Folgen
Stefano Tessaro
Stefano Tessaro
Bestätigte E-Mail-Adresse bei cs.washington.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Semantic security for the wiretap channel
M Bellare, S Tessaro, A Vardy
Annual Cryptology Conference, 294-311, 2012
1862012
Optimal resilience for erasure-coded Byzantine distributed storage
C Cachin, S Tessaro
International Conference on Dependable Systems and Networks (DSN'06), 115-124, 2006
1522006
Asynchronous verifiable information dispersal
C Cachin, S Tessaro
24th IEEE Symposium on Reliable Distributed Systems (SRDS'05), 191-201, 2005
1442005
Pact: Privacy sensitive protocols and mechanisms for mobile contact tracing
J Chan, D Foster, S Gollakota, E Horvitz, J Jaeger, S Kakade, T Kohno, ...
arXiv preprint arXiv:2004.03544, 2020
1392020
The locality of searchable symmetric encryption
D Cash, S Tessaro
Annual international conference on the theory and applications of …, 2014
1262014
Obfuscation of probabilistic circuits and applications
R Canetti, H Lin, S Tessaro, V Vaikuntanathan
Theory of Cryptography Conference, 468-497, 2015
1232015
Indistinguishability obfuscation from trilinear maps and block-wise local PRGs
H Lin, S Tessaro
Annual International Cryptology Conference, 630-660, 2017
1132017
The equivalence of the random oracle model and the ideal cipher model, revisited
T Holenstein, R Künzler, S Tessaro
Proceedings of the forty-third annual ACM symposium on Theory of computing …, 2011
1002011
Key-alternating ciphers and key-length extension: exact bounds and multi-user security
VT Hoang, S Tessaro
Annual International Cryptology Conference, 3-32, 2016
922016
Random oracles with (out) programmability
M Fischlin, A Lehmann, T Ristenpart, T Shrimpton, M Stam, S Tessaro
International Conference on the Theory and Application of Cryptology and …, 2010
922010
Taostore: Overcoming asynchronicity in oblivious data storage
C Sahin, V Zakhary, A El Abbadi, H Lin, S Tessaro
2016 IEEE Symposium on Security and Privacy (SP), 198-217, 2016
882016
Scrypt is maximally memory-hard
J Alwen, B Chen, K Pietrzak, L Reyzin, S Tessaro
Annual International Conference on the Theory and Applications of …, 2017
802017
Multi-instance security and its application to password-based cryptography
M Bellare, T Ristenpart, S Tessaro
Annual Cryptology Conference, 312-329, 2012
782012
A cryptographic treatment of the wiretap channel
M Bellare, S Tessaro, A Vardy
arXiv preprint arXiv:1201.2205, 2012
692012
Communication locality in secure multi-party computation
E Boyle, S Goldwasser, S Tessaro
Theory of Cryptography Conference, 356-376, 2013
662013
To Hash or Not to Hash Again? (In)Differentiability Results for and HMAC
Y Dodis, T Ristenpart, J Steinberger, S Tessaro
Annual Cryptology Conference, 348-366, 2012
652012
Oblivious parallel RAM: improved efficiency and generic constructions
B Chen, H Lin, S Tessaro
Theory of Cryptography Conference, 205-234, 2016
642016
Foundations of homomorphic secret sharing
E Boyle, N Gilboa, Y Ishai, H Lin, S Tessaro
Cryptology ePrint Archive, 2017
632017
Information-theoretic indistinguishability via the chi-squared method
W Dai, VT Hoang, S Tessaro
Annual International Cryptology Conference, 497-523, 2017
612017
Poly-many hardcore bits for any one-way function and a framework for differing-inputs obfuscation
M Bellare, I Stepanovs, S Tessaro
International Conference on the Theory and Application of Cryptology and …, 2014
552014
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20