default search action
Daniele Venturi 0001
Person information
- affiliation: Sapienza University of Rome, Italy
- affiliation (former): University of Trento, Italy
Other persons with the same name
- Daniele Venturi 0002 — University of California Santa Cruz, CA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j21]Danilo Francati, Daniele Friolo, Giulio Malavolta, Daniele Venturi:
Multi-key and Multi-input Predicate Encryption (for Conjunctions) from Learning with Errors. J. Cryptol. 37(3): 24 (2024) - [c64]Danilo Francati, Daniele Venturi:
Non-malleable Fuzzy Extractors. ACNS (1) 2024: 135-155 - [c63]Maciej Obremski, João Ribeiro, Lawrence Roy, François-Xavier Standaert, Daniele Venturi:
Improved Reductions from Noisy to Bounded and Probing Leakages via Hockey-Stick Divergences. CRYPTO (6) 2024: 461-491 - [c62]Hanlin Zhang, Benjamin L. Edelman, Danilo Francati, Daniele Venturi, Giuseppe Ateniese, Boaz Barak:
Watermarks in the Sand: Impossibility of Strong Watermarking for Language Models. ICML 2024 - [i63]Michele Kryston, Edoardo Marangone, Claudio Di Ciccio, Daniele Friolo, Eugenio Nerio Nemmi, Mattia Samory, Michele Spina, Daniele Venturi, Ingo Weber:
MARTSIA: Safeguarding Data Confidentiality in Blockchain-Driven Process Execution. CoRR abs/2407.10684 (2024) - [i62]Maciej Obremski, João Ribeiro, Lawrence Roy, François-Xavier Standaert, Daniele Venturi:
Improved Reductions from Noisy to Bounded and Probing Leakages via Hockey-Stick Divergences. IACR Cryptol. ePrint Arch. 2024: 1009 (2024) - [i61]Gennaro Avitabile, Vincenzo Botta, Daniele Friolo, Daniele Venturi, Ivan Visconti:
Compact Proofs of Partial Knowledge for Overlapping CNF Formulae. IACR Cryptol. ePrint Arch. 2024: 1488 (2024) - 2023
- [c61]Daniele Friolo, Matteo Salvino, Daniele Venturi:
On the Complete Non-malleability of the Fujisaki-Okamoto Transform. ACNS 2023: 307-335 - [c60]Danilo Francati, Daniele Friolo, Monosij Maitra, Giulio Malavolta, Ahmadreza Rahimi, Daniele Venturi:
Registered (Inner-Product) Functional Encryption. ASIACRYPT (5) 2023: 98-133 - [c59]Edoardo Marangone, Claudio Di Ciccio, Daniele Friolo, Eugenio Nerio Nemmi, Daniele Venturi, Ingo Weber:
MARTSIA: Enabling Data Confidentiality for Blockchain-Based Process Execution. EDOC 2023: 58-76 - [c58]Danilo Francati, Daniele Friolo, Giulio Malavolta, Daniele Venturi:
Multi-key and Multi-input Predicate Encryption from Learning with Errors. EUROCRYPT (3) 2023: 573-604 - [i60]Edoardo Marangone, Claudio Di Ciccio, Daniele Friolo, Eugenio Nerio Nemmi, Daniele Venturi, Ingo Weber:
MARTSIA: Enabling Data Confidentiality for Blockchain-based Process Execution. CoRR abs/2303.17977 (2023) - [i59]Edoardo Marangone, Claudio Di Ciccio, Daniele Friolo, Eugenio Nerio Nemmi, Daniele Venturi, Ingo Weber:
Enabling Data Confidentiality with Public Blockchains. CoRR abs/2308.03791 (2023) - [i58]Hanlin Zhang, Benjamin L. Edelman, Danilo Francati, Daniele Venturi, Giuseppe Ateniese, Boaz Barak:
Watermarks in the Sand: Impossibility of Strong Watermarking for Generative Models. CoRR abs/2311.04378 (2023) - [i57]Danilo Francati, Daniele Friolo, Monosij Maitra, Giulio Malavolta, Ahmadreza Rahimi, Daniele Venturi:
Registered (Inner-Product) Functional Encryption. IACR Cryptol. ePrint Arch. 2023: 395 (2023) - [i56]Danilo Francati, Daniele Venturi:
