default search action
BibTeX records: Daniele Venturi 0001
@article{DBLP:journals/joc/FrancatiFMV24, author = {Danilo Francati and Daniele Friolo and Giulio Malavolta and Daniele Venturi}, title = {Multi-key and Multi-input Predicate Encryption (for Conjunctions) from Learning with Errors}, journal = {J. Cryptol.}, volume = {37}, number = {3}, pages = {24}, year = {2024}, url = {https://doi.org/10.1007/s00145-024-09504-7}, doi = {10.1007/S00145-024-09504-7}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/FrancatiFMV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/FrancatiV24, author = {Danilo Francati and Daniele Venturi}, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {Non-malleable Fuzzy Extractors}, booktitle = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14583}, pages = {135--155}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54770-6\_6}, doi = {10.1007/978-3-031-54770-6\_6}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/FrancatiV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ObresmkiRRSV24, author = {Maciej Obremski and Jo{\~{a}}o Ribeiro and Lawrence Roy and Fran{\c{c}}ois{-}Xavier Standaert and Daniele Venturi}, editor = {Leonid Reyzin and Douglas Stebila}, title = {Improved Reductions from Noisy to Bounded and Probing Leakages via Hockey-Stick Divergences}, booktitle = {Advances in Cryptology - {CRYPTO} 2024 - 44th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2024, Proceedings, Part {VI}}, series = {Lecture Notes in Computer Science}, volume = {14925}, pages = {461--491}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-68391-6\_14}, doi = {10.1007/978-3-031-68391-6\_14}, timestamp = {Fri, 20 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ObresmkiRRSV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icml/ZhangEF0AB24, author = {Hanlin Zhang and Benjamin L. Edelman and Danilo Francati and Daniele Venturi and Giuseppe Ateniese and Boaz Barak}, title = {Watermarks in the Sand: Impossibility of Strong Watermarking for Language Models}, booktitle = {Forty-first International Conference on Machine Learning, {ICML} 2024, Vienna, Austria, July 21-27, 2024}, publisher = {OpenReview.net}, year = {2024}, url = {https://openreview.net/forum?id=bM2s12t4hR}, timestamp = {Mon, 02 Sep 2024 16:45:29 +0200}, biburl = {https://dblp.org/rec/conf/icml/ZhangEF0AB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2407-10684, author = {Michele Kryston and Edoardo Marangone and Claudio Di Ciccio and Daniele Friolo and Eugenio Nerio Nemmi and Mattia Samory and Michele Spina and Daniele Venturi and Ingo Weber}, title = {{MARTSIA:} Safeguarding Data Confidentiality in Blockchain-Driven Process Execution}, journal = {CoRR}, volume = {abs/2407.10684}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2407.10684}, doi = {10.48550/ARXIV.2407.10684}, eprinttype = {arXiv}, eprint = {2407.10684}, timestamp = {Thu, 15 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2407-10684.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ObremskiRRSV24, author = {Maciej Obremski and Jo{\~{a}}o Ribeiro and Lawrence Roy and Fran{\c{c}}ois{-}Xavier Standaert and Daniele Venturi}, title = {Improved Reductions from Noisy to Bounded and Probing Leakages via Hockey-Stick Divergences}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1009}, year = {2024}, url = {https://eprint.iacr.org/2024/1009}, timestamp = {Wed, 14 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ObremskiRRSV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/FrioloSV23, author = {Daniele Friolo and Matteo Salvino and Daniele Venturi}, editor = {Mehdi Tibouchi and Xiaofeng Wang}, title = {On the Complete Non-malleability of the Fujisaki-Okamoto Transform}, booktitle = {Applied Cryptography and Network Security - 21st International Conference, {ACNS} 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13906}, pages = {307--335}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-33491-7\_12}, doi = {10.1007/978-3-031-33491-7\_12}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/FrioloSV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/FrancatiFMMRV23, author = {Danilo Francati and Daniele Friolo and Monosij Maitra and Giulio Malavolta and Ahmadreza Rahimi and Daniele Venturi}, editor = {Jian Guo and Ron Steinfeld}, title = {Registered (Inner-Product) Functional Encryption}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14442}, pages = {98--133}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8733-7\_4}, doi = {10.1007/978-981-99-8733-7\_4}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/FrancatiFMMRV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edoc/MarangoneCFNVW23, author = {Edoardo Marangone and Claudio Di Ciccio and Daniele Friolo and Eugenio Nerio Nemmi and Daniele Venturi and Ingo Weber}, editor = {Henderik A. Proper and Luise Pufahl and Dimka Karastoyanova and Marten van Sinderen and Jo{\~{a}}o L. R. Moreira}, title = {{MARTSIA:} Enabling Data Confidentiality for Blockchain-Based Process Execution}, booktitle = {Enterprise Design, Operations, and Computing - 27th International Conference, {EDOC} 2023, Groningen, The Netherlands, October 30 - November 3, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14367}, pages = {58--76}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-46587-1\_4}, doi = {10.1007/978-3-031-46587-1\_4}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/edoc/MarangoneCFNVW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FrancatiFMV23, author = {Danilo Francati and Daniele Friolo and Giulio Malavolta and Daniele Venturi}, editor = {Carmit Hazay and Martijn Stam}, title = {Multi-key and Multi-input Predicate Encryption from Learning with Errors}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14006}, pages = {573--604}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30620-4\_19}, doi = {10.1007/978-3-031-30620-4\_19}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/FrancatiFMV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2303-17977, author = {Edoardo Marangone and Claudio Di Ciccio and Daniele Friolo and Eugenio Nerio Nemmi and Daniele Venturi and Ingo Weber}, title = {{MARTSIA:} Enabling Data Confidentiality for Blockchain-based Process Execution}, journal = {CoRR}, volume = {abs/2303.17977}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2303.17977}, doi = {10.48550/ARXIV.2303.17977}, eprinttype = {arXiv}, eprint = {2303.17977}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2303-17977.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2308-03791, author = {Edoardo Marangone and Claudio Di Ciccio and Daniele Friolo and Eugenio Nerio Nemmi and Daniele Venturi and Ingo Weber}, title = {Enabling Data Confidentiality with Public Blockchains}, journal = {CoRR}, volume = {abs/2308.03791}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.03791}, doi = {10.48550/ARXIV.2308.03791}, eprinttype = {arXiv}, eprint = {2308.03791}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-03791.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2311-04378, author = {Hanlin Zhang and Benjamin L. Edelman and Danilo Francati and Daniele Venturi and Giuseppe Ateniese and Boaz Barak}, title = {Watermarks in the Sand: Impossibility of Strong Watermarking for Generative Models}, journal = {CoRR}, volume = {abs/2311.04378}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2311.04378}, doi = {10.48550/ARXIV.2311.04378}, eprinttype = {arXiv}, eprint = {2311.04378}, timestamp = {Tue, 14 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2311-04378.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FrancatiFMMRV23, author = {Danilo Francati and Daniele Friolo and Monosij Maitra and Giulio Malavolta and Ahmadreza Rahimi and Daniele Venturi}, title = {Registered (Inner-Product) Functional Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {395}, year = {2023}, url = {https://eprint.iacr.org/2023/395}, timestamp = {Fri, 31 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FrancatiFMMRV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FrancatiV23, author = {Danilo Francati and Daniele Venturi}, title = {Evolving Secret Sharing Made Short}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1534}, year = {2023}, url = {https://eprint.iacr.org/2023/1534}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FrancatiV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangEFVAB23, author = {Hanlin Zhang and Benjamin L. Edelman and Danilo Francati and Daniele Venturi and Giuseppe Ateniese and Boaz Barak}, title = {Watermarks in the Sand: Impossibility of Strong Watermarking for Generative Models}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1776}, year = {2023}, url = {https://eprint.iacr.org/2023/1776}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ZhangEFVAB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChakrabortyMMV23, author = {Suvradip Chakraborty and Lorenzo Magliocco and Bernardo Magri and Daniele Venturi}, title = {Key Exchange in the Post-Snowden Era: {UC} Secure Subversion-Resilient {PAKE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1827}, year = {2023}, url = {https://eprint.iacr.org/2023/1827}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ChakrabortyMMV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/FrioloMNV22, author = {Daniele Friolo and Fabio Massacci and Chan Nam Ngo and Daniele Venturi}, title = {Cryptographic and Financial Fairness}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {17}, pages = {3391--3406}, year = {2022}, url = {https://doi.org/10.1109/TIFS.2022.3198852}, doi = {10.1109/TIFS.2022.3198852}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/FrioloMNV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/BrianFORSSV22, author = {Gianluca Brian and Antonio Faonio and Maciej Obremski and Jo{\~{a}}o Ribeiro and Mark Simkin and Maciej Sk{\'{o}}rski and Daniele Venturi}, title = {The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free}, journal = {{IEEE} Trans. Inf. Theory}, volume = {68}, number = {12}, pages = {8197--8227}, year = {2022}, url = {https://doi.org/10.1109/TIT.2022.3193848}, doi = {10.1109/TIT.2022.3193848}, timestamp = {Sat, 18 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/BrianFORSSV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BrianFRV22, author = {Gianluca Brian and Antonio Faonio and Jo{\~{a}}o Ribeiro and Daniele Venturi}, title = {Short Non-Malleable Codes from Related-Key Secure Block Ciphers, Revisited}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {3}, pages = {1--19}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i3.1-19}, doi = {10.46586/TOSC.V2022.I3.1-19}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/BrianFRV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BrianFMV22, author = {Gianluca Brian and Sebastian Faust and Elena Micheli and Daniele Venturi}, editor = {Shweta Agrawal and Dongdai Lin}, title = {Continuously Non-malleable Codes Against Bounded-Depth Tampering}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {13794}, pages = {384--413}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22972-5\_14}, doi = {10.1007/978-3-031-22972-5\_14}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/BrianFMV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/citc/MadathilOS022, author = {Varun Madathil and Chris Orsini and Alessandra Scafuro and Daniele Venturi}, editor = {Dana Dachman{-}Soled}, title = {From Privacy-Only to Simulatable {OT:} Black-Box, Round-Optimal, Information-Theoretic}, booktitle = {3rd Conference on Information-Theoretic Cryptography, {ITC} 2022, July 5-7, 2022, Cambridge, MA, {USA}}, series = {LIPIcs}, volume = {230}, pages = {5:1--5:20}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2022}, url = {https://doi.org/10.4230/LIPIcs.ITC.2022.5}, doi = {10.4230/LIPICS.ITC.2022.5}, timestamp = {Wed, 21 Aug 2024 22:46:00 +0200}, biburl = {https://dblp.org/rec/conf/citc/MadathilOS022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ChakrabortyMNV22, author = {Suvradip Chakraborty and Bernardo Magri and Jesper Buus Nielsen and Daniele Venturi}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Universally Composable Subversion-Resilient Cryptography}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13275}, pages = {272--302}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-06944-4\_10}, doi = {10.1007/978-3-031-06944-4\_10}, timestamp = {Tue, 31 May 2022 17:23:10 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ChakrabortyMNV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acns/2022, editor = {Giuseppe Ateniese and Daniele Venturi}, title = {Applied Cryptography and Network Security - 20th International Conference, {ACNS} 2022, Rome, Italy, June 20-23, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13269}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-09234-3}, doi = {10.1007/978-3-031-09234-3}, isbn = {978-3-031-09233-6}, timestamp = {Tue, 21 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2207-10780, author = {Daniele Friolo and Fabio Massacci and Chan Nam Ngo and Daniele Venturi}, title = {Cryptographic and Financial Fairness}, journal = {CoRR}, volume = {abs/2207.10780}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2207.10780}, doi = {10.48550/ARXIV.2207.10780}, eprinttype = {arXiv}, eprint = {2207.10780}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2207-10780.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MadathilOSV22, author = {Varun Madathil and Chris Orsini and Alessandra Scafuro and Daniele Venturi}, title = {From Privacy-Only to Simulatable {OT:} Black-Box, Round-Optimal, Information-theoretic}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {34}, year = {2022}, url = {https://eprint.iacr.org/2022/034}, timestamp = {Fri, 18 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/MadathilOSV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChakrabortyMNV22, author = {Suvradip Chakraborty and Bernardo Magri and Jesper Buus Nielsen and Daniele Venturi}, title = {Universally Composable Subversion-Resilient Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {244}, year = {2022}, url = {https://eprint.iacr.org/2022/244}, timestamp = {Tue, 22 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ChakrabortyMNV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FrancatiFM022, author = {Danilo Francati and Daniele Friolo and Giulio Malavolta and Daniele Venturi}, title = {Multi-key and Multi-input Predicate Encryption from Learning with Errors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {806}, year = {2022}, url = {https://eprint.iacr.org/2022/806}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FrancatiFM022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrianF0022, author = {Gianluca Brian and Antonio Faonio and Jo{\~{a}}o Ribeiro and Daniele Venturi}, title = {Short Non-Malleable Codes from Related-Key Secure Block Ciphers, Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1100}, year = {2022}, url = {https://eprint.iacr.org/2022/1100}, timestamp = {Sat, 18 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BrianF0022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrianFM022, author = {Gianluca Brian and Sebastian Faust and Elena Micheli and Daniele Venturi}, title = {Continuously Non-Malleable Codes against Bounded-Depth Tampering}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1231}, year = {2022}, url = {https://eprint.iacr.org/2022/1231}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrianFM022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FrioloSV22, author = {Daniele Friolo and Matteo Salvino and Daniele Venturi}, title = {On the Complete Non-Malleability of the Fujisaki-Okamoto Transform}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1654}, year = {2022}, url = {https://eprint.iacr.org/2022/1654}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FrioloSV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/AtenieseFNV21, author = {Giuseppe Ateniese and Danilo Francati and David Nu{\~{n}}ez and Daniele Venturi}, title = {Match Me if You Can: Matchmaking Encryption and Its Applications}, journal = {J. Cryptol.}, volume = {34}, number = {3}, pages = {16}, year = {2021}, url = {https://doi.org/10.1007/s00145-021-09381-4}, doi = {10.1007/S00145-021-09381-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/AtenieseFNV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/GaneshMV21, author = {Chaya Ganesh and Bernardo Magri and Daniele Venturi}, title = {Cryptographic reverse firewalls for interactive proof systems}, journal = {Theor. Comput. Sci.}, volume = {855}, pages = {104--132}, year = {2021}, url = {https://doi.org/10.1016/j.tcs.2020.11.043}, doi = {10.1016/J.TCS.2020.11.043}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/GaneshMV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/AtenieseFMV21, author = {Giuseppe Ateniese and Danilo Francati and Bernardo Magri and Daniele Venturi}, title = {Immunization against complete subversion without random oracles}, journal = {Theor. Comput. Sci.}, volume = {859}, pages = {1--36}, year = {2021}, url = {https://doi.org/10.1016/j.tcs.2021.01.002}, doi = {10.1016/J.TCS.2021.01.002}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/AtenieseFMV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/SamarinFVA21, author = {Somayeh Dolatnezhad Samarin and Dario Fiore and Daniele Venturi and Morteza Amini}, title = {A compiler for multi-key homomorphic signatures for Turing machines}, journal = {Theor. Comput. Sci.