Stefano Tessaro
Stefano Tessaro
Geverifieerd e-mailadres voor cs.washington.edu - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Semantic security for the wiretap channel
M Bellare, S Tessaro, A Vardy
Annual Cryptology Conference, 294-311, 2012
1632012
Optimal resilience for erasure-coded Byzantine distributed storage
C Cachin, S Tessaro
International Conference on Dependable Systems and Networks (DSN'06), 115-124, 2006
1422006
The locality of searchable symmetric encryption
D Cash, S Tessaro
Annual international conference on the theory and applications of …, 2014
1062014
Obfuscation of probabilistic circuits and applications
R Canetti, H Lin, S Tessaro, V Vaikuntanathan
Theory of Cryptography Conference, 468-497, 2015
1052015
Asynchronous verifiable information dispersal
C Cachin, S Tessaro
24th IEEE Symposium on Reliable Distributed Systems (SRDS'05), 191-201, 2005
1032005
Indistinguishability obfuscation from trilinear maps and block-wise local PRGs
H Lin, S Tessaro
Annual International Cryptology Conference, 630-660, 2017
932017
The equivalence of the random oracle model and the ideal cipher model, revisited
T Holenstein, R Künzler, S Tessaro
Proceedings of the forty-third annual ACM symposium on Theory of computing …, 2011
852011
Pact: Privacy sensitive protocols and mechanisms for mobile contact tracing
J Chan, D Foster, S Gollakota, E Horvitz, J Jaeger, S Kakade, T Kohno, ...
arXiv preprint arXiv:2004.03544, 2020
802020
Random oracles with (out) programmability
M Fischlin, A Lehmann, T Ristenpart, T Shrimpton, M Stam, S Tessaro
International Conference on the Theory and Application of Cryptology and …, 2010
802010
Multi-instance security and its application to password-based cryptography
M Bellare, T Ristenpart, S Tessaro
Annual Cryptology Conference, 312-329, 2012
732012
Taostore: Overcoming asynchronicity in oblivious data storage
C Sahin, V Zakhary, A El Abbadi, H Lin, S Tessaro
2016 IEEE Symposium on Security and Privacy (SP), 198-217, 2016
692016
Scrypt is maximally memory-hard
J Alwen, B Chen, K Pietrzak, L Reyzin, S Tessaro
Annual International Conference on the Theory and Applications of …, 2017
622017
Key-alternating ciphers and key-length extension: exact bounds and multi-user security
VT Hoang, S Tessaro
Annual International Cryptology Conference, 3-32, 2016
622016
A cryptographic treatment of the wiretap channel
M Bellare, S Tessaro, A Vardy
arXiv preprint arXiv:1201.2205, 2012
622012
Communication locality in secure multi-party computation
E Boyle, S Goldwasser, S Tessaro
Theory of Cryptography Conference, 356-376, 2013
592013
To Hash or Not to Hash Again? (In)Differentiability Results for and HMAC
Y Dodis, T Ristenpart, J Steinberger, S Tessaro
Annual Cryptology Conference, 348-366, 2012
572012
Oblivious parallel RAM: improved efficiency and generic constructions
B Chen, H Lin, S Tessaro
Theory of Cryptography Conference, 205-234, 2016
532016
Domain extension of public random functions: Beyond the birthday barrier
U Maurer, S Tessaro
Annual International Cryptology Conference, 187-204, 2007
502007
Information-theoretic indistinguishability via the chi-squared method
W Dai, VT Hoang, S Tessaro
Annual International Cryptology Conference, 497-523, 2017
482017
Poly-many hardcore bits for any one-way function and a framework for differing-inputs obfuscation
M Bellare, I Stepanovs, S Tessaro
International Conference on the Theory and Application of Cryptology and …, 2014
482014
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20