BibTeX records: Daniele Venturi 0001

download as .bib file

@article{DBLP:journals/joc/FrancatiFMV24,
  author       = {Danilo Francati and
                  Daniele Friolo and
                  Giulio Malavolta and
                  Daniele Venturi},
  title        = {Multi-key and Multi-input Predicate Encryption (for Conjunctions)
                  from Learning with Errors},
  journal      = {J. Cryptol.},
  volume       = {37},
  number       = {3},
  pages        = {24},
  year         = {2024},
  url          = {https://doi.org/10.1007/s00145-024-09504-7},
  doi          = {10.1007/S00145-024-09504-7},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/FrancatiFMV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/FrancatiV24,
  author       = {Danilo Francati and
                  Daniele Venturi},
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {Non-malleable Fuzzy Extractors},
  booktitle    = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14583},
  pages        = {135--155},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54770-6\_6},
  doi          = {10.1007/978-3-031-54770-6\_6},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/FrancatiV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ObresmkiRRSV24,
  author       = {Maciej Obremski and
                  Jo{\~{a}}o Ribeiro and
                  Lawrence Roy and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Daniele Venturi},
  editor       = {Leonid Reyzin and
                  Douglas Stebila},
  title        = {Improved Reductions from Noisy to Bounded and Probing Leakages via
                  Hockey-Stick Divergences},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2024 - 44th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2024,
                  Proceedings, Part {VI}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14925},
  pages        = {461--491},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-68391-6\_14},
  doi          = {10.1007/978-3-031-68391-6\_14},
  timestamp    = {Fri, 20 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ObresmkiRRSV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icml/ZhangEF0AB24,
  author       = {Hanlin Zhang and
                  Benjamin L. Edelman and
                  Danilo Francati and
                  Daniele Venturi and
                  Giuseppe Ateniese and
                  Boaz Barak},
  title        = {Watermarks in the Sand: Impossibility of Strong Watermarking for Language
                  Models},
  booktitle    = {Forty-first International Conference on Machine Learning, {ICML} 2024,
                  Vienna, Austria, July 21-27, 2024},
  publisher    = {OpenReview.net},
  year         = {2024},
  url          = {https://openreview.net/forum?id=bM2s12t4hR},
  timestamp    = {Mon, 02 Sep 2024 16:45:29 +0200},
  biburl       = {https://dblp.org/rec/conf/icml/ZhangEF0AB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2407-10684,
  author       = {Michele Kryston and
                  Edoardo Marangone and
                  Claudio Di Ciccio and
                  Daniele Friolo and
                  Eugenio Nerio Nemmi and
                  Mattia Samory and
                  Michele Spina and
                  Daniele Venturi and
                  Ingo Weber},
  title        = {{MARTSIA:} Safeguarding Data Confidentiality in Blockchain-Driven
                  Process Execution},
  journal      = {CoRR},
  volume       = {abs/2407.10684},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2407.10684},
  doi          = {10.48550/ARXIV.2407.10684},
  eprinttype    = {arXiv},
  eprint       = {2407.10684},
  timestamp    = {Thu, 15 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2407-10684.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ObremskiRRSV24,
  author       = {Maciej Obremski and
                  Jo{\~{a}}o Ribeiro and
                  Lawrence Roy and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Daniele Venturi},
  title        = {Improved Reductions from Noisy to Bounded and Probing Leakages via
                  Hockey-Stick Divergences},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1009},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/1009},
  timestamp    = {Wed, 14 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ObremskiRRSV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/FrioloSV23,
  author       = {Daniele Friolo and
                  Matteo Salvino and
                  Daniele Venturi},
  editor       = {Mehdi Tibouchi and
                  Xiaofeng Wang},
  title        = {On the Complete Non-malleability of the Fujisaki-Okamoto Transform},
  booktitle    = {Applied Cryptography and Network Security - 21st International Conference,
                  {ACNS} 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13906},
  pages        = {307--335},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-33491-7\_12},
  doi          = {10.1007/978-3-031-33491-7\_12},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/FrioloSV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/FrancatiFMMRV23,
  author       = {Danilo Francati and
                  Daniele Friolo and
                  Monosij Maitra and
                  Giulio Malavolta and
                  Ahmadreza Rahimi and
                  Daniele Venturi},
  editor       = {Jian Guo and
                  Ron Steinfeld},
  title        = {Registered (Inner-Product) Functional Encryption},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Guangzhou, China, December 4-8, 2023, Proceedings, Part {V}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14442},
  pages        = {98--133},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8733-7\_4},
  doi          = {10.1007/978-981-99-8733-7\_4},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/FrancatiFMMRV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edoc/MarangoneCFNVW23,
  author       = {Edoardo Marangone and
                  Claudio Di Ciccio and
                  Daniele Friolo and
                  Eugenio Nerio Nemmi and
                  Daniele Venturi and
                  Ingo Weber},
  editor       = {Henderik A. Proper and
                  Luise Pufahl and
                  Dimka Karastoyanova and
                  Marten van Sinderen and
                  Jo{\~{a}}o L. R. Moreira},
  title        = {{MARTSIA:} Enabling Data Confidentiality for Blockchain-Based Process
                  Execution},
  booktitle    = {Enterprise Design, Operations, and Computing - 27th International
                  Conference, {EDOC} 2023, Groningen, The Netherlands, October 30 -
                  November 3, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14367},
  pages        = {58--76},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-46587-1\_4},
  doi          = {10.1007/978-3-031-46587-1\_4},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/edoc/MarangoneCFNVW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/FrancatiFMV23,
  author       = {Danilo Francati and
                  Daniele Friolo and
                  Giulio Malavolta and
                  Daniele Venturi},
  editor       = {Carmit Hazay and
                  Martijn Stam},
  title        = {Multi-key and Multi-input Predicate Encryption from Learning with
                  Errors},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Lyon, France, April 23-27, 2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14006},
  pages        = {573--604},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-30620-4\_19},
  doi          = {10.1007/978-3-031-30620-4\_19},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/FrancatiFMV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2303-17977,
  author       = {Edoardo Marangone and
                  Claudio Di Ciccio and
                  Daniele Friolo and
                  Eugenio Nerio Nemmi and
                  Daniele Venturi and
                  Ingo Weber},
  title        = {{MARTSIA:} Enabling Data Confidentiality for Blockchain-based Process
                  Execution},
  journal      = {CoRR},
  volume       = {abs/2303.17977},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2303.17977},
  doi          = {10.48550/ARXIV.2303.17977},
  eprinttype    = {arXiv},
  eprint       = {2303.17977},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2303-17977.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2308-03791,
  author       = {Edoardo Marangone and
                  Claudio Di Ciccio and
                  Daniele Friolo and
                  Eugenio Nerio Nemmi and
                  Daniele Venturi and
                  Ingo Weber},
  title        = {Enabling Data Confidentiality with Public Blockchains},
  journal      = {CoRR},
  volume       = {abs/2308.03791},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2308.03791},
  doi          = {10.48550/ARXIV.2308.03791},
  eprinttype    = {arXiv},
  eprint       = {2308.03791},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2308-03791.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2311-04378,
  author       = {Hanlin Zhang and
                  Benjamin L. Edelman and
                  Danilo Francati and
                  Daniele Venturi and
                  Giuseppe Ateniese and
                  Boaz Barak},
  title        = {Watermarks in the Sand: Impossibility of Strong Watermarking for Generative
                  Models},
  journal      = {CoRR},
  volume       = {abs/2311.04378},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2311.04378},
  doi          = {10.48550/ARXIV.2311.04378},
  eprinttype    = {arXiv},
  eprint       = {2311.04378},
  timestamp    = {Tue, 14 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2311-04378.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FrancatiFMMRV23,
  author       = {Danilo Francati and
                  Daniele Friolo and
                  Monosij Maitra and
                  Giulio Malavolta and
                  Ahmadreza Rahimi and
                  Daniele Venturi},
  title        = {Registered (Inner-Product) Functional Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {395},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/395},
  timestamp    = {Fri, 31 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FrancatiFMMRV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FrancatiV23,
  author       = {Danilo Francati and
                  Daniele Venturi},
  title        = {Evolving Secret Sharing Made Short},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1534},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1534},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FrancatiV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangEFVAB23,
  author       = {Hanlin Zhang and
                  Benjamin L. Edelman and
                  Danilo Francati and
                  Daniele Venturi and
                  Giuseppe Ateniese and
                  Boaz Barak},
  title        = {Watermarks in the Sand: Impossibility of Strong Watermarking for Generative
                  Models},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1776},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1776},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangEFVAB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChakrabortyMMV23,
  author       = {Suvradip Chakraborty and
                  Lorenzo Magliocco and
