BibTeX records: Roberto Trifiletti

download as .bib file

@inproceedings{DBLP:conf/ccs/KolesnikovNRTT17,
  author    = {Vladimir Kolesnikov and
               Jesper Buus Nielsen and
               Mike Rosulek and
               Ni Trieu and
               Roberto Trifiletti},
  title     = {{DUPLO:} Unifying Cut-and-Choose for Garbled Circuits},
  booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
               November 03, 2017},
  pages     = {3--20},
  year      = {2017},
  crossref  = {DBLP:conf/ccs/2017},
  url       = {http://doi.acm.org/10.1145/3133956.3133991},
  doi       = {10.1145/3133956.3133991},
  timestamp = {Tue, 13 Mar 2018 15:08:56 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/KolesnikovNRTT17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DottlingGNNT17,
  author    = {Nico D{\"{o}}ttling and
               Satrajit Ghosh and
               Jesper Buus Nielsen and
               Tobias Nilges and
               Roberto Trifiletti},
  title     = {TinyOLE: Efficient Actively Secure Two-Party Computation from Oblivious
               Linear Function Evaluation},
  booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
               November 03, 2017},
  pages     = {2263--2276},
  year      = {2017},
  crossref  = {DBLP:conf/ccs/2017},
  url       = {http://doi.acm.org/10.1145/3133956.3134024},
  doi       = {10.1145/3133956.3134024},
  timestamp = {Tue, 13 Mar 2018 15:08:56 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/DottlingGNNT17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/Nielsen0T17,
  author    = {Jesper Buus Nielsen and
               Thomas Schneider and
               Roberto Trifiletti},
  title     = {Constant Round Maliciously Secure 2PC with Function-independent Preprocessing
               using {LEGO}},
  booktitle = {24th Annual Network and Distributed System Security Symposium, {NDSS}
               2017, San Diego, California, USA, February 26 - March 1, 2017},
  year      = {2017},
  crossref  = {DBLP:conf/ndss/2017},
  url       = {https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/constant-round-maliciously-secure-2pc-function-independent-preprocessing-using-lego/},
  timestamp = {Tue, 16 Jan 2018 15:43:37 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ndss/Nielsen0T17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KolesnikovNRTT17,
  author    = {Vladimir Kolesnikov and
               Jesper Buus Nielsen and
               Mike Rosulek and
               Ni Trieu and
               Roberto Trifiletti},
  title     = {{DUPLO:} Unifying Cut-and-Choose for Garbled Circuits},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {344},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/344},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/KolesnikovNRTT17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RindalT17,
  author    = {Peter Rindal and
               Roberto Trifiletti},
  title     = {SplitCommit: Implementing and Analyzing Homomorphic {UC} Commitments},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {407},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/407},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/RindalT17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DottlingGNNT17,
  author    = {Nico D{\"{o}}ttling and
               Satrajit Ghosh and
               Jesper Buus Nielsen and
               Tobias Nilges and
               Roberto Trifiletti},
  title     = {TinyOLE: Efficient Actively Secure Two-Party Computation from Oblivious
               Linear Function Evaluation},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {790},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/790},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DottlingGNNT17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/FrederiksenJNT16,
  author    = {Tore Kasper Frederiksen and
               Thomas P. Jakobsen and
               Jesper Buus Nielsen and
               Roberto Trifiletti},
  title     = {On the Complexity of Additively Homomorphic {UC} Commitments},
  booktitle = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A,
               Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {I}},
  pages     = {542--565},
  year      = {2016},
  crossref  = {DBLP:conf/tcc/2016a1},
  url       = {https://doi.org/10.1007/978-3-662-49096-9\_23},
  doi       = {10.1007/978-3-662-49096-9\_23},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/FrederiksenJNT16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NielsenST16,
  author    = {Jesper Buus Nielsen and
               Thomas Schneider and
               Roberto Trifiletti},
  title     = {Constant Round Maliciously Secure 2PC with Function-independent Preprocessing
               using {LEGO}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {1069},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/1069},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/NielsenST16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CascudoDDGNT15,
  author    = {Ignacio Cascudo and
               Ivan Damg{\aa}rd and
               Bernardo Machado David and
               Irene Giacomelli and
               Jesper Buus Nielsen and
               Roberto Trifiletti},
  title     = {Additively Homomorphic {UC} Commitments with Optimal Amortized Overhead},
  booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
               on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
               USA, March 30 - April 1, 2015, Proceedings},
  pages     = {495--515},
  year      = {2015},
  crossref  = {DBLP:conf/pkc/2015},
  url       = {https://doi.org/10.1007/978-3-662-46447-2\_22},
  doi       = {10.1007/978-3-662-46447-2\_22},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/CascudoDDGNT15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FrederiksenJNT15,
  author    = {Tore Kasper Frederiksen and
               Thomas P. Jakobsen and
               Jesper Buus Nielsen and
               Roberto Trifiletti},
  title     = {TinyLEGO: An Interactive Garbling Scheme for Maliciously Secure Two-party
               Computation},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {309},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/309},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/FrederiksenJNT15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FrederiksenJNT15a,
  author    = {Tore Kasper Frederiksen and
               Thomas P. Jakobsen and
               Jesper Buus Nielsen and
               Roberto Trifiletti},
  title     = {On the Complexity of Additively Homomorphic {UC} Commitments},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {694},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/694},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/FrederiksenJNT15a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CascudoDDGNT14,
  author    = {Ignacio Cascudo and
               Ivan Damg{\aa}rd and
               Bernardo David and
               Irene Giacomelli and
               Jesper Buus Nielsen and
               Roberto Trifiletti},
  title     = {Additively Homomorphic {UC} commitments with Optimal Amortized Overhead},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {829},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/829},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/CascudoDDGNT14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2017,
  editor    = {Bhavani M. Thuraisingham and
               David Evans and
               Tal Malkin and
               Dongyan Xu},
  title     = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
               November 03, 2017},
  publisher = {{ACM}},
  year      = {2017},
  url       = {http://doi.acm.org/10.1145/3133956},
  doi       = {10.1145/3133956},
  isbn      = {978-1-4503-4946-8},
  timestamp = {Tue, 13 Mar 2018 15:08:56 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ndss/2017,
  title     = {24th Annual Network and Distributed System Security Symposium, {NDSS}
               2017, San Diego, California, USA, February 26 - March 1, 2017},
  publisher = {The Internet Society},
  year      = {2017},
  url       = {https://www.ndss-symposium.org/ndss2017/},
  timestamp = {Tue, 16 Jan 2018 15:43:37 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ndss/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2016a1,
  editor    = {Eyal Kushilevitz and
               Tal Malkin},
  title     = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A,
               Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9562},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-49096-9},
  doi       = {10.1007/978-3-662-49096-9},
  isbn      = {978-3-662-49095-2},
  timestamp = {Tue, 23 May 2017 01:06:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/2016a1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2015,
  editor    = {Jonathan Katz},
  title     = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
               on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
               USA, March 30 - April 1, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9020},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-662-46447-2},
  doi       = {10.1007/978-3-662-46447-2},
  isbn      = {978-3-662-46446-5},
  timestamp = {Wed, 24 May 2017 08:27:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI at University of Trier