Liu, Tianren; Pelecanos, Angelos; Tessaro, Stefano; Vaikuntanathan, Vinod Layout graphs, random walks and the \(t\)-wise independence of SPN block ciphers. (English) Zbl 07799272 Handschuh, Helena (ed.) et al., Advances in cryptology – CRYPTO 2023. 43rd annual international cryptology conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 14083, 694-726 (2023). MSC: 94A60 PDFBibTeX XMLCite \textit{T. Liu} et al., Lect. Notes Comput. Sci. 14083, 694--726 (2023; Zbl 07799272) Full Text: DOI
Ghoshal, Ashrujit; Tessaro, Stefano The query-complexity of preprocessing attacks. (English) Zbl 07799231 Handschuh, Helena (ed.) et al., Advances in cryptology – CRYPTO 2023. 43rd annual international cryptology conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 14082, 482-513 (2023). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Ghoshal} and \textit{S. Tessaro}, Lect. Notes Comput. Sci. 14082, 482--513 (2023; Zbl 07799231) Full Text: DOI
Crites, Elizabeth; Komlo, Chelsea; Maller, Mary; Tessaro, Stefano; Zhu, Chenzhi Snowblind: a threshold blind signature in pairing-free groups. (English) Zbl 07799111 Handschuh, Helena (ed.) et al., Advances in cryptology – CRYPTO 2023. 43rd annual international cryptology conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 14081, 710-742 (2023). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{E. Crites} et al., Lect. Notes Comput. Sci. 14081, 710--742 (2023; Zbl 07799111) Full Text: DOI
Tessaro, Stefano; Zhu, Chenzhi Revisiting BBS signatures. (English) Zbl 1528.94103 Hazay, Carmit (ed.) et al., Advances in cryptology – EUROCRYPT 2023. 42nd annual international conference on the theory and applications of cryptographic techniques, Lyon, France, April 23–27, 2023. Proceedings. Part V. Cham: Springer. Lect. Notes Comput. Sci. 14008, 691-721 (2023). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{S. Tessaro} and \textit{C. Zhu}, Lect. Notes Comput. Sci. 14008, 691--721 (2023; Zbl 1528.94103) Full Text: DOI
Tessaro, Stefano; Zhu, Chenzhi Threshold and multi-signature schemes from linear hash functions. (English) Zbl 1528.94102 Hazay, Carmit (ed.) et al., Advances in cryptology – EUROCRYPT 2023. 42nd annual international conference on the theory and applications of cryptographic techniques, Lyon, France, April 23–27, 2023. Proceedings. Part V. Cham: Springer. Lect. Notes Comput. Sci. 14008, 628-658 (2023). MSC: 94A62 94A60 68P25 PDFBibTeX XMLCite \textit{S. Tessaro} and \textit{C. Zhu}, Lect. Notes Comput. Sci. 14008, 628--658 (2023; Zbl 1528.94102) Full Text: DOI
Ghoshal, Ashrujit; Ghosal, Riddhi; Jaeger, Joseph; Tessaro, Stefano Hiding in plain sight: memory-tight proofs via randomness programming. (English) Zbl 1497.94092 Dunkelman, Orr (ed.) et al., Advances in cryptology – EUROCRYPT 2022. 41st annual international conference on the theory and applications of cryptographic techniques, Trondheim, Norway, May 30 – June 3, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13276, 706-735 (2022). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Ghoshal} et al., Lect. Notes Comput. Sci. 13276, 706--735 (2022; Zbl 1497.94092) Full Text: DOI
Tessaro, Stefano; Zhang, Xihu Tight security for key-alternating ciphers with correlated sub-keys. (English) Zbl 1514.94132 Tibouchi, Mehdi (ed.) et al., Advances in cryptology – ASIACRYPT 2021. 27th international conference on the theory and application of cryptology and information security, Singapore, December 6–10, 2021. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 13092, 435-464 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Tessaro} and \textit{X. Zhang}, Lect. Notes Comput. Sci. 13092, 435--464 (2021; Zbl 1514.94132) Full Text: DOI
Chen, Yu Long; Tessaro, Stefano Better security-efficiency trade-offs in permutation-based two-party computation. (English) Zbl 07684784 Tibouchi, Mehdi (ed.) et al., Advances in cryptology – ASIACRYPT 2021. 27th international conference on the theory and application of cryptology and information security, Singapore, December 6–10, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13091, 275-304 (2021). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{Y. L. Chen} and \textit{S. Tessaro}, Lect. Notes Comput. Sci. 13091, 275--304 (2021; Zbl 07684784) Full Text: DOI
Jaeger, Joseph; Song, Fang; Tessaro, Stefano Quantum key-length extension. (English) Zbl 1520.81047 Nissim, Kobbi (ed.) et al., Theory of cryptography. 19th international conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13042, 209-239 (2021). MSC: 81P94 94A60 81P70 91G20 PDFBibTeX XMLCite \textit{J. Jaeger} et al., Lect. Notes Comput. Sci. 13042, 209--239 (2021; Zbl 1520.81047) Full Text: DOI arXiv
