Fakultät für Informatik
-
Technische Universität München
Lehrstuhl für Effiziente Algorithmen
Die bibliographische Datenbank LEABib
Suchen
•
Liste der Journale
•
Liste der Serien
•
Liste der Konferenzen
•
Ausgewählte Publikationen
Hilfe
Suche: Author="Gennaro, Rosario"
Als [
bib
] [
pdf
] [
ps
] [
dvi
] [
xml
] herunterladen.
Cramer-Dåmgard signatures revisited: Efficient flat-tree signatures based on factoring
Dario Catalano
,
Rosario Gennaro
Theoretical Computer Science
370
(1-3), 2007, pp. 186-200
Provably secure threshold password-authenticated key exchange
Mario Di Raimondo
,
Rosario Gennaro
Journal of Computer and System Sciences
72
(6), 2006, pp. 978-1001
Independent zero-knowledge sets
Rosario Gennaro
,
Silvio Micali
Lecture Notes in Computer Science
4052
, 2006, pp. 34-45
Secure multiplication of shared secrets in the exponent
Rosario Gennaro
,
Mario Di Raimondo
Information Processing Letters
96
(2), 2005, pp. 71-79
Bounds on the efficiency of generic cryptographic constructions
Rosario Gennaro
,
Yael Gertner
,
Jonathan Katz
,
Luca Trevisan
SIAM Journal on Computing
35
(1), 2005, pp. 217-246
Lower bounds on the efficiency of encryption and digital signature schemes
Rosario Gennaro
,
Yael Gertner
,
Jonathan Katz
Proceedings of the 35th Annual ACM Symposium on Theory of Computing, STOC'2003 (San Diego, California, USA, June 9-11, 2003)
, 2003, pp. 417-425
The round complexity of verifiable secret sharing and secure multicast
Rosario Gennaro
,
Yuval Ishai
,
Eyal Kushilevitz
,
Tal Rabin
Proceedings of the 33rd Annual ACM Symposium on Theory of Computing, STOC'2001 (Hersonissos, Crete, Greece, July 6-8, 2001)
, 2001, pp. 580-589
Robust threshold DSS signatures
Rosario Gennaro
,
Stanisƚaw Jarecki
,
Hugo Krawczyk
,
Tal Rabin
Information and Computation
164
(1), 2001, pp. 54-84
How to sign digital streams
Rosario Gennaro
,
Pankaj Rohatgi
Information and Computation
165
(1), 2001, pp. 100-116
New efficient and secure protocols for verifiable signature sharing and other applications
Dario Catalano
,
Rosario Gennaro
Journal of Computer and System Sciences
61
(1), 2000, pp. 51-80
Secure distributed storage and retrieval
Juan A. Garay
,
Rosario Gennaro
,
Charanjit Jutla
,
Tal Rabin
Theoretical Computer Science
243
(1-2), 2000, pp. 363-389
A protocol to achieve independence in constant rounds
Rosario Gennaro
IEEE Transactions on Parallel and Distributed Systems
11
(7), 2000, pp. 636-647
Secure distributed storage and retrieval
Juan A. Garay
,
Rosario Gennaro
,
Charanjit Jutla
,
Tal Rabin
Lecture Notes in Computer Science
1320
, 1997, pp. 275-289
Incoercible multiparty computation
Ran Canetti
,
Rosario Gennaro
Proceedings of the 37th IEEE Symposium on Foundations of Computer Science, FOCS'96 (Burlington, Vermont, October 14-16, 1996)
, 1996, pp. 504-513