| 2008 |
| 73 | | Steven M. Bellovin,
Rosario Gennaro,
Angelos D. Keromytis,
Moti Yung:
Applied Cryptography and Network Security, 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings
ACNS 2008 |
| 72 | EE | Rosario Gennaro,
Shai Halevi,
Hugo Krawczyk,
Tal Rabin,
Steffen Reidt,
Stephen D. Wolthusen:
Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs.
ESORICS 2008: 49-65 |
| 71 | EE | Rosario Gennaro,
Shai Halevi,
Hugo Krawczyk,
Tal Rabin:
Threshold RSA for Dynamic and Ad-Hoc Groups.
EUROCRYPT 2008: 88-107 |
| 70 | EE | Dario Catalano,
Mario Di Raimondo,
Dario Fiore,
Rosario Gennaro:
Off-Line/On-Line Signatures: Theoretical Aspects and Experimental Results.
Public Key Cryptography 2008: 101-120 |
| 69 | EE | Rosario Gennaro:
Faster and Shorter Password-Authenticated Key Exchange.
TCC 2008: 589-606 |
| 68 | EE | Masayuki Abe,
Rosario Gennaro,
Kaoru Kurosawa:
Tag-KEM/DEM: A New Framework for Hybrid Encryption.
J. Cryptology 21(1): 97-130 (2008) |
| 2007 |
| 67 | EE | Emmanuel Bresson,
Dario Catalano,
Rosario Gennaro:
Improved On-Line/Off-Line Threshold Signatures.
Public Key Cryptography 2007: 217-232 |
| 66 | EE | Rosario Gennaro,
Stanislaw Jarecki,
Hugo Krawczyk,
Tal Rabin:
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems.
J. Cryptology 20(1): 51-83 (2007) |
| 65 | EE | Rosario Gennaro,
Tal Rabin,
Stanislaw Jarecki,
Hugo Krawczyk:
Robust and Efficient Sharing of RSA Functions.
J. Cryptology 20(3): 393 (2007) |
| 64 | EE | Rosario Gennaro,
Tal Rabin,
Hugo Krawczyk:
RSA-Based Undeniable Signatures.
J. Cryptology 20(3): 394 (2007) |
| 63 | EE | Dario Catalano,
Rosario Gennaro:
Cramer-Damgård signatures revisited: Efficient flat-tree signatures based on factoring.
Theor. Comput. Sci. 370(1-3): 186-200 (2007) |
| 2006 |
| 62 | EE | Mario Di Raimondo,
Rosario Gennaro,
Hugo Krawczyk:
Deniable authentication and key exchange.
ACM Conference on Computer and Communications Security 2006: 400-409 |
| 61 | EE | Rosario Gennaro,
Silvio Micali:
Independent Zero-Knowledge Sets.
ICALP (2) 2006: 34-45 |
| 60 | EE | Rosario Gennaro,
Yehuda Lindell:
A framework for password-based authenticated key exchange1.
ACM Trans. Inf. Syst. Secur. 9(2): 181-234 (2006) |
| 59 | EE | Rosario Gennaro:
Randomness in Cryptography.
IEEE Security & Privacy 4(2): 64-67 (2006) |
| 58 | EE | Mario Di Raimondo,
Rosario Gennaro:
Provably secure threshold password-authenticated key exchange.
J. Comput. Syst. Sci. 72(6): 978-1001 (2006) |
| 2005 |
| 57 | EE | Mario Di Raimondo,
Rosario Gennaro:
New approaches for deniable authentication.
ACM Conference on Computer and Communications Security 2005: 112-121 |
| 56 | EE | Masayuki Abe,
Rosario Gennaro,
Kaoru Kurosawa,
Victor Shoup:
Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM.
EUROCRYPT 2005: 128-146 |
| 55 | EE | Dario Catalano,
Rosario Gennaro:
Cramer-Damgård Signatures Revisited: Efficient Flat-Tree Signatures Based on Factoring.