Evolving Secret Sharing Made Short. IACR Cryptol. ePrint Arch. 2023: 1534 (2023) - [i55]Hanlin Zhang, Benjamin L. Edelman, Danilo Francati, Daniele Venturi, Giuseppe Ateniese, Boaz Barak:
Watermarks in the Sand: Impossibility of Strong Watermarking for Generative Models. IACR Cryptol. ePrint Arch. 2023: 1776 (2023) - [i54]Suvradip Chakraborty, Lorenzo Magliocco, Bernardo Magri, Daniele Venturi:
Key Exchange in the Post-Snowden Era: UC Secure Subversion-Resilient PAKE. IACR Cryptol. ePrint Arch. 2023: 1827 (2023) - 2022
- [j20]Daniele Friolo, Fabio Massacci, Chan Nam Ngo, Daniele Venturi:
Cryptographic and Financial Fairness. IEEE Trans. Inf. Forensics Secur. 17: 3391-3406 (2022) - [j19]Gianluca Brian, Antonio Faonio, Maciej Obremski, João Ribeiro, Mark Simkin, Maciej Skórski, Daniele Venturi:
The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free. IEEE Trans. Inf. Theory 68(12): 8197-8227 (2022) - [j18]Gianluca Brian, Antonio Faonio, João Ribeiro, Daniele Venturi:
Short Non-Malleable Codes from Related-Key Secure Block Ciphers, Revisited. IACR Trans. Symmetric Cryptol. 2022(3): 1-19 (2022) - [c57]Gianluca Brian, Sebastian Faust, Elena Micheli, Daniele Venturi:
Continuously Non-malleable Codes Against Bounded-Depth Tampering. ASIACRYPT (4) 2022: 384-413 - [c56]Varun Madathil, Chris Orsini, Alessandra Scafuro, Daniele Venturi:
From Privacy-Only to Simulatable OT: Black-Box, Round-Optimal, Information-Theoretic. ITC 2022: 5:1-5:20 - [c55]Suvradip Chakraborty, Bernardo Magri, Jesper Buus Nielsen, Daniele Venturi:
Universally Composable Subversion-Resilient Cryptography. EUROCRYPT (1) 2022: 272-302 - [e1]Giuseppe Ateniese, Daniele Venturi:
Applied Cryptography and Network Security - 20th International Conference, ACNS 2022, Rome, Italy, June 20-23, 2022, Proceedings. Lecture Notes in Computer Science 13269, Springer 2022, ISBN 978-3-031-09233-6 [contents] - [i53]Daniele Friolo, Fabio Massacci, Chan Nam Ngo, Daniele Venturi:
Cryptographic and Financial Fairness. CoRR abs/2207.10780 (2022) - [i52]Varun Madathil, Chris Orsini, Alessandra Scafuro, Daniele Venturi:
From Privacy-Only to Simulatable OT: Black-Box, Round-Optimal, Information-theoretic. IACR Cryptol. ePrint Arch. 2022: 34 (2022) - [i51]Suvradip Chakraborty, Bernardo Magri, Jesper Buus Nielsen, Daniele Venturi:
Universally Composable Subversion-Resilient Cryptography. IACR Cryptol. ePrint Arch. 2022: 244 (2022) - [i50]Danilo Francati, Daniele Friolo, Giulio Malavolta, Daniele Venturi:
Multi-key and Multi-input Predicate Encryption from Learning with Errors. IACR Cryptol. ePrint Arch. 2022: 806 (2022) - [i49]Gianluca Brian, Antonio Faonio, João Ribeiro, Daniele Venturi:
Short Non-Malleable Codes from Related-Key Secure Block Ciphers, Revisited. IACR Cryptol. ePrint Arch. 2022: 1100 (2022) - [i48]Gianluca Brian, Sebastian Faust, Elena Micheli, Daniele Venturi:
Continuously Non-Malleable Codes against Bounded-Depth Tampering. IACR Cryptol. ePrint Arch. 2022: 1231 (2022) - [i47]Daniele Friolo, Matteo Salvino, Daniele Venturi:
On the Complete Non-Malleability of the Fujisaki-Okamoto Transform. IACR Cryptol. ePrint Arch. 2022: 1654 (2022) - 2021
