2008 |
73 | | Steven M. Bellovin,
Rosario Gennaro,
Angelos D. Keromytis,
Moti Yung:
Applied Cryptography and Network Security, 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings
ACNS 2008 |
72 | EE | Rosario Gennaro,
Shai Halevi,
Hugo Krawczyk,
Tal Rabin,
Steffen Reidt,
Stephen D. Wolthusen:
Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs.
ESORICS 2008: 49-65 |
71 | EE | Rosario Gennaro,
Shai Halevi,
Hugo Krawczyk,
Tal Rabin:
Threshold RSA for Dynamic and Ad-Hoc Groups.
EUROCRYPT 2008: 88-107 |
70 | EE | Dario Catalano,
Mario Di Raimondo,
Dario Fiore,
Rosario Gennaro:
Off-Line/On-Line Signatures: Theoretical Aspects and Experimental Results.
Public Key Cryptography 2008: 101-120 |
69 | EE | Rosario Gennaro:
Faster and Shorter Password-Authenticated Key Exchange.
TCC 2008: 589-606 |
68 | EE | Masayuki Abe,
Rosario Gennaro,
Kaoru Kurosawa:
Tag-KEM/DEM: A New Framework for Hybrid Encryption.
J. Cryptology 21(1): 97-130 (2008) |
2007 |
67 | EE | Emmanuel Bresson,
Dario Catalano,
Rosario Gennaro:
Improved On-Line/Off-Line Threshold Signatures.
Public Key Cryptography 2007: 217-232 |
66 | EE | Rosario Gennaro,
Stanislaw Jarecki,
Hugo Krawczyk,
Tal Rabin:
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems.
J. Cryptology 20(1): 51-83 (2007) |
65 | EE | Rosario Gennaro,
Tal Rabin,
Stanislaw Jarecki,
Hugo Krawczyk:
Robust and Efficient Sharing of RSA Functions.
J. Cryptology 20(3): 393 (2007) |
64 | EE | Rosario Gennaro,
Tal Rabin,
Hugo Krawczyk:
RSA-Based Undeniable Signatures.
J. Cryptology 20(3): 394 (2007) |
63 | EE | Dario Catalano,
Rosario Gennaro:
Cramer-Damgård signatures revisited: Efficient flat-tree signatures based on factoring.
Theor. Comput. Sci. 370(1-3): 186-200 (2007) |
2006 |
62 | EE | Mario Di Raimondo,
Rosario Gennaro,
Hugo Krawczyk:
Deniable authentication and key exchange.
ACM Conference on Computer and Communications Security 2006: 400-409 |
61 | EE | Rosario Gennaro,
Silvio Micali:
Independent Zero-Knowledge Sets.
ICALP (2) 2006: 34-45 |
60 | EE | Rosario Gennaro,
Yehuda Lindell:
A framework for password-based authenticated key exchange1.
ACM Trans. Inf. Syst. Secur. 9(2): 181-234 (2006) |
59 | EE | Rosario Gennaro:
Randomness in Cryptography.
IEEE Security & Privacy 4(2): 64-67 (2006) |
58 | EE | Mario Di Raimondo,
Rosario Gennaro:
Provably secure threshold password-authenticated key exchange.
J. Comput. Syst. Sci. 72(6): 978-1001 (2006) |
2005 |
57 | EE | Mario Di Raimondo,
Rosario Gennaro:
New approaches for deniable authentication.
ACM Conference on Computer and Communications Security 2005: 112-121 |
56 | EE | Masayuki Abe,
Rosario Gennaro,
Kaoru Kurosawa,
Victor Shoup:
Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM.
EUROCRYPT 2005: 128-146 |
55 | EE | Dario Catalano,
Rosario Gennaro:
Cramer-Damgård Signatures Revisited: Efficient Flat-Tree Signatures Based on Factoring.
Public Key Cryptography 2005: 313-327 |
54 | EE | Mario Di Raimondo,
Rosario Gennaro,
Hugo Krawczyk:
Secure off-the-record messaging.
WPES 2005: 81-89 |
53 | EE | Rosario Gennaro,
Mario Di Raimondo:
Secure multiplication of shared secrets in the exponent.
Inf. Process. Lett. 96(2): 71-79 (2005) |
52 | EE | Rosario Gennaro:
An Improved Pseudo-Random Generator Based on the Discrete Logarithm Problem.
J. Cryptology 18(2): 91-110 (2005) |
51 | EE | Rosario Gennaro,
Yael Gertner,
Jonathan Katz,
Luca Trevisan:
Bounds on the Efficiency of Generic Cryptographic Constructions.
SIAM J. Comput. 35(1): 217-246 (2005) |
2004 |
50 | EE | Rosario Gennaro,
Darren Leigh,
Ravi Sundaram,
William S. Yerazunis:
Batching Schnorr Identification Scheme with Applications to Privacy-Preserving Authorization and Low-Bandwidth Communication Devices.
ASIACRYPT 2004: 276-292 |
49 | EE | Rosario Gennaro:
Multi-trapdoor Commitments and Their Applications to Proofs of Knowledge Secure Under Concurrent Man-in-the-Middle Attacks.