Public Key Cryptography 2005: 313-327 |
| 54 | EE | Mario Di Raimondo,
Rosario Gennaro,
Hugo Krawczyk:
Secure off-the-record messaging.
WPES 2005: 81-89 |
| 53 | EE | Rosario Gennaro,
Mario Di Raimondo:
Secure multiplication of shared secrets in the exponent.
Inf. Process. Lett. 96(2): 71-79 (2005) |
| 52 | EE | Rosario Gennaro:
An Improved Pseudo-Random Generator Based on the Discrete Logarithm Problem.
J. Cryptology 18(2): 91-110 (2005) |
| 51 | EE | Rosario Gennaro,
Yael Gertner,
Jonathan Katz,
Luca Trevisan:
Bounds on the Efficiency of Generic Cryptographic Constructions.
SIAM J. Comput. 35(1): 217-246 (2005) |
| 2004 |
| 50 | EE | Rosario Gennaro,
Darren Leigh,
Ravi Sundaram,
William S. Yerazunis:
Batching Schnorr Identification Scheme with Applications to Privacy-Preserving Authorization and Low-Bandwidth Communication Devices.
ASIACRYPT 2004: 276-292 |
| 49 | EE | Rosario Gennaro:
Multi-trapdoor Commitments and Their Applications to Proofs of Knowledge Secure Under Concurrent Man-in-the-Middle Attacks.
CRYPTO 2004: 220-236 |
| 48 | EE | Yevgeniy Dodis,
Rosario Gennaro,
Johan Håstad,
Hugo Krawczyk,
Tal Rabin:
Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes.
CRYPTO 2004: 494-510 |
| 47 | EE | Rosario Gennaro,
Hugo Krawczyk,
Tal Rabin:
Secure Hashed Diffie-Hellman over Non-DDH Groups.
EUROCRYPT 2004: 361-381 |
| 46 | EE | Rosario Gennaro,
Anna Lysyanskaya,
Tal Malkin,
Silvio Micali,
Tal Rabin:
Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering.
TCC 2004: 258-277 |
| 2003 |
| 45 | EE | Rosario Gennaro,
Stanislaw Jarecki,
Hugo Krawczyk,
Tal Rabin:
Secure Applications of Pedersen's Distributed Key Generation Protocol.
CT-RSA 2003: 373-390 |
| 44 | EE | Mario Di Raimondo,
Rosario Gennaro:
Provably Secure Threshold Password-Authenticated Key Exchange.
EUROCRYPT 2003: 507-523 |
| 43 | EE | Rosario Gennaro,
Yehuda Lindell:
A Framework for Password-Based Authenticated Key Exchange.
EUROCRYPT 2003: 524-543 |
| 42 | EE | Rosario Gennaro,
Yael Gertner,
Jonathan Katz:
Lower bounds on the efficiency of encryption and digital signature schemes.
STOC 2003: 417-425 |
| 2002 |
| 41 | EE | Rosario Gennaro,
Yuval Ishai,
Eyal Kushilevitz,
Tal Rabin:
On 2-Round Secure Multiparty Computation.
CRYPTO 2002: 178-193 |
| 40 | EE | Rosario Gennaro,
Daniele Micciancio:
Cryptanalysis of a Pseudorandom Generator Based on Braid Groups.
EUROCRYPT 2002: 1-13 |
| 39 | EE | Rosario Gennaro:
Cryptographic Algorithms for Multimedia Traffic.
FOSAD 2002: 186-206 |
| 38 | EE | Victor Shoup,
Rosario Gennaro:
Securing Threshold Cryptosystems against Chosen Ciphertext Attack.
J. Cryptology 15(2): 75-96 (2002) |
| 37 | EE | Dario Catalano,
Rosario Gennaro,
Nick Howgrave-Graham:
Paillier's Trapdoor Function Hides up to O(n) Bits.
