Rosario Gennaro
Orcid: 0000-0002-3297-3750Affiliations:
- City College of New York, New York, NY, USA
- IBM Research (former)
According to our database1,
Rosario Gennaro
authored at least 124 papers
between 1995 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
On the Power of Polynomial Preprocessing: Proving Computations in Sublinear Time, and More.
IACR Cryptol. ePrint Arch., 2025
2024
IACR Cryptol. ePrint Arch., 2024
IACR Commun. Cryptol., 2024
2023
Des. Codes Cryptogr., November, 2023
Proc. ACM Program. Lang., August, 2023
Testudo: Linear Time Prover SNARKs with Constant Size Proofs and Square Root Size Universal Setup.
IACR Cryptol. ePrint Arch., 2023
sfTestudo: Linear Time Prover SNARKs with Constant Size Proofs and Square Root Size Universal Setup.
Proceedings of the Progress in Cryptology - LATINCRYPT 2023, 2023
Witness-Authenticated Key Exchange, Revisited: Extensions to Groups, Improved Models, Simpler Constructions.
Proceedings of the Financial Cryptography and Data Security, 2023
2022
Witness-Authenticated Key Exchange Revisited: Improved Models, Simpler Constructions, Extensions to Groups.
IACR Cryptol. ePrint Arch., 2022
Proceedings of the Theory of Cryptography - 20th International Conference, 2022
2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Proceedings of the Applied Cryptography and Network Security, 2020
Proceedings of the Applied Cryptography and Network Security, 2020
2018
Proceedings of the Theory of Cryptography - 16th International Conference, 2018
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Provable Security, 2017
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2017
Using Level-1 Homomorphic Encryption to Improve Threshold DSA Signatures for Bitcoin Wallet Security.
Proceedings of the Progress in Cryptology - LATINCRYPT 2017, 2017
Proceedings of the Decision and Game Theory for Security - 8th International Conference, 2017
Proceedings of the Financial Cryptography and Data Security, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Threshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet Security.
Proceedings of the Applied Cryptography and Network Security, 2016
2015
Theor. Comput. Sci., 2015
Proceedings of the Decision and Game Theory for Security - 6th International Conference, 2015
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Public-Key Cryptography - PKC 2014, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Combating Insider Attacks in IEEE 802.11 Wireless Networks with Broadcast Encryption.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014
2013
Off-line/on-line signatures revisited: a general unifying paradigm, efficient threshold variants and experimental results.
Int. J. Inf. Sec., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013
On the Relationship between Functional Encryption, Obfuscation, and Fully Homomorphic Encryption.
Proceedings of the Cryptography and Coding - 14th IMA International Conference, 2013
Proceedings of the Advances in Cryptology, 2013
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013
2012
Relations between the security models for certificateless encryption and ID-based key agreement.
Int. J. Inf. Sec., 2012
Improved Publicly Verifiable Delegation of Large Polynomials and Matrix Computations.
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012
Publicly verifiable delegation of large polynomials and matrix computations, with applications.
Proceedings of the ACM Conference on Computer and Communications Security, 2012
The Generalized Randomized Iterate and Its Application to New Efficient Constructions of UOWHFs from Regular One-Way Functions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012
2011
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011
Proceedings of the Applied Cryptography and Network Security, 2011
2010
A New and Improved Paradigm for Hybrid Encryption Secure Against Chosen-Ciphertext Attack.
J. Cryptol., 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Public Key Cryptography, 2010
Proceedings of the Public Key Cryptography, 2010
Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement.
Proceedings of the Pairing-Based Cryptography - Pairing 2010, 2010
Proceedings of the Topics in Cryptology, 2010
Proceedings of the Advances in Cryptology, 2010
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010
2009
Proceedings of the Selected Areas in Cryptography, 16th Annual International Workshop, 2009
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
2008
Proceedings of the Theory of Cryptography, Fifth Theory of Cryptography Conference, 2008
Proceedings of the Public Key Cryptography, 2008
Proceedings of the Advances in Cryptology, 2008
Proceedings of the Computer Security, 2008
2007
Proceedings of the Public Key Cryptography, 2007
2006
ACM Trans. Inf. Syst. Secur., 2006
Proceedings of the Automata, Languages and Programming, 33rd International Colloquium, 2006
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006
2005
SIAM J. Comput., 2005
J. Cryptol., 2005
Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, 2005
Cramer-Damgård Signatures Revisited: Efficient Flat-Tree Signatures Based on Factoring.
Proceedings of the Public Key Cryptography, 2005
Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM.
Proceedings of the Advances in Cryptology, 2005
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005
2004
IACR Cryptol. ePrint Arch., 2004
Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering.
Proceedings of the Theory of Cryptography, First Theory of Cryptography Conference, 2004
Proceedings of the Advances in Cryptology, 2004
Multi-trapdoor Commitments and Their Applications to Proofs of Knowledge Secure Under Concurrent Man-in-the-Middle Attacks.
Proceedings of the Advances in Cryptology, 2004
Proceedings of the Advances in Cryptology, 2004
Batching Schnorr Identification Scheme with Applications to Privacy-Preserving Authorization and Low-Bandwidth Communication Devices.
Proceedings of the Advances in Cryptology, 2004
2003
IACR Cryptol. ePrint Arch., 2003
Proceedings of the 35th Annual ACM Symposium on Theory of Computing, 2003
Proceedings of the Advances in Cryptology, 2003
Proceedings of the Advances in Cryptology, 2003
Proceedings of the Topics in Cryptology, 2003
2002
Proceedings of the Foundations of Security Analysis and Design II, 2002
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002
Proceedings of the Advances in Cryptology, 2002
2001
Proceedings of the Proceedings on 33rd Annual ACM Symposium on Theory of Computing, 2001
Proceedings of the Advances in Cryptology, 2001
Proceedings of the Cryptographic Hardware and Embedded Systems, 2001
2000
IEEE Trans. Parallel Distributed Syst., 2000
Proceedings of the Security and Watermarking of Multimedia Contents II, 2000
Proceedings of the 41st Annual Symposium on Foundations of Computer Science, 2000
Proceedings of the Advances in Cryptology, 2000
Proceedings of the Advances in Cryptology, 2000
IBM Comments.
Proceedings of the Third Advanced Encryption Standard Candidate Conference, 2000
1999
Proceedings of the Information Hiding, Third International Workshop, 1999
Proceedings of the Advances in Cryptology, 1999
Proceedings of the Advances in Cryptology, 1999
Proceedings of the Advances in Cryptology, 1999
1998
Simplified VSS and Fast-Track Multiparty Computations with Applications to Threshold Cryptography.
Proceedings of the Seventeenth Annual ACM Symposium on Principles of Distributed Computing, 1998
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998
New Efficient and Secure Protocols for Verifiable Signature Sharing and Other Applications.
Proceedings of the Advances in Cryptology, 1998
An Efficient Non-Interactive Statistical Zero-Knowledge Proof System for Quasi-Safe Prime Products.
Proceedings of the CCS '98, 1998
1997
Proceedings of the Distributed Algorithms, 11th International Workshop, 1997
Proceedings of the Advances in Cryptology, 1997
1996
Proceedings of the 37th Annual Symposium on Foundations of Computer Science, 1996
Proceedings of the Advances in Cryptology, 1996
Proceedings of the Automated Deduction in Geometry, 1996
1995
Proceedings of the Fourteenth Annual ACM Symposium on Principles of Distributed Computing, 1995
Proceedings of the Advances in Cryptology, 1995
Proceedings of the Eigth Annual Conference on Computational Learning Theory, 1995