- [j17]Giuseppe Ateniese, Danilo Francati, David Nuñez, Daniele Venturi:
Match Me if You Can: Matchmaking Encryption and Its Applications. J. Cryptol. 34(3): 16 (2021) - [j16]Chaya Ganesh, Bernardo Magri, Daniele Venturi:
Cryptographic reverse firewalls for interactive proof systems. Theor. Comput. Sci. 855: 104-132 (2021) - [j15]Giuseppe Ateniese, Danilo Francati, Bernardo Magri, Daniele Venturi:
Immunization against complete subversion without random oracles. Theor. Comput. Sci. 859: 1-36 (2021) - [j14]Somayeh Dolatnezhad Samarin, Dario Fiore, Daniele Venturi, Morteza Amini:
A compiler for multi-key homomorphic signatures for Turing machines. Theor. Comput. Sci. 889: 145-170 (2021) - [c54]Gianluca Brian, Antonio Faonio, Maciej Obremski, João Ribeiro, Mark Simkin, Maciej Skórski, Daniele Venturi:
The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free. EUROCRYPT (2) 2021: 408-437 - [c53]Vincenzo Botta, Daniele Friolo, Daniele Venturi, Ivan Visconti:
Shielded Computations in Smart Contracts Overcoming Forks. Financial Cryptography (1) 2021: 73-92 - [c52]Danilo Francati, Alessio Guidi, Luigi Russo, Daniele Venturi:
Identity-Based Matchmaking Encryption Without Random Oracles. INDOCRYPT 2021: 415-435 - [c51]Gianluca Brian, Antonio Faonio, Daniele Venturi:
Continuously Non-malleable Secret Sharing: Joint Tampering, Plain Model and Capacity. TCC (2) 2021: 333-364 - [i46]Gianluca Brian, Antonio Faonio, Daniele Venturi:
Continuously Non-Malleable Secret Sharing: Joint Tampering, Plain Model and Capacity. IACR Cryptol. ePrint Arch. 2021: 1128 (2021) - [i45]Somayeh Dolatnezhad Samarin, Dario Fiore, Daniele Venturi, Morteza Amini:
A compiler for multi-key homomorphic signatures for Turing machines. IACR Cryptol. ePrint Arch. 2021: 1651 (2021) - [i44]Danilo Francati, Alessio Guidi, Luigi Russo, Daniele Venturi:
Identity-Based Matchmaking Encryption without Random Oracles. IACR Cryptol. ePrint Arch. 2021: 1660 (2021) - 2020
- [j13]Sandro Coretti, Yevgeniy Dodis, Ueli Maurer, Björn Tackmann, Daniele Venturi:
Non-malleable Encryption: Simpler, Shorter, Stronger. J. Cryptol. 33(4): 1984-2033 (2020) - [j12]Sebastian Faust, Pratyay Mukherjee, Jesper Buus Nielsen, Daniele Venturi:
Continuously Non-malleable Codes in the Split-State Model. J. Cryptol. 33(4): 2034-2077 (2020) - [j11]Giuseppe Ateniese, Bernardo Magri, Daniele Venturi:
Subversion-resilient signatures: Definitions, constructions and applications. Theor. Comput. Sci. 820: 91-122 (2020) - [c50]Gianluca Brian, Antonio Faonio, Maciej Obremski, Mark Simkin, Daniele Venturi:
Non-malleable Secret Sharing Against Bounded Joint-Tampering Attacks in the Plain Model. CRYPTO (3) 2020: 127-155 - [c49]Chan Nam Ngo, Daniele Friolo, Fabio Massacci, Daniele Venturi, Ettore Battaiola:
Vision: What If They All Die? Crypto Requirements For Key People. EuroS&P Workshops 2020: 178-183 - [c48]Chaya Ganesh, Bernardo Magri, Daniele Venturi:
Cryptographic Reverse Firewalls for Interactive Proof Systems. ICALP 2020: 55:1-55:16 - [c47]Michele Ciampi, Roberto Parisella, Daniele Venturi:
On Adaptive Security of Delayed-Input Sigma Protocols and Fiat-Shamir NIZKs. SCN 2020: 670-690 - [i43]Chaya Ganesh, Bernardo Magri, Daniele Venturi:
