano , Rosario Gennaro Improved On-Line/Off-Line Threshold Signatures. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2007, pp:217-232 [Conf ] Rosario Gennaro , Stanislaw Jarecki , Hugo Krawczyk , Tal Rabin Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 2007, v:20, n:1, pp:51-83 [Journal ] Rosario Gennaro , Tal Rabin , Stanislaw Jarecki , Hugo Krawczyk Robust and Efficient Sharing of RSA Functions. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 2007, v:20, n:3, pp:393- [Journal ] Rosario Gennaro , Tal Rabin , Hugo Krawczyk RSA-Based Undeniable Signatures. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 2007, v:20, n:3, pp:394- [Journal ] Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead. [Citation Graph (, )][DBLP ] Certificateless onion routing. [Citation Graph (, )][DBLP ] Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers. [Citation Graph (, )][DBLP ] Making the Diffie-Hellman Protocol Identity-Based. [Citation Graph (, )][DBLP ] Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs. [Citation Graph (, )][DBLP ] Threshold RSA for Dynamic and Ad-Hoc Groups. [Citation Graph (, )][DBLP ] Off-Line/On-Line Signatures: Theoretical Aspects and Experimental Results. [Citation Graph (, )][DBLP ] Secure Network Coding over the Integers. [Citation Graph (, )][DBLP ] Text Search Protocols with Simulation Based Security. [Citation Graph (, )][DBLP ] More on Key Wrapping. [Citation Graph (, )][DBLP ] Faster and Shorter Password-Authenticated Key Exchange. [Citation Graph (, )][DBLP ] Search in 0.004secs, Finished in 0.457secs