J. Cryptology 15(4): 251-269 (2002) |
| 2001 |
| 36 | EE | Dario Catalano,
Rosario Gennaro,
Nick Howgrave-Graham,
Phong Q. Nguyen:
Paillier's cryptosystem revisited.
ACM Conference on Computer and Communications Security 2001: 206-214 |
| 35 | EE | Nick Howgrave-Graham,
Joan G. Dyer,
Rosario Gennaro:
Pseudo-random Number Generation on the IBM 4758 Secure Crypto Coprocessor.
CHES 2001: 93-102 |
| 34 | EE | Dario Catalano,
Rosario Gennaro,
Nick Howgrave-Graham:
The Bit Security of Paillier's Encryption Scheme and Its Applications.
EUROCRYPT 2001: 229-243 |
| 33 | EE | Rosario Gennaro,
Yuval Ishai,
Eyal Kushilevitz,
Tal Rabin:
The round complexity of verifiable secret sharing and secure multicast.
STOC 2001: 580-589 |
| 32 | | Rosario Gennaro,
Stanislaw Jarecki,
Hugo Krawczyk,
Tal Rabin:
Robust Threshold DSS Signatures.
Inf. Comput. 164(1): 54-84 (2001) |
| 31 | | Rosario Gennaro,
Pankaj Rohatgi:
How to Sign Digital Streams.
Inf. Comput. 165(1): 100-116 (2001) |
| 2000 |
| 30 | | Don Coppersmith,
Rosario Gennaro,
Shai Halevi,
Charanjit S. Jutla,
Stephen M. Matyas,
Mohammad Peyravian,
David Safford,
Nevenko Zunic:
IBM Comments.
AES Candidate Conference 2000: 333-336 |
| 29 | EE | Rosario Gennaro:
An Improved Pseudo-random Generator Based on Discrete Log.
CRYPTO 2000: 469-481 |
| 28 | EE | Dario Catalano,
Rosario Gennaro,
Shai Halevi:
Computing Inverses over a Shared Secret Modulus.
EUROCRYPT 2000: 190-206 |
| 27 | | Rosario Gennaro,
Luca Trevisan:
Lower Bounds on the Efficiency of Generic Cryptographic Constructions.
FOCS 2000: 305-313 |
| 26 | EE | Rosario Gennaro,
Luca Trevisan:
Lower Bounds on the Efficiency of Generic Cryptographic Constructions
Electronic Colloquium on Computational Complexity (ECCC) 7(22): (2000) |
| 25 | EE | Rosario Gennaro:
A Protocol to Achieve Independence in Constant Rounds.
IEEE Trans. Parallel Distrib. Syst. 11(7): 636-647 (2000) |
| 24 | | Dario Catalano,
Rosario Gennaro:
New Efficient and Secure Protocols for Verifiable Signature Sharing and Other Applications.
J. Comput. Syst. Sci. 61(1): 51-80 (2000) |
| 23 | EE | Rosario Gennaro,
Tal Rabin,
Stanislaw Jarecki,
Hugo Krawczyk:
Robust and Efficient Sharing of RSA Functions.
J. Cryptology 13(2): 273-300 (2000) |
| 22 | EE | Rosario Gennaro,
Tal Rabin,
Hugo Krawczyk:
RSA-Based Undeniable Signatures.
J. Cryptology 13(4): 397-416 (2000) |
| 21 | EE | Juan A. Garay,
Rosario Gennaro,
Charanjit S. Jutla,
Tal Rabin:
Secure distributed storage and retrieval.
Theor. Comput. Sci. 243(1-2): 363-389 (2000) |
| 1999 |
| 20 | EE | Ran Canetti,
Rosario Gennaro,
Stanislaw Jarecki,
Hugo Krawczyk,
Tal Rabin:
Adaptive Security for Threshold Cryptosystems.
CRYPTO 1999: 98-115 |
| 19 | EE | Rosario Gennaro,
Shai Halevi,
Tal Rabin:
Secure Hash-and-Sign Signatures Without the Random Oracle.