Cryptographic Reverse Firewalls for Interactive Proof Systems. IACR Cryptol. ePrint Arch. 2020: 204 (2020) - [i42]Gianluca Brian, Antonio Faonio, Maciej Obremski, Mark Simkin, Daniele Venturi:
Non-Malleable Secret Sharing against Bounded Joint-Tampering Attacks in the Plain Model. IACR Cryptol. ePrint Arch. 2020: 725 (2020) - [i41]Michele Ciampi, Roberto Parisella, Daniele Venturi:
On Adaptive Security of Delayed-Input Sigma Protocols and Fiat-Shamir NIZKs. IACR Cryptol. ePrint Arch. 2020: 831 (2020) - [i40]Gianluca Brian, Antonio Faonio, Maciej Obremski, João Ribeiro, Mark Simkin, Maciej Skórski, Daniele Venturi:
The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free. IACR Cryptol. ePrint Arch. 2020: 1246 (2020)
2010 – 2019
- 2019
- [j10]Antonio Faonio, Jesper Buus Nielsen, Mark Simkin, Daniele Venturi:
Continuously non-malleable codes with split-state refresh. Theor. Comput. Sci. 759: 98-132 (2019) - [c46]Sandro Coretti, Antonio Faonio, Daniele Venturi:
Rate-Optimizing Compilers for Continuously Non-malleable Codes. ACNS 2019: 3-23 - [c45]Giuseppe Ateniese, Danilo Francati, Bernardo Magri, Daniele Venturi:
Public Immunization Against Complete Subversion Without Random Oracles. ACNS 2019: 465-485 - [c44]Antonio Faonio, Daniele Venturi:
Non-malleable Secret Sharing in the Computational Setting: Adaptive Tampering, Noisy-Leakage Resilience, and Improved Rate. CRYPTO (2) 2019: 448-479 - [c43]Giuseppe Ateniese, Danilo Francati, David Nuñez, Daniele Venturi:
Match Me if You Can: Matchmaking Encryption and Its Applications. CRYPTO (2) 2019: 701-731 - [c42]Mahdi Akil, Luigi V. Mancini, Daniele Venturi:
Multi-Covert Channel Attack in the Cloud. SDS 2019: 160-165 - [c41]Daniele Friolo, Fabio Massacci, Chan Nam Ngo, Daniele Venturi:
Affordable Security or Big Guy vs Small Guy - Does the Depth of Your Pockets Impact Your Protocols? Security Protocols Workshop 2019: 135-147 - [c40]Daniele Friolo, Daniel Masny, Daniele Venturi:
A Black-Box Construction of Fully-Simulatable, Round-Optimal Oblivious Transfer from Strongly Uniform Key Agreement. TCC (1) 2019: 111-130 - [c39]Gianluca Brian, Antonio Faonio, Daniele Venturi:
Continuously Non-malleable Secret Sharing for General Access Structures. TCC (2) 2019: 211-232 - [i39]Sandro Coretti, Antonio Faonio, Daniele Venturi:
Rate-Optimizing Compilers for Continuously Non-Malleable Codes. IACR Cryptol. ePrint Arch. 2019: 55 (2019) - [i38]Antonio Faonio, Daniele Venturi:
Non-Malleable Secret Sharing in the Computational Setting: Adaptive Tampering, Noisy-Leakage Resilience, and Improved Rate. IACR Cryptol. ePrint Arch. 2019: 105 (2019) - [i37]Gianluca Brian, Antonio Faonio, Daniele Venturi:
Continuously Non-Malleable Secret Sharing for General Access Structures. IACR Cryptol. ePrint Arch. 2019: 602 (2019) - [i36]Vincenzo Botta, Daniele Friolo, Daniele Venturi, Ivan Visconti:
The Rush Dilemma: Attacking and Repairing Smart Contracts on Forking Blockchains. IACR Cryptol. ePrint Arch. 2019: 891 (2019) - [i35]Giuseppe Ateniese, Danilo Francati, Bernardo Magri, Daniele Venturi:
Immunization against Complete Subversion without Random Oracles. IACR Cryptol. ePrint Arch. 2019: 1173 (2019) - 2018
- [j9]Sebastian Faust, Carmit Hazay, Daniele Venturi:
Outsourced pattern matching. Int. J. Inf. Sec. 17(3): 327-346 (2018) - [j8]Arno Mittelbach, Daniele Venturi:
