What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Stefano Tessaro
Google Scholar
85
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/crypto
On the Adaptive Security of FROST.
Elizabeth C. Crites
Jonathan Katz
Chelsea Komlo
Stefano Tessaro
Chenzhi Zhu
2025
conf/crypto
Succinct PPRFs via Memory-Tight Reductions.
Joël Alwen
Chris Brzuska
Jérôme Govinden
Patrick Harasser
Stefano Tessaro
2025
conf/crypto
Cryptographic Treatment of Key Control Security - In Light of NIST SP 800-108.
Ritam Bhaumik
Avijit Dutta
Akiko Inoue
Tetsu Iwata
Ashwin Jha
Kazuhiko Minematsu
Mridul Nandi
Yu Sasaki
Meltem Sönmez Turan
Stefano Tessaro
2025
conf/crypto
Server-Aided Anonymous Credentials.
Rutchathon Chairattana-Apirom
Franklin Harding
Anna Lysyanskaya
Stefano Tessaro
2025
conf/crypto
Straight-Line Knowledge Extraction for Multi-Round Protocols.
Lior Rotem
Stefano Tessaro
2025
conf/crypto
The Algebraic One-More MISIS Problem and Applications to Threshold Signatures.
Chenzhi Zhu
Stefano Tessaro
2024
conf/uss
POPSTAR: Lightweight Threshold Reporting with Reduced Leakage.
Hanjun Li
Sela Navot
Stefano Tessaro
2024
conf/crypto
Is ML-Based Cryptanalysis Inherently Limited? Simulating Cryptographic Adversaries via Gradient-Based Methods.
Avital Shafran
Eran Malach
Thomas Ristenpart
Gil Segev
Stefano Tessaro
2024
conf/crypto
Fully Malicious Authenticated PIR.
Marian Dietz
Stefano Tessaro
2024
conf/crypto
Oblivious Issuance of Proofs.
Michele Orrù
Stefano Tessaro
Greg Zaverucha
Chenzhi Zhu
2024
conf/crypto
Pairing-Free Blind Signatures from CDH Assumptions.
Rutchathon Chairattana-Apirom
Stefano Tessaro
Chenzhi Zhu
2024
conf/crypto
Collision Resistance from Multi-collision Resistance for All Constant Parameters.
Jan Buzek
Stefano Tessaro
2024
conf/eurocrypt
Twinkle: Threshold Signatures from DDH with Full Adaptive Security.
Renas Bacho
Julian Loss
Stefano Tessaro
Benedikt Wagner
Chenzhi Zhu
2024
conf/asiacrypt
One-More Unforgeability for Multi - and Threshold Signatures.
Sela Navot
Stefano Tessaro
2024
conf/asiacrypt
Count Corruptions, Not Users: Improved Tightness for Signatures, Encryption and Authenticated Key Exchange.
Mihir Bellare
Doreen Riepel
Stefano Tessaro
Yizhao Zhang
2024
conf/asiacrypt
Partially Non-interactive Two-Round Lattice-Based Threshold Signatures.
Rutchathon Chairattana-Apirom
Stefano Tessaro
Chenzhi Zhu
2023
conf/crypto
Snowblind: A Threshold Blind Signature in Pairing-Free Groups.
Elizabeth C. Crites
Chelsea Komlo
Mary Maller
Stefano Tessaro
Chenzhi Zhu
2023
conf/crypto
Layout Graphs, Random Walks and the t-Wise Independence of SPN Block Ciphers.
Tianren Liu
Angelos Pelecanos
Stefano Tessaro
Vinod Vaikuntanathan
2023
conf/crypto
The Query-Complexity of Preprocessing Attacks.
Ashrujit Ghoshal
Stefano Tessaro
2023
conf/eurocrypt
Revisiting BBS Signatures.
Stefano Tessaro
Chenzhi Zhu
2023
conf/eurocrypt
Threshold and Multi-signature Schemes from Linear Hash Functions.
Stefano Tessaro
Chenzhi Zhu
2023
conf/asiacrypt
LERNA: Secure Single-Server Aggregation via Key-Homomorphic Masking.
Hanjun Li
Huijia Lin
Antigoni Polychroniadou
Stefano Tessaro
2022
conf/ccs
VeRSA: Verifiable Registries with Efficient Client Audits from RSA Authenticated Dictionaries.
Nirvan Tyagi
Ben Fisch
Andrew Zitek
Joseph Bonneau
Stefano Tessaro
2022
conf/uss
QuORAM: A Quorum-Replicated Fault Tolerant ORAM Datastore.
Sujaya Maiyya
Seif Ibrahim
Caitlin Scarberry
Divyakant Agrawal
Amr El Abbadi
Huijia Lin
Stefano Tessaro
Victor Zakhary
2022
conf/crypto
Better than Advertised Security for Non-interactive Threshold Signatures.
