Prati
Sandro Coretti
Sandro Coretti
IOHK
Potvrđena adresa e-pošte na iohk.io - Početna stranica
Naslov
Citirano
Citirano
Godina
The double ratchet: security notions, proofs, and modularization for the signal protocol
J Alwen, S Coretti, Y Dodis
Advances in Cryptology–EUROCRYPT 2019: 38th Annual International Conference …, 2019
1212019
Security analysis and improvements for the IETF MLS standard for group messaging
J Alwen, S Coretti, Y Dodis, Y Tselekounis
Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020
712020
From single-bit to multi-bit public-key encryption via non-malleable codes
S Coretti, U Maurer, B Tackmann, D Venturi
Cryptology ePrint Archive, 2014
692014
Random oracles and non-uniformity
S Coretti, Y Dodis, S Guo, J Steinberger
Advances in Cryptology–EUROCRYPT 2018: 37th Annual International Conference …, 2018
582018
Non-malleable encryption: simpler, shorter, stronger
S Coretti, Y Dodis, B Tackmann, D Venturi
Theory of Cryptography: 13th International Conference, TCC 2016-A, Tel Aviv …, 2015
502015
Non-uniform bounds in the random-permutation, ideal-cipher, and generic-group models
S Coretti, Y Dodis, S Guo
Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018
432018
Constant-round asynchronous multi-party computation based on one-way functions
S Coretti, J Garay, M Hirt, V Zikas
Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the …, 2016
392016
Constructing confidential channels from authenticated channels—public-key encryption revisited
S Coretti, U Maurer, B Tackmann
Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on the …, 2013
372013
Continuous group key agreement with active security
J Alwen, S Coretti, D Jost, M Mularczyk
Theory of Cryptography: 18th International Conference, TCC 2020, Durham, NC …, 2020
332020
Probabilistic termination and composability of cryptographic protocols
R Cohen, S Coretti, J Garay, V Zikas
Advances in Cryptology–CRYPTO 2016: 36th Annual International Cryptology …, 2016
332016
Hydra: Fast isomorphic state channels
MMT Chakravarty, S Coretti, M Fitzi, P Gazi, P Kant, A Kiayias, A Russell
Cryptology ePrint Archive, 2020
282020
Round-preserving parallel composition of probabilistic-termination cryptographic protocols
R Cohen, S Coretti, J Garay, V Zikas
Journal of Cryptology 34, 1-57, 2021
242021
Key exchange with unilateral authentication: Composable security definition and modular protocol design
U Maurer, B Tackmann, S Coretti
Cryptology ePrint Archive, 2013
222013
Modular design of secure group messaging protocols and the security of MLS
J Alwen, S Coretti, Y Dodis, Y Tselekounis
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
202021
Nonlocality is transitive
S Coretti, E Hänggi, S Wolf
Physical Review Letters 107 (10), 100402, 2011
172011
Rate-optimizing compilers for continuously non-malleable codes
S Coretti, A Faonio, D Venturi
Applied Cryptography and Network Security: 17th International Conference …, 2019
132019
Seedless fruit is the sweetest: Random number generation, revisited
S Coretti, Y Dodis, H Karthikeyan, S Tessaro
Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019
102019
Probabilistic termination and composability of cryptographic protocols
R Cohen, S Coretti, J Garay, V Zikas
Journal of Cryptology 32 (3), 690-741, 2019
102019
The Generals’ Scuttlebutt: Byzantine-Resilient Gossip Protocols.
S Coretti, A Kiayias, C Moore, A Russell
IACR Cryptol. ePrint Arch. 2022, 541, 2022
72022
Self-destruct non-malleability
S Coretti, Y Dodis, B Tackmann, D Venturi
IACR Cryptology ePrint Archive 2014, 866, 2014
72014
Sustav trenutno ne može provesti ovu radnju. Pokušajte ponovo kasnije.
Članci 1–20