Fiat-Shamir for highly sound protocols is instantiable. Theor. Comput. Sci. 740: 28-62 (2018) - [c38]Antonio Faonio, Jesper Buus Nielsen, Mark Simkin, Daniele Venturi:
Continuously Non-malleable Codes with Split-State Refresh. ACNS 2018: 121-139 - [c37]Rafail Ostrovsky, Giuseppe Persiano, Daniele Venturi, Ivan Visconti:
Continuously Non-Malleable Codes in the Split-State Model from Minimal Assumptions. CRYPTO (3) 2018: 608-639 - [c36]Giuseppe Ateniese, Aggelos Kiayias, Bernardo Magri, Yiannis Tselekounis, Daniele Venturi:
Secure Outsourcing of Cryptographic Circuits Manufacturing. ProvSec 2018: 75-93 - [c35]Fabio Massacci, Chan Nam Ngo, Jing Nie, Daniele Venturi, Julian Williams:
FuturesMEX: Secure, Distributed Futures Market Exchange. IEEE Symposium on Security and Privacy 2018: 335-353 - [c34]Fabio Massacci, Chan Nam Ngo, Daniele Venturi, Julian Williams:
Non-monotonic Security Protocols and Failures in Financial Intermediation. Security Protocols Workshop 2018: 45-54 - [i34]Daniele Friolo, Daniel Masny, Daniele Venturi:
Secure Multi-Party Computation from Strongly Uniform Key Agreement. IACR Cryptol. ePrint Arch. 2018: 473 (2018) - [i33]Rafail Ostrovsky, Giuseppe Persiano, Daniele Venturi, Ivan Visconti:
Continuously Non-Malleable Codes in the Split-State Model from Minimal Assumptions. IACR Cryptol. ePrint Arch. 2018: 542 (2018) - [i32]Antonio Faonio, Jesper Buus Nielsen, Mark Simkin, Daniele Venturi:
Continuously Non-Malleable Codes with Split-State Refresh. IACR Cryptol. ePrint Arch. 2018: 606 (2018) - [i31]Giuseppe Ateniese, Danilo Francati, David Nuñez, Daniele Venturi:
Match Me if You Can: Matchmaking Encryption and its Applications. IACR Cryptol. ePrint Arch. 2018: 1094 (2018) - 2017
- [j7]Ivan Damgård, Sebastian Faust, Pratyay Mukherjee, Daniele Venturi:
Bounded Tamper Resilience: How to Go Beyond the Algebraic Barrier. J. Cryptol. 30(1): 152-190 (2017) - [j6]Eike Kiltz, Krzysztof Pietrzak, Daniele Venturi, David Cash, Abhishek Jain:
Efficient Authentication from Hard Learning Problems. J. Cryptol. 30(4): 1238-1275 (2017) - [j5]Antonio Faonio, Jesper Buus Nielsen, Daniele Venturi:
Fully leakage-resilient signatures revisited: Graceful degradation, noisy leakage, and construction in the bounded-retrieval model. Theor. Comput. Sci. 660: 23-56 (2017) - [j4]Silvio Biagioni, Daniel Masny, Daniele Venturi:
Naor-Yung paradigm with shared randomness and applications. Theor. Comput. Sci. 692: 90-113 (2017) - [c33]Sebastian Faust, Kristina Hostáková, Pratyay Mukherjee, Daniele Venturi:
Non-Malleable Codes for Space-Bounded Tampering. CRYPTO (2) 2017: 95-126 - [c32]Giuseppe Ateniese, Bernardo Magri, Daniele Venturi, Ewerton R. Andrade:
Redactable Blockchain - or - Rewriting History in Bitcoin and Friends. EuroS&P 2017: 111-126 - [c31]Antonio Faonio, Jesper Buus Nielsen, Daniele Venturi:
Predictable Arguments of Knowledge. Public Key Cryptography (1) 2017: 121-150 - [c30]Fabio Massacci, Chan Nam Ngo, Jing Nie, Daniele Venturi, Julian Williams:
The Seconomics (Security-Economics) Vulnerabilities of Decentralized Autonomous Organizations. Security Protocols Workshop 2017: 171-179 - [c29]Angelo Capossele, Chiara Petrioli, Gabriele Saturni, Daniele Spaccini, Daniele Venturi:
