Stefano Tessaro

ScholarGPS® ID: 92379773193970

Affiliation History

Discipline
Computer Science
Metrics Summary
Publication Count
80
Predicted Citations
2,551
Predicted h-index
30
Ranking

Publications and Citation History

Publications based on Top Specialties

Types of Publication

You must register and claim your profile to add or remove publications from it.
... publications
FILTER BY:
Year
Type
Specialty
Affiliations
Access
Co-Authors
Delete
Twinkle: Threshold Signatures from DDH with Full Adaptive Security (book chapter)
In Advances in Cryptology – EUROCRYPT 2024
Bacho, Renas | Loss, Julian | Tessaro, Stefano | Wagner, Benedikt | Zhu, Chenzhi
Springer Nature Switzerland (2024)
LERNA: Secure Single-Server Aggregation via Key-Homomorphic Masking (book chapter)
In Advances in Cryptology – ASIACRYPT 2023
Li, Hanjun | Lin, Huijia | Polychroniadou, Antigoni | Tessaro, Stefano
Springer Nature Singapore (2023)
The Query-Complexity of Preprocessing Attacks (book chapter)
In Advances in Cryptology – CRYPTO 2023
Springer Nature Switzerland (2023)
Layout Graphs, Random Walks and the t-Wise Independence of SPN Block Ciphers (book chapter)
In Advances in Cryptology – CRYPTO 2023
Liu, Tianren | Pelecanos, Angelos | Tessaro, Stefano | Vaikuntanathan, Vinod
Springer Nature Switzerland (2023)
Snowblind: A Threshold Blind Signature in Pairing-Free Groups (book chapter)
In Advances in Cryptology – CRYPTO 2023
Crites, Elizabeth | Komlo, Chelsea | Maller, Mary | Tessaro, Stefano | Zhu, Chenzhi
Springer Nature Switzerland (2023)
Threshold and Multi-signature Schemes from Linear Hash Functions (book chapter)
In Advances in Cryptology – EUROCRYPT 2023
Tessaro, Stefano | Zhu, Chenzhi
Springer Nature Switzerland (2023)
Revisiting BBS Signatures (book chapter)
In Advances in Cryptology – EUROCRYPT 2023
Tessaro, Stefano | Zhu, Chenzhi
Springer Nature Switzerland (2023)
VeRSA (conference)
Tyagi, Nirvan | Fisch, Ben | Zitek, Andrew | Bonneau, Joseph | Tessaro, Stefano
CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security (2022)
Los Angeles CA USA
Short Pairing-Free Blind Signatures with Exponential Security (book chapter)
In Advances in Cryptology – EUROCRYPT 2022
Tessaro, Stefano | Zhu, Chenzhi
Springer International Publishing (2022)
Better than Advertised Security for Non-interactive Threshold Signatures (book chapter)
In Advances in Cryptology – CRYPTO 2022
Bellare, Mihir | Crites, Elizabeth | Komlo, Chelsea | Maller, Mary | Tessaro, Stefano | Zhu, Chenzhi
Springer Nature Switzerland (2022)
A Fast and Simple Partially Oblivious PRF, with Applications (book chapter)
In Advances in Cryptology – EUROCRYPT 2022
Tyagi, Nirvan | Celi, Sofía | Ristenpart, Thomas | Sullivan, Nick | Tessaro, Stefano | Wood, Christopher A.
Springer International Publishing (2022)
Hiding in Plain Sight: Memory-Tight Proofs via Randomness Programming (book chapter)
In Advances in Cryptology – EUROCRYPT 2022
Springer International Publishing (2022)
Quantum Key-Length Extension (book chapter)
In Theory of Cryptography
Springer International Publishing (2021)
Tight Security for Key-Alternating Ciphers with Correlated Sub-keys (book chapter)
In Advances in Cryptology – ASIACRYPT 2021
Springer International Publishing (2021)
Better Security-Efficiency Trade-Offs in Permutation-Based Two-Party Computation (book chapter)
In Advances in Cryptology – ASIACRYPT 2021
Chen, Yu Long | Tessaro, Stefano
Springer International Publishing (2021)
The t-wise Independence of Substitution-Permutation Networks (book chapter)
In Advances in Cryptology – CRYPTO 2021
Springer International Publishing (2021)
Tight State-Restoration Soundness in the Algebraic Group Model (book chapter)
In Advances in Cryptology – CRYPTO 2021
Springer International Publishing (2021)
Password Hashing and Preprocessing (book chapter)
In Advances in Cryptology – EUROCRYPT 2021
Springer International Publishing (2021)
The Memory-Tightness of Authenticated Encryption (book chapter)
In Advances in Cryptology – CRYPTO 2020
Springer International Publishing (2020)
On the Query Complexity of Constructing PRFs from Non-adaptive PRFs (book chapter)
In Security and Cryptography for Networks
Springer International Publishing (2020)