Liu, Tianren; Tessaro, Stefano; Vaikuntanathan, Vinod The \(t\)-wise independence of substitution-permutation networks. (English) Zbl 1489.94104 Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part IV. Cham: Springer. Lect. Notes Comput. Sci. 12828, 454-483 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{T. Liu} et al., Lect. Notes Comput. Sci. 12828, 454--483 (2021; Zbl 1489.94104) Full Text: DOI
Ghoshal, Ashrujit; Tessaro, Stefano Tight state-restoration soundness in the algebraic group model. (English) Zbl 1487.94116 Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12827, 64-93 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Ghoshal} and \textit{S. Tessaro}, Lect. Notes Comput. Sci. 12827, 64--93 (2021; Zbl 1487.94116) Full Text: DOI
Farshim, Pooya; Tessaro, Stefano Password hashing and preprocessing. (English) Zbl 1479.94317 Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2021. 40th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, October 17–21, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12697, 64-91 (2021). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{P. Farshim} and \textit{S. Tessaro}, Lect. Notes Comput. Sci. 12697, 64--91 (2021; Zbl 1479.94317) Full Text: DOI
Ghoshal, Ashrujit; Jaeger, Joseph; Tessaro, Stefano The memory-tightness of authenticated encryption. (English) Zbl 1503.94049 Micciancio, Daniele (ed.) et al., Advances in cryptology – CRYPTO 2020. 40th annual international cryptology conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12170, 127-156 (2020). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{A. Ghoshal} et al., Lect. Notes Comput. Sci. 12170, 127--156 (2020; Zbl 1503.94049) Full Text: DOI
Tessaro, Stefano; Thiruvengadam, Aishwarya Provable time-memory trade-offs: symmetric cryptography against memory-bounded adversaries. (English) Zbl 1443.94080 Beimel, Amos (ed.) et al., Theory of cryptography. 16th international conference, TCC 2018, Panaji, India, November 11–14, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11239, 3-32 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Tessaro} and \textit{A. Thiruvengadam}, Lect. Notes Comput. Sci. 11239, 3--32 (2018; Zbl 1443.94080) Full Text: DOI
Bose, Priyanka; Hoang, Viet Tung; Tessaro, Stefano Revisiting AES-GCM-SIV: multi-user security, faster key derivation, and better bounds. (English) Zbl 1423.94055 Nielsen, Jesper Buus (ed.) et al., Advances in cryptology – EUROCRYPT 2018. 37th annual international conference on the theory and applications of cryptographic techniques, Tel Aviv, Israel, April 29 – May 3, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10820, 468-499 (2018). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{P. Bose} et al., Lect. Notes Comput. Sci. 10820, 468--499 (2018; Zbl 1423.94055) Full Text: DOI
Alwen, Joël; Chen, Binyi; Pietrzak, Krzysztof; Reyzin, Leonid; Tessaro, Stefano Scrypt is maximally memory-hard. (English) Zbl 1394.94925 Coron, Jean-Sébastien (ed.) et al., Advances in cryptology – EUROCRYPT 2017. 36th annual international conference on the theory and applications of cryptographic techniques, Paris, France, April 30 – May 4, 2017. Proceedings. Part III. Cham: Springer (ISBN 978-3-319-56616-0/pbk; 978-3-319-56617-7/ebook). Lecture Notes in Computer Science 10212, 33-62 (2017). MSC: 94A60 68Q10 PDFBibTeX XMLCite \textit{J. Alwen} et al., Lect. Notes Comput. Sci. 10212, 33--62 (2017; Zbl 1394.94925) Full Text: DOI
Soni, Pratik; Tessaro, Stefano Public-seed pseudorandom permutations. (English) Zbl 1415.94461 Coron, Jean-Sébastien (ed.) et al., Advances in cryptology – EUROCRYPT 2017. 36th annual international conference on the theory and applications of cryptographic techniques, Paris, France, April 30 – May 4, 2017. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10211, 412-441 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{P. Soni} and \textit{S. Tessaro}, Lect. Notes Comput. Sci. 10211, 412--441 (2017; Zbl 1415.94461) Full Text: DOI
Hoang, Viet Tung; Tessaro, Stefano The multi-user security of double encryption. (English) Zbl 1415.94438 Coron, Jean-Sébastien (ed.) et al., Advances in cryptology – EUROCRYPT 2017. 36th annual international conference on the theory and applications of cryptographic techniques, Paris, France, April 30 – May 4, 2017. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10211, 381-411 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{V. T. Hoang} and \textit{S. Tessaro}, Lect. Notes Comput. Sci. 10211, 381--411 (2017; Zbl 1415.94438) Full Text: DOI