EUROCRYPT 1999: 123-139 |
| 18 | EE | Rosario Gennaro,
Stanislaw Jarecki,
Hugo Krawczyk,
Tal Rabin:
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems.
EUROCRYPT 1999: 295-310 |
| 17 | | Sebastiano Battiato,
Dario Catalano,
Giovanni Gallo,
Rosario Gennaro:
Robust Watermarking for Images Based on Color Manipulation.
Information Hiding 1999: 302-317 |
| 1998 |
| 16 | EE | Rosario Gennaro,
Daniele Micciancio,
Tal Rabin:
An Efficient Non-Interactive Statistical Zero-Knowledge Proof System for Quasi-Safe Prime Products.
ACM Conference on Computer and Communications Security 1998: 67-72 |
| 15 | EE | Dario Catalano,
Rosario Gennaro:
New Efficient and Secure Protocols for Verifiable Signature Sharing and Other Applications.
CRYPTO 1998: 105-120 |
| 14 | EE | Victor Shoup,
Rosario Gennaro:
Securing Threshold Cryptosystems against Chosen Ciphertext Attack.
EUROCRYPT 1998: 1-16 |
| 13 | EE | Rosario Gennaro,
Michael O. Rabin,
Tal Rabin:
Simplified VSS and Fact-Track Multiparty Computations with Applications to Threshold Cryptography.
PODC 1998: 101-111 |
| 1997 |
| 12 | EE | Rosario Gennaro,
Hugo Krawczyk,
Tal Rabin:
RSA-Based Undeniable Signatures.
CRYPTO 1997: 132-149 |
| 11 | EE | Rosario Gennaro,
Pankaj Rohatgi:
How to Sign Digital Streams.
CRYPTO 1997: 180-197 |
| 10 | EE | Ronald Cramer,
Rosario Gennaro,
Berry Schoenmakers:
A Secure and Optimally Efficient Multi-Authority Election Scheme.
EUROCRYPT 1997: 103-118 |
| 9 | | Juan A. Garay,
Rosario Gennaro,
Charanjit S. Jutla,
Tal Rabin:
Secure Distributed Storage and Retrieval.
WDAG 1997: 275-289 |
| 8 | EE | Rosario Gennaro,
Paul A. Karger,
Stephen M. Matyas,
Mohammad Peyravian,
Allen Roginsky,
David Safford,
Michael Willett,
Nevenko Zunic:
Two-phase cryptographic key recovery system.
Computers & Security 16(6): 481-506 (1997) |
| 1996 |
| 7 | | Giuseppa Carrà Ferro,
Giovanni Gallo,
Rosario Gennaro:
Probabilistic Verification of Elementary Geometry Statements.
Automated Deduction in Geometry 1996: 87-101 |
| 6 | EE | Rosario Gennaro,
Stanislaw Jarecki,
Hugo Krawczyk,
Tal Rabin:
Robust and Efficient Sharing of RSA Functions.
CRYPTO 1996: 157-172 |
| 5 | EE | Rosario Gennaro,
Stanislaw Jarecki,
Hugo Krawczyk,
Tal Rabin:
Robust Threshold DSS Signatures.
EUROCRYPT 1996: 354-371 |
| 4 | | Ran Canetti,
Rosario Gennaro:
Incoercible Multiparty Computation (extended abstract).
FOCS 1996: 504-513 |
| 1995 |
| 3 | EE | Scott E. Decatur,
Rosario Gennaro:
On Learning from Noisy and Incomplete Examples.
COLT 1995: 353-360 |
| 2 | EE | Rosario Gennaro,
Silvio Micali:
Verifiable Secret Sharing as Secure Computation.
EUROCRYPT 1995: 168-182 |
| 1 | | Rosario Gennaro:
Achieving Independence Efficiently and Securely.
PODC 1995: 130-136 |