Mihir Bellare
Elizabeth C. Crites
Chelsea Komlo
Mary Maller
Stefano Tessaro
Chenzhi Zhu
2022
conf/eurocrypt
Hiding in Plain Sight: Memory-Tight Proofs via Randomness Programming.
Ashrujit Ghoshal
Riddhi Ghosal
Joseph Jaeger
Stefano Tessaro
2022
conf/eurocrypt
Short Pairing-Free Blind Signatures with Exponential Security.
Stefano Tessaro
Chenzhi Zhu
2022
conf/eurocrypt
A Fast and Simple Partially Oblivious PRF, with Applications.
Nirvan Tyagi
Sofía Celi
Thomas Ristenpart
Nick Sullivan
Stefano Tessaro
Christopher A. Wood
2021
conf/crypto
The t-wise Independence of Substitution-Permutation Networks.
Tianren Liu
Stefano Tessaro
Vinod Vaikuntanathan
2021
conf/crypto
Tight State-Restoration Soundness in the Algebraic Group Model.
Ashrujit Ghoshal
Stefano Tessaro
2021
conf/eurocrypt
Password Hashing and Preprocessing.
Pooya Farshim
Stefano Tessaro
2021
conf/asiacrypt
Better Security-Efficiency Trade-Offs in Permutation-Based Two-Party Computation.
Yu Long Chen
Stefano Tessaro
2021
conf/asiacrypt
Tight Security for Key-Alternating Ciphers with Correlated Sub-keys.
Stefano Tessaro
Xihu Zhang
2021
conf/tcc
Quantum Key-Length Extension.
Joseph Jaeger
Fang Song
Stefano Tessaro
2020
conf/crypto
The Memory-Tightness of Authenticated Encryption.
Ashrujit Ghoshal
Joseph Jaeger
Stefano Tessaro
2020
conf/eurocrypt
On the Memory-Tightness of Hashed ElGamal.
Ashrujit Ghoshal
Stefano Tessaro
2020
conf/tcc
Super-Linear Time-Memory Trade-Offs for Symmetric Encryption.
Wei Dai
Stefano Tessaro
Xihu Zhang
2020
conf/tcc
Towards Defeating Backdoored Random Oracles: Indifferentiability with Bounded Adaptivity.
Yevgeniy Dodis
Pooya Farshim
Sogol Mazaheri
Stefano Tessaro
2020
conf/tcc
Expected-Time Cryptography: Generic Techniques and Applications to Concrete Soundness.
Joseph Jaeger
Stefano Tessaro
2019
conf/crypto
Seedless Fruit Is the Sweetest: Random Number Generation, Revisited.
Sandro Coretti
Yevgeniy Dodis
Harish Karthikeyan
Stefano Tessaro
2019
conf/crypto
Memory-Hard Functions from Cryptographic Primitives.
Binyi Chen
Stefano Tessaro
2019
conf/eurocrypt
Tight Time-Memory Trade-Offs for Symmetric Encryption.
Joseph Jaeger
Stefano Tessaro
2018
conf/ccs
The Multi-user Security of GCM, Revisited: Tight Bounds for Nonce Randomization.
Viet Tung Hoang
Stefano Tessaro
Aishwarya Thiruvengadam
2018
conf/crypto
The Curse of Small Domains: New Attacks on Format-Preserving Encryption.
Viet Tung Hoang
Stefano Tessaro
Ni Trieu
2018
conf/eurocrypt
Naor-Reingold Goes Public: The Complexity of Known-Key Security.
Pratik Soni
Stefano Tessaro
2018
conf/eurocrypt
Revisiting AES-GCM-SIV: Multi-user Security, Faster Key Derivation, and Better Bounds.
Priyanka Bose
Viet Tung Hoang
Stefano Tessaro
2018
conf/tcc
Provable Time-Memory Trade-Offs: Symmetric Cryptography Against Memory-Bounded Adversaries.
Stefano Tessaro
Aishwarya Thiruvengadam
2017
conf/crypto
Indistinguishability Obfuscation from Trilinear Maps and Block-Wise Local PRGs.
Huijia Lin
Stefano Tessaro
2017
conf/crypto
Information-Theoretic Indistinguishability via the Chi-Squared Method.
Wei Dai
Viet Tung Hoang
Stefano Tessaro
2017
conf/eurocrypt
Public-Seed Pseudorandom Permutations.
Pratik Soni
Stefano Tessaro
2017
conf/eurocrypt
The Multi-user Security of Double Encryption.
Viet Tung Hoang
Stefano Tessaro
2017
conf/eurocrypt
Scrypt Is Maximally Memory-Hard.
Joël Alwen
Binyi Chen
Krzysztof Pietrzak
Leonid Reyzin
Stefano Tessaro
2016
journals/joc
How to Build an Ideal Cipher: The Indifferentiability of the Feistel Construction.
