Rosario Gennaro
Rosario Gennaro
Professor of Computer Science, City College of New York
Email verificata su cs.ccny.cuny.edu - Home page
Titolo
Citata da
Citata da
Anno
Method and apparatus for the secure distributed storage and retrieval of information
JA Garay, R Gennaro, CS Jutla, TD Rabin
US Patent 6,192,472, 2001
12022001
Method and apparatus for the secure distributed storage and retrieval of information
JA Garay, R Gennaro, CS Jutla, TD Rabin
US Patent 5,991,414, 1999
11881999
A secure and optimally efficient multi‐authority election scheme
R Cramer, R Gennaro, B Schoenmakers
European transactions on Telecommunications 8 (5), 481-490, 1997
11441997
Non-interactive verifiable computing: Outsourcing computation to untrusted workers
R Gennaro, C Gentry, B Parno
Annual Cryptology Conference, 465-482, 2010
10742010
Robust threshold DSS signatures
R Gennaro, S Jarecki, H Krawczyk, T Rabin
International Conference on the Theory and Applications of Cryptographic …, 1996
6011996
Secure distributed key generation for discrete-log based cryptosystems
R Gennaro, S Jarecki, H Krawczyk, T Rabin
International Conference on the Theory and Applications of Cryptographic …, 1999
5781999
Simplified VSS and fast-track multiparty computations with applications to threshold cryptography
R Gennaro, MO Rabin, T Rabin
Proceedings of the seventeenth annual ACM symposium on Principles of …, 1998
5401998
How to sign digital streams
R Gennaro, P Rohatgi
Annual International Cryptology Conference, 180-197, 1997
5311997
Quadratic span programs and succinct NIZKs without PCPs
R Gennaro, C Gentry, B Parno, M Raykova
Annual International Conference on the Theory and Applications of …, 2013
4682013
Secure hash-and-sign signatures without the random oracle
R Gennaro, S Halevi, T Rabin
International Conference on the Theory and Applications of Cryptographic …, 1999
4041999
Robust and efficient sharing of RSA functions
R Gennaro, S Jarecki, H Krawczyk, T Rabin
Annual International Cryptology Conference, 157-172, 1996
354*1996
A framework for password-based authenticated key exchange
R Gennaro, Y Lindell
International Conference on the Theory and Applications of Cryptographic …, 2003
3532003
Verifiable delegation of computation over large datasets
S Benabbas, R Gennaro, Y Vahlis
Annual Cryptology Conference, 111-131, 2011
3372011
Two-phase cryptographic key recovery system
R Gennaro, DB Johnson, PA Karger, SM Matyas Jr, M Peyravian, ...
US Patent 5,937,066, 1999
3011999
Secure distributed key generation for discrete-log based cryptosystems
R Gennaro, S Jarecki, H Krawczyk, T Rabin
Journal of Cryptology 20 (1), 51-83, 2007
2882007
Biometric authentication system with encrypted models
R Gennaro, S Halevi, S Maes, T Rabin, J Sorensen
US Patent 6,317,834, 2001
2702001
Securing threshold cryptosystems against chosen ciphertext attack
V Shoup, R Gennaro
International Conference on the Theory and Applications of Cryptographic …, 1998
2581998
MARS-a candidate cipher for AES
C Burwick, D Coppersmith, E D’Avignon, R Gennaro, S Halevi, C Jutla, ...
NIST AES Proposal 268, 80, 1998
2551998
Publicly verifiable delegation of large polynomials and matrix computations, with applications
D Fiore, R Gennaro
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
2312012
Algorithmic tamper-proof (ATP) security: Theoretical foundations for security against hardware tampering
R Gennaro, A Lysyanskaya, T Malkin, S Micali, T Rabin
Theory of Cryptography Conference, 258-277, 2004
2082004
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20