                  Bernardo Magri and
                  Daniele Venturi},
  title        = {Key Exchange in the Post-Snowden Era: {UC} Secure Subversion-Resilient
                  {PAKE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1827},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1827},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ChakrabortyMMV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FrioloMNV22,
  author       = {Daniele Friolo and
                  Fabio Massacci and
                  Chan Nam Ngo and
                  Daniele Venturi},
  title        = {Cryptographic and Financial Fairness},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {17},
  pages        = {3391--3406},
  year         = {2022},
  url          = {https://doi.org/10.1109/TIFS.2022.3198852},
  doi          = {10.1109/TIFS.2022.3198852},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/FrioloMNV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/BrianFORSSV22,
  author       = {Gianluca Brian and
                  Antonio Faonio and
                  Maciej Obremski and
                  Jo{\~{a}}o Ribeiro and
                  Mark Simkin and
                  Maciej Sk{\'{o}}rski and
                  Daniele Venturi},
  title        = {The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded
                  Leakage (Almost) for Free},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {68},
  number       = {12},
  pages        = {8197--8227},
  year         = {2022},
  url          = {https://doi.org/10.1109/TIT.2022.3193848},
  doi          = {10.1109/TIT.2022.3193848},
  timestamp    = {Sat, 18 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/BrianFORSSV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BrianFRV22,
  author       = {Gianluca Brian and
                  Antonio Faonio and
                  Jo{\~{a}}o Ribeiro and
                  Daniele Venturi},
  title        = {Short Non-Malleable Codes from Related-Key Secure Block Ciphers, Revisited},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {3},
  pages        = {1--19},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i3.1-19},
  doi          = {10.46586/TOSC.V2022.I3.1-19},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/BrianFRV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BrianFMV22,
  author       = {Gianluca Brian and
                  Sebastian Faust and
                  Elena Micheli and
                  Daniele Venturi},
  editor       = {Shweta Agrawal and
                  Dongdai Lin},
  title        = {Continuously Non-malleable Codes Against Bounded-Depth Tampering},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13794},
  pages        = {384--413},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22972-5\_14},
  doi          = {10.1007/978-3-031-22972-5\_14},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BrianFMV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/citc/MadathilOS022,
  author       = {Varun Madathil and
                  Chris Orsini and
                  Alessandra Scafuro and
                  Daniele Venturi},
  editor       = {Dana Dachman{-}Soled},
  title        = {From Privacy-Only to Simulatable {OT:} Black-Box, Round-Optimal, Information-Theoretic},
  booktitle    = {3rd Conference on Information-Theoretic Cryptography, {ITC} 2022,
                  July 5-7, 2022, Cambridge, MA, {USA}},
  series       = {LIPIcs},
  volume       = {230},
  pages        = {5:1--5:20},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2022},
  url          = {https://doi.org/10.4230/LIPIcs.ITC.2022.5},
  doi          = {10.4230/LIPICS.ITC.2022.5},
  timestamp    = {Wed, 21 Aug 2024 22:46:00 +0200},
  biburl       = {https://dblp.org/rec/conf/citc/MadathilOS022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/ChakrabortyMNV22,
  author       = {Suvradip Chakraborty and
                  Bernardo Magri and
                  Jesper Buus Nielsen and
                  Daniele Venturi},
  editor       = {Orr Dunkelman and
                  Stefan Dziembowski},
  title        = {Universally Composable Subversion-Resilient Cryptography},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13275},
  pages        = {272--302},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-06944-4\_10},
  doi          = {10.1007/978-3-031-06944-4\_10},
  timestamp    = {Tue, 31 May 2022 17:23:10 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/ChakrabortyMNV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2022,
  editor       = {Giuseppe Ateniese and
                  Daniele Venturi},
  title        = {Applied Cryptography and Network Security - 20th International Conference,
                  {ACNS} 2022, Rome, Italy, June 20-23, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13269},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-09234-3},
  doi          = {10.1007/978-3-031-09234-3},
  isbn         = {978-3-031-09233-6},
  timestamp    = {Tue, 21 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2207-10780,
  author       = {Daniele Friolo and
                  Fabio Massacci and
                  Chan Nam Ngo and
                  Daniele Venturi},
  title        = {Cryptographic and Financial Fairness},
  journal      = {CoRR},
  volume       = {abs/2207.10780},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2207.10780},
  doi          = {10.48550/ARXIV.2207.10780},
  eprinttype    = {arXiv},
  eprint       = {2207.10780},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2207-10780.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MadathilOSV22,
  author       = {Varun Madathil and
                  Chris Orsini and
                  Alessandra Scafuro and
                  Daniele Venturi},
  title        = {From Privacy-Only to Simulatable {OT:} Black-Box, Round-Optimal, Information-theoretic},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {34},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/034},
  timestamp    = {Fri, 18 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/MadathilOSV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChakrabortyMNV22,
  author       = {Suvradip Chakraborty and
                  Bernardo Magri and
                  Jesper Buus Nielsen and
                  Daniele Venturi},
  title        = {Universally Composable Subversion-Resilient Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {244},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/244},
  timestamp    = {Tue, 22 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ChakrabortyMNV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FrancatiFM022,
  author       = {Danilo Francati and
                  Daniele Friolo and
                  Giulio Malavolta and
                  Daniele Venturi},
  title        = {Multi-key and Multi-input Predicate Encryption from Learning with
                  Errors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {806},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/806},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FrancatiFM022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrianF0022,
  author       = {Gianluca Brian and
                  Antonio Faonio and
                  Jo{\~{a}}o Ribeiro and
                  Daniele Venturi},
  title        = {Short Non-Malleable Codes from Related-Key Secure Block Ciphers, Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1100},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1100},
  timestamp    = {Sat, 18 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BrianF0022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrianFM022,
  author       = {Gianluca Brian and
                  Sebastian Faust and
                  Elena Micheli and
                  Daniele Venturi},
  title        = {Continuously Non-Malleable Codes against Bounded-Depth Tampering},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1231},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1231},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrianFM022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FrioloSV22,
  author       = {Daniele Friolo and
                  Matteo Salvino and
                  Daniele Venturi},
  title        = {On the Complete Non-Malleability of the Fujisaki-Okamoto Transform},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1654},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1654},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FrioloSV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/AtenieseFNV21,
  author       = {Giuseppe Ateniese and
                  Danilo Francati and
                  David Nu{\~{n}}ez and
                  Daniele Venturi},
  title        = {Match Me if You Can: Matchmaking Encryption and Its Applications},
  journal      = {J. Cryptol.},
  volume       = {34},
  number       = {3},
  pages        = {16},
  year         = {2021},
  url          = {https://doi.org/10.1007/s00145-021-09381-4},
  doi          = {10.1007/S00145-021-09381-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/AtenieseFNV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/GaneshMV21,
  author       = {Chaya Ganesh and
                  Bernardo Magri and
                  Daniele Venturi},
  title        = {Cryptographic reverse firewalls for interactive proof systems},
  journal      = {Theor. Comput. Sci.},
  volume       = {855},
  pages        = {104--132},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.tcs.2020.11.043},
  doi          = {10.1016/J.TCS.2020.11.043},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/GaneshMV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/AtenieseFMV21,
  author       = {Giuseppe Ateniese and
                  Danilo Francati and
                  Bernardo Magri and
                  Daniele Venturi},
  title        = {Immunization against complete subversion without random oracles},
  journal      = {Theor. Comput. Sci.},
  volume       = {859},
  pages        = {1--36},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.tcs.2021.01.002},
  doi          = {10.1016/J.TCS.2021.01.002},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/AtenieseFMV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/SamarinFVA21,
  author       = {Somayeh Dolatnezhad Samarin and
                  Dario Fiore and
                  Daniele Venturi and
                  Morteza Amini},
  title        = {A compiler for multi-key homomorphic signatures for Turing machines},
  journal      = {Theor. Comput. Sci.},
  volume       = {889},
  pages        = {145--170},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.tcs.2021.08.002},
  doi          = {10.1016/J.TCS.2021.08.002},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/SamarinFVA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BrianFO00S021,
  author       = {Gianluca Brian and
                  Antonio Faonio and
                  Maciej Obremski and
                  Jo{\~{a}}o Ribeiro and
                  Mark Simkin and
                  Maciej Sk{\'{o}}rski and
                  Daniele Venturi},
  editor       = {Anne Canteaut and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded
                  Leakage (Almost) for Free},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12697},
  pages        = {408--437},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-77886-6\_14},