Securing Underwater Communications: Key Agreement based on Fully Hashed MQV. WUWNet 2017: 12:1-12:5 - [i30]Sebastian Faust, Kristina Hostáková, Pratyay Mukherjee, Daniele Venturi:
Non-Malleable Codes for Space-Bounded Tampering. IACR Cryptol. ePrint Arch. 2017: 530 (2017) - 2016
- [b1]Daniele Venturi:
Tampering in wonderland. Sapienza University of Rome, Italy, 2016 - [j3]Giuseppe Ateniese, Özgür Dagdelen, Ivan Damgård, Daniele Venturi:
Entangled cloud storage. Future Gener. Comput. Syst. 62: 104-118 (2016) - [j2]Özgür Dagdelen, Payman Mohassel, Daniele Venturi:
Rate-limited secure function evaluation. Theor. Comput. Sci. 653: 53-78 (2016) - [j1]Sebastian Faust, Pratyay Mukherjee, Daniele Venturi, Daniel Wichs:
Efficient Non-Malleable Codes and Key Derivation for Poly-Size Tampering Circuits. IEEE Trans. Inf. Theory 62(12): 7179-7194 (2016) - [c28]Antonio Faonio, Daniele Venturi:
Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience. ASIACRYPT (1) 2016: 877-907 - [c27]Sebastian Faust, Daniel Masny, Daniele Venturi:
Chosen-Ciphertext Security from Subset Sum. Public Key Cryptography (1) 2016: 35-46 - [c26]Silvio Biagioni, Daniel Masny, Daniele Venturi:
Naor-Yung Paradigm with Shared Randomness and Applications. SCN 2016: 62-80 - [c25]Arno Mittelbach, Daniele Venturi:
Fiat-Shamir for Highly Sound Protocols Is Instantiable. SCN 2016: 198-215 - [c24]Sandro Coretti, Yevgeniy Dodis, Björn Tackmann, Daniele Venturi:
Non-Malleable Encryption: Simpler, Shorter, Stronger. TCC (A1) 2016: 306-335 - [i29]Arno Mittelbach, Daniele Venturi:
Fiat-Shamir for Highly Sound Protocols is Instantiable. IACR Cryptol. ePrint Arch. 2016: 313 (2016) - [i28]Giuseppe Ateniese, Aggelos Kiayias, Bernardo Magri, Yiannis Tselekounis, Daniele Venturi:
Secure Outsourcing of Circuit Manufacturing. IACR Cryptol. ePrint Arch. 2016: 527 (2016) - [i27]Antonio Faonio, Daniele Venturi:
Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience. IACR Cryptol. ePrint Arch. 2016: 529 (2016) - [i26]Giuseppe Ateniese, Bernardo Magri, Daniele Venturi, Ewerton R. Andrade:
Redactable Blockchain - or - Rewriting History in Bitcoin and Friends. IACR Cryptol. ePrint Arch. 2016: 757 (2016) - [i25]Silvio Biagioni, Daniel Masny, Daniele Venturi:
Naor-Yung Paradigm with Shared Randomness and Applications. IACR Cryptol. ePrint Arch. 2016: 880 (2016) - 2015
- [c23]Giuseppe Ateniese, Özgür Dagdelen, Ivan Damgård, Daniele Venturi:
Entangled Encodings and Data Entanglement. SCC@ASIACCS 2015: 3-12 - [c22]Giuseppe Ateniese, Bernardo Magri, Daniele Venturi:
Subversion-Resilient Signature Schemes. CCS 2015: 364-375 - [c21]Bojan Suzic, Andreas Reiter, Florian Reimair, Daniele Venturi, Baldur Kubo:
Secure Data Sharing and Processing in Heterogeneous Clouds. Cloud Forward 2015: 116-126 - [c20]Antonio Faonio, Jesper Buus Nielsen, Daniele Venturi:
Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation. ICALP (1) 2015: 456-468 - [c19]Ivan Damgård, Sebastian Faust, Pratyay Mukherjee, Daniele Venturi:
The Chaining Lemma and Its Application. ICITS 2015: 181-196 - [c18]Markulf Kohlweiss, Ueli Maurer, Cristina Onete, Björn Tackmann, Daniele Venturi:
(De-)Constructing TLS 1.3. INDOCRYPT 2015: 85-102 - [c17]Sebastian Faust, Pratyay Mukherjee, Jesper Buus Nielsen, Daniele Venturi:
