Cryptographers' World
 

Rosario Gennaro


Author's Web Page Link

41 papers in database with 3238 citations StarStarStar

Editor of 1 conference proceedings book

H-number: 22

Conference Proceedings

 
1. Steven M. BellovinRosario GennaroAngelos D. KeromytisMoti Yung, editors, Applied Cryptography and Network Security, 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings. Springer, 2008. ISBN 978-3-540-68913-3.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Masayuki Abe,  Rosario Gennaro,  Kaoru Kurosawa,  Tag-KEM/DEM: A New Framework for Hybrid Encryption, Journal of Cryptology, Volume 21(1), pp. 97 - 130, Springer, 2008.

[Cited 76 times Red Star]

2. Rosario Gennaro,  Tal Rabin,  Stanislaw Jarecki,  Hugo Krawczyk,  Robust and Efficient Sharing of RSA Functions, Journal of Cryptology, Volume 20(3), pp. 393 - 0, Springer, 2007.

[Cited 185 times Red StarRed Star]

3. Rosario Gennaro,  Tal Rabin,  Hugo Krawczyk,  RSA-Based Undeniable Signatures, Journal of Cryptology, Volume 20(3), pp. 394 - 0, Springer, 2007.

[Cited 114 times Red StarRed Star]

4. Rosario Gennaro,  Stanislaw Jarecki,  Hugo Krawczyk,  Tal Rabin,  Secure Distributed Key Generation for Discrete-Log Based Cryptosystems, Journal of Cryptology, Volume 20(1), pp. 51 - 83, Springer, 2007.

[Cited 246 times Red StarRed Star]

5. Rosario Gennaro,  An Improved Pseudo-Random Generator Based on the Discrete Logarithm Problem, Journal of Cryptology, Volume 18(2), pp. 91 - 110, Springer, 2005.

[Cited 41 times ]

6. Dario Catalano,  Rosario Gennaro,  Nick Howgrave-Graham,  Paillier's Trapdoor Function Hides up to , Journal of Cryptology, Volume 15(4), pp. 251 - 269, Springer, 2002.

[Cited 10 times ]

7. Victor Shoup,  Rosario Gennaro,  Securing Threshold Cryptosystems against Chosen Ciphertext Attack, Journal of Cryptology, Volume 15(2), pp. 75 - 96, Springer, 2002.

[Cited 157 times Red StarRed Star]

8. Rosario Gennaro,  Tal Rabin,  Hugo Krawczyk,  RSA-Based Undeniable Signatures, Journal of Cryptology, Volume 13(4), pp. 397 - 416, Springer, 2000.

[Cited 114 times Red StarRed Star]

9. Rosario Gennaro,  Tal Rabin,  Stanislaw Jarecki,  Hugo Krawczyk,  Robust and Efficient Sharing of RSA Functions, Journal of Cryptology, Volume 13(2), pp. 273 - 300, Springer, 2000.

[Cited 185 times Red StarRed Star]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Rosario Gennaro,  Shai Halevi,  Hugo Krawczyk,  Tal Rabin,  Threshold RSA for Dynamic and Ad-Hoc Groups, pp. 88 - 107, EUROCRYPT 2008.

[Electronic Edition][Cited 13 times ]

2. Dario Catalano,  Mario Di Raimondo,  Dario Fiore,  Rosario Gennaro,  Off-Line/On-Line Signatures: Theoretical Aspects and Experimental Results, pp. 101 - 120, PKC 2008.

[Electronic Edition][Cited 6 times ]

3. Rosario Gennaro,  Faster and Shorter Password-Authenticated Key Exchange, pp. 589 - 606, TCC 2008.

[Electronic Edition][Cited 11 times ]

4. Emmanuel Bresson,  Dario Catalano,  Rosario Gennaro,  Improved On-Line/Off-Line Threshold Signatures, pp. 217 - 232, PKC 2007.

[Electronic Edition][Cited 9 times ]

5. Masayuki Abe,  Rosario Gennaro,  Kaoru Kurosawa,  Victor Shoup,  Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM, pp. 128 - 146, EUROCRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 106 times Red StarRed Star]

6. Dario Catalano,  Rosario Gennaro,  Cramer-Damg√•rd Signatures Revisited: Efficient Flat-Tree Signatures Based on Factoring, pp. 313 - 327, PKC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 3 times ]

7. Rosario Gennaro,  Darren Leigh,  Ravi Sundaram,  William S. Yerazunis,  Batching Schnorr Identification Scheme with Applications to Privacy-Preserving Authorization and Low-Bandwidth Communication Devices, pp. 276 - 292, ASIACRYPT 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 7 times ]

8. Rosario Gennaro,  Multi-trapdoor Commitments and Their Applications to Proofs of Knowledge Secure Under Concurrent Man-in-the-Middle Attacks, pp. 220 - 236, CRYPTO 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 25 times ]

9. Yevgeniy Dodis,  Rosario Gennaro,  Johan H√•stad,  Hugo Krawczyk,  Tal Rabin,  Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes, pp. 494 - 510, CRYPTO 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 64 times Red Star]

10. Rosario Gennaro,  Hugo Krawczyk,  Tal Rabin,  Secure Hashed Diffie-Hellman over Non-DDH Groups, pp. 361 - 381, EUROCRYPT 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 37 times ]

11. Rosario Gennaro,  Anna Lysyanskaya,  Tal Malkin,  Silvio Micali,  Tal Rabin,  Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering, pp. 258 - 277, TCC 2004.