}, volume = {889}, pages = {145--170}, year = {2021}, url = {https://doi.org/10.1016/j.tcs.2021.08.002}, doi = {10.1016/J.TCS.2021.08.002}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/SamarinFVA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BrianFO00S021, author = {Gianluca Brian and Antonio Faonio and Maciej Obremski and Jo{\~{a}}o Ribeiro and Mark Simkin and Maciej Sk{\'{o}}rski and Daniele Venturi}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12697}, pages = {408--437}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77886-6\_14}, doi = {10.1007/978-3-030-77886-6\_14}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BrianFO00S021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/BottaFVV21, author = {Vincenzo Botta and Daniele Friolo and Daniele Venturi and Ivan Visconti}, editor = {Nikita Borisov and Claudia D{\'{\i}}az}, title = {Shielded Computations in Smart Contracts Overcoming Forks}, booktitle = {Financial Cryptography and Data Security - 25th International Conference, {FC} 2021, Virtual Event, March 1-5, 2021, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12674}, pages = {73--92}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-662-64322-8\_4}, doi = {10.1007/978-3-662-64322-8\_4}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/BottaFVV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/FrancatiGRV21, author = {Danilo Francati and Alessio Guidi and Luigi Russo and Daniele Venturi}, editor = {Avishek Adhikari and Ralf K{\"{u}}sters and Bart Preneel}, title = {Identity-Based Matchmaking Encryption Without Random Oracles}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2021 - 22nd International Conference on Cryptology in India, Jaipur, India, December 12-15, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13143}, pages = {415--435}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92518-5\_19}, doi = {10.1007/978-3-030-92518-5\_19}, timestamp = {Wed, 12 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/FrancatiGRV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BrianF021, author = {Gianluca Brian and Antonio Faonio and Daniele Venturi}, editor = {Kobbi Nissim and Brent Waters}, title = {Continuously Non-malleable Secret Sharing: Joint Tampering, Plain Model and Capacity}, booktitle = {Theory of Cryptography - 19th International Conference, {TCC} 2021, Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13043}, pages = {333--364}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90453-1\_12}, doi = {10.1007/978-3-030-90453-1\_12}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/BrianF021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrianFV21, author = {Gianluca Brian and Antonio Faonio and Daniele Venturi}, title = {Continuously Non-Malleable Secret Sharing: Joint Tampering, Plain Model and Capacity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1128}, year = {2021}, url = {https://eprint.iacr.org/2021/1128}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrianFV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SamarinFVA21, author = {Somayeh Dolatnezhad Samarin and Dario Fiore and Daniele Venturi and Morteza Amini}, title = {A compiler for multi-key homomorphic signatures for Turing machines}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1651}, year = {2021}, url = {https://eprint.iacr.org/2021/1651}, timestamp = {Thu, 13 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/SamarinFVA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FrancatiGRV21, author = {Danilo Francati and Alessio Guidi and Luigi Russo and Daniele Venturi}, title = {Identity-Based Matchmaking Encryption without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1660}, year = {2021}, url = {https://eprint.iacr.org/2021/1660}, timestamp = {Wed, 12 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FrancatiGRV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/CorettiDMTV20, author = {Sandro Coretti and Yevgeniy Dodis and Ueli Maurer and Bj{\"{o}}rn Tackmann and Daniele Venturi}, title = {Non-malleable Encryption: Simpler, Shorter, Stronger}, journal = {J. Cryptol.}, volume = {33}, number = {4}, pages = {1984--2033}, year = {2020}, url = {https://doi.org/10.1007/s00145-020-09361-0}, doi = {10.1007/S00145-020-09361-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/CorettiDMTV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/FaustMNV20, author = {Sebastian Faust and Pratyay Mukherjee and Jesper Buus Nielsen and Daniele Venturi}, title = {Continuously Non-malleable Codes in the Split-State Model}, journal = {J. Cryptol.}, volume = {33}, number = {4}, pages = {2034--2077}, year = {2020}, url = {https://doi.org/10.1007/s00145-020-09362-z}, doi = {10.1007/S00145-020-09362-Z}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joc/FaustMNV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/AtenieseMV20, author = {Giuseppe Ateniese and Bernardo Magri and Daniele Venturi}, title = {Subversion-resilient signatures: Definitions, constructions and applications}, journal = {Theor. Comput. Sci.}, volume = {820}, pages = {91--122}, year = {2020}, url = {https://doi.org/10.1016/j.tcs.2020.03.021}, doi = {10.1016/J.TCS.2020.03.021}, timestamp = {Tue, 21 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/AtenieseMV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BrianFO0020, author = {Gianluca Brian and Antonio Faonio and Maciej Obremski and Mark Simkin and Daniele Venturi}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Non-malleable Secret Sharing Against Bounded Joint-Tampering Attacks in the Plain Model}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12172}, pages = {127--155}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56877-1\_5}, doi = {10.1007/978-3-030-56877-1\_5}, timestamp = {Mon, 28 Aug 2023 21:17:50 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BrianFO0020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/NgoFM0B20, author = {Chan Nam Ngo and Daniele Friolo and Fabio Massacci and Daniele Venturi and Ettore Battaiola}, title = {Vision: What If They All Die? Crypto Requirements For Key People}, booktitle = {{IEEE} European Symposium on Security and Privacy Workshops, EuroS{\&}P Workshops 2020, Genoa, Italy, September 7-11, 2020}, pages = {178--183}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/EuroSPW51379.2020.00032}, doi = {10.1109/EUROSPW51379.2020.00032}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosp/NgoFM0B20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/GaneshM020, author = {Chaya Ganesh and Bernardo Magri and Daniele Venturi}, editor = {Artur Czumaj and Anuj Dawar and Emanuela Merelli}, title = {Cryptographic Reverse Firewalls for Interactive Proof Systems}, booktitle = {47th International Colloquium on Automata, Languages, and Programming, {ICALP} 2020, July 8-11, 2020, Saarbr{\"{u}}cken, Germany (Virtual Conference)}, series = {LIPIcs}, volume = {168}, pages = {55:1--55:16}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2020}, url = {https://doi.org/10.4230/LIPIcs.ICALP.2020.55}, doi = {10.4230/LIPICS.ICALP.2020.55}, timestamp = {Wed, 21 Aug 2024 22:46:00 +0200}, biburl = {https://dblp.org/rec/conf/icalp/GaneshM020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/CiampiPV20, author = {Michele Ciampi and Roberto Parisella and Daniele Venturi}, editor = {Clemente Galdi and Vladimir Kolesnikov}, title = {On Adaptive Security of Delayed-Input Sigma Protocols and Fiat-Shamir NIZKs}, booktitle = {Security and Cryptography for Networks - 12th International Conference, {SCN} 2020, Amalfi, Italy, September 14-16, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12238}, pages = {670--690}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-57990-6\_33}, doi = {10.1007/978-3-030-57990-6\_33}, timestamp = {Sat, 19 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/CiampiPV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaneshMV20, author = {Chaya Ganesh and Bernardo Magri and Daniele Venturi}, title = {Cryptographic Reverse Firewalls for Interactive Proof Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {204}, year = {2020}, url = {https://eprint.iacr.org/2020/204}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaneshMV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrianFOSV20, author = {Gianluca Brian and Antonio Faonio and Maciej Obremski and Mark Simkin and Daniele Venturi}, title = {Non-Malleable Secret Sharing against Bounded Joint-Tampering Attacks in the Plain Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {725}, year = {2020}, url = {https://eprint.iacr.org/2020/725}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BrianFOSV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CiampiPV20, author = {Michele Ciampi and Roberto Parisella and Daniele Venturi}, title = {On Adaptive Security of Delayed-Input Sigma Protocols and Fiat-Shamir NIZKs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {831}, year = {2020}, url = {https://eprint.iacr.org/2020/831}, timestamp = {Mon, 27 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CiampiPV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrianFORSSV20, author = {Gianluca Brian and Antonio Faonio and Maciej Obremski and Jo{\~{a}}o Ribeiro and Mark Simkin and Maciej Sk{\'{o}}rski and Daniele Venturi}, title = {The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1246}, year = {2020}, url = {https://eprint.iacr.org/2020/1246}, timestamp = {Sat, 18 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BrianFORSSV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/FaonioNSV19, author = {Antonio Faonio and Jesper Buus Nielsen and Mark Simkin and Daniele Venturi}, title = {Continuously non-malleable codes with split-state refresh}, journal = {Theor. Comput. Sci.