CRYPTO 2004: 220-236 |
48 | EE | Yevgeniy Dodis,
Rosario Gennaro,
Johan Håstad,
Hugo Krawczyk,
Tal Rabin:
Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes.
CRYPTO 2004: 494-510 |
47 | EE | Rosario Gennaro,
Hugo Krawczyk,
Tal Rabin:
Secure Hashed Diffie-Hellman over Non-DDH Groups.
EUROCRYPT 2004: 361-381 |
46 | EE | Rosario Gennaro,
Anna Lysyanskaya,
Tal Malkin,
Silvio Micali,
Tal Rabin:
Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering.
TCC 2004: 258-277 |
2003 |
45 | EE | Rosario Gennaro,
Stanislaw Jarecki,
Hugo Krawczyk,
Tal Rabin:
Secure Applications of Pedersen's Distributed Key Generation Protocol.
CT-RSA 2003: 373-390 |
44 | EE | Mario Di Raimondo,
Rosario Gennaro:
Provably Secure Threshold Password-Authenticated Key Exchange.
EUROCRYPT 2003: 507-523 |
43 | EE | Rosario Gennaro,
Yehuda Lindell:
A Framework for Password-Based Authenticated Key Exchange.
EUROCRYPT 2003: 524-543 |
42 | EE | Rosario Gennaro,
Yael Gertner,
Jonathan Katz:
Lower bounds on the efficiency of encryption and digital signature schemes.
STOC 2003: 417-425 |
2002 |
41 | EE | Rosario Gennaro,
Yuval Ishai,
Eyal Kushilevitz,
Tal Rabin:
On 2-Round Secure Multiparty Computation.
CRYPTO 2002: 178-193 |
40 | EE | Rosario Gennaro,
Daniele Micciancio:
Cryptanalysis of a Pseudorandom Generator Based on Braid Groups.
EUROCRYPT 2002: 1-13 |
39 | EE | Rosario Gennaro:
Cryptographic Algorithms for Multimedia Traffic.
FOSAD 2002: 186-206 |
38 | EE | Victor Shoup,
Rosario Gennaro:
Securing Threshold Cryptosystems against Chosen Ciphertext Attack.
J. Cryptology 15(2): 75-96 (2002) |
37 | EE | Dario Catalano,
Rosario Gennaro,
Nick Howgrave-Graham:
Paillier's Trapdoor Function Hides up to O(n) Bits.
J. Cryptology 15(4): 251-269 (2002) |
2001 |
36 | EE | Dario Catalano,
Rosario Gennaro,
Nick Howgrave-Graham,
Phong Q. Nguyen:
Paillier's cryptosystem revisited.
ACM Conference on Computer and Communications Security 2001: 206-214 |
35 | EE | Nick Howgrave-Graham,
Joan G. Dyer,
Rosario Gennaro:
Pseudo-random Number Generation on the IBM 4758 Secure Crypto Coprocessor.
CHES 2001: 93-102 |
34 | EE | Dario Catalano,
Rosario Gennaro,
Nick Howgrave-Graham:
The Bit Security of Paillier's Encryption Scheme and Its Applications.
EUROCRYPT 2001: 229-243 |
33 | EE | Rosario Gennaro,
Yuval Ishai,
Eyal Kushilevitz,
Tal Rabin:
The round complexity of verifiable secret sharing and secure multicast.
STOC 2001: 580-589 |
32 | | Rosario Gennaro,
Stanislaw Jarecki,
Hugo Krawczyk,
Tal Rabin:
Robust Threshold DSS Signatures.
Inf. Comput. 164(1): 54-84 (2001) |
31 | | Rosario Gennaro,
Pankaj Rohatgi:
How to Sign Digital Streams.
Inf. Comput. 165(1): 100-116 (2001) |
2000 |
30 | | Don Coppersmith,
Rosario Gennaro,
Shai Halevi,
Charanjit S. Jutla,
Stephen M. Matyas,
Mohammad Peyravian,
David Safford,
Nevenko Zunic:
IBM Comments.
AES Candidate Conference 2000: 333-336 |
29 | EE | Rosario Gennaro:
An Improved Pseudo-random Generator Based on Discrete Log.
CRYPTO 2000: 469-481 |
28 | EE | Dario Catalano,
Rosario Gennaro,
Shai Halevi:
Computing Inverses over a Shared Secret Modulus.
EUROCRYPT 2000: 190-206 |
27 | | Rosario Gennaro,
Luca Trevisan:
Lower Bounds on the Efficiency of Generic Cryptographic Constructions.
FOCS 2000: 305-313 |
26 | EE | Rosario Gennaro,
Luca Trevisan:
Lower Bounds on the Efficiency of Generic Cryptographic Constructions
Electronic Colloquium on Computational Complexity (ECCC) 7(22): (2000) |
25 | EE | Rosario Gennaro:
A Protocol to Achieve Independence in Constant Rounds.