  doi          = {10.1007/978-3-030-77886-6\_14},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BrianFO00S021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/BottaFVV21,
  author       = {Vincenzo Botta and
                  Daniele Friolo and
                  Daniele Venturi and
                  Ivan Visconti},
  editor       = {Nikita Borisov and
                  Claudia D{\'{\i}}az},
  title        = {Shielded Computations in Smart Contracts Overcoming Forks},
  booktitle    = {Financial Cryptography and Data Security - 25th International Conference,
                  {FC} 2021, Virtual Event, March 1-5, 2021, Revised Selected Papers,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12674},
  pages        = {73--92},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-662-64322-8\_4},
  doi          = {10.1007/978-3-662-64322-8\_4},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/BottaFVV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/FrancatiGRV21,
  author       = {Danilo Francati and
                  Alessio Guidi and
                  Luigi Russo and
                  Daniele Venturi},
  editor       = {Avishek Adhikari and
                  Ralf K{\"{u}}sters and
                  Bart Preneel},
  title        = {Identity-Based Matchmaking Encryption Without Random Oracles},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2021 - 22nd International Conference
                  on Cryptology in India, Jaipur, India, December 12-15, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13143},
  pages        = {415--435},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92518-5\_19},
  doi          = {10.1007/978-3-030-92518-5\_19},
  timestamp    = {Wed, 12 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/FrancatiGRV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BrianF021,
  author       = {Gianluca Brian and
                  Antonio Faonio and
                  Daniele Venturi},
  editor       = {Kobbi Nissim and
                  Brent Waters},
  title        = {Continuously Non-malleable Secret Sharing: Joint Tampering, Plain
                  Model and Capacity},
  booktitle    = {Theory of Cryptography - 19th International Conference, {TCC} 2021,
                  Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13043},
  pages        = {333--364},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90453-1\_12},
  doi          = {10.1007/978-3-030-90453-1\_12},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/BrianF021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrianFV21,
  author       = {Gianluca Brian and
                  Antonio Faonio and
                  Daniele Venturi},
  title        = {Continuously Non-Malleable Secret Sharing: Joint Tampering, Plain
                  Model and Capacity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1128},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1128},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrianFV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SamarinFVA21,
  author       = {Somayeh Dolatnezhad Samarin and
                  Dario Fiore and
                  Daniele Venturi and
                  Morteza Amini},
  title        = {A compiler for multi-key homomorphic signatures for Turing machines},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1651},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1651},
  timestamp    = {Thu, 13 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/SamarinFVA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FrancatiGRV21,
  author       = {Danilo Francati and
                  Alessio Guidi and
                  Luigi Russo and
                  Daniele Venturi},
  title        = {Identity-Based Matchmaking Encryption without Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1660},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1660},
  timestamp    = {Wed, 12 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FrancatiGRV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/CorettiDMTV20,
  author       = {Sandro Coretti and
                  Yevgeniy Dodis and
                  Ueli Maurer and
                  Bj{\"{o}}rn Tackmann and
                  Daniele Venturi},
  title        = {Non-malleable Encryption: Simpler, Shorter, Stronger},
  journal      = {J. Cryptol.},
  volume       = {33},
  number       = {4},
  pages        = {1984--2033},
  year         = {2020},
  url          = {https://doi.org/10.1007/s00145-020-09361-0},
  doi          = {10.1007/S00145-020-09361-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/CorettiDMTV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/FaustMNV20,
  author       = {Sebastian Faust and
                  Pratyay Mukherjee and
                  Jesper Buus Nielsen and
                  Daniele Venturi},
  title        = {Continuously Non-malleable Codes in the Split-State Model},
  journal      = {J. Cryptol.},
  volume       = {33},
  number       = {4},
  pages        = {2034--2077},
  year         = {2020},
  url          = {https://doi.org/10.1007/s00145-020-09362-z},
  doi          = {10.1007/S00145-020-09362-Z},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joc/FaustMNV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/AtenieseMV20,
  author       = {Giuseppe Ateniese and
                  Bernardo Magri and
                  Daniele Venturi},
  title        = {Subversion-resilient signatures: Definitions, constructions and applications},
  journal      = {Theor. Comput. Sci.},
  volume       = {820},
  pages        = {91--122},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.tcs.2020.03.021},
  doi          = {10.1016/J.TCS.2020.03.021},
  timestamp    = {Tue, 21 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/AtenieseMV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BrianFO0020,
  author       = {Gianluca Brian and
                  Antonio Faonio and
                  Maciej Obremski and
                  Mark Simkin and
                  Daniele Venturi},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Non-malleable Secret Sharing Against Bounded Joint-Tampering Attacks
                  in the Plain Model},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12172},
  pages        = {127--155},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56877-1\_5},
  doi          = {10.1007/978-3-030-56877-1\_5},
  timestamp    = {Mon, 28 Aug 2023 21:17:50 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BrianFO0020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/NgoFM0B20,
  author       = {Chan Nam Ngo and
                  Daniele Friolo and
                  Fabio Massacci and
                  Daniele Venturi and
                  Ettore Battaiola},
  title        = {Vision: What If They All Die? Crypto Requirements For Key People},
  booktitle    = {{IEEE} European Symposium on Security and Privacy Workshops, EuroS{\&}P
                  Workshops 2020, Genoa, Italy, September 7-11, 2020},
  pages        = {178--183},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/EuroSPW51379.2020.00032},
  doi          = {10.1109/EUROSPW51379.2020.00032},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosp/NgoFM0B20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/GaneshM020,
  author       = {Chaya Ganesh and
                  Bernardo Magri and
                  Daniele Venturi},
  editor       = {Artur Czumaj and
                  Anuj Dawar and
                  Emanuela Merelli},
  title        = {Cryptographic Reverse Firewalls for Interactive Proof Systems},
  booktitle    = {47th International Colloquium on Automata, Languages, and Programming,
                  {ICALP} 2020, July 8-11, 2020, Saarbr{\"{u}}cken, Germany (Virtual
                  Conference)},
  series       = {LIPIcs},
  volume       = {168},
  pages        = {55:1--55:16},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2020},
  url          = {https://doi.org/10.4230/LIPIcs.ICALP.2020.55},
  doi          = {10.4230/LIPICS.ICALP.2020.55},
  timestamp    = {Wed, 21 Aug 2024 22:46:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/GaneshM020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/CiampiPV20,
  author       = {Michele Ciampi and
                  Roberto Parisella and
                  Daniele Venturi},
  editor       = {Clemente Galdi and
                  Vladimir Kolesnikov},
  title        = {On Adaptive Security of Delayed-Input Sigma Protocols and Fiat-Shamir
                  NIZKs},
  booktitle    = {Security and Cryptography for Networks - 12th International Conference,
                  {SCN} 2020, Amalfi, Italy, September 14-16, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12238},
  pages        = {670--690},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-57990-6\_33},
  doi          = {10.1007/978-3-030-57990-6\_33},
  timestamp    = {Sat, 19 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/CiampiPV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaneshMV20,
  author       = {Chaya Ganesh and
                  Bernardo Magri and
                  Daniele Venturi},
  title        = {Cryptographic Reverse Firewalls for Interactive Proof Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {204},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/204},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaneshMV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrianFOSV20,
  author       = {Gianluca Brian and
                  Antonio Faonio and
                  Maciej Obremski and
                  Mark Simkin and
                  Daniele Venturi},
  title        = {Non-Malleable Secret Sharing against Bounded Joint-Tampering Attacks
                  in the Plain Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {725},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/725},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BrianFOSV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CiampiPV20,
  author       = {Michele Ciampi and
                  Roberto Parisella and
                  Daniele Venturi},
  title        = {On Adaptive Security of Delayed-Input Sigma Protocols and Fiat-Shamir
                  NIZKs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {831},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/831},
  timestamp    = {Mon, 27 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CiampiPV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrianFORSSV20,
  author       = {Gianluca Brian and
                  Antonio Faonio and
                  Maciej Obremski and
                  Jo{\~{a}}o Ribeiro and
                  Mark Simkin and
                  Maciej Sk{\'{o}}rski and
                  Daniele Venturi},
  title        = {The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded
                  Leakage (Almost) for Free},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1246},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1246},
  timestamp    = {Sat, 18 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BrianFORSSV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/FaonioNSV19,
  author       = {Antonio Faonio and
                  Jesper Buus Nielsen and
                  Mark Simkin and
                  Daniele Venturi},
  title        = {Continuously non-malleable codes with split-state refresh},
  journal      = {Theor. Comput. Sci.},
  volume       = {759},
