Stefano Tessaro
Stefano Tessaro
University of Washington
Bestätigte E-Mail-Adresse bei cs.ucsb.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Semantic security for the wiretap channel
M Bellare, S Tessaro, A Vardy
Annual Cryptology Conference, 294-311, 2012
1482012
Optimal resilience for erasure-coded Byzantine distributed storage
C Cachin, S Tessaro
International Conference on Dependable Systems and Networks (DSN'06), 115-124, 2006
1322006
Obfuscation of probabilistic circuits and applications
R Canetti, H Lin, S Tessaro, V Vaikuntanathan
Theory of Cryptography Conference, 468-497, 2015
942015
The locality of searchable symmetric encryption
D Cash, S Tessaro
Annual International Conference on the Theory and Applications of …, 2014
882014
Asynchronous verifiable information dispersal
C Cachin, S Tessaro
24th IEEE Symposium on Reliable Distributed Systems (SRDS'05), 191-201, 2005
792005
Indistinguishability obfuscation from trilinear maps and block-wise local PRGs
H Lin, S Tessaro
Annual International Cryptology Conference, 630-660, 2017
772017
The equivalence of the random oracle model and the ideal cipher model, revisited
T Holenstein, R Künzler, S Tessaro
Proceedings of the forty-third annual ACM symposium on Theory of computing …, 2011
772011
Random oracles with (out) programmability
M Fischlin, A Lehmann, T Ristenpart, T Shrimpton, M Stam, S Tessaro
International Conference on the Theory and Application of Cryptology and …, 2010
682010
Multi-instance security and its application to password-based cryptography
M Bellare, T Ristenpart, S Tessaro
Annual Cryptology Conference, 312-329, 2012
672012
A cryptographic treatment of the wiretap channel
M Bellare, S Tessaro, A Vardy
arXiv preprint arXiv:1201.2205, 2012
572012
To Hash or Not to Hash Again? (In)Differentiability Results for and HMAC
Y Dodis, T Ristenpart, J Steinberger, S Tessaro
Annual Cryptology Conference, 348-366, 2012
542012
Communication locality in secure multi-party computation
E Boyle, S Goldwasser, S Tessaro
Theory of Cryptography Conference, 356-376, 2013
532013
Taostore: Overcoming asynchronicity in oblivious data storage
C Sahin, V Zakhary, A El Abbadi, H Lin, S Tessaro
2016 IEEE Symposium on Security and Privacy (SP), 198-217, 2016
522016
Scrypt is maximally memory-hard
J Alwen, B Chen, K Pietrzak, L Reyzin, S Tessaro
Annual International Conference on the Theory and Applications of …, 2017
502017
Key-alternating ciphers and key-length extension: exact bounds and multi-user security
VT Hoang, S Tessaro
Annual International Cryptology Conference, 3-32, 2016
492016
Domain extension of public random functions: Beyond the birthday barrier
U Maurer, S Tessaro
Annual International Cryptology Conference, 187-204, 2007
482007
Oblivious parallel RAM: improved efficiency and generic constructions
B Chen, H Lin, S Tessaro
Theory of Cryptography Conference, 205-234, 2016
472016
Poly-many hardcore bits for any one-way function and a framework for differing-inputs obfuscation
M Bellare, I Stepanovs, S Tessaro
International Conference on the Theory and Application of Cryptology and …, 2014
442014
Information-theoretic indistinguishability via the chi-squared method
W Dai, VT Hoang, S Tessaro
Annual International Cryptology Conference, 497-523, 2017
362017
The exact PRF security of truncation: Tight bounds for keyed sponges and truncated CBC
P Gaži, K Pietrzak, S Tessaro
Annual Cryptology Conference, 368-387, 2015
342015
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20