dblp.uni-trier.dewww.uni-trier.de

Rosario Gennaro

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2008
73 Steven M. Bellovin, Rosario Gennaro, Angelos D. Keromytis, Moti Yung: Applied Cryptography and Network Security, 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings ACNS 2008
72EERosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin, Steffen Reidt, Stephen D. Wolthusen: Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs. ESORICS 2008: 49-65
71EERosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin: Threshold RSA for Dynamic and Ad-Hoc Groups. EUROCRYPT 2008: 88-107
70EEDario Catalano, Mario Di Raimondo, Dario Fiore, Rosario Gennaro: Off-Line/On-Line Signatures: Theoretical Aspects and Experimental Results. Public Key Cryptography 2008: 101-120
69EERosario Gennaro: Faster and Shorter Password-Authenticated Key Exchange. TCC 2008: 589-606
68EEMasayuki Abe, Rosario Gennaro, Kaoru Kurosawa: Tag-KEM/DEM: A New Framework for Hybrid Encryption. J. Cryptology 21(1): 97-130 (2008)
2007
67EEEmmanuel Bresson, Dario Catalano, Rosario Gennaro: Improved On-Line/Off-Line Threshold Signatures. Public Key Cryptography 2007: 217-232
66EERosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin: Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. J. Cryptology 20(1): 51-83 (2007)
65EERosario Gennaro, Tal Rabin, Stanislaw Jarecki, Hugo Krawczyk: Robust and Efficient Sharing of RSA Functions. J. Cryptology 20(3): 393 (2007)
64EERosario Gennaro, Tal Rabin, Hugo Krawczyk: RSA-Based Undeniable Signatures. J. Cryptology 20(3): 394 (2007)
63EEDario Catalano, Rosario Gennaro: Cramer-Damgård signatures revisited: Efficient flat-tree signatures based on factoring. Theor. Comput. Sci. 370(1-3): 186-200 (2007)
2006
62EEMario Di Raimondo, Rosario Gennaro, Hugo Krawczyk: Deniable authentication and key exchange. ACM Conference on Computer and Communications Security 2006: 400-409
61EERosario Gennaro, Silvio Micali: Independent Zero-Knowledge Sets. ICALP (2) 2006: 34-45
60EERosario Gennaro, Yehuda Lindell: A framework for password-based authenticated key exchange1. ACM Trans. Inf. Syst. Secur. 9(2): 181-234 (2006)
59EERosario Gennaro: Randomness in Cryptography. IEEE Security & Privacy 4(2): 64-67 (2006)
58EEMario Di Raimondo, Rosario Gennaro: Provably secure threshold password-authenticated key exchange. J. Comput. Syst. Sci. 72(6): 978-1001 (2006)
2005
57EEMario Di Raimondo, Rosario Gennaro: New approaches for deniable authentication. ACM Conference on Computer and Communications Security 2005: 112-121
56EEMasayuki Abe, Rosario Gennaro, Kaoru Kurosawa, Victor Shoup: Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM. EUROCRYPT 2005: 128-146
55EEDario Catalano, Rosario Gennaro: Cramer-Damgård Signatures Revisited: Efficient Flat-Tree Signatures Based on Factoring. Public Key Cryptography 2005: 313-327
54EEMario Di Raimondo, Rosario Gennaro, Hugo Krawczyk: Secure off-the-record messaging. WPES 2005: 81-89
53EERosario Gennaro, Mario Di Raimondo: Secure multiplication of shared secrets in the exponent. Inf. Process. Lett. 96(2): 71-79 (2005)
52EERosario Gennaro: An Improved Pseudo-Random Generator Based on the Discrete Logarithm Problem. J. Cryptology 18(2): 91-110 (2005)
51EERosario Gennaro, Yael Gertner, Jonathan Katz, Luca Trevisan: Bounds on the Efficiency of Generic Cryptographic Constructions. SIAM J. Comput. 35(1): 217-246 (2005)
2004
50EERosario Gennaro, Darren Leigh, Ravi Sundaram, William S. Yerazunis: Batching Schnorr Identification Scheme with Applications to Privacy-Preserving Authorization and Low-Bandwidth Communication Devices. ASIACRYPT 2004: 276-292
49EERosario Gennaro: Multi-trapdoor Commitments and Their Applications to Proofs of Knowledge Secure Under Concurrent Man-in-the-Middle Attacks. CRYPTO 2004: 220-236
48EEYevgeniy Dodis, Rosario Gennaro, Johan Håstad, Hugo Krawczyk, Tal Rabin: Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes. CRYPTO 2004: 494-510
47EERosario Gennaro, Hugo Krawczyk, Tal Rabin: Secure Hashed Diffie-Hellman over Non-DDH Groups. EUROCRYPT 2004: 361-381