}, volume = {759}, pages = {98--132}, year = {2019}, url = {https://doi.org/10.1016/j.tcs.2018.12.028}, doi = {10.1016/J.TCS.2018.12.028}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/FaonioNSV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/CorettiF019, author = {Sandro Coretti and Antonio Faonio and Daniele Venturi}, editor = {Robert H. Deng and Val{\'{e}}rie Gauthier{-}Uma{\~{n}}a and Mart{\'{\i}}n Ochoa and Moti Yung}, title = {Rate-Optimizing Compilers for Continuously Non-malleable Codes}, booktitle = {Applied Cryptography and Network Security - 17th International Conference, {ACNS} 2019, Bogota, Colombia, June 5-7, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11464}, pages = {3--23}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21568-2\_1}, doi = {10.1007/978-3-030-21568-2\_1}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/CorettiF019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/AtenieseFM019, author = {Giuseppe Ateniese and Danilo Francati and Bernardo Magri and Daniele Venturi}, editor = {Robert H. Deng and Val{\'{e}}rie Gauthier{-}Uma{\~{n}}a and Mart{\'{\i}}n Ochoa and Moti Yung}, title = {Public Immunization Against Complete Subversion Without Random Oracles}, booktitle = {Applied Cryptography and Network Security - 17th International Conference, {ACNS} 2019, Bogota, Colombia, June 5-7, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11464}, pages = {465--485}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21568-2\_23}, doi = {10.1007/978-3-030-21568-2\_23}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/AtenieseFM019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Faonio019, author = {Antonio Faonio and Daniele Venturi}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Non-malleable Secret Sharing in the Computational Setting: Adaptive Tampering, Noisy-Leakage Resilience, and Improved Rate}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11693}, pages = {448--479}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26951-7\_16}, doi = {10.1007/978-3-030-26951-7\_16}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/Faonio019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AtenieseFN019, author = {Giuseppe Ateniese and Danilo Francati and David Nu{\~{n}}ez and Daniele Venturi}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Match Me if You Can: Matchmaking Encryption and Its Applications}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11693}, pages = {701--731}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26951-7\_24}, doi = {10.1007/978-3-030-26951-7\_24}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/AtenieseFN019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sds/AkilMV19, author = {Mahdi Akil and Luigi V. Mancini and Daniele Venturi}, title = {Multi-Covert Channel Attack in the Cloud}, booktitle = {6th International Conference on Software Defined Systems, {SDS} 2019, Rome, Italy, June 10-13, 2019}, pages = {160--165}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SDS.2019.8768563}, doi = {10.1109/SDS.2019.8768563}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/sds/AkilMV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/FrioloMN019, author = {Daniele Friolo and Fabio Massacci and Chan Nam Ngo and Daniele Venturi}, editor = {Jonathan Anderson and Frank Stajano and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Affordable Security or Big Guy vs Small Guy - Does the Depth of Your Pockets Impact Your Protocols?}, booktitle = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12287}, pages = {135--147}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-57043-9\_13}, doi = {10.1007/978-3-030-57043-9\_13}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/FrioloMN019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/FrioloM019, author = {Daniele Friolo and Daniel Masny and Daniele Venturi}, editor = {Dennis Hofheinz and Alon Rosen}, title = {A Black-Box Construction of Fully-Simulatable, Round-Optimal Oblivious Transfer from Strongly Uniform Key Agreement}, booktitle = {Theory of Cryptography - 17th International Conference, {TCC} 2019, Nuremberg, Germany, December 1-5, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11891}, pages = {111--130}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-36030-6\_5}, doi = {10.1007/978-3-030-36030-6\_5}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/FrioloM019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BrianF019, author = {Gianluca Brian and Antonio Faonio and Daniele Venturi}, editor = {Dennis Hofheinz and Alon Rosen}, title = {Continuously Non-malleable Secret Sharing for General Access Structures}, booktitle = {Theory of Cryptography - 17th International Conference, {TCC} 2019, Nuremberg, Germany, December 1-5, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11892}, pages = {211--232}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-36033-7\_8}, doi = {10.1007/978-3-030-36033-7\_8}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/BrianF019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CorettiF019, author = {Sandro Coretti and Antonio Faonio and Daniele Venturi}, title = {Rate-Optimizing Compilers for Continuously Non-Malleable Codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {55}, year = {2019}, url = {https://eprint.iacr.org/2019/055}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/CorettiF019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Faonio019, author = {Antonio Faonio and Daniele Venturi}, title = {Non-Malleable Secret Sharing in the Computational Setting: Adaptive Tampering, Noisy-Leakage Resilience, and Improved Rate}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {105}, year = {2019}, url = {https://eprint.iacr.org/2019/105}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/Faonio019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrianF019, author = {Gianluca Brian and Antonio Faonio and Daniele Venturi}, title = {Continuously Non-Malleable Secret Sharing for General Access Structures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {602}, year = {2019}, url = {https://eprint.iacr.org/2019/602}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BrianF019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BottaFVV19, author = {Vincenzo Botta and Daniele Friolo and Daniele Venturi and Ivan Visconti}, title = {The Rush Dilemma: Attacking and Repairing Smart Contracts on Forking Blockchains}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {891}, year = {2019}, url = {https://eprint.iacr.org/2019/891}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BottaFVV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtenieseFMV19, author = {Giuseppe Ateniese and Danilo Francati and Bernardo Magri and Daniele Venturi}, title = {Immunization against Complete Subversion without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1173}, year = {2019}, url = {https://eprint.iacr.org/2019/1173}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AtenieseFMV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/FaustH018, author = {Sebastian Faust and Carmit Hazay and Daniele Venturi}, title = {Outsourced pattern matching}, journal = {Int. J. Inf. Sec.}, volume = {17}, number = {3}, pages = {327--346}, year = {2018}, url = {https://doi.org/10.1007/s10207-017-0374-0}, doi = {10.1007/S10207-017-0374-0}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/FaustH018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/MittelbachV18, author = {Arno Mittelbach and Daniele Venturi}, title = {Fiat-Shamir for highly sound protocols is instantiable}, journal = {Theor. Comput. Sci.}, volume = {740}, pages = {28--62}, year = {2018}, url = {https://doi.org/10.1016/j.tcs.2018.05.001}, doi = {10.1016/J.TCS.2018.05.001}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/MittelbachV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/FaonioNS018, author = {Antonio Faonio and Jesper Buus Nielsen and Mark Simkin and Daniele Venturi}, editor = {Bart Preneel and Frederik Vercauteren}, title = {Continuously Non-malleable Codes with Split-State Refresh}, booktitle = {Applied Cryptography and Network Security - 16th International Conference, {ACNS} 2018, Leuven, Belgium, July 2-4, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10892}, pages = {121--139}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93387-0\_7}, doi = {10.1007/978-3-319-93387-0\_7}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/FaonioNS018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/OstrovskyP0V18, author = {Rafail Ostrovsky and Giuseppe Persiano and Daniele Venturi and Ivan Visconti}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Continuously Non-Malleable Codes in the Split-State Model from Minimal Assumptions}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10993}, pages = {608--639}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96878-0\_21}, doi = {10.1007/978-3-319-96878-0\_21}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/OstrovskyP0V18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/AtenieseKMT018, author = {Giuseppe Ateniese and Aggelos Kiayias and Bernardo Magri and Yiannis Tselekounis and Daniele Venturi}, editor = {Joonsang Baek and Willy Susilo and Jongkil Kim}, title = {Secure Outsourcing of Cryptographic Circuits