Sandro Coretti
According to our database1,
Sandro Coretti
authored at least 26 papers
between 2013 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
High-Throughput Permissionless Blockchain Consensus Under Realistic Network Assumptions.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025
Proceedings of the 6th Conference on Information-Theoretic Cryptography, 2025
2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the 3rd Conference on Information-Theoretic Cryptography, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Proceedings of the Financial Cryptography and Data Security, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
Proceedings of the Theory of Cryptography - 18th International Conference, 2020
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020
2019
The Double Ratchet: Security Notions, Proofs, and Modularization for the Signal Protocol.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019
Proceedings of the Applied Cryptography and Network Security, 2019
2018
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018
Non-Uniform Bounds in the Random-Permutation, Ideal-Cipher, and Generic-Group Models.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018
2017
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017
Round-Preserving Parallel Composition of Probabilistic-Termination Cryptographic Protocols.
Proceedings of the 44th International Colloquium on Automata, Languages, and Programming, 2017
2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Theory of Cryptography - 13th International Conference, 2016
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016
2015
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015
2013
Key Exchange with Unilateral Authentication: Composable Security Definition and Modular Protocol Design.
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Number Theory and Cryptography, 2013
Constructing Confidential Channels from Authenticated Channels - Public-Key Encryption Revisited.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013