IEEE Trans. Parallel Distrib. Syst. 11(7): 636-647 (2000) |
24 | | Dario Catalano,
Rosario Gennaro:
New Efficient and Secure Protocols for Verifiable Signature Sharing and Other Applications.
J. Comput. Syst. Sci. 61(1): 51-80 (2000) |
23 | EE | Rosario Gennaro,
Tal Rabin,
Stanislaw Jarecki,
Hugo Krawczyk:
Robust and Efficient Sharing of RSA Functions.
J. Cryptology 13(2): 273-300 (2000) |
22 | EE | Rosario Gennaro,
Tal Rabin,
Hugo Krawczyk:
RSA-Based Undeniable Signatures.
J. Cryptology 13(4): 397-416 (2000) |
21 | EE | Juan A. Garay,
Rosario Gennaro,
Charanjit S. Jutla,
Tal Rabin:
Secure distributed storage and retrieval.
Theor. Comput. Sci. 243(1-2): 363-389 (2000) |
1999 |
20 | EE | Ran Canetti,
Rosario Gennaro,
Stanislaw Jarecki,
Hugo Krawczyk,
Tal Rabin:
Adaptive Security for Threshold Cryptosystems.
CRYPTO 1999: 98-115 |
19 | EE | Rosario Gennaro,
Shai Halevi,
Tal Rabin:
Secure Hash-and-Sign Signatures Without the Random Oracle.
EUROCRYPT 1999: 123-139 |
18 | EE | Rosario Gennaro,
Stanislaw Jarecki,
Hugo Krawczyk,
Tal Rabin:
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems.
EUROCRYPT 1999: 295-310 |
17 | | Sebastiano Battiato,
Dario Catalano,
Giovanni Gallo,
Rosario Gennaro:
Robust Watermarking for Images Based on Color Manipulation.
Information Hiding 1999: 302-317 |
1998 |
16 | EE | Rosario Gennaro,
Daniele Micciancio,
Tal Rabin:
An Efficient Non-Interactive Statistical Zero-Knowledge Proof System for Quasi-Safe Prime Products.
ACM Conference on Computer and Communications Security 1998: 67-72 |
15 | EE | Dario Catalano,
Rosario Gennaro:
New Efficient and Secure Protocols for Verifiable Signature Sharing and Other Applications.
CRYPTO 1998: 105-120 |
14 | EE | Victor Shoup,
Rosario Gennaro:
Securing Threshold Cryptosystems against Chosen Ciphertext Attack.
EUROCRYPT 1998: 1-16 |
13 | EE | Rosario Gennaro,
Michael O. Rabin,
Tal Rabin:
Simplified VSS and Fact-Track Multiparty Computations with Applications to Threshold Cryptography.
PODC 1998: 101-111 |
1997 |
12 | EE | Rosario Gennaro,
Hugo Krawczyk,
Tal Rabin:
RSA-Based Undeniable Signatures.
CRYPTO 1997: 132-149 |
11 | EE | Rosario Gennaro,
Pankaj Rohatgi:
How to Sign Digital Streams.
CRYPTO 1997: 180-197 |
10 | EE | Ronald Cramer,
Rosario Gennaro,
Berry Schoenmakers:
A Secure and Optimally Efficient Multi-Authority Election Scheme.
EUROCRYPT 1997: 103-118 |
9 | | Juan A. Garay,
Rosario Gennaro,
Charanjit S. Jutla,
Tal Rabin:
Secure Distributed Storage and Retrieval.
WDAG 1997: 275-289 |
8 | EE | Rosario Gennaro,
Paul A. Karger,
Stephen M. Matyas,
Mohammad Peyravian,
Allen Roginsky,
David Safford,
Michael Willett,
Nevenko Zunic:
Two-phase cryptographic key recovery system.
Computers & Security 16(6): 481-506 (1997) |
1996 |
7 | | Giuseppa Carrà Ferro,
Giovanni Gallo,
Rosario Gennaro:
Probabilistic Verification of Elementary Geometry Statements.
Automated Deduction in Geometry 1996: 87-101 |
6 | EE | Rosario Gennaro,
Stanislaw Jarecki,
Hugo Krawczyk,
Tal Rabin:
Robust and Efficient Sharing of RSA Functions.
CRYPTO 1996: 157-172 |
5 | EE | Rosario Gennaro,
Stanislaw Jarecki,
Hugo Krawczyk,
Tal Rabin:
Robust Threshold DSS Signatures.
EUROCRYPT 1996: 354-371 |
4 | | Ran Canetti,
Rosario Gennaro:
Incoercible Multiparty Computation (extended abstract).
FOCS 1996: 504-513 |
1995 |
3 | EE | Scott E. Decatur,
Rosario Gennaro:
On Learning from Noisy and Incomplete Examples.
COLT 1995: 353-360 |
2 | EE | Rosario Gennaro,
Silvio Micali:
Verifiable Secret Sharing as Secure Computation.
EUROCRYPT 1995: 168-182 |
1 | | Rosario Gennaro:
Achieving Independence Efficiently and Securely.
PODC 1995: 130-136 |