Impagliazzo, Russell; Jaiswal, Ragesh; Kabanets, Valentine; Kapron, Bruce M.; King, Valerie; Tessaro, Stefano Simultaneous secrecy and reliability amplification for a general channel model. (English) Zbl 1406.94066 Hirt, Martin (ed.) et al., Theory of cryptography. 14th international conference, TCC 2016-B, Beijing, China, October 31 – November 3, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53640-7/pbk; 978-3-662-53641-4/ebook). Lecture Notes in Computer Science 9985, 235-261 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Impagliazzo} et al., Lect. Notes Comput. Sci. 9985, 235--261 (2016; Zbl 1406.94066) Full Text: DOI
Hoang, Viet Tung; Tessaro, Stefano Key-alternating ciphers and key-length extension: exact bounds and multi-user security. (English) Zbl 1351.94051 Robshaw, Matthew (ed.) et al., Advances in cryptology – CRYPTO 2016. 36th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53017-7/pbk; 978-3-662-53018-4/ebook). Lecture Notes in Computer Science 9814, 3-32 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{V. T. Hoang} and \textit{S. Tessaro}, Lect. Notes Comput. Sci. 9814, 3--32 (2016; Zbl 1351.94051) Full Text: DOI
Bellare, Mihir; Stepanovs, Igors; Tessaro, Stefano Contention in cryptoland: obfuscation, leakage and UCE. (English) Zbl 1382.94062 Kushilevitz, Eyal (ed.) et al., Theory of cryptography. 13th international conference, TCC 2016-A, Tel Aviv, Israel, January 10–13, 2016. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-49098-3/pbk; 978-3-662-49099-0/ebook). Lecture Notes in Computer Science 9563, 542-564 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Bellare} et al., Lect. Notes Comput. Sci. 9563, 542--564 (2016; Zbl 1382.94062) Full Text: DOI
Coron, Jean-Sébastien; Holenstein, Thomas; Künzler, Robin; Patarin, Jacques; Seurin, Yannick; Tessaro, Stefano How to build an ideal cipher: the indifferentiability of the Feistel construction. (English) Zbl 1351.94037 J. Cryptology 29, No. 1, 61-114 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{J.-S. Coron} et al., J. Cryptology 29, No. 1, 61--114 (2016; Zbl 1351.94037) Full Text: DOI
Cash, David; Kiltz, Eike; Tessaro, Stefano Two-round man-in-the-middle security from LPN. (English) Zbl 1378.94074 Kushilevitz, Eyal (ed.) et al., Theory of cryptography. 13th international conference, TCC 2016-A, Tel Aviv, Israel, January 10–13, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49095-2/pbk; 978-3-662-49096-9/ebook). Lecture Notes in Computer Science 9562, 225-248 (2016). MSC: 94A62 PDFBibTeX XMLCite \textit{D. Cash} et al., Lect. Notes Comput. Sci. 9562, 225--248 (2016; Zbl 1378.94074) Full Text: DOI
Gaži, Peter; Pietrzak, Krzysztof; Tessaro, Stefano The exact PRF security of truncation: tight bounds for keyed sponges and truncated CBC. (English) Zbl 1375.94127 Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-47988-9/pbk; 978-3-662-47989-6/ebook). Lecture Notes in Computer Science 9215, 368-387 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{P. Gaži} et al., Lect. Notes Comput. Sci. 9215, 368--387 (2015; Zbl 1375.94127) Full Text: DOI Link
Maurer, Ueli; Tessaro, Stefano A hardcore lemma for computational indistinguishability: security amplification for arbitrarily weak PRGs with optimal stretch. (English) Zbl 1274.94098 Micciancio, Daniele (ed.), Theory of cryptography. 7th theory of cryptography conference, TCC 2010, Zurich, Switzerland, February 9–11, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-11798-5/pbk). Lecture Notes in Computer Science 5978, 237-254 (2010). MSC: 94A60 PDFBibTeX XMLCite \textit{U. Maurer} and \textit{S. Tessaro}, Lect. Notes Comput. Sci. 5978, 237--254 (2010; Zbl 1274.94098) Full Text: DOI
König, Robert; Maurer, Ueli; Tessaro, Stefano Abstract storage devices. (English) Zbl 1206.68109 Nielsen, Mogens (ed.) et al., SOFSEM 2009: Theory and practice of computer science. 35th conference on current trends in theory and practice of computer science, Špindlerův Mlýn, Czech Republic, January 24–30, 2009. Proceedings. Berlin: Springer (ISBN 978-3-540-95890-1/pbk). Lecture Notes in Computer Science 5404, 341-352 (2009). MSC: 68P20 PDFBibTeX XMLCite \textit{R. König} et al., Lect. Notes Comput. Sci. 5404, 341--352 (2009; Zbl 1206.68109) Full Text: DOI arXiv Link