[Electronic Edition][Cited 53 times Red Star]

12. Rosario Gennaro,  Yael Gertner,  Jonathan Katz,  Lower bounds on the efficiency of encryption and digital signature schemes, pp. 417 - 425, STOC 2003.

[Electronic Edition][Cited 17 times ]

13. Rosario Gennaro,  Yehuda Lindell,  A Framework for Password-Based Authenticated Key Exchange, pp. 524 - 543, EUROCRYPT 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 130 times Red StarRed Star]

14. Mario Di Raimondo,  Rosario Gennaro,  Provably Secure Threshold Password-Authenticated Key Exchange, pp. 507 - 523, EUROCRYPT 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 48 times ]

15. Rosario Gennaro,  Stanislaw Jarecki,  Hugo Krawczyk,  Tal Rabin,  Secure Applications of Pedersen's Distributed Key Generation Protocol, pp. 373 - 390, CT-RSA 2003.

[Electronic Edition][Cited 20 times ]

16. Rosario Gennaro,  Yuval Ishai,  Eyal Kushilevitz,  Tal Rabin,  On 2-Round Secure Multiparty Computation, pp. 178 - 193, CRYPTO 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 21 times ]

17. Rosario Gennaro,  Daniele Micciancio,  Cryptanalysis of a Pseudorandom Generator Based on Braid Groups, pp. 1 - 13, EUROCRYPT 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 6 times ]

18. Nick Howgrave-Graham,  Joan G. Dyer,  Rosario Gennaro,  Pseudo-random Number Generation on the IBM 4758 Secure Crypto Coprocessor, pp. 93 - 102, CHES 2001.

[Electronic Edition][Cited 4 times ]

19. Dario Catalano,  Rosario Gennaro,  Nick Howgrave-Graham,  The Bit Security of Paillier's Encryption Scheme and Its Applications, pp. 229 - 243, EUROCRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 41 times ]

20. Rosario Gennaro,  An Improved Pseudo-random Generator Based on Discrete Log, pp. 469 - 481, CRYPTO 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 56 times Red Star]

21. Dario Catalano,  Rosario Gennaro,  Shai Halevi,  Computing Inverses over a Shared Secret Modulus, pp. 190 - 206, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 46 times ]

22. Ran Canetti,  Rosario Gennaro,  Stanislaw Jarecki,  Hugo Krawczyk,  Tal Rabin,  Adaptive Security for Threshold Cryptosystems, pp. 98 - 115, CRYPTO 1999.

[Electronic Edition][Cited 106 times Red StarRed Star]

23. Rosario Gennaro,  Shai Halevi,  Tal Rabin,  Secure Hash-and-Sign Signatures Without the Random Oracle, pp. 123 - 139, EUROCRYPT 1999.

[Electronic Edition][Cited 219 times Red StarRed Star]

24. Rosario Gennaro,  Stanislaw Jarecki,  Hugo Krawczyk,  Tal Rabin,  Secure Distributed Key Generation for Discrete-Log Based Cryptosystems, pp. 295 - 310, EUROCRYPT 1999.

[Electronic Edition][Cited 312 times Red StarRed StarRed Star]

25. Dario Catalano,  Rosario Gennaro,  New Efficient and Secure Protocols for Verifiable Signature Sharing and Other Applications, pp. 105 - 120, CRYPTO 1998.

[Electronic Edition][Cited 18 times ]

26. Victor Shoup,  Rosario Gennaro,  Securing Threshold Cryptosystems against Chosen Ciphertext Attack, pp. 1 - 16, EUROCRYPT 1998.

[Electronic Edition][Cited 139 times Red StarRed Star]

27. Rosario Gennaro,  Hugo Krawczyk,  Tal Rabin,  RSA-Based Undeniable Signatures, pp. 132 - 149, CRYPTO 1997.

[Electronic Edition][Cited 144 times Red StarRed Star]

28. Rosario Gennaro,  Pankaj Rohatgi,  How to Sign Digital Streams, pp. 180 - 197, CRYPTO 1997.

[Electronic Edition][Cited 335 times Red StarRed StarRed Star]

29. Ronald Cramer,  Rosario Gennaro,  Berry Schoenmakers,  A Secure and Optimally Efficient Multi-Authority Election Scheme, pp. 103 - 118, EUROCRYPT 1997.

[Electronic Edition][Cited 474 times Red StarRed StarRed Star]

30. Rosario Gennaro,  Stanislaw Jarecki,  Hugo Krawczyk,  Tal Rabin,  Robust and Efficient Sharing of RSA Functions, pp. 157 - 172, CRYPTO 1996.

[Electronic Edition][Cited 229 times Red StarRed Star]

31. Rosario Gennaro,  Stanislaw Jarecki,  Hugo Krawczyk,  Tal Rabin,  Robust Threshold DSS Signatures, pp. 354 - 371, EUROCRYPT 1996.

[Electronic Edition][Cited 373 times Red StarRed StarRed Star]

32. Rosario Gennaro,  Silvio Micali,  Verifiable Secret Sharing as Secure Computation, pp. 168 - 182, EUROCRYPT 1995.

[Electronic Edition][Cited 39 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...