A Tamper and Leakage Resilient von Neumann Architecture. Public Key Cryptography 2015: 579-603 - [c16]Sandro Coretti, Ueli Maurer, Björn Tackmann, Daniele Venturi:
From Single-Bit to Multi-bit Public-Key Encryption via Non-malleable Codes. TCC (1) 2015: 532-560 - [i24]Giuseppe Ateniese, Bernardo Magri, Daniele Venturi:
Subversion-Resilient Signature Schemes. IACR Cryptol. ePrint Arch. 2015: 517 (2015) - [i23]Antonio Faonio, Jesper Buus Nielsen, Daniele Venturi:
Predictable Arguments of Knowledge. IACR Cryptol. ePrint Arch. 2015: 740 (2015) - [i22]Sandro Coretti, Yevgeniy Dodis, Björn Tackmann, Daniele Venturi:
Non-Malleable Encryption: Simpler, Shorter, Stronger. IACR Cryptol. ePrint Arch. 2015: 772 (2015) - [i21]Sebastian Faust, Daniel Masny, Daniele Venturi:
Chosen-Ciphertext Security from Subset Sum. IACR Cryptol. ePrint Arch. 2015: 1223 (2015) - 2014
- [c15]Özgür Dagdelen, Daniele Venturi:
A Second Look at Fischlin's Transformation. AFRICACRYPT 2014: 356-376 - [c14]Özgür Dagdelen, Daniele Venturi:
A Multi-Party Protocol for Privacy-Preserving Cooperative Linear Systems of Equations. BalkanCryptSec 2014: 161-172 - [c13]Sebastian Faust, Pratyay Mukherjee, Daniele Venturi, Daniel Wichs:
Efficient Non-malleable Codes and Key-Derivation for Poly-size Tampering Circuits. EUROCRYPT 2014: 111-128 - [c12]Jesper Buus Nielsen, Daniele Venturi, Angela Zottarel:
Leakage-Resilient Signatures with Graceful Degradation. Public Key Cryptography 2014: 362-379 - [c11]Sebastian Faust, Pratyay Mukherjee, Jesper Buus Nielsen, Daniele Venturi:
Continuous Non-malleable Codes. TCC 2014: 465-488 - [i20]Markulf Kohlweiss, Ueli Maurer, Cristina Onete, Björn Tackmann, Daniele Venturi:
(De-)Constructing TLS. IACR Cryptol. ePrint Arch. 2014: 20 (2014) - [i19]Sebastian Faust, Pratyay Mukherjee, Jesper Buus Nielsen, Daniele Venturi:
Continuous Non-malleable Codes. IACR Cryptol. ePrint Arch. 2014: 173 (2014) - [i18]Özgür Dagdelen, Daniele Venturi:
A Second Look at Fischlin's Transformation. IACR Cryptol. ePrint Arch. 2014: 188 (2014) - [i17]Sandro Coretti, Ueli Maurer, Björn Tackmann, Daniele Venturi:
From Single-Bit to Multi-Bit Public-Key Encryption via Non-Malleable Codes. IACR Cryptol. ePrint Arch. 2014: 324 (2014) - [i16]Sebastian Faust, Pratyay Mukherjee, Jesper Buus Nielsen, Daniele Venturi:
A Tamper and Leakage Resilient Random Access Machine. IACR Cryptol. ePrint Arch. 2014: 338 (2014) - [i15]Jesper Buus Nielsen, Daniele Venturi, Angela Zottarel:
On the Connection between Leakage Tolerance and Adaptive Security. IACR Cryptol. ePrint Arch. 2014: 517 (2014) - [i14]Jesper Buus Nielsen, Daniele Venturi, Angela Zottarel:
Leakage-Resilient Signatures with Graceful Degradation. IACR Cryptol. ePrint Arch. 2014: 529 (2014) - [i13]Sebastian Faust, Carmit Hazay, Daniele Venturi:
Outsourced Pattern Matching. IACR Cryptol. ePrint Arch. 2014: 662 (2014) - [i12]Antonio Faonio, Jesper Buus Nielsen, Daniele Venturi:
Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation. IACR Cryptol. ePrint Arch. 2014: 913 (2014) - [i11]Ivan Damgård, Sebastian Faust, Pratyay Mukherjee, Daniele Venturi:
The Chaining Lemma and its application. IACR Cryptol. ePrint Arch. 2014: 979 (2014) - 2013