Manufacturing}, booktitle = {Provable Security - 12th International Conference, ProvSec 2018, Jeju, South Korea, October 25-28, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11192}, pages = {75--93}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01446-9\_5}, doi = {10.1007/978-3-030-01446-9\_5}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/provsec/AtenieseKMT018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/MassacciNN0W18, author = {Fabio Massacci and Chan Nam Ngo and Jing Nie and Daniele Venturi and Julian Williams}, title = {FuturesMEX: Secure, Distributed Futures Market Exchange}, booktitle = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings, 21-23 May 2018, San Francisco, California, {USA}}, pages = {335--353}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SP.2018.00028}, doi = {10.1109/SP.2018.00028}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/MassacciNN0W18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/MassacciN0W18, author = {Fabio Massacci and Chan Nam Ngo and Daniele Venturi and Julian Williams}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {Non-monotonic Security Protocols and Failures in Financial Intermediation}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {45--54}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_5}, doi = {10.1007/978-3-030-03251-7\_5}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/MassacciN0W18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FrioloMV18, author = {Daniele Friolo and Daniel Masny and Daniele Venturi}, title = {Secure Multi-Party Computation from Strongly Uniform Key Agreement}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {473}, year = {2018}, url = {https://eprint.iacr.org/2018/473}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FrioloMV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OstrovskyPVV18, author = {Rafail Ostrovsky and Giuseppe Persiano and Daniele Venturi and Ivan Visconti}, title = {Continuously Non-Malleable Codes in the Split-State Model from Minimal Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {542}, year = {2018}, url = {https://eprint.iacr.org/2018/542}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OstrovskyPVV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaonioNSV18, author = {Antonio Faonio and Jesper Buus Nielsen and Mark Simkin and Daniele Venturi}, title = {Continuously Non-Malleable Codes with Split-State Refresh}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {606}, year = {2018}, url = {https://eprint.iacr.org/2018/606}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FaonioNSV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtenieseFNV18, author = {Giuseppe Ateniese and Danilo Francati and David Nu{\~{n}}ez and Daniele Venturi}, title = {Match Me if You Can: Matchmaking Encryption and its Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1094}, year = {2018}, url = {https://eprint.iacr.org/2018/1094}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AtenieseFNV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/DamgardFMV17, author = {Ivan Damg{\aa}rd and Sebastian Faust and Pratyay Mukherjee and Daniele Venturi}, title = {Bounded Tamper Resilience: How to Go Beyond the Algebraic Barrier}, journal = {J. Cryptol.}, volume = {30}, number = {1}, pages = {152--190}, year = {2017}, url = {https://doi.org/10.1007/s00145-015-9218-0}, doi = {10.1007/S00145-015-9218-0}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joc/DamgardFMV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/KiltzPVCJ17, author = {Eike Kiltz and Krzysztof Pietrzak and Daniele Venturi and David Cash and Abhishek Jain}, title = {Efficient Authentication from Hard Learning Problems}, journal = {J. Cryptol.}, volume = {30}, number = {4}, pages = {1238--1275}, year = {2017}, url = {https://doi.org/10.1007/s00145-016-9247-3}, doi = {10.1007/S00145-016-9247-3}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/KiltzPVCJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/FaonioNV17, author = {Antonio Faonio and Jesper Buus Nielsen and Daniele Venturi}, title = {Fully leakage-resilient signatures revisited: Graceful degradation, noisy leakage, and construction in the bounded-retrieval model}, journal = {Theor. Comput. Sci.}, volume = {660}, pages = {23--56}, year = {2017}, url = {https://doi.org/10.1016/j.tcs.2016.11.016}, doi = {10.1016/J.TCS.2016.11.016}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/FaonioNV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/BiagioniMV17, author = {Silvio Biagioni and Daniel Masny and Daniele Venturi}, title = {Naor-Yung paradigm with shared randomness and applications}, journal = {Theor. Comput. Sci.}, volume = {692}, pages = {90--113}, year = {2017}, url = {https://doi.org/10.1016/j.tcs.2017.06.019}, doi = {10.1016/J.TCS.2017.06.019}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/BiagioniMV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FaustHM017, author = {Sebastian Faust and Kristina Host{\'{a}}kov{\'{a}} and Pratyay Mukherjee and Daniele Venturi}, editor = {Jonathan Katz and Hovav Shacham}, title = {Non-Malleable Codes for Space-Bounded Tampering}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10402}, pages = {95--126}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63715-0\_4}, doi = {10.1007/978-3-319-63715-0\_4}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/FaustHM017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/AtenieseM0A17, author = {Giuseppe Ateniese and Bernardo Magri and Daniele Venturi and Ewerton R. Andrade}, title = {Redactable Blockchain - or - Rewriting History in Bitcoin and Friends}, booktitle = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2017, Paris, France, April 26-28, 2017}, pages = {111--126}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/EuroSP.2017.37}, doi = {10.1109/EUROSP.2017.37}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/AtenieseM0A17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FaonioN017, author = {Antonio Faonio and Jesper Buus Nielsen and Daniele Venturi}, editor = {Serge Fehr}, title = {Predictable Arguments of Knowledge}, booktitle = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10174}, pages = {121--150}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54365-8\_6}, doi = {10.1007/978-3-662-54365-8\_6}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/FaonioN017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/MassacciNNVW17, author = {Fabio Massacci and Chan Nam Ngo and Jing Nie and Daniele Venturi and Julian Williams}, editor = {Frank Stajano and Jonathan Anderson and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {The Seconomics (Security-Economics) Vulnerabilities of Decentralized Autonomous Organizations}, booktitle = {Security Protocols {XXV} - 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10476}, pages = {171--179}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-71075-4\_19}, doi = {10.1007/978-3-319-71075-4\_19}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/MassacciNNVW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wuwnet/CaposselePSSV17, author = {Angelo Capossele and Chiara Petrioli and Gabriele Saturni and Daniele Spaccini and Daniele Venturi}, title = {Securing Underwater Communications: Key Agreement based on Fully Hashed {MQV}}, booktitle = {Proceedings of the International Conference on Underwater Networks {\&} Systems, WUWNet 2017, Halifax, NS, Canada, November 6-8, 2017}, pages = {12:1--12:5}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3148675.3152760}, doi = {10.1145/3148675.3152760}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wuwnet/CaposselePSSV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaustHM017, author = {Sebastian Faust and Kristina Host{\'{a}}kov{\'{a}} and Pratyay Mukherjee and Daniele Venturi}, title = {Non-Malleable Codes for Space-Bounded Tampering}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {530}, year = {2017}, url = {http://eprint.iacr.org/2017/530}, timestamp = {Tue, 23 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FaustHM017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/basesearch/Dellinformazione16a, author = {Daniele Venturi}, title = {Tampering in wonderland}, school = {Sapienza University of Rome, Italy}, year = {2016}, url = {http://hdl.handle.net/11573/918100}, timestamp = {Tue, 10 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/phd/basesearch/Dellinformazione16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/AtenieseDDV16, author = {Giuseppe Ateniese and {\"{O}}zg{\"{u}}r Dagdelen and Ivan Damg{\aa}rd and Daniele Venturi}, title = {Entangled cloud storage}, journal = {Future Gener. Comput. Syst.}, volume = {62}, pages = {104--118}, year = {2016}, url = {https://doi.org/10.1016/j.future.2016.01.008}, doi = {10.1016/J.FUTURE.2016.01.008}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/AtenieseDDV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/DagdelenMV16, author = {{\"{O}}zg{\"{u}}r Dagdelen and Payman Mohassel and Daniele Venturi}, title = {Rate-limited secure function evaluation}, journal = {Theor. Comput. Sci.