Follow
Stefano Tessaro
Title
Cited by
Cited by
Year
Semantic security for the wiretap channel
M Bellare, S Tessaro, A Vardy
Annual Cryptology Conference, 294-311, 2012
1922012
Pact: Privacy sensitive protocols and mechanisms for mobile contact tracing
J Chan, D Foster, S Gollakota, E Horvitz, J Jaeger, S Kakade, T Kohno, ...
arXiv preprint arXiv:2004.03544, 2020
1642020
Asynchronous verifiable information dispersal
C Cachin, S Tessaro
24th IEEE Symposium on Reliable Distributed Systems (SRDS'05), 191-201, 2005
1612005
Optimal resilience for erasure-coded Byzantine distributed storage
C Cachin, S Tessaro
International Conference on Dependable Systems and Networks (DSN'06), 115-124, 2006
1572006
Obfuscation of probabilistic circuits and applications
R Canetti, H Lin, S Tessaro, V Vaikuntanathan
Cryptology ePrint Archive, 2014
1382014
The Locality of Searchable Symmetric Encryption.
D Cash, S Tessaro
Eurocrypt 8441, 351-368, 2014
1272014
Indistinguishability obfuscation from trilinear maps and block-wise local PRGs
H Lin, S Tessaro
Advances in Cryptology–CRYPTO 2017: 37th Annual International Cryptology …, 2017
1222017
The equivalence of the random oracle model and the ideal cipher model, revisited
T Holenstein, R Künzler, S Tessaro
Proceedings of the forty-third annual ACM symposium on Theory of computing …, 2011
1022011
Key-alternating ciphers and key-length extension: exact bounds and multi-user security
VT Hoang, S Tessaro
Advances in Cryptology–CRYPTO 2016: 36th Annual International Cryptology …, 2016
972016
Taostore: Overcoming asynchronicity in oblivious data storage
C Sahin, V Zakhary, A El Abbadi, H Lin, S Tessaro
2016 IEEE Symposium on Security and Privacy (SP), 198-217, 2016
922016
Random Oracles with (out) Programmability.
M Fischlin, A Lehmann, T Ristenpart, T Shrimpton, M Stam, S Tessaro
ASIACRYPT 6477, 303-320, 2010
922010
Scrypt is maximally memory-hard
J Alwen, B Chen, K Pietrzak, L Reyzin, S Tessaro
Advances in Cryptology–EUROCRYPT 2017: 36th Annual International Conference …, 2017
872017
Multi-instance security and its application to password-based cryptography
M Bellare, T Ristenpart, S Tessaro
Advances in Cryptology–CRYPTO 2012: 32nd Annual Cryptology Conference, Santa …, 2012
782012
A cryptographic treatment of the wiretap channel
M Bellare, S Tessaro, A Vardy
arXiv preprint arXiv:1201.2205, 2012
722012
Information-theoretic indistinguishability via the chi-squared method
W Dai, VT Hoang, S Tessaro
Advances in Cryptology–CRYPTO 2017: 37th Annual International Cryptology …, 2017
692017
Foundations of homomorphic secret sharing
E Boyle, N Gilboa, Y Ishai, H Lin, S Tessaro
Cryptology ePrint Archive, 2017
682017
Oblivious parallel RAM: improved efficiency and generic constructions
B Chen, H Lin, S Tessaro
Theory of Cryptography: 13th International Conference, TCC 2016-A, Tel Aviv …, 2016
682016
Communication locality in secure multi-party computation: how to run sublinear algorithms in a distributed setting
E Boyle, S Goldwasser, S Tessaro
Theory of Cryptography: 10th Theory of Cryptography Conference, TCC 2013 …, 2013
672013
To Hash or Not to Hash Again? (In)Differentiability Results for and HMAC
Y Dodis, T Ristenpart, J Steinberger, S Tessaro
Advances in Cryptology–CRYPTO 2012: 32nd Annual Cryptology Conference, Santa …, 2012
662012
Poly-many hardcore bits for any one-way function and a framework for differing-inputs obfuscation
M Bellare, I Stepanovs, S Tessaro
Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014
542014
The system can't perform the operation now. Try again later.
Articles 1–20