Daniele Venturi

According to our database1, Daniele Venturi
  • authored at least 68 papers between 2009 and 2017.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2017
Fully leakage-resilient signatures revisited: Graceful degradation, noisy leakage, and construction in the bounded-retrieval model.
Theor. Comput. Sci., 2017

Bounded Tamper Resilience: How to Go Beyond the Algebraic Barrier.
J. Cryptology, 2017

Non-Malleable Codes for Space-Bounded Tampering.
IACR Cryptology ePrint Archive, 2017

Predictable Arguments of Knowledge.
Proceedings of the Public-Key Cryptography - PKC 2017, 2017

Redactable Blockchain - or - Rewriting History in Bitcoin and Friends.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

Non-Malleable Codes for Space-Bounded Tampering.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

2016
Efficient Non-Malleable Codes and Key Derivation for Poly-Size Tampering Circuits.
IEEE Trans. Information Theory, 2016

Rate-limited secure function evaluation.
Theor. Comput. Sci., 2016

Fiat-Shamir for Highly Sound Protocols is Instantiable.
IACR Cryptology ePrint Archive, 2016

Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience.
IACR Cryptology ePrint Archive, 2016

Naor-Yung Paradigm with Shared Randomness and Applications.
IACR Cryptology ePrint Archive, 2016

Redactable Blockchain - or - Rewriting History in Bitcoin and Friends.
IACR Cryptology ePrint Archive, 2016

Secure Outsourcing of Circuit Manufacturing.
IACR Cryptology ePrint Archive, 2016

Entangled cloud storage.
Future Generation Comp. Syst., 2016

Non-Malleable Encryption: Simpler, Shorter, Stronger.
Proceedings of the Theory of Cryptography - 13th International Conference, 2016

Fiat-Shamir for Highly Sound Protocols Is Instantiable.
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016

Naor-Yung Paradigm with Shared Randomness and Applications.
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016

Chosen-Ciphertext Security from Subset Sum.
Proceedings of the Public-Key Cryptography - PKC 2016, 2016

Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
Chosen-Ciphertext Security from Subset Sum.
IACR Cryptology ePrint Archive, 2015

Predictable Arguments of Knowledge.
IACR Cryptology ePrint Archive, 2015

Non-Malleable Encryption: Simpler, Shorter, Stronger.
IACR Cryptology ePrint Archive, 2015

Subversion-Resilient Signature Schemes.
IACR Cryptology ePrint Archive, 2015

From Single-Bit to Multi-bit Public-Key Encryption via Non-malleable Codes.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

A Tamper and Leakage Resilient von Neumann Architecture.
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015

(De-)Constructing TLS 1.3.
Proceedings of the Progress in Cryptology - INDOCRYPT 2015, 2015

The Chaining Lemma and Its Application.
Proceedings of the Information Theoretic Security - 8th International Conference, 2015

Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation.
Proceedings of the Automata, Languages, and Programming - 42nd International Colloquium, 2015

Secure Data Sharing and Processing in Heterogeneous Clouds.
Proceedings of the 1st International Conference on Cloud Forward: From Distributed to Complete Computing, 2015

Subversion-Resilient Signature Schemes.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Entangled Encodings and Data Entanglement.
Proceedings of the 3rd International Workshop on Security in Cloud Computing, 2015

2014
Leakage-Resilient Signatures with Graceful Degradation.
IACR Cryptology ePrint Archive, 2014

On the Connection between Leakage Tolerance and Adaptive Security.
IACR Cryptology ePrint Archive, 2014

(De-)Constructing TLS.
IACR Cryptology ePrint Archive, 2014

A Tamper and Leakage Resilient Random Access Machine.
IACR Cryptology ePrint Archive, 2014

Continuous Non-malleable Codes.
IACR Cryptology ePrint Archive, 2014

Outsourced Pattern Matching.
IACR Cryptology ePrint Archive, 2014

Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation.
IACR Cryptology ePrint Archive, 2014

The Chaining Lemma and its application.
IACR Cryptology ePrint Archive, 2014

A Second Look at Fischlin's Transformation.
IACR Cryptology ePrint Archive, 2014

From Single-Bit to Multi-Bit Public-Key Encryption via Non-Malleable Codes.
IACR Cryptology ePrint Archive, 2014

Self-Destruct Non-Malleability.
IACR Cryptology ePrint Archive, 2014

Continuous Non-malleable Codes.
Proceedings of the Theory of Cryptography - 11th Theory of Cryptography Conference, 2014

Leakage-Resilient Signatures with Graceful Degradation.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014

Efficient Non-malleable Codes and Key-Derivation for Poly-size Tampering Circuits.
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014

A Multi-Party Protocol for Privacy-Preserving Cooperative Linear Systems of Equations.
Proceedings of the Cryptography and Information Security in the Balkans, 2014

A Second Look at Fischlin's Transformation.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014

2013
Anonymity-preserving Public-Key Encryption: A Constructive Approach.
IACR Cryptology ePrint Archive, 2013

Efficient Non-Malleable Codes and Key-Derivation for Poly-Size Tampering Circuits.
IACR Cryptology ePrint Archive, 2013

Bounded Tamper Resilience: How to go beyond the Algebraic Barrier.
IACR Cryptology ePrint Archive, 2013

Tamper Resilient Cryptography Without Self-Destruct.
IACR Cryptology ePrint Archive, 2013

Rate-Limited Secure Function Evaluation: Definitions and Constructions.
IACR Cryptology ePrint Archive, 2013

On the Connection between Leakage Tolerance and Adaptive Security.
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013

Rate-Limited Secure Function Evaluation: Definitions and Constructions.
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013

Anonymity-Preserving Public-Key Encryption: A Constructive Approach.
Proceedings of the Privacy Enhancing Technologies - 13th International Symposium, 2013

Outsourced Pattern Matching.
Proceedings of the Automata, Languages, and Programming - 40th International Colloquium, 2013

Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

2012
On the Non-malleability of the Fiat-Shamir Transform.
IACR Cryptology ePrint Archive, 2012

Entangled Cloud Storage.
IACR Cryptology ePrint Archive, 2012

On the Non-malleability of the Fiat-Shamir Transform.
Proceedings of the Progress in Cryptology, 2012

2011
Security & Indistinguishability in the Presence of Traffic Analysis.
IACR Cryptology ePrint Archive, 2011

Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience.
IACR Cryptology ePrint Archive, 2011

Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience.
Proceedings of the Automata, Languages and Programming - 38th International Colloquium, 2011

Efficient Authentication from Hard Learning Problems.
Proceedings of the Advances in Cryptology - EUROCRYPT 2011, 2011

2010
Leakage-Resilient Storage.
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010

2009
Leakage-Resilient Storage.
IACR Cryptology ePrint Archive, 2009

Lecture Notes on Algorithmic Number Theory.
Electronic Colloquium on Computational Complexity (ECCC), 2009

Inadequacy of the Queue-Based Max-Weight Optimal Scheduler on Wireless Links with TCP Sources.
Proceedings of IEEE International Conference on Communications, 2009


  Loading...