}, volume = {653}, pages = {53--78}, year = {2016}, url = {https://doi.org/10.1016/j.tcs.2016.09.020}, doi = {10.1016/J.TCS.2016.09.020}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/DagdelenMV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/FaustMVW16, author = {Sebastian Faust and Pratyay Mukherjee and Daniele Venturi and Daniel Wichs}, title = {Efficient Non-Malleable Codes and Key Derivation for Poly-Size Tampering Circuits}, journal = {{IEEE} Trans. Inf. Theory}, volume = {62}, number = {12}, pages = {7179--7194}, year = {2016}, url = {https://doi.org/10.1109/TIT.2016.2613919}, doi = {10.1109/TIT.2016.2613919}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/FaustMVW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Faonio016, author = {Antonio Faonio and Daniele Venturi}, editor = {Jung Hee Cheon and Tsuyoshi Takagi}, title = {Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10031}, pages = {877--907}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53887-6\_32}, doi = {10.1007/978-3-662-53887-6\_32}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/Faonio016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FaustMV16, author = {Sebastian Faust and Daniel Masny and Daniele Venturi}, editor = {Chen{-}Mou Cheng and Kai{-}Min Chung and Giuseppe Persiano and Bo{-}Yin Yang}, title = {Chosen-Ciphertext Security from Subset Sum}, booktitle = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9614}, pages = {35--46}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49384-7\_2}, doi = {10.1007/978-3-662-49384-7\_2}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/FaustMV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/BiagioniMV16, author = {Silvio Biagioni and Daniel Masny and Daniele Venturi}, editor = {Vassilis Zikas and Roberto De Prisco}, title = {Naor-Yung Paradigm with Shared Randomness and Applications}, booktitle = {Security and Cryptography for Networks - 10th International Conference, {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9841}, pages = {62--80}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44618-9\_4}, doi = {10.1007/978-3-319-44618-9\_4}, timestamp = {Thu, 23 Jun 2022 19:58:57 +0200}, biburl = {https://dblp.org/rec/conf/scn/BiagioniMV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/MittelbachV16, author = {Arno Mittelbach and Daniele Venturi}, editor = {Vassilis Zikas and Roberto De Prisco}, title = {Fiat-Shamir for Highly Sound Protocols Is Instantiable}, booktitle = {Security and Cryptography for Networks - 10th International Conference, {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9841}, pages = {198--215}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44618-9\_11}, doi = {10.1007/978-3-319-44618-9\_11}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/MittelbachV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/CorettiDTV16, author = {Sandro Coretti and Yevgeniy Dodis and Bj{\"{o}}rn Tackmann and Daniele Venturi}, editor = {Eyal Kushilevitz and Tal Malkin}, title = {Non-Malleable Encryption: Simpler, Shorter, Stronger}, booktitle = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9562}, pages = {306--335}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49096-9\_13}, doi = {10.1007/978-3-662-49096-9\_13}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/CorettiDTV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MittelbachV16, author = {Arno Mittelbach and Daniele Venturi}, title = {Fiat-Shamir for Highly Sound Protocols is Instantiable}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {313}, year = {2016}, url = {http://eprint.iacr.org/2016/313}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MittelbachV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtenieseKMTV16, author = {Giuseppe Ateniese and Aggelos Kiayias and Bernardo Magri and Yiannis Tselekounis and Daniele Venturi}, title = {Secure Outsourcing of Circuit Manufacturing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {527}, year = {2016}, url = {http://eprint.iacr.org/2016/527}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AtenieseKMTV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaonioV16, author = {Antonio Faonio and Daniele Venturi}, title = {Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {529}, year = {2016}, url = {http://eprint.iacr.org/2016/529}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FaonioV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtenieseMVA16, author = {Giuseppe Ateniese and Bernardo Magri and Daniele Venturi and Ewerton R. Andrade}, title = {Redactable Blockchain - or - Rewriting History in Bitcoin and Friends}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {757}, year = {2016}, url = {http://eprint.iacr.org/2016/757}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AtenieseMVA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BiagioniMV16, author = {Silvio Biagioni and Daniel Masny and Daniele Venturi}, title = {Naor-Yung Paradigm with Shared Randomness and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {880}, year = {2016}, url = {http://eprint.iacr.org/2016/880}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BiagioniMV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AtenieseDDV15, author = {Giuseppe Ateniese and {\"{O}}zg{\"{u}}r Dagdelen and Ivan Damg{\aa}rd and Daniele Venturi}, editor = {Feng Bao and Steven Miller and Sherman S. M. Chow and Danfeng Yao}, title = {Entangled Encodings and Data Entanglement}, booktitle = {Proceedings of the 3rd International Workshop on Security in Cloud Computing, SCC@ASIACCS '15, Singapore, Republic of Singapore, April 14, 2015}, pages = {3--12}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2732516.2732524}, doi = {10.1145/2732516.2732524}, timestamp = {Thu, 20 Oct 2022 10:45:07 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AtenieseDDV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AtenieseMV15, author = {Giuseppe Ateniese and Bernardo Magri and Daniele Venturi}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Subversion-Resilient Signature Schemes}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {364--375}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813635}, doi = {10.1145/2810103.2813635}, timestamp = {Tue, 10 Nov 2020 19:58:09 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AtenieseMV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloudforward/SuzicRRVK15, author = {Bojan Suzic and Andreas Reiter and Florian Reimair and Daniele Venturi and Baldur Kubo}, editor = {Keith G. Jeffery and Dimosthenis Kyriazis}, title = {Secure Data Sharing and Processing in Heterogeneous Clouds}, booktitle = {1st International Conference on Cloud Forward: From Distributed to Complete Computing, October 6-8, 2015, Pisa, Italy}, series = {Procedia Computer Science}, volume = {68}, pages = {116--126}, publisher = {Elsevier}, year = {2015}, url = {https://doi.org/10.1016/j.procs.2015.09.228}, doi = {10.1016/J.PROCS.2015.09.228}, timestamp = {Thu, 08 Jul 2021 16:04:02 +0200}, biburl = {https://dblp.org/rec/conf/cloudforward/SuzicRRVK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/FaonioNV15, author = {Antonio Faonio and Jesper Buus Nielsen and Daniele Venturi}, editor = {Magn{\'{u}}s M. Halld{\'{o}}rsson and Kazuo Iwama and Naoki Kobayashi and Bettina Speckmann}, title = {Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation}, booktitle = {Automata, Languages, and Programming - 42nd International Colloquium, {ICALP} 2015, Kyoto, Japan, July 6-10, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9134}, pages = {456--468}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47672-7\_37}, doi = {10.1007/978-3-662-47672-7\_37}, timestamp = {Fri, 27 Mar 2020 09:02:59 +0100}, biburl = {https://dblp.org/rec/conf/icalp/FaonioNV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/DamgardFMV15, author = {Ivan Damg{\aa}rd and Sebastian Faust and Pratyay Mukherjee and Daniele Venturi}, editor = {Anja Lehmann and Stefan Wolf}, title = {The Chaining Lemma and Its Application}, booktitle = {Information Theoretic Security - 8th International Conference, {ICITS} 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9063}, pages = {181--196}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-17470-9\_11}, doi = {10.1007/978-3-319-17470-9\_11}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/icits/DamgardFMV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/KohlweissMOTV15, author = {Markulf Kohlweiss and Ueli Maurer and Cristina Onete and Bj{\"{o}}rn Tackmann and Daniele Venturi}, editor = {Alex Biryukov and Vipul Goyal}, title = {(De-)Constructing {TLS} 1.3}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2015 - 16th International Conference on Cryptology in India, Bangalore, India, December 6-9, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9462}, pages = {85--102}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26617-6\_5}, doi = {10.1007/978-3-319-26617-6\_5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/KohlweissMOTV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FaustMNV15, author = {Sebastian Faust and Pratyay Mukherjee and Jesper Buus Nielsen and Daniele