46EERosario Gennaro, Anna Lysyanskaya, Tal Malkin, Silvio Micali, Tal Rabin: Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering. TCC 2004: 258-277
2003
45EERosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin: Secure Applications of Pedersen's Distributed Key Generation Protocol. CT-RSA 2003: 373-390
44EEMario Di Raimondo, Rosario Gennaro: Provably Secure Threshold Password-Authenticated Key Exchange. EUROCRYPT 2003: 507-523
43EERosario Gennaro, Yehuda Lindell: A Framework for Password-Based Authenticated Key Exchange. EUROCRYPT 2003: 524-543
42EERosario Gennaro, Yael Gertner, Jonathan Katz: Lower bounds on the efficiency of encryption and digital signature schemes. STOC 2003: 417-425
2002
41EERosario Gennaro, Yuval Ishai, Eyal Kushilevitz, Tal Rabin: On 2-Round Secure Multiparty Computation. CRYPTO 2002: 178-193
40EERosario Gennaro, Daniele Micciancio: Cryptanalysis of a Pseudorandom Generator Based on Braid Groups. EUROCRYPT 2002: 1-13
39EERosario Gennaro: Cryptographic Algorithms for Multimedia Traffic. FOSAD 2002: 186-206
38EEVictor Shoup, Rosario Gennaro: Securing Threshold Cryptosystems against Chosen Ciphertext Attack. J. Cryptology 15(2): 75-96 (2002)
37EEDario Catalano, Rosario Gennaro, Nick Howgrave-Graham: Paillier's Trapdoor Function Hides up to O(n) Bits. J. Cryptology 15(4): 251-269 (2002)
2001
36EEDario Catalano, Rosario Gennaro, Nick Howgrave-Graham, Phong Q. Nguyen: Paillier's cryptosystem revisited. ACM Conference on Computer and Communications Security 2001: 206-214
35EENick Howgrave-Graham, Joan G. Dyer, Rosario Gennaro: Pseudo-random Number Generation on the IBM 4758 Secure Crypto Coprocessor. CHES 2001: 93-102
34EEDario Catalano, Rosario Gennaro, Nick Howgrave-Graham: The Bit Security of Paillier's Encryption Scheme and Its Applications. EUROCRYPT 2001: 229-243
33EERosario Gennaro, Yuval Ishai, Eyal Kushilevitz, Tal Rabin: The round complexity of verifiable secret sharing and secure multicast. STOC 2001: 580-589
32 Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin: Robust Threshold DSS Signatures. Inf. Comput. 164(1): 54-84 (2001)
31 Rosario Gennaro, Pankaj Rohatgi: How to Sign Digital Streams. Inf. Comput. 165(1): 100-116 (2001)
2000
30 Don Coppersmith, Rosario Gennaro, Shai Halevi, Charanjit S. Jutla, Stephen M. Matyas, Mohammad Peyravian, David Safford, Nevenko Zunic: IBM Comments. AES Candidate Conference 2000: 333-336
29EERosario Gennaro: An Improved Pseudo-random Generator Based on Discrete Log. CRYPTO 2000: 469-481
28EEDario Catalano, Rosario Gennaro, Shai Halevi: Computing Inverses over a Shared Secret Modulus. EUROCRYPT 2000: 190-206
27 Rosario Gennaro, Luca Trevisan: Lower Bounds on the Efficiency of Generic Cryptographic Constructions. FOCS 2000: 305-313
26EERosario Gennaro, Luca Trevisan: Lower Bounds on the Efficiency of Generic Cryptographic Constructions Electronic Colloquium on Computational Complexity (ECCC) 7(22): (2000)
25EERosario Gennaro: A Protocol to Achieve Independence in Constant Rounds. IEEE Trans. Parallel Distrib. Syst. 11(7): 636-647 (2000)
24 Dario Catalano, Rosario Gennaro: New Efficient and Secure Protocols for Verifiable Signature Sharing and Other Applications. J. Comput. Syst. Sci. 61(1): 51-80 (2000)
23EERosario Gennaro, Tal Rabin, Stanislaw Jarecki, Hugo Krawczyk: Robust and Efficient Sharing of RSA Functions. J. Cryptology 13(2): 273-300 (2000)
22EERosario Gennaro, Tal Rabin, Hugo Krawczyk: RSA-Based Undeniable Signatures. J. Cryptology 13(4): 397-416 (2000)
21EEJuan A. Garay, Rosario Gennaro, Charanjit S. Jutla, Tal Rabin: Secure distributed storage and retrieval. Theor. Comput. Sci. 243(1-2): 363-389 (2000)
1999
20EERan Canetti, Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin: Adaptive Security for Threshold Cryptosystems. CRYPTO 1999: 98-115
19EERosario Gennaro, Shai Halevi, Tal Rabin: Secure Hash-and-Sign Signatures Without the Random Oracle. EUROCRYPT 1999: 123-139
18EERosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin: Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. EUROCRYPT 1999: 295-310