  pages        = {98--132},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.tcs.2018.12.028},
  doi          = {10.1016/J.TCS.2018.12.028},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/FaonioNSV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/CorettiF019,
  author       = {Sandro Coretti and
                  Antonio Faonio and
                  Daniele Venturi},
  editor       = {Robert H. Deng and
                  Val{\'{e}}rie Gauthier{-}Uma{\~{n}}a and
                  Mart{\'{\i}}n Ochoa and
                  Moti Yung},
  title        = {Rate-Optimizing Compilers for Continuously Non-malleable Codes},
  booktitle    = {Applied Cryptography and Network Security - 17th International Conference,
                  {ACNS} 2019, Bogota, Colombia, June 5-7, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11464},
  pages        = {3--23},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21568-2\_1},
  doi          = {10.1007/978-3-030-21568-2\_1},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/CorettiF019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/AtenieseFM019,
  author       = {Giuseppe Ateniese and
                  Danilo Francati and
                  Bernardo Magri and
                  Daniele Venturi},
  editor       = {Robert H. Deng and
                  Val{\'{e}}rie Gauthier{-}Uma{\~{n}}a and
                  Mart{\'{\i}}n Ochoa and
                  Moti Yung},
  title        = {Public Immunization Against Complete Subversion Without Random Oracles},
  booktitle    = {Applied Cryptography and Network Security - 17th International Conference,
                  {ACNS} 2019, Bogota, Colombia, June 5-7, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11464},
  pages        = {465--485},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21568-2\_23},
  doi          = {10.1007/978-3-030-21568-2\_23},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/AtenieseFM019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Faonio019,
  author       = {Antonio Faonio and
                  Daniele Venturi},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Non-malleable Secret Sharing in the Computational Setting: Adaptive
                  Tampering, Noisy-Leakage Resilience, and Improved Rate},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11693},
  pages        = {448--479},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26951-7\_16},
  doi          = {10.1007/978-3-030-26951-7\_16},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/Faonio019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AtenieseFN019,
  author       = {Giuseppe Ateniese and
                  Danilo Francati and
                  David Nu{\~{n}}ez and
                  Daniele Venturi},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Match Me if You Can: Matchmaking Encryption and Its Applications},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11693},
  pages        = {701--731},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26951-7\_24},
  doi          = {10.1007/978-3-030-26951-7\_24},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/AtenieseFN019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sds/AkilMV19,
  author       = {Mahdi Akil and
                  Luigi V. Mancini and
                  Daniele Venturi},
  title        = {Multi-Covert Channel Attack in the Cloud},
  booktitle    = {6th International Conference on Software Defined Systems, {SDS} 2019,
                  Rome, Italy, June 10-13, 2019},
  pages        = {160--165},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SDS.2019.8768563},
  doi          = {10.1109/SDS.2019.8768563},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/sds/AkilMV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/FrioloMN019,
  author       = {Daniele Friolo and
                  Fabio Massacci and
                  Chan Nam Ngo and
                  Daniele Venturi},
  editor       = {Jonathan Anderson and
                  Frank Stajano and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {Affordable Security or Big Guy vs Small Guy - Does the Depth of Your
                  Pockets Impact Your Protocols?},
  booktitle    = {Security Protocols {XXVII} - 27th International Workshop, Cambridge,
                  UK, April 10-12, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12287},
  pages        = {135--147},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-57043-9\_13},
  doi          = {10.1007/978-3-030-57043-9\_13},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/FrioloMN019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/FrioloM019,
  author       = {Daniele Friolo and
                  Daniel Masny and
                  Daniele Venturi},
  editor       = {Dennis Hofheinz and
                  Alon Rosen},
  title        = {A Black-Box Construction of Fully-Simulatable, Round-Optimal Oblivious
                  Transfer from Strongly Uniform Key Agreement},
  booktitle    = {Theory of Cryptography - 17th International Conference, {TCC} 2019,
                  Nuremberg, Germany, December 1-5, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11891},
  pages        = {111--130},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-36030-6\_5},
  doi          = {10.1007/978-3-030-36030-6\_5},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/FrioloM019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BrianF019,
  author       = {Gianluca Brian and
                  Antonio Faonio and
                  Daniele Venturi},
  editor       = {Dennis Hofheinz and
                  Alon Rosen},
  title        = {Continuously Non-malleable Secret Sharing for General Access Structures},
  booktitle    = {Theory of Cryptography - 17th International Conference, {TCC} 2019,
                  Nuremberg, Germany, December 1-5, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11892},
  pages        = {211--232},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-36033-7\_8},
  doi          = {10.1007/978-3-030-36033-7\_8},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/BrianF019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CorettiF019,
  author       = {Sandro Coretti and
                  Antonio Faonio and
                  Daniele Venturi},
  title        = {Rate-Optimizing Compilers for Continuously Non-Malleable Codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {55},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/055},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/CorettiF019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Faonio019,
  author       = {Antonio Faonio and
                  Daniele Venturi},
  title        = {Non-Malleable Secret Sharing in the Computational Setting: Adaptive
                  Tampering, Noisy-Leakage Resilience, and Improved Rate},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {105},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/105},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/Faonio019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrianF019,
  author       = {Gianluca Brian and
                  Antonio Faonio and
                  Daniele Venturi},
  title        = {Continuously Non-Malleable Secret Sharing for General Access Structures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {602},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/602},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BrianF019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BottaFVV19,
  author       = {Vincenzo Botta and
                  Daniele Friolo and
                  Daniele Venturi and
                  Ivan Visconti},
  title        = {The Rush Dilemma: Attacking and Repairing Smart Contracts on Forking
                  Blockchains},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {891},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/891},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BottaFVV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseFMV19,
  author       = {Giuseppe Ateniese and
                  Danilo Francati and
                  Bernardo Magri and
                  Daniele Venturi},
  title        = {Immunization against Complete Subversion without Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1173},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1173},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtenieseFMV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/FaustH018,
  author       = {Sebastian Faust and
                  Carmit Hazay and
                  Daniele Venturi},
  title        = {Outsourced pattern matching},
  journal      = {Int. J. Inf. Sec.},
  volume       = {17},
  number       = {3},
  pages        = {327--346},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10207-017-0374-0},
  doi          = {10.1007/S10207-017-0374-0},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/FaustH018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/MittelbachV18,
  author       = {Arno Mittelbach and
                  Daniele Venturi},
  title        = {Fiat-Shamir for highly sound protocols is instantiable},
  journal      = {Theor. Comput. Sci.},
  volume       = {740},
  pages        = {28--62},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.tcs.2018.05.001},
  doi          = {10.1016/J.TCS.2018.05.001},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/MittelbachV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/FaonioNS018,
  author       = {Antonio Faonio and
                  Jesper Buus Nielsen and
                  Mark Simkin and
                  Daniele Venturi},
  editor       = {Bart Preneel and
                  Frederik Vercauteren},
  title        = {Continuously Non-malleable Codes with Split-State Refresh},
  booktitle    = {Applied Cryptography and Network Security - 16th International Conference,
                  {ACNS} 2018, Leuven, Belgium, July 2-4, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10892},
  pages        = {121--139},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93387-0\_7},
  doi          = {10.1007/978-3-319-93387-0\_7},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/FaonioNS018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/OstrovskyP0V18,
  author       = {Rafail Ostrovsky and
                  Giuseppe Persiano and
                  Daniele Venturi and
                  Ivan Visconti},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Continuously Non-Malleable Codes in the Split-State Model from Minimal
                  Assumptions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10993},
  pages        = {608--639},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96878-0\_21},
  doi          = {10.1007/978-3-319-96878-0\_21},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/OstrovskyP0V18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/AtenieseKMT018,
  author       = {Giuseppe Ateniese and
                  Aggelos Kiayias and
                  Bernardo Magri and
                  Yiannis Tselekounis and
                  Daniele Venturi},
  editor       = {Joonsang Baek and
                  Willy Susilo and
                  Jongkil Kim},
  title        = {Secure Outsourcing of Cryptographic Circuits Manufacturing},
  booktitle    = {Provable Security - 12th International Conference, ProvSec 2018, Jeju,
                  South Korea, October 25-28, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11192},