Venturi}, editor = {Jonathan Katz}, title = {A Tamper and Leakage Resilient von Neumann Architecture}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {579--603}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_26}, doi = {10.1007/978-3-662-46447-2\_26}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/FaustMNV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/CorettiMTV15, author = {Sandro Coretti and Ueli Maurer and Bj{\"{o}}rn Tackmann and Daniele Venturi}, editor = {Yevgeniy Dodis and Jesper Buus Nielsen}, title = {From Single-Bit to Multi-bit Public-Key Encryption via Non-malleable Codes}, booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC} 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9014}, pages = {532--560}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46494-6\_22}, doi = {10.1007/978-3-662-46494-6\_22}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/CorettiMTV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtenieseMV15, author = {Giuseppe Ateniese and Bernardo Magri and Daniele Venturi}, title = {Subversion-Resilient Signature Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {517}, year = {2015}, url = {http://eprint.iacr.org/2015/517}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AtenieseMV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaonioNV15, author = {Antonio Faonio and Jesper Buus Nielsen and Daniele Venturi}, title = {Predictable Arguments of Knowledge}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {740}, year = {2015}, url = {http://eprint.iacr.org/2015/740}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FaonioNV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CorettiDTV15, author = {Sandro Coretti and Yevgeniy Dodis and Bj{\"{o}}rn Tackmann and Daniele Venturi}, title = {Non-Malleable Encryption: Simpler, Shorter, Stronger}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {772}, year = {2015}, url = {http://eprint.iacr.org/2015/772}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CorettiDTV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaustMV15, author = {Sebastian Faust and Daniel Masny and Daniele Venturi}, title = {Chosen-Ciphertext Security from Subset Sum}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1223}, year = {2015}, url = {http://eprint.iacr.org/2015/1223}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FaustMV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/DagdelenV14, author = {{\"{O}}zg{\"{u}}r Dagdelen and Daniele Venturi}, editor = {David Pointcheval and Damien Vergnaud}, title = {A Second Look at Fischlin's Transformation}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2014 - 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8469}, pages = {356--376}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06734-6\_22}, doi = {10.1007/978-3-319-06734-6\_22}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/DagdelenV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/balkancryptsec/DagdelenV14, author = {{\"{O}}zg{\"{u}}r Dagdelen and Daniele Venturi}, editor = {Berna {\"{O}}rs and Bart Preneel}, title = {A Multi-Party Protocol for Privacy-Preserving Cooperative Linear Systems of Equations}, booktitle = {Cryptography and Information Security in the Balkans - First International Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9024}, pages = {161--172}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-21356-9\_11}, doi = {10.1007/978-3-319-21356-9\_11}, timestamp = {Tue, 16 Nov 2021 09:08:54 +0100}, biburl = {https://dblp.org/rec/conf/balkancryptsec/DagdelenV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FaustMVW14, author = {Sebastian Faust and Pratyay Mukherjee and Daniele Venturi and Daniel Wichs}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {Efficient Non-malleable Codes and Key-Derivation for Poly-size Tampering Circuits}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {111--128}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_7}, doi = {10.1007/978-3-642-55220-5\_7}, timestamp = {Thu, 14 Oct 2021 09:58:16 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/FaustMVW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/NielsenVZ14, author = {Jesper Buus Nielsen and Daniele Venturi and Angela Zottarel}, editor = {Hugo Krawczyk}, title = {Leakage-Resilient Signatures with Graceful Degradation}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {362--379}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_21}, doi = {10.1007/978-3-642-54631-0\_21}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/NielsenVZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/FaustMNV14, author = {Sebastian Faust and Pratyay Mukherjee and Jesper Buus Nielsen and Daniele Venturi}, editor = {Yehuda Lindell}, title = {Continuous Non-malleable Codes}, booktitle = {Theory of Cryptography - 11th Theory of Cryptography Conference, {TCC} 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8349}, pages = {465--488}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54242-8\_20}, doi = {10.1007/978-3-642-54242-8\_20}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/FaustMNV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KohlweissMOTV14, author = {Markulf Kohlweiss and Ueli Maurer and Cristina Onete and Bj{\"{o}}rn Tackmann and Daniele Venturi}, title = {(De-)Constructing {TLS}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {20}, year = {2014}, url = {http://eprint.iacr.org/2014/020}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KohlweissMOTV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaustMNV14, author = {Sebastian Faust and Pratyay Mukherjee and Jesper Buus Nielsen and Daniele Venturi}, title = {Continuous Non-malleable Codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {173}, year = {2014}, url = {http://eprint.iacr.org/2014/173}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FaustMNV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DagdelenV14, author = {{\"{O}}zg{\"{u}}r Dagdelen and Daniele Venturi}, title = {A Second Look at Fischlin's Transformation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {188}, year = {2014}, url = {http://eprint.iacr.org/2014/188}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DagdelenV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CorettiMTV14, author = {Sandro Coretti and Ueli Maurer and Bj{\"{o}}rn Tackmann and Daniele Venturi}, title = {From Single-Bit to Multi-Bit Public-Key Encryption via Non-Malleable Codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {324}, year = {2014}, url = {http://eprint.iacr.org/2014/324}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CorettiMTV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaustMNV14a, author = {Sebastian Faust and Pratyay Mukherjee and Jesper Buus Nielsen and Daniele Venturi}, title = {A Tamper and Leakage Resilient Random Access Machine}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {338}, year = {2014}, url = {http://eprint.iacr.org/2014/338}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FaustMNV14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NielsenVZ14, author = {Jesper Buus Nielsen and Daniele Venturi and Angela Zottarel}, title = {On the Connection between Leakage Tolerance and Adaptive Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {517}, year = {2014}, url = {http://eprint.iacr.org/2014/517}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NielsenVZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NielsenVZ14a, author = {Jesper Buus Nielsen and Daniele Venturi and Angela Zottarel}, title = {Leakage-Resilient Signatures with Graceful Degradation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {529}, year = {2014}, url = {http://eprint.iacr.org/2014/529}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NielsenVZ14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaustHV14a, author = {Sebastian Faust and Carmit Hazay and Daniele Venturi}, title = {Outsourced Pattern Matching}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {662}, year = {2014}, url = {http://eprint.iacr.org/2014/662}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FaustHV14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaonioNV14, author = {Antonio Faonio and Jesper Buus Nielsen and Daniele Venturi}, title = {Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {913}, year = {2014}, url = {http://eprint.iacr.org/2014/913}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FaonioNV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardFMV14, author = {Ivan Damg{\aa}rd and Sebastian Faust and Pratyay Mukherjee and Daniele Venturi}, title = {The Chaining Lemma and its application}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {979}, year = {2014}, url = {http://eprint.iacr.org/2014/979}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardFMV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/DamgardFMV13, author = {Ivan Damg{\aa}rd and Sebastian Faust and Pratyay Mukherjee and Daniele Venturi}, editor = {Kazue Sako and Palash Sarkar}, title = {Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8270}, pages = {140--160}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-42045-0\_8}, doi = {10.1007/978-3-642-42045-0\_8}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/DamgardFMV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/FaustHV13, author = {Sebastian Faust and Carmit Hazay and Daniele Venturi}, editor = {Fedor V. Fomin and Rusins Freivalds and Marta Z. Kwiatkowska and David Peleg}, title = {Outsourced Pattern Matching}, booktitle = {Automata, Languages, and Programming - 40th International Colloquium, {ICALP} 2013, Riga, Latvia, July 8-12, 2013, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {7966}, pages = {545--556}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39212-2\_48}, doi = {10.1007/978-3-642-39212-2\_48}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/FaustHV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/KohlweissMOTV13, author = {Markulf Kohlweiss and Ueli Maurer and Cristina Onete and Bj{\"{o}}rn Tackmann and Daniele Venturi}, editor = {Emiliano De Cristofaro and Matthew K. Wright}, title = {Anonymity-Preserving Public-Key Encryption: {A} Constructive Approach}, booktitle = {Privacy Enhancing Technologies - 13th International Symposium, {PETS} 2013, Bloomington, IN, USA, July 10-12, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7981}, pages = {19--39}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39077-7\_2}, doi = {10.1007/978-3-642-39077-7\_2}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pet/KohlweissMOTV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DagdelenMV13, author = {{\"{O}}zg{\"{u}}r Dagdelen and Payman Mohassel and Daniele Venturi}, editor = {Kaoru Kurosawa and Goichiro Hanaoka}, title = {Rate-Limited Secure Function Evaluation: Definitions and Constructions}, booktitle = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7778}, pages = {461--478}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36362-7\_28}, doi = {10.1007/978-3-642-36362-7\_28}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DagdelenMV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/NielsenVZ13, author = {Jesper Buus Nielsen and Daniele Venturi and Angela Zottarel}, editor = {Kaoru Kurosawa and Goichiro Hanaoka}, title = {On the Connection between Leakage Tolerance and Adaptive Security}, booktitle = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7778}, pages = {497--515}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36362-7\_30}, doi = {10.1007/978-3-642-36362-7\_30}, timestamp = {Mon, 06 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/NielsenVZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DagdelenMV13, author = {{\"{O}}zg{\"{u}}r Dagdelen and Payman Mohassel and Daniele Venturi}, title = {Rate-Limited Secure Function Evaluation: Definitions and Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {21}, year = {2013}, url = {http://eprint.iacr.org/2013/021}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DagdelenMV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KohlweissMOTV13, author = {Markulf Kohlweiss and Ueli Maurer and Cristina Onete and Bj{\"{o}}rn Tackmann and Daniele Venturi}, title = {Anonymity-preserving Public-Key Encryption: {A} Constructive Approach}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {238}, year = {2013}, url = {http://eprint.iacr.org/2013/238}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KohlweissMOTV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardFMV13a, author = {Ivan Damg{\aa}rd and Sebastian Faust and Pratyay Mukherjee and Daniele Venturi}, title = {Bounded Tamper Resilience: How to go beyond the Algebraic Barrier}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {677}, year = {2013}, url = {http://eprint.iacr.org/2013/677}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardFMV13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaustMVW13, author = {Sebastian Faust and Pratyay Mukherjee and Daniele Venturi and Daniel Wichs}, title = {Efficient Non-Malleable Codes and Key-Derivation for Poly-Size Tampering Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {702}, year = {2013}, url = {http://eprint.iacr.org/2013/702}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FaustMVW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/FaustKMV12, author = {Sebastian Faust and Markulf Kohlweiss and Giorgia Azzurra Marson and Daniele Venturi}, editor = {Steven D. Galbraith and Mridul Nandi}, title = {On the Non-malleability of the Fiat-Shamir Transform}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2012, 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7668}, pages = {60--79}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34931-7\_5}, doi = {10.1007/978-3-642-34931-7\_5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/FaustKMV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtenieseDDV12, author = {Giuseppe Ateniese and {\"{O}}zg{\"{u}}r Dagdelen and Ivan Damg{\aa}rd and Daniele Venturi}, title = {Entangled Cloud Storage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {511}, year = {2012}, url = {http://eprint.iacr.org/2012/511}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AtenieseDDV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaustKMV12, author = {Sebastian Faust and Markulf Kohlweiss and Giorgia Azzurra Marson and Daniele Venturi}, title = {On the Non-malleability of the Fiat-Shamir Transform}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {704}, year = {2012}, url = {http://eprint.iacr.org/2012/704}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FaustKMV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KiltzPCJV11, author = {Eike Kiltz and Krzysztof Pietrzak and David Cash and Abhishek Jain and Daniele Venturi}, editor = {Kenneth G. Paterson}, title = {Efficient Authentication from Hard Learning Problems}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {7--26}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_3}, doi = {10.1007/978-3-642-20465-4\_3}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KiltzPCJV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/FaustPV11, author = {Sebastian Faust and Krzysztof Pietrzak and Daniele Venturi}, editor = {Luca Aceto and Monika Henzinger and Jir{\'{\i}} Sgall}, title = {Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience}, booktitle = {Automata, Languages and Programming - 38th International Colloquium, {ICALP} 2011, Zurich, Switzerland, July 4-8, 2011, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {6755}, pages = {391--402}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22006-7\_33}, doi = {10.1007/978-3-642-22006-7\_33}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/FaustPV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OneteV11, author = {Cristina Onete and Daniele Venturi}, title = {Security {\&} Indistinguishability in the Presence of Traffic Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {260}, year = {2011}, url = {http://eprint.iacr.org/2011/260}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OneteV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaustPV11, author = {Sebastian Faust and Krzysztof Pietrzak and Daniele Venturi}, title = {Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {314}, year = {2011}, url = {http://eprint.iacr.org/2011/314}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FaustPV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/DaviDV10, author = {Francesco Dav{\`{\i}} and Stefan Dziembowski and Daniele Venturi}, editor = {Juan A. Garay and Roberto De Prisco}, title = {Leakage-Resilient Storage}, booktitle = {Security and Cryptography for Networks, 7th International Conference, {SCN} 2010, Amalfi, Italy, September 13-15, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6280}, pages = {121--137}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15317-4\_9}, doi = {10.1007/978-3-642-15317-4\_9}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/scn/DaviDV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/TodiniBV09, author = {Alfredo Todini and Andrea Baiocchi and Daniele Venturi}, title = {Inadequacy of the Queue-Based Max-Weight Optimal Scheduler on Wireless Links with {TCP} Sources}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2009, Dresden, Germany, 14-18 June 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICC.2009.5199080}, doi = {10.1109/ICC.2009.5199080}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/TodiniBV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/Venturi09, author = {Daniele Venturi}, title = {Lecture Notes on Algorithmic Number Theory}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR09-062}}, year = {2009}, url = {https://eccc.weizmann.ac.il/report/2009/062}, eprinttype = {ECCC}, eprint = {TR09-062}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/Venturi09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DaviDV09, author = {Francesco Dav{\`{\i}} and Stefan Dziembowski and Daniele Venturi}, title = {Leakage-Resilient Storage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {399}, year = {2009}, url = {http://eprint.iacr.org/2009/399}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DaviDV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.