Jean-Sébastien Coron
Thomas Holenstein
Robin Künzler
Jacques Patarin
Yannick Seurin
Stefano Tessaro
2016
conf/ccs
Message-Recovery Attacks on Feistel-Based Format Preserving Encryption.
Mihir Bellare
Viet Tung Hoang
Stefano Tessaro
2016
conf/crypto
Key-Alternating Ciphers and Key-Length Extension: Exact Bounds and Multi-user Security.
Viet Tung Hoang
Stefano Tessaro
2016
conf/sp
TaoStore: Overcoming Asynchronicity in Oblivious Data Storage.
Cetin Sahin
Victor Zakhary
Amr El Abbadi
Huijia Lin
Stefano Tessaro
2016
conf/eurocrypt
Hash-Function Based PRFs: AMAC and Its Multi-User Security.
Mihir Bellare
Daniel J. Bernstein
Stefano Tessaro
2016
conf/eurocrypt
On the Complexity of Scrypt and Proofs of Space in the Parallel Random Oracle Model.
Joël Alwen
Binyi Chen
Chethan Kamath
Vladimir Kolmogorov
Krzysztof Pietrzak
Stefano Tessaro
2016
conf/eurocrypt
Provably Robust Sponge-Based PRNGs and KDFs.
Peter Gazi
Stefano Tessaro
2016
conf/tcc
Contention in Cryptoland: Obfuscation, Leakage and UCE.
Mihir Bellare
Igors Stepanovs
Stefano Tessaro
2016
conf/tcc
Simultaneous Secrecy and Reliability Amplification for a General Channel Model.
Russell Impagliazzo
Ragesh Jaiswal
Valentine Kabanets
Bruce M. Kapron
Valerie King
Stefano Tessaro
2016
conf/tcc
Two-Round Man-in-the-Middle Security from LPN.
David Cash
Eike Kiltz
Stefano Tessaro
2016
conf/tcc
Oblivious Parallel RAM: Improved Efficiency and Generic Constructions.
Binyi Chen
Huijia Lin
Stefano Tessaro
2015
conf/fse
Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes.
Peter Gazi
Jooyoung Lee
Yannick Seurin
John P. Steinberger
Stefano Tessaro
2015
conf/crypto
The Exact PRF Security of Truncation: Tight Bounds for Keyed Sponges and Truncated CBC.
Peter Gazi
Krzysztof Pietrzak
Stefano Tessaro
2015
conf/asiacrypt
Generic Security of NMAC and HMAC with Input Whitening.
Peter Gazi
Krzysztof Pietrzak
Stefano Tessaro
2015
conf/asiacrypt
Optimally Secure Block Ciphers from Ideal Primitives.
Stefano Tessaro
2015
conf/tcc
Obfuscation of Probabilistic Circuits and Applications.
Ran Canetti
Huijia Lin
Stefano Tessaro
Vinod Vaikuntanathan
2014
conf/pkc
Bounded-Collusion Identity-Based Encryption from Semantically-Secure Public-Key Encryption: Generic Constructions with Short Ciphertexts.
Stefano Tessaro
David A. Wilson
2014
conf/eurocrypt
The Locality of Searchable Symmetric Encryption.
David Cash
Stefano Tessaro
2014
conf/asiacrypt
Poly-Many Hardcore Bits for Any One-Way Function and a Framework for Differing-Inputs Obfuscation.
Mihir Bellare
Igors Stepanovs
Stefano Tessaro
2013
conf/eurocrypt
Amplification of Chosen-Ciphertext Security.
Huijia Lin
Stefano Tessaro
2013
conf/tcc
Communication Locality in Secure Multi-party Computation - How to Run Sublinear Algorithms in a Distributed Setting.
Elette Boyle
Shafi Goldwasser
Stefano Tessaro
2012
conf/crypto
To Hash or Not to Hash Again? (In)Differentiability Results for H 2 and HMAC.
Yevgeniy Dodis
Thomas Ristenpart
John P. Steinberger
Stefano Tessaro
2012
conf/crypto
Multi-instance Security and Its Application to Password-Based Cryptography.
Mihir Bellare
Thomas Ristenpart
Stefano Tessaro
2012
conf/crypto
Semantic Security for the Wiretap Channel.
Mihir Bellare
Stefano Tessaro
Alexander Vardy
2012
conf/eurocrypt
Efficient and Optimally Secure Key-Length Extension for Block Ciphers via Randomized Cascading.
Peter Gazi
Stefano Tessaro
2011
conf/tcc
Security Amplification for the Cascade of Arbitrarily Weak PRPs: Tight Bounds via the Interactive Hardcore Lemma.
Stefano Tessaro
2010
conf/asiacrypt
Random Oracles with(out) Programmability.