  pages        = {75--93},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01446-9\_5},
  doi          = {10.1007/978-3-030-01446-9\_5},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/AtenieseKMT018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/MassacciNN0W18,
  author       = {Fabio Massacci and
                  Chan Nam Ngo and
                  Jing Nie and
                  Daniele Venturi and
                  Julian Williams},
  title        = {FuturesMEX: Secure, Distributed Futures Market Exchange},
  booktitle    = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings,
                  21-23 May 2018, San Francisco, California, {USA}},
  pages        = {335--353},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SP.2018.00028},
  doi          = {10.1109/SP.2018.00028},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/MassacciNN0W18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/MassacciN0W18,
  author       = {Fabio Massacci and
                  Chan Nam Ngo and
                  Daniele Venturi and
                  Julian Williams},
  editor       = {Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {Non-monotonic Security Protocols and Failures in Financial Intermediation},
  booktitle    = {Security Protocols {XXVI} - 26th International Workshop, Cambridge,
                  UK, March 19-21, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11286},
  pages        = {45--54},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03251-7\_5},
  doi          = {10.1007/978-3-030-03251-7\_5},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/MassacciN0W18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FrioloMV18,
  author       = {Daniele Friolo and
                  Daniel Masny and
                  Daniele Venturi},
  title        = {Secure Multi-Party Computation from Strongly Uniform Key Agreement},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {473},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/473},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FrioloMV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OstrovskyPVV18,
  author       = {Rafail Ostrovsky and
                  Giuseppe Persiano and
                  Daniele Venturi and
                  Ivan Visconti},
  title        = {Continuously Non-Malleable Codes in the Split-State Model from Minimal
                  Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {542},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/542},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OstrovskyPVV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaonioNSV18,
  author       = {Antonio Faonio and
                  Jesper Buus Nielsen and
                  Mark Simkin and
                  Daniele Venturi},
  title        = {Continuously Non-Malleable Codes with Split-State Refresh},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {606},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/606},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FaonioNSV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseFNV18,
  author       = {Giuseppe Ateniese and
                  Danilo Francati and
                  David Nu{\~{n}}ez and
                  Daniele Venturi},
  title        = {Match Me if You Can: Matchmaking Encryption and its Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1094},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1094},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtenieseFNV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/DamgardFMV17,
  author       = {Ivan Damg{\aa}rd and
                  Sebastian Faust and
                  Pratyay Mukherjee and
                  Daniele Venturi},
  title        = {Bounded Tamper Resilience: How to Go Beyond the Algebraic Barrier},
  journal      = {J. Cryptol.},
  volume       = {30},
  number       = {1},
  pages        = {152--190},
  year         = {2017},
  url          = {https://doi.org/10.1007/s00145-015-9218-0},
  doi          = {10.1007/S00145-015-9218-0},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joc/DamgardFMV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/KiltzPVCJ17,
  author       = {Eike Kiltz and
                  Krzysztof Pietrzak and
                  Daniele Venturi and
                  David Cash and
                  Abhishek Jain},
  title        = {Efficient Authentication from Hard Learning Problems},
  journal      = {J. Cryptol.},
  volume       = {30},
  number       = {4},
  pages        = {1238--1275},
  year         = {2017},
  url          = {https://doi.org/10.1007/s00145-016-9247-3},
  doi          = {10.1007/S00145-016-9247-3},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/KiltzPVCJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/FaonioNV17,
  author       = {Antonio Faonio and
                  Jesper Buus Nielsen and
                  Daniele Venturi},
  title        = {Fully leakage-resilient signatures revisited: Graceful degradation,
                  noisy leakage, and construction in the bounded-retrieval model},
  journal      = {Theor. Comput. Sci.},
  volume       = {660},
  pages        = {23--56},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.tcs.2016.11.016},
  doi          = {10.1016/J.TCS.2016.11.016},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/FaonioNV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/BiagioniMV17,
  author       = {Silvio Biagioni and
                  Daniel Masny and
                  Daniele Venturi},
  title        = {Naor-Yung paradigm with shared randomness and applications},
  journal      = {Theor. Comput. Sci.},
  volume       = {692},
  pages        = {90--113},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.tcs.2017.06.019},
  doi          = {10.1016/J.TCS.2017.06.019},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/BiagioniMV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FaustHM017,
  author       = {Sebastian Faust and
                  Kristina Host{\'{a}}kov{\'{a}} and
                  Pratyay Mukherjee and
                  Daniele Venturi},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Non-Malleable Codes for Space-Bounded Tampering},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10402},
  pages        = {95--126},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63715-0\_4},
  doi          = {10.1007/978-3-319-63715-0\_4},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/FaustHM017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/AtenieseM0A17,
  author       = {Giuseppe Ateniese and
                  Bernardo Magri and
                  Daniele Venturi and
                  Ewerton R. Andrade},
  title        = {Redactable Blockchain - or - Rewriting History in Bitcoin and Friends},
  booktitle    = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2017, Paris, France, April 26-28, 2017},
  pages        = {111--126},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/EuroSP.2017.37},
  doi          = {10.1109/EUROSP.2017.37},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/AtenieseM0A17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FaonioN017,
  author       = {Antonio Faonio and
                  Jesper Buus Nielsen and
                  Daniele Venturi},
  editor       = {Serge Fehr},
  title        = {Predictable Arguments of Knowledge},
  booktitle    = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Amsterdam, The
                  Netherlands, March 28-31, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10174},
  pages        = {121--150},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54365-8\_6},
  doi          = {10.1007/978-3-662-54365-8\_6},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/FaonioN017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/MassacciNNVW17,
  author       = {Fabio Massacci and
                  Chan Nam Ngo and
                  Jing Nie and
                  Daniele Venturi and
                  Julian Williams},
  editor       = {Frank Stajano and
                  Jonathan Anderson and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {The Seconomics (Security-Economics) Vulnerabilities of Decentralized
                  Autonomous Organizations},
  booktitle    = {Security Protocols {XXV} - 25th International Workshop, Cambridge,
                  UK, March 20-22, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10476},
  pages        = {171--179},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-71075-4\_19},
  doi          = {10.1007/978-3-319-71075-4\_19},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/MassacciNNVW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wuwnet/CaposselePSSV17,
  author       = {Angelo Capossele and
                  Chiara Petrioli and
                  Gabriele Saturni and
                  Daniele Spaccini and
                  Daniele Venturi},
  title        = {Securing Underwater Communications: Key Agreement based on Fully Hashed
                  {MQV}},
  booktitle    = {Proceedings of the International Conference on Underwater Networks
                  {\&} Systems, WUWNet 2017, Halifax, NS, Canada, November 6-8,
                  2017},
  pages        = {12:1--12:5},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3148675.3152760},
  doi          = {10.1145/3148675.3152760},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wuwnet/CaposselePSSV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaustHM017,
  author       = {Sebastian Faust and
                  Kristina Host{\'{a}}kov{\'{a}} and
                  Pratyay Mukherjee and
                  Daniele Venturi},
  title        = {Non-Malleable Codes for Space-Bounded Tampering},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {530},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/530},
  timestamp    = {Tue, 23 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FaustHM017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/basesearch/Dellinformazione16a,
  author       = {Daniele Venturi},
  title        = {Tampering in wonderland},
  school       = {Sapienza University of Rome, Italy},
  year         = {2016},
  url          = {http://hdl.handle.net/11573/918100},
  timestamp    = {Tue, 10 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/phd/basesearch/Dellinformazione16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/AtenieseDDV16,
  author       = {Giuseppe Ateniese and
                  {\"{O}}zg{\"{u}}r Dagdelen and
                  Ivan Damg{\aa}rd and
                  Daniele Venturi},
  title        = {Entangled cloud storage},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {62},
  pages        = {104--118},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.future.2016.01.008},
  doi          = {10.1016/J.FUTURE.2016.01.008},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/AtenieseDDV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/DagdelenMV16,
  author       = {{\"{O}}zg{\"{u}}r Dagdelen and
                  Payman Mohassel and
                  Daniele Venturi},
  title        = {Rate-limited secure function evaluation},
  journal      = {Theor. Comput. Sci.},
  volume       = {653},
  pages        = {53--78},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.tcs.2016.09.020},
  doi          = {10.1016/J.TCS.2016.09.020},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/DagdelenMV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/FaustMVW16,
