Sandro Coretti

According to our database1, Sandro Coretti authored at least 26 papers between 2013 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
High-Throughput Permissionless Blockchain Consensus Under Realistic Network Assumptions.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

Multi-Source Randomness Extraction and Generation in the Random-Oracle Model.
Proceedings of the 6th Conference on Information-Theoretic Cryptography, 2025

2022
The Generals’ Scuttlebutt: Byzantine-Resilient Gossip Protocols.
IACR Cryptol. ePrint Arch., 2022

On Seedless PRNGs and Premature Next.
Proceedings of the 3rd Conference on Information-Theoretic Cryptography, 2022

The Generals' Scuttlebutt: Byzantine-Resilient Gossip Protocols.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Fast Isomorphic State Channels.
Proceedings of the Financial Cryptography and Data Security, 2021

Modular Design of Secure Group Messaging Protocols and the Security of MLS.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Non-malleable Encryption: Simpler, Shorter, Stronger.
J. Cryptol., 2020

Hydra: Fast Isomorphic State Channels.
IACR Cryptol. ePrint Arch., 2020

Continuous Group Key Agreement with Active Security.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

Security Analysis and Improvements for the IETF MLS Standard for Group Messaging.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

2019
The Double Ratchet: Security Notions, Proofs, and Modularization for the Signal Protocol.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

Seedless Fruit Is the Sweetest: Random Number Generation, Revisited.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

Rate-Optimizing Compilers for Continuously Non-malleable Codes.
Proceedings of the Applied Cryptography and Network Security, 2019

2018
Random Oracles and Non-uniformity.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

Non-Uniform Bounds in the Random-Permutation, Ideal-Cipher, and Generic-Group Models.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

2017
Efficiency lower bounds for commit-and-prove constructions.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

Round-Preserving Parallel Composition of Probabilistic-Termination Cryptographic Protocols.
Proceedings of the 44th International Colloquium on Automata, Languages, and Programming, 2017

2016
Constant-Round Asynchronous Multi-Party Computation.
IACR Cryptol. ePrint Arch., 2016

Non-Malleable Encryption: Simpler, Shorter, Stronger.
Proceedings of the Theory of Cryptography - 13th International Conference, 2016

Probabilistic Termination and Composability of Cryptographic Protocols.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

Constant-Round Asynchronous Multi-Party Computation Based on One-Way Functions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
From Single-Bit to Multi-bit Public-Key Encryption via Non-malleable Codes.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

2013
Key Exchange with Unilateral Authentication: Composable Security Definition and Modular Protocol Design.
IACR Cryptol. ePrint Arch., 2013

A Constructive Perspective on Key Encapsulation.
Proceedings of the Number Theory and Cryptography, 2013

Constructing Confidential Channels from Authenticated Channels - Public-Key Encryption Revisited.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013


  Loading...