Folgen
Rosario Gennaro
Rosario Gennaro
Professor of Computer Science, City College of New York
Bestätigte E-Mail-Adresse bei cs.ccny.cuny.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Method and apparatus for the secure distributed storage and retrieval of information
JA Garay, R Gennaro, CS Jutla, TD Rabin
US Patent 5,991,414, 1999
14981999
Non-interactive verifiable computing: Outsourcing computation to untrusted workers
R Gennaro, C Gentry, B Parno
Advances in Cryptology–CRYPTO 2010: 30th Annual Cryptology Conference, Santa …, 2010
14972010
Method and apparatus for the secure distributed storage and retrieval of information
JA Garay, R Gennaro, CS Jutla, TD Rabin
US Patent 6,192,472, 2001
14902001
A secure and optimally efficient multi‐authority election scheme
R Cramer, R Gennaro, B Schoenmakers
European transactions on Telecommunications 8 (5), 481-490, 1997
14111997
Quadratic span programs and succinct NIZKs without PCPs
R Gennaro, C Gentry, B Parno, M Raykova
Advances in Cryptology–EUROCRYPT 2013: 32nd Annual International Conference …, 2013
10792013
Secure distributed key generation for discrete-log based cryptosystems
R Gennaro, S Jarecki, H Krawczyk, T Rabin
Advances in Cryptology—EUROCRYPT’99: International Conference on the Theory …, 1999
7941999
Robust threshold DSS signatures
R Gennaro, S Jarecki, H Krawczyk, T Rabin
Advances in Cryptology—EUROCRYPT’96: International Conference on the Theory …, 1996
7621996
Simplified VSS and fast-track multiparty computations with applications to threshold cryptography
R Gennaro, MO Rabin, T Rabin
Proceedings of the seventeenth annual ACM symposium on Principles of …, 1998
7051998
How to sign digital streams
R Gennaro, P Rohatgi
Annual International Cryptology Conference, 180-197, 1997
5651997
Secure distributed key generation for discrete-log based cryptosystems
R Gennaro, S Jarecki, H Krawczyk, T Rabin
Journal of Cryptology 20, 51-83, 2007
5482007
Verifiable delegation of computation over large datasets
S Benabbas, R Gennaro, Y Vahlis
Annual Cryptology Conference, 111-131, 2011
4692011
Secure hash-and-sign signatures without the random oracle
R Gennaro, S Halevi, T Rabin
Advances in Cryptology—EUROCRYPT’99: International Conference on the Theory …, 1999
4651999
A framework for password-based authenticated key exchange
R Gennaro, Y Lindell
International Conference on the Theory and Applications of Cryptographic …, 2003
4402003
Robust and efficient sharing of RSA functions
R Gennaro, S Jarecki, H Krawczyk, T Rabin
Advances in Cryptology—CRYPTO’96: 16th Annual International Cryptology …, 1996
376*1996
Securing threshold cryptosystems against chosen ciphertext attack
V Shoup, R Gennaro
International conference on the theory and applications of cryptographic …, 1998
3471998
Two-phase cryptographic key recovery system
R Gennaro, DB Johnson, PA Karger, SM Matyas Jr, M Peyravian, ...
US Patent 5,937,066, 1999
3421999
Threshold-optimal DSA/ECDSA signatures and an application to bitcoin wallet security
R Gennaro, S Goldfeder, A Narayanan
Applied Cryptography and Network Security: 14th International Conference …, 2016
3132016
Publicly verifiable delegation of large polynomials and matrix computations, with applications
D Fiore, R Gennaro
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
3082012
Fast multiparty threshold ECDSA with fast trustless setup
R Gennaro, S Goldfeder
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
3032018
Biometric authentication system with encrypted models
R Gennaro, S Halevi, S Maes, T Rabin, J Sorensen
US Patent 6,317,834, 2001
3012001
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20