  author       = {Sebastian Faust and
                  Pratyay Mukherjee and
                  Daniele Venturi and
                  Daniel Wichs},
  title        = {Efficient Non-Malleable Codes and Key Derivation for Poly-Size Tampering
                  Circuits},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {62},
  number       = {12},
  pages        = {7179--7194},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIT.2016.2613919},
  doi          = {10.1109/TIT.2016.2613919},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/FaustMVW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Faonio016,
  author       = {Antonio Faonio and
                  Daniele Venturi},
  editor       = {Jung Hee Cheon and
                  Tsuyoshi Takagi},
  title        = {Efficient Public-Key Cryptography with Bounded Leakage and Tamper
                  Resilience},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10031},
  pages        = {877--907},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53887-6\_32},
  doi          = {10.1007/978-3-662-53887-6\_32},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Faonio016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FaustMV16,
  author       = {Sebastian Faust and
                  Daniel Masny and
                  Daniele Venturi},
  editor       = {Chen{-}Mou Cheng and
                  Kai{-}Min Chung and
                  Giuseppe Persiano and
                  Bo{-}Yin Yang},
  title        = {Chosen-Ciphertext Security from Subset Sum},
  booktitle    = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
                  March 6-9, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9614},
  pages        = {35--46},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49384-7\_2},
  doi          = {10.1007/978-3-662-49384-7\_2},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/FaustMV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/BiagioniMV16,
  author       = {Silvio Biagioni and
                  Daniel Masny and
                  Daniele Venturi},
  editor       = {Vassilis Zikas and
                  Roberto De Prisco},
  title        = {Naor-Yung Paradigm with Shared Randomness and Applications},
  booktitle    = {Security and Cryptography for Networks - 10th International Conference,
                  {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9841},
  pages        = {62--80},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44618-9\_4},
  doi          = {10.1007/978-3-319-44618-9\_4},
  timestamp    = {Thu, 23 Jun 2022 19:58:57 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/BiagioniMV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/MittelbachV16,
  author       = {Arno Mittelbach and
                  Daniele Venturi},
  editor       = {Vassilis Zikas and
                  Roberto De Prisco},
  title        = {Fiat-Shamir for Highly Sound Protocols Is Instantiable},
  booktitle    = {Security and Cryptography for Networks - 10th International Conference,
                  {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9841},
  pages        = {198--215},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44618-9\_11},
  doi          = {10.1007/978-3-319-44618-9\_11},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/MittelbachV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/CorettiDTV16,
  author       = {Sandro Coretti and
                  Yevgeniy Dodis and
                  Bj{\"{o}}rn Tackmann and
                  Daniele Venturi},
  editor       = {Eyal Kushilevitz and
                  Tal Malkin},
  title        = {Non-Malleable Encryption: Simpler, Shorter, Stronger},
  booktitle    = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A,
                  Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9562},
  pages        = {306--335},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49096-9\_13},
  doi          = {10.1007/978-3-662-49096-9\_13},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/CorettiDTV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MittelbachV16,
  author       = {Arno Mittelbach and
                  Daniele Venturi},
  title        = {Fiat-Shamir for Highly Sound Protocols is Instantiable},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {313},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/313},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MittelbachV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseKMTV16,
  author       = {Giuseppe Ateniese and
                  Aggelos Kiayias and
                  Bernardo Magri and
                  Yiannis Tselekounis and
                  Daniele Venturi},
  title        = {Secure Outsourcing of Circuit Manufacturing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {527},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/527},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtenieseKMTV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaonioV16,
  author       = {Antonio Faonio and
                  Daniele Venturi},
  title        = {Efficient Public-Key Cryptography with Bounded Leakage and Tamper
                  Resilience},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {529},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/529},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FaonioV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseMVA16,
  author       = {Giuseppe Ateniese and
                  Bernardo Magri and
                  Daniele Venturi and
                  Ewerton R. Andrade},
  title        = {Redactable Blockchain - or - Rewriting History in Bitcoin and Friends},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {757},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/757},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtenieseMVA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BiagioniMV16,
  author       = {Silvio Biagioni and
                  Daniel Masny and
                  Daniele Venturi},
  title        = {Naor-Yung Paradigm with Shared Randomness and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {880},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/880},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BiagioniMV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AtenieseDDV15,
  author       = {Giuseppe Ateniese and
                  {\"{O}}zg{\"{u}}r Dagdelen and
                  Ivan Damg{\aa}rd and
                  Daniele Venturi},
  editor       = {Feng Bao and
                  Steven Miller and
                  Sherman S. M. Chow and
                  Danfeng Yao},
  title        = {Entangled Encodings and Data Entanglement},
  booktitle    = {Proceedings of the 3rd International Workshop on Security in Cloud
                  Computing, SCC@ASIACCS '15, Singapore, Republic of Singapore, April
                  14, 2015},
  pages        = {3--12},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2732516.2732524},
  doi          = {10.1145/2732516.2732524},
  timestamp    = {Thu, 20 Oct 2022 10:45:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/AtenieseDDV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AtenieseMV15,
  author       = {Giuseppe Ateniese and
                  Bernardo Magri and
                  Daniele Venturi},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {Subversion-Resilient Signature Schemes},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {364--375},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2813635},
  doi          = {10.1145/2810103.2813635},
  timestamp    = {Tue, 10 Nov 2020 19:58:09 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AtenieseMV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudforward/SuzicRRVK15,
  author       = {Bojan Suzic and
                  Andreas Reiter and
                  Florian Reimair and
                  Daniele Venturi and
                  Baldur Kubo},
  editor       = {Keith G. Jeffery and
                  Dimosthenis Kyriazis},
  title        = {Secure Data Sharing and Processing in Heterogeneous Clouds},
  booktitle    = {1st International Conference on Cloud Forward: From Distributed to
                  Complete Computing, October 6-8, 2015, Pisa, Italy},
  series       = {Procedia Computer Science},
  volume       = {68},
  pages        = {116--126},
  publisher    = {Elsevier},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.procs.2015.09.228},
  doi          = {10.1016/J.PROCS.2015.09.228},
  timestamp    = {Thu, 08 Jul 2021 16:04:02 +0200},
  biburl       = {https://dblp.org/rec/conf/cloudforward/SuzicRRVK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/FaonioNV15,
  author       = {Antonio Faonio and
                  Jesper Buus Nielsen and
                  Daniele Venturi},
  editor       = {Magn{\'{u}}s M. Halld{\'{o}}rsson and
                  Kazuo Iwama and
                  Naoki Kobayashi and
                  Bettina Speckmann},
  title        = {Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful
                  Degradation},
  booktitle    = {Automata, Languages, and Programming - 42nd International Colloquium,
                  {ICALP} 2015, Kyoto, Japan, July 6-10, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9134},
  pages        = {456--468},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47672-7\_37},
  doi          = {10.1007/978-3-662-47672-7\_37},
  timestamp    = {Fri, 27 Mar 2020 09:02:59 +0100},
  biburl       = {https://dblp.org/rec/conf/icalp/FaonioNV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/DamgardFMV15,
  author       = {Ivan Damg{\aa}rd and
                  Sebastian Faust and
                  Pratyay Mukherjee and
                  Daniele Venturi},
  editor       = {Anja Lehmann and
                  Stefan Wolf},
  title        = {The Chaining Lemma and Its Application},
  booktitle    = {Information Theoretic Security - 8th International Conference, {ICITS}
                  2015, Lugano, Switzerland, May 2-5, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9063},
  pages        = {181--196},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-17470-9\_11},
  doi          = {10.1007/978-3-319-17470-9\_11},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/DamgardFMV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/KohlweissMOTV15,
  author       = {Markulf Kohlweiss and
                  Ueli Maurer and
                  Cristina Onete and
                  Bj{\"{o}}rn Tackmann and
                  Daniele Venturi},
  editor       = {Alex Biryukov and
                  Vipul Goyal},
  title        = {(De-)Constructing {TLS} 1.3},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2015 - 16th International Conference
                  on Cryptology in India, Bangalore, India, December 6-9, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9462},
  pages        = {85--102},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26617-6\_5},
  doi          = {10.1007/978-3-319-26617-6\_5},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/KohlweissMOTV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FaustMNV15,
  author       = {Sebastian Faust and
                  Pratyay Mukherjee and
                  Jesper Buus Nielsen and
                  Daniele Venturi},
  editor       = {Jonathan Katz},
  title        = {A Tamper and Leakage Resilient von Neumann Architecture},