Marc Fischlin
Anja Lehmann
Thomas Ristenpart
Thomas Shrimpton
Martijn Stam
Stefano Tessaro
2010
conf/tcc
A Hardcore Lemma for Computational Indistinguishability: Security Amplification for Arbitrarily Weak PRGs with Optimal Stretch.
Ueli M. Maurer
Stefano Tessaro
2009
conf/crypto
Computational Indistinguishability Amplification: Tight Product Theorems for System Composition.
Ueli M. Maurer
Stefano Tessaro
2009
conf/asiacrypt
A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach Practical.
Anja Lehmann
Stefano Tessaro
2008
conf/asiacrypt
Basing PRFs on Constant-Query Weak PRFs: Minimizing Assumptions for Efficient Symmetric Cryptography.
Ueli M. Maurer
Stefano Tessaro
2007
conf/crypto
Domain Extension of Public Random Functions: Beyond the Birthday Barrier.
Ueli M. Maurer
Stefano Tessaro
2006
conf/dsn
Optimal Resilience for Erasure-Coded Byzantine Distributed Storage.
Christian Cachin
Stefano Tessaro
Coauthors
Aishwarya Thiruvengadam
(2)
Akiko Inoue
(1)
Alexander Vardy
(1)
Amr El Abbadi
(2)
Andrew Zitek
(1)
Angelos Pelecanos
(1)
Anja Lehmann
(2)
Anna Lysyanskaya
(1)
Antigoni Polychroniadou
(1)
Ashrujit Ghoshal
(5)
Ashwin Jha
(1)
Avijit Dutta
(1)
Avital Shafran
(1)
Ben Fisch
(1)
Benedikt Wagner
(1)
Binyi Chen
(4)
Bruce M. Kapron
(1)
Caitlin Scarberry
(1)
Cetin Sahin
(1)
Chelsea Komlo
(3)
Chenzhi Zhu
(11)
Chethan Kamath
(1)
Chris Brzuska
(1)
Christian Cachin
(1)
Christopher A. Wood
(1)
Daniel J. Bernstein
(1)
David A. Wilson
(1)
David Cash
(2)
Divyakant Agrawal
(1)
Doreen Riepel
(1)
Eike Kiltz
(1)
Elette Boyle
(1)
Elizabeth C. Crites
(3)
Eran Malach
(1)
Fang Song
(1)
Franklin Harding
(1)
Gil Segev
(1)
Greg Zaverucha
(1)
Hanjun Li
(2)
Harish Karthikeyan
(1)
Huijia Lin
(7)
Igors Stepanovs
(2)
Jacques Patarin
(1)
Jan Buzek
(1)
Jean-Sébastien Coron
(1)
Jérôme Govinden
(1)
Joël Alwen
(3)
John P. Steinberger
(2)
Jonathan Katz
(1)
Jooyoung Lee
(1)
Joseph Bonneau
(1)
Joseph Jaeger
(5)
Julian Loss
(1)
Kazuhiko Minematsu
(1)
Krzysztof Pietrzak
(4)
Leonid Reyzin
(1)
Lior Rotem
(1)
Marc Fischlin
(1)
Marian Dietz
(1)
Martijn Stam
(1)
Mary Maller
(2)
Meltem Sönmez Turan
(1)
Michele Orrù
(1)
Mihir Bellare
(8)
Mridul Nandi
(1)
Ni Trieu
(1)
Nick Sullivan
(1)
Nirvan Tyagi
(2)
Patrick Harasser
(1)
Peter Gazi
(5)
Pooya Farshim
(2)
Pratik Soni
(2)
Priyanka Bose
(1)
Ragesh Jaiswal
(1)
Ran Canetti
(1)
Renas Bacho
(1)
Riddhi Ghosal
(1)
Ritam Bhaumik
(1)
Robin Künzler
(1)
Russell Impagliazzo
(1)
Rutchathon Chairattana-Apirom
(3)
Sandro Coretti
(1)
Seif Ibrahim
(1)
Sela Navot
(2)
Shafi Goldwasser
(1)
Sofía Celi
(1)
Sogol Mazaheri
(1)
Stefano Tessaro
(85)
Sujaya Maiyya
(1)
Tetsu Iwata
(1)
Thomas Holenstein
(1)
Thomas Ristenpart
(5)
Thomas Shrimpton
(1)
Tianren Liu
(2)
Ueli M. Maurer
(4)
Valentine Kabanets
(1)
Valerie King
(1)
Victor Zakhary
(2)
Viet Tung Hoang
(7)
Vinod Vaikuntanathan
(3)
Vladimir Kolmogorov
(1)
Wei Dai
(2)
Xihu Zhang
(2)
Yannick Seurin
(2)
Yevgeniy Dodis
(3)
Yizhao Zhang
(1)
Yu Long Chen
(1)
Yu Sasaki
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to