Stefano Tessaro
Cited by
Cited by
Semantic security for the wiretap channel
M Bellare, S Tessaro, A Vardy
Annual Cryptology Conference, 294-311, 2012
Asynchronous verifiable information dispersal
C Cachin, S Tessaro
24th IEEE Symposium on Reliable Distributed Systems (SRDS'05), 191-201, 2005
Pact: Privacy sensitive protocols and mechanisms for mobile contact tracing
J Chan, D Foster, S Gollakota, E Horvitz, J Jaeger, S Kakade, T Kohno, ...
arXiv preprint arXiv:2004.03544, 2020
Optimal resilience for erasure-coded Byzantine distributed storage
C Cachin, S Tessaro
International Conference on Dependable Systems and Networks (DSN'06), 115-124, 2006
Obfuscation of probabilistic circuits and applications
R Canetti, H Lin, S Tessaro, V Vaikuntanathan
Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015 …, 2015
The locality of searchable symmetric encryption
D Cash, S Tessaro
Advances in Cryptology–EUROCRYPT 2014: 33rd Annual International Conference …, 2014
Indistinguishability obfuscation from trilinear maps and block-wise local PRGs
H Lin, S Tessaro
Annual International Cryptology Conference, 630-660, 2017
Key-alternating ciphers and key-length extension: exact bounds and multi-user security
VT Hoang, S Tessaro
Advances in Cryptology–CRYPTO 2016: 36th Annual International Cryptology …, 2016
Taostore: Overcoming asynchronicity in oblivious data storage
C Sahin, V Zakhary, A El Abbadi, H Lin, S Tessaro
2016 IEEE Symposium on Security and Privacy (SP), 198-217, 2016
Scrypt is maximally memory-hard
J Alwen, B Chen, K Pietrzak, L Reyzin, S Tessaro
Annual International Conference on the Theory and Applications of …, 2017
The equivalence of the random oracle model and the ideal cipher model, revisited
T Holenstein, R Künzler, S Tessaro
Proceedings of the forty-third annual ACM symposium on Theory of computing …, 2011
Random oracles with (out) programmability
M Fischlin, A Lehmann, T Ristenpart, T Shrimpton, M Stam, S Tessaro
International Conference on the Theory and Application of Cryptology and …, 2010
Information-theoretic indistinguishability via the chi-squared method
W Dai, VT Hoang, S Tessaro
Annual International Cryptology Conference, 497-523, 2017
Foundations of homomorphic secret sharing
E Boyle, N Gilboa, Y Ishai, H Lin, S Tessaro
Cryptology ePrint Archive, 2017
Multi-instance security and its application to password-based cryptography
M Bellare, T Ristenpart, S Tessaro
Annual Cryptology Conference, 312-329, 2012
A cryptographic treatment of the wiretap channel
M Bellare, S Tessaro, A Vardy
arXiv preprint arXiv:1201.2205, 2012
Oblivious parallel RAM: improved efficiency and generic constructions
B Chen, H Lin, S Tessaro
Theory of Cryptography: 13th International Conference, TCC 2016-A, Tel Aviv …, 2016
Communication locality in secure multi-party computation: how to run sublinear algorithms in a distributed setting
E Boyle, S Goldwasser, S Tessaro
Theory of Cryptography Conference, 356-376, 2013
To Hash or Not to Hash Again?(In) Differentiability Results for and HMAC
Y Dodis, T Ristenpart, J Steinberger, S Tessaro
Annual Cryptology Conference, 348-366, 2012
Poly-many hardcore bits for any one-way function and a framework for differing-inputs obfuscation
M Bellare, I Stepanovs, S Tessaro
Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014
The system can't perform the operation now. Try again later.
Articles 1–20