  booktitle    = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
                  USA, March 30 - April 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9020},
  pages        = {579--603},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46447-2\_26},
  doi          = {10.1007/978-3-662-46447-2\_26},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/FaustMNV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/CorettiMTV15,
  author       = {Sandro Coretti and
                  Ueli Maurer and
                  Bj{\"{o}}rn Tackmann and
                  Daniele Venturi},
  editor       = {Yevgeniy Dodis and
                  Jesper Buus Nielsen},
  title        = {From Single-Bit to Multi-bit Public-Key Encryption via Non-malleable
                  Codes},
  booktitle    = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
                  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9014},
  pages        = {532--560},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46494-6\_22},
  doi          = {10.1007/978-3-662-46494-6\_22},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/CorettiMTV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseMV15,
  author       = {Giuseppe Ateniese and
                  Bernardo Magri and
                  Daniele Venturi},
  title        = {Subversion-Resilient Signature Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {517},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/517},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtenieseMV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaonioNV15,
  author       = {Antonio Faonio and
                  Jesper Buus Nielsen and
                  Daniele Venturi},
  title        = {Predictable Arguments of Knowledge},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {740},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/740},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FaonioNV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CorettiDTV15,
  author       = {Sandro Coretti and
                  Yevgeniy Dodis and
                  Bj{\"{o}}rn Tackmann and
                  Daniele Venturi},
  title        = {Non-Malleable Encryption: Simpler, Shorter, Stronger},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {772},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/772},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CorettiDTV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaustMV15,
  author       = {Sebastian Faust and
                  Daniel Masny and
                  Daniele Venturi},
  title        = {Chosen-Ciphertext Security from Subset Sum},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1223},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1223},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FaustMV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/DagdelenV14,
  author       = {{\"{O}}zg{\"{u}}r Dagdelen and
                  Daniele Venturi},
  editor       = {David Pointcheval and
                  Damien Vergnaud},
  title        = {A Second Look at Fischlin's Transformation},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2014 - 7th International Conference
                  on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8469},
  pages        = {356--376},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06734-6\_22},
  doi          = {10.1007/978-3-319-06734-6\_22},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/DagdelenV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/balkancryptsec/DagdelenV14,
  author       = {{\"{O}}zg{\"{u}}r Dagdelen and
                  Daniele Venturi},
  editor       = {Berna {\"{O}}rs and
                  Bart Preneel},
  title        = {A Multi-Party Protocol for Privacy-Preserving Cooperative Linear Systems
                  of Equations},
  booktitle    = {Cryptography and Information Security in the Balkans - First International
                  Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17,
                  2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9024},
  pages        = {161--172},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-21356-9\_11},
  doi          = {10.1007/978-3-319-21356-9\_11},
  timestamp    = {Tue, 16 Nov 2021 09:08:54 +0100},
  biburl       = {https://dblp.org/rec/conf/balkancryptsec/DagdelenV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/FaustMVW14,
  author       = {Sebastian Faust and
                  Pratyay Mukherjee and
                  Daniele Venturi and
                  Daniel Wichs},
  editor       = {Phong Q. Nguyen and
                  Elisabeth Oswald},
  title        = {Efficient Non-malleable Codes and Key-Derivation for Poly-size Tampering
                  Circuits},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Copenhagen, Denmark, May 11-15, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8441},
  pages        = {111--128},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55220-5\_7},
  doi          = {10.1007/978-3-642-55220-5\_7},
  timestamp    = {Thu, 14 Oct 2021 09:58:16 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/FaustMVW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/NielsenVZ14,
  author       = {Jesper Buus Nielsen and
                  Daniele Venturi and
                  Angela Zottarel},
  editor       = {Hugo Krawczyk},
  title        = {Leakage-Resilient Signatures with Graceful Degradation},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {362--379},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_21},
  doi          = {10.1007/978-3-642-54631-0\_21},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/NielsenVZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/FaustMNV14,
  author       = {Sebastian Faust and
                  Pratyay Mukherjee and
                  Jesper Buus Nielsen and
                  Daniele Venturi},
  editor       = {Yehuda Lindell},
  title        = {Continuous Non-malleable Codes},
  booktitle    = {Theory of Cryptography - 11th Theory of Cryptography Conference, {TCC}
                  2014, San Diego, CA, USA, February 24-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8349},
  pages        = {465--488},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54242-8\_20},
  doi          = {10.1007/978-3-642-54242-8\_20},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/FaustMNV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KohlweissMOTV14,
  author       = {Markulf Kohlweiss and
                  Ueli Maurer and
                  Cristina Onete and
                  Bj{\"{o}}rn Tackmann and
                  Daniele Venturi},
  title        = {(De-)Constructing {TLS}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {20},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/020},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KohlweissMOTV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaustMNV14,
  author       = {Sebastian Faust and
                  Pratyay Mukherjee and
                  Jesper Buus Nielsen and
                  Daniele Venturi},
  title        = {Continuous Non-malleable Codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {173},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/173},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FaustMNV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DagdelenV14,
  author       = {{\"{O}}zg{\"{u}}r Dagdelen and
                  Daniele Venturi},
  title        = {A Second Look at Fischlin's Transformation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {188},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/188},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DagdelenV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CorettiMTV14,
  author       = {Sandro Coretti and
                  Ueli Maurer and
                  Bj{\"{o}}rn Tackmann and
                  Daniele Venturi},
  title        = {From Single-Bit to Multi-Bit Public-Key Encryption via Non-Malleable
                  Codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {324},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/324},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CorettiMTV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaustMNV14a,
  author       = {Sebastian Faust and
                  Pratyay Mukherjee and
                  Jesper Buus Nielsen and
                  Daniele Venturi},
  title        = {A Tamper and Leakage Resilient Random Access Machine},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {338},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/338},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FaustMNV14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NielsenVZ14,
  author       = {Jesper Buus Nielsen and
                  Daniele Venturi and
                  Angela Zottarel},
  title        = {On the Connection between Leakage Tolerance and Adaptive Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {517},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/517},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NielsenVZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NielsenVZ14a,
  author       = {Jesper Buus Nielsen and
                  Daniele Venturi and
                  Angela Zottarel},
  title        = {Leakage-Resilient Signatures with Graceful Degradation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {529},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/529},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NielsenVZ14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaustHV14a,
  author       = {Sebastian Faust and
                  Carmit Hazay and
                  Daniele Venturi},
  title        = {Outsourced Pattern Matching},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {662},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/662},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FaustHV14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaonioNV14,
  author       = {Antonio Faonio and
                  Jesper Buus Nielsen and
                  Daniele Venturi},
  title        = {Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful
                  Degradation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {913},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/913},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FaonioNV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardFMV14,
  author       = {Ivan Damg{\aa}rd and
                  Sebastian Faust and
                  Pratyay Mukherjee and
                  Daniele Venturi},
  title        = {The Chaining Lemma and its application},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {979},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/979},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardFMV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DamgardFMV13,
  author       = {Ivan Damg{\aa}rd and
                  Sebastian Faust and
                  Pratyay Mukherjee and
                  Daniele Venturi},
  editor       = {Kazue Sako and
                  Palash Sarkar},
  title        = {Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Bengaluru, India, December 1-5, 2013, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8270},
  pages        = {140--160},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-42045-0\_8},