17 Sebastiano Battiato, Dario Catalano, Giovanni Gallo, Rosario Gennaro: Robust Watermarking for Images Based on Color Manipulation. Information Hiding 1999: 302-317
1998
16EERosario Gennaro, Daniele Micciancio, Tal Rabin: An Efficient Non-Interactive Statistical Zero-Knowledge Proof System for Quasi-Safe Prime Products. ACM Conference on Computer and Communications Security 1998: 67-72
15EEDario Catalano, Rosario Gennaro: New Efficient and Secure Protocols for Verifiable Signature Sharing and Other Applications. CRYPTO 1998: 105-120
14EEVictor Shoup, Rosario Gennaro: Securing Threshold Cryptosystems against Chosen Ciphertext Attack. EUROCRYPT 1998: 1-16
13EERosario Gennaro, Michael O. Rabin, Tal Rabin: Simplified VSS and Fact-Track Multiparty Computations with Applications to Threshold Cryptography. PODC 1998: 101-111
1997
12EERosario Gennaro, Hugo Krawczyk, Tal Rabin: RSA-Based Undeniable Signatures. CRYPTO 1997: 132-149
11EERosario Gennaro, Pankaj Rohatgi: How to Sign Digital Streams. CRYPTO 1997: 180-197
10EERonald Cramer, Rosario Gennaro, Berry Schoenmakers: A Secure and Optimally Efficient Multi-Authority Election Scheme. EUROCRYPT 1997: 103-118
9 Juan A. Garay, Rosario Gennaro, Charanjit S. Jutla, Tal Rabin: Secure Distributed Storage and Retrieval. WDAG 1997: 275-289
8EERosario Gennaro, Paul A. Karger, Stephen M. Matyas, Mohammad Peyravian, Allen Roginsky, David Safford, Michael Willett, Nevenko Zunic: Two-phase cryptographic key recovery system. Computers & Security 16(6): 481-506 (1997)
1996
7 Giuseppa Carrà Ferro, Giovanni Gallo, Rosario Gennaro: Probabilistic Verification of Elementary Geometry Statements. Automated Deduction in Geometry 1996: 87-101
6EERosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin: Robust and Efficient Sharing of RSA Functions. CRYPTO 1996: 157-172
5EERosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin: Robust Threshold DSS Signatures. EUROCRYPT 1996: 354-371
4 Ran Canetti, Rosario Gennaro: Incoercible Multiparty Computation (extended abstract). FOCS 1996: 504-513
1995
3EEScott E. Decatur, Rosario Gennaro: On Learning from Noisy and Incomplete Examples. COLT 1995: 353-360
2EERosario Gennaro, Silvio Micali: Verifiable Secret Sharing as Secure Computation. EUROCRYPT 1995: 168-182
1 Rosario Gennaro: Achieving Independence Efficiently and Securely. PODC 1995: 130-136

Coauthor Index

1Masayuki Abe [56] [68]
2Sebastiano Battiato [17]
3Steven M. Bellovin [73]
4Emmanuel Bresson [67]
5Ran Canetti [4] [20]
6Dario Catalano [15] [17] [24] [28] [34] [36] [37] [55] [63] [67] [70]
7Don Coppersmith [30]
8Ronald Cramer [10]
9Scott E. Decatur [3]
10Yevgeniy Dodis [48]
11Joan G. Dyer [35]
12Giuseppa Carrà Ferro [7]
13Dario Fiore [70]
14Giovanni Gallo [7] [17]
15Juan A. Garay [9] [21]
16Yael Gertner [42] [51]
17Shai Halevi [19] [28] [30] [71] [72]
18Johan Håstad [48]
19Nick Howgrave-Graham [34] [35] [36] [37]
20Yuval Ishai [33] [41]
21Stanislaw Jarecki [5] [6] [18] [20] [23] [32] [45] [65] [66]
22Charanjit S. Jutla [9] [21] [30]
23Paul A. Karger [8]
24Jonathan Katz [42] [51]
25Angelos D. Keromytis [73]
26Hugo Krawczyk [5] [6] [12] [18] [20] [22] [23] [32] [45] [47] [48] [54] [62] [64] [65] [66] [71] [72]
27Kaoru Kurosawa [56] [68]
28Eyal Kushilevitz [33] [41]
29Darren Leigh [50]
30Yehuda Lindell (Andrew Y. Lindell) [43] [60]
31Anna Lysyanskaya [46]
32Tal Malkin [46]
33Stephen M. Matyas [8] [30]
34Silvio Micali [2] [46] [61]
35Daniele Micciancio [16] [40]
36Phong Q. Nguyen [36]
37Mohammad Peyravian [8] [30]
38Michael O. Rabin [13]
39Tal Rabin [5] [6] [9] [12] [13] [16] [18] [19] [20] [21] [22] [23] [32] [33] [41] [45] [46] [47] [48] [64] [65] [66] [71] [72]
40Mario Di Raimondo [44] [53] [54] [57] [58] [62] [70]
41Steffen Reidt [72]
42Allen Roginsky [8]
43Pankaj Rohatgi [11] [31]
44David Safford [8] [30]
45Berry Schoenmakers [10]
46Victor Shoup [14] [38] [56]
47Ravi Sundaram [50]
48Luca Trevisan [26] [27] [51]
49Michael Willett [8]
50Stephen D. Wolthusen [72]
51William S. Yerazunis [50]
52Moti Yung (Mordechai M. Yung) [73]
53Nevenko Zunic [8] [30]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)