Stefano Tessaro
Orcid: 0000-0002-3751-8546Affiliations:
- University of Washington, Seattle, WA, USA
According to our database1,
Stefano Tessaro
authored at least 116 papers
between 2005 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
IACR Cryptol. ePrint Arch., 2025
IACR Cryptol. ePrint Arch., 2025
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025
2024
IACR Cryptol. ePrint Arch., 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024
Is ML-Based Cryptanalysis Inherently Limited? Simulating Cryptographic Adversaries via Gradient-Based Methods.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024
Count Corruptions, Not Users: Improved Tightness for Signatures, Encryption and Authenticated Key Exchange.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024
2023
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023
2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022
Proceedings of the 3rd Conference on Information-Theoretic Cryptography, 2022
VeRSA: Verifiable Registries with Efficient Client Audits from RSA Authenticated Dictionaries.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Proceedings of the Theory of Cryptography - 19th International Conference, 2021
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021
2020
IEEE Data Eng. Bull., 2020
CoRR, 2020
Expected-Time Cryptography: Generic Techniques and Applications to Concrete Soundness.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020
Towards Defeating Backdoored Random Oracles: Indifferentiability with Bounded Adaptivity.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020
Proceedings of the Theory of Cryptography - 18th International Conference, 2020
Proceedings of the Security and Cryptography for Networks - 12th International Conference, 2020
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020
2019
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019
2018
Privacy and Efficiency Tradeoffs for Multiword Top <i>K</i> Search with Linear Additive Rank Scoring.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018
Provable Time-Memory Trade-Offs: Symmetric Cryptography Against Memory-Bounded Adversaries.
Proceedings of the Theory of Cryptography - 16th International Conference, 2018
Proceedings of the 9th Innovations in Theoretical Computer Science Conference, 2018
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018
Revisiting AES-GCM-SIV: Multi-user Security, Faster Key Derivation, and Better Bounds.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018
Proceedings of the 21st International Conference on Extending Database Technology, 2018
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
IACR Cryptol. ePrint Arch., 2017
Understanding the Security Challenges of Oblivious Cloud Storage with Asynchronous Accesses.
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017
2016
J. Cryptol., 2016
Proceedings of the Theory of Cryptography - 14th International Conference, 2016
Proceedings of the Theory of Cryptography - 13th International Conference, 2016
Proceedings of the Theory of Cryptography - 13th International Conference, 2016
Proceedings of the Theory of Cryptography - 13th International Conference, 2016
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016
Key-Alternating Ciphers and Key-Length Extension: Exact Bounds and Multi-user Security.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015
Proceedings of the 2015 IEEE Information Theory Workshop, 2015
Proceedings of the Fast Software Encryption - 22nd International Workshop, 2015
The Exact PRF Security of Truncation: Tight Bounds for Keyed Sponges and Truncated CBC.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015
2014
Bounded-Collusion Identity-Based Encryption from Semantically-Secure Public-Key Encryption: Generic Constructions with Short Ciphertexts.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014
Poly-Many Hardcore Bits for Any One-Way Function and a Framework for Differing-Inputs Obfuscation.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014
2013
To Hash or Not to Hash Again? (In)differentiability Results for H<sup>2</sup> and HMAC.
IACR Cryptol. ePrint Arch., 2013
Communication Locality in Secure Multi-party Computation - How to Run Sublinear Algorithms in a Distributed Setting.
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013
Proceedings of the Innovations in Theoretical Computer Science, 2013
On the Relationship between Functional Encryption, Obfuscation, and Fully Homomorphic Encryption.
Proceedings of the Cryptography and Coding - 14th IMA International Conference, 2013
Proceedings of the Advances in Cryptology, 2013
Proceedings of the 51st Annual Allerton Conference on Communication, 2013
2012
IACR Cryptol. ePrint Arch., 2012
Efficient and Optimally Secure Key-Length Extension for Block Ciphers via Randomized Cascading.
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012
2011
Security Amplification for the Cascade of Arbitrarily Weak PRPs: Tight Bounds via the Interactive Hardcore Lemma.
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011
Proceedings of the 43rd ACM Symposium on Theory of Computing, 2011
2010
A Hardcore Lemma for Computational Indistinguishability: Security Amplification for Arbitrarily Weak PRGs with Optimal Stretch.
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010
2009
Proceedings of the SOFSEM 2009: Theory and Practice of Computer Science, 2009
Computational Indistinguishability Amplification: Tight Product Theorems for System Composition.
Proceedings of the Advances in Cryptology, 2009
A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach Practical.
Proceedings of the Advances in Cryptology, 2009
2008
Basing PRFs on Constant-Query Weak PRFs: Minimizing Assumptions for Efficient Symmetric Cryptography.
Proceedings of the Advances in Cryptology, 2008
2007
Proceedings of the Advances in Cryptology, 2007
2006
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006
2005
Proceedings of the Distributed Computing, 19th International Conference, 2005
Proceedings of the 24th IEEE Symposium on Reliable Distributed Systems (SRDS 2005), 2005