  doi          = {10.1007/978-3-642-42045-0\_8},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/DamgardFMV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/FaustHV13,
  author       = {Sebastian Faust and
                  Carmit Hazay and
                  Daniele Venturi},
  editor       = {Fedor V. Fomin and
                  Rusins Freivalds and
                  Marta Z. Kwiatkowska and
                  David Peleg},
  title        = {Outsourced Pattern Matching},
  booktitle    = {Automata, Languages, and Programming - 40th International Colloquium,
                  {ICALP} 2013, Riga, Latvia, July 8-12, 2013, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7966},
  pages        = {545--556},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39212-2\_48},
  doi          = {10.1007/978-3-642-39212-2\_48},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/FaustHV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/KohlweissMOTV13,
  author       = {Markulf Kohlweiss and
                  Ueli Maurer and
                  Cristina Onete and
                  Bj{\"{o}}rn Tackmann and
                  Daniele Venturi},
  editor       = {Emiliano De Cristofaro and
                  Matthew K. Wright},
  title        = {Anonymity-Preserving Public-Key Encryption: {A} Constructive Approach},
  booktitle    = {Privacy Enhancing Technologies - 13th International Symposium, {PETS}
                  2013, Bloomington, IN, USA, July 10-12, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7981},
  pages        = {19--39},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39077-7\_2},
  doi          = {10.1007/978-3-642-39077-7\_2},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/KohlweissMOTV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DagdelenMV13,
  author       = {{\"{O}}zg{\"{u}}r Dagdelen and
                  Payman Mohassel and
                  Daniele Venturi},
  editor       = {Kaoru Kurosawa and
                  Goichiro Hanaoka},
  title        = {Rate-Limited Secure Function Evaluation: Definitions and Constructions},
  booktitle    = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference
                  on Practice and Theory in Public-Key Cryptography, Nara, Japan, February
                  26 - March 1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7778},
  pages        = {461--478},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36362-7\_28},
  doi          = {10.1007/978-3-642-36362-7\_28},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DagdelenMV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/NielsenVZ13,
  author       = {Jesper Buus Nielsen and
                  Daniele Venturi and
                  Angela Zottarel},
  editor       = {Kaoru Kurosawa and
                  Goichiro Hanaoka},
  title        = {On the Connection between Leakage Tolerance and Adaptive Security},
  booktitle    = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference
                  on Practice and Theory in Public-Key Cryptography, Nara, Japan, February
                  26 - March 1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7778},
  pages        = {497--515},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36362-7\_30},
  doi          = {10.1007/978-3-642-36362-7\_30},
  timestamp    = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/NielsenVZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DagdelenMV13,
  author       = {{\"{O}}zg{\"{u}}r Dagdelen and
                  Payman Mohassel and
                  Daniele Venturi},
  title        = {Rate-Limited Secure Function Evaluation: Definitions and Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {21},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/021},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DagdelenMV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KohlweissMOTV13,
  author       = {Markulf Kohlweiss and
                  Ueli Maurer and
                  Cristina Onete and
                  Bj{\"{o}}rn Tackmann and
                  Daniele Venturi},
  title        = {Anonymity-preserving Public-Key Encryption: {A} Constructive Approach},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {238},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/238},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KohlweissMOTV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardFMV13a,
  author       = {Ivan Damg{\aa}rd and
                  Sebastian Faust and
                  Pratyay Mukherjee and
                  Daniele Venturi},
  title        = {Bounded Tamper Resilience: How to go beyond the Algebraic Barrier},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {677},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/677},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardFMV13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaustMVW13,
  author       = {Sebastian Faust and
                  Pratyay Mukherjee and
                  Daniele Venturi and
                  Daniel Wichs},
  title        = {Efficient Non-Malleable Codes and Key-Derivation for Poly-Size Tampering
                  Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {702},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/702},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FaustMVW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/FaustKMV12,
  author       = {Sebastian Faust and
                  Markulf Kohlweiss and
                  Giorgia Azzurra Marson and
                  Daniele Venturi},
  editor       = {Steven D. Galbraith and
                  Mridul Nandi},
  title        = {On the Non-malleability of the Fiat-Shamir Transform},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2012, 13th International Conference
                  on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7668},
  pages        = {60--79},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34931-7\_5},
  doi          = {10.1007/978-3-642-34931-7\_5},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/FaustKMV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseDDV12,
  author       = {Giuseppe Ateniese and
                  {\"{O}}zg{\"{u}}r Dagdelen and
                  Ivan Damg{\aa}rd and
                  Daniele Venturi},
  title        = {Entangled Cloud Storage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {511},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/511},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtenieseDDV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaustKMV12,
  author       = {Sebastian Faust and
                  Markulf Kohlweiss and
                  Giorgia Azzurra Marson and
                  Daniele Venturi},
  title        = {On the Non-malleability of the Fiat-Shamir Transform},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {704},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/704},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FaustKMV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KiltzPCJV11,
  author       = {Eike Kiltz and
                  Krzysztof Pietrzak and
                  David Cash and
                  Abhishek Jain and
                  Daniele Venturi},
  editor       = {Kenneth G. Paterson},
  title        = {Efficient Authentication from Hard Learning Problems},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tallinn, Estonia, May 15-19, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6632},
  pages        = {7--26},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20465-4\_3},
  doi          = {10.1007/978-3-642-20465-4\_3},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KiltzPCJV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/FaustPV11,
  author       = {Sebastian Faust and
                  Krzysztof Pietrzak and
                  Daniele Venturi},
  editor       = {Luca Aceto and
                  Monika Henzinger and
                  Jir{\'{\i}} Sgall},
  title        = {Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience},
  booktitle    = {Automata, Languages and Programming - 38th International Colloquium,
                  {ICALP} 2011, Zurich, Switzerland, July 4-8, 2011, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6755},
  pages        = {391--402},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22006-7\_33},
  doi          = {10.1007/978-3-642-22006-7\_33},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/FaustPV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OneteV11,
  author       = {Cristina Onete and
                  Daniele Venturi},
  title        = {Security {\&} Indistinguishability in the Presence of Traffic
                  Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {260},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/260},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OneteV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaustPV11,
  author       = {Sebastian Faust and
                  Krzysztof Pietrzak and
                  Daniele Venturi},
  title        = {Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {314},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/314},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FaustPV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/DaviDV10,
  author       = {Francesco Dav{\`{\i}} and
                  Stefan Dziembowski and
                  Daniele Venturi},
  editor       = {Juan A. Garay and
                  Roberto De Prisco},
  title        = {Leakage-Resilient Storage},
  booktitle    = {Security and Cryptography for Networks, 7th International Conference,
                  {SCN} 2010, Amalfi, Italy, September 13-15, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6280},
  pages        = {121--137},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15317-4\_9},
  doi          = {10.1007/978-3-642-15317-4\_9},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/DaviDV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/TodiniBV09,
  author       = {Alfredo Todini and
                  Andrea Baiocchi and
                  Daniele Venturi},
  title        = {Inadequacy of the Queue-Based Max-Weight Optimal Scheduler on Wireless
                  Links with {TCP} Sources},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2009, Dresden, Germany, 14-18 June 2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICC.2009.5199080},
  doi          = {10.1109/ICC.2009.5199080},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/TodiniBV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/Venturi09,
  author       = {Daniele Venturi},
  title        = {Lecture Notes on Algorithmic Number Theory},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR09-062}},
  year         = {2009},
  url          = {https://eccc.weizmann.ac.il/report/2009/062},
  eprinttype    = {ECCC},
  eprint       = {TR09-062},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/Venturi09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DaviDV09,
  author       = {Francesco Dav{\`{\i}} and
                  Stefan Dziembowski and
                  Daniele Venturi},
  title        = {Leakage-Resilient Storage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {399},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/399},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DaviDV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}