- [c10]Ivan Damgård, Sebastian Faust, Pratyay Mukherjee, Daniele Venturi:
Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier. ASIACRYPT (2) 2013: 140-160 - [c9]Sebastian Faust, Carmit Hazay, Daniele Venturi:
Outsourced Pattern Matching. ICALP (2) 2013: 545-556 - [c8]Markulf Kohlweiss, Ueli Maurer, Cristina Onete, Björn Tackmann, Daniele Venturi:
Anonymity-Preserving Public-Key Encryption: A Constructive Approach. Privacy Enhancing Technologies 2013: 19-39 - [c7]Özgür Dagdelen, Payman Mohassel, Daniele Venturi:
Rate-Limited Secure Function Evaluation: Definitions and Constructions. Public Key Cryptography 2013: 461-478 - [c6]Jesper Buus Nielsen, Daniele Venturi, Angela Zottarel:
On the Connection between Leakage Tolerance and Adaptive Security. Public Key Cryptography 2013: 497-515 - [i10]Özgür Dagdelen, Payman Mohassel, Daniele Venturi:
Rate-Limited Secure Function Evaluation: Definitions and Constructions. IACR Cryptol. ePrint Arch. 2013: 21 (2013) - [i9]Markulf Kohlweiss, Ueli Maurer, Cristina Onete, Björn Tackmann, Daniele Venturi:
Anonymity-preserving Public-Key Encryption: A Constructive Approach. IACR Cryptol. ePrint Arch. 2013: 238 (2013) - [i8]Ivan Damgård, Sebastian Faust, Pratyay Mukherjee, Daniele Venturi:
Bounded Tamper Resilience: How to go beyond the Algebraic Barrier. IACR Cryptol. ePrint Arch. 2013: 677 (2013) - [i7]Sebastian Faust, Pratyay Mukherjee, Daniele Venturi, Daniel Wichs:
Efficient Non-Malleable Codes and Key-Derivation for Poly-Size Tampering Circuits. IACR Cryptol. ePrint Arch. 2013: 702 (2013) - 2012
- [c5]Sebastian Faust, Markulf Kohlweiss, Giorgia Azzurra Marson, Daniele Venturi:
On the Non-malleability of the Fiat-Shamir Transform. INDOCRYPT 2012: 60-79 - [i6]Giuseppe Ateniese, Özgür Dagdelen, Ivan Damgård, Daniele Venturi:
Entangled Cloud Storage. IACR Cryptol. ePrint Arch. 2012: 511 (2012) - [i5]Sebastian Faust, Markulf Kohlweiss, Giorgia Azzurra Marson, Daniele Venturi:
On the Non-malleability of the Fiat-Shamir Transform. IACR Cryptol. ePrint Arch. 2012: 704 (2012) - 2011
- [c4]Eike Kiltz, Krzysztof Pietrzak, David Cash, Abhishek Jain, Daniele Venturi:
Efficient Authentication from Hard Learning Problems. EUROCRYPT 2011: 7-26 - [c3]Sebastian Faust, Krzysztof Pietrzak, Daniele Venturi:
Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience. ICALP (1) 2011: 391-402 - [i4]Cristina Onete, Daniele Venturi:
Security & Indistinguishability in the Presence of Traffic Analysis. IACR Cryptol. ePrint Arch. 2011: 260 (2011) - [i3]Sebastian Faust, Krzysztof Pietrzak, Daniele Venturi:
Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience. IACR Cryptol. ePrint Arch. 2011: 314 (2011) - 2010
- [c2]Francesco Davì, Stefan Dziembowski, Daniele Venturi:
Leakage-Resilient Storage. SCN 2010: 121-137
2000 – 2009
- 2009
- [c1]Alfredo Todini, Andrea Baiocchi, Daniele Venturi:
Inadequacy of the Queue-Based Max-Weight Optimal Scheduler on Wireless Links with TCP Sources. ICC 2009: 1-6 - [i2]Daniele Venturi:
Lecture Notes on Algorithmic Number Theory. Electron. Colloquium Comput. Complex. TR09 (2009) - [i1]Francesco Davì, Stefan Dziembowski, Daniele Venturi:
Leakage-Resilient Storage. IACR Cryptol. ePrint Arch. 2009: 399 (2009)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint