×

zbMATH — the first resource for mathematics

Tessaro, Stefano

Compute Distance To:
Author ID: tessaro.stefano Recent zbMATH articles by "Tessaro, Stefano"
Published as: Tessaro, Stefano
Documents Indexed: 47 Publications since 2007

Publications by Year

Citations contained in zbMATH Open

37 Publications have been cited 170 times in 129 Documents Cited by Year
Obfuscation of probabilistic circuits and applications. Zbl 1382.94078
Canetti, Ran; Lin, Huijia; Tessaro, Stefano; Vaikuntanathan, Vinod
22
2015
Poly-many hardcore bits for any one-way function and a framework for differing-inputs obfuscation. Zbl 1317.94085
Bellare, Mihir; Stepanovs, Igors; Tessaro, Stefano
18
2014
Semantic security for the wiretap channel. Zbl 1296.94081
Bellare, Mihir; Tessaro, Stefano; Vardy, Alexander
8
2012
The exact PRF security of truncation: tight bounds for keyed sponges and truncated CBC. Zbl 1375.94127
Gaži, Peter; Pietrzak, Krzysztof; Tessaro, Stefano
7
2015
Contention in cryptoland: obfuscation, leakage and UCE. Zbl 1382.94062
Bellare, Mihir; Stepanovs, Igors; Tessaro, Stefano
7
2016
Communication locality in secure multi-party computation. How to run sublinear algorithms in a distributed setting. Zbl 1315.94063
Boyle, Elette; Goldwasser, Shafi; Tessaro, Stefano
7
2013
The equivalence of the random oracle model and the ideal cipher model, revisited. Zbl 1288.94065
Holenstein, Thomas; Künzler, Robin; Tessaro, Stefano
7
2011
Key-alternating ciphers and key-length extension: exact bounds and multi-user security. Zbl 1351.94051
Hoang, Viet Tung; Tessaro, Stefano
7
2016
Information-theoretic indistinguishability via the chi-squared method. Zbl 1418.94042
Dai, Wei; Hoang, Viet Tung; Tessaro, Stefano
6
2017
On the complexity of scrypt and proofs of space in the parallel random oracle model. Zbl 1369.94518
Alwen, Joël; Chen, Binyi; Kamath, Chethan; Kolmogorov, Vladimir; Pietrzak, Krzysztof; Tessaro, Stefano
5
2016
Optimally secure block ciphers from ideal primitives. Zbl 1382.94165
Tessaro, Stefano
5
2015
Random oracles with(out) programmability. Zbl 1253.94047
Fischlin, Marc; Lehmann, Anja; Ristenpart, Thomas; Shrimpton, Thomas; Stam, Martijn; Tessaro, Stefano
5
2010
Multi-instance security and its application to password-based cryptography. Zbl 1296.94080
Bellare, Mihir; Ristenpart, Thomas; Tessaro, Stefano
5
2012
Domain extension of public random functions: beyond the birthday barrier. Zbl 1215.94063
Maurer, Ueli; Tessaro, Stefano
5
2007
Hash-function based PRFs: AMAC and its multi-user security. Zbl 1385.94010
Bellare, Mihir; Bernstein, Daniel J.; Tessaro, Stefano
4
2016
On the relationship between functional encryption, obfuscation, and fully homomorphic encryption. Zbl 1317.94080
Alwen, Joël; Barbosa, Manuel; Farshim, Pooya; Gennaro, Rosario; Gordon, S. Dov; Tessaro, Stefano; Wilson, David A.
4
2013
To hash or not to hash again? (In)differentiability results for \(H^2\) and HMAC. Zbl 1296.94106
Dodis, Yevgeniy; Ristenpart, Thomas; Steinberger, John; Tessaro, Stefano
4
2012
Indistinguishability obfuscation from trilinear maps and block-wise local PRGs. Zbl 1407.94139
Lin, Huijia; Tessaro, Stefano
3
2017
How to build an ideal cipher: the indifferentiability of the Feistel construction. Zbl 1351.94037
Coron, Jean-Sébastien; Holenstein, Thomas; Künzler, Robin; Patarin, Jacques; Seurin, Yannick; Tessaro, Stefano
3
2016
Oblivious parallel RAM: improved efficiency and generic constructions. Zbl 1377.94043
Chen, Binyi; Lin, Huijia; Tessaro, Stefano
3
2016
The locality of searchable symmetric encryption. Zbl 1332.94061
Cash, David; Tessaro, Stefano
3
2014
Bounded-collusion identity-based encryption from semantically-secure public-key encryption: generic constructions with short ciphertexts. Zbl 1335.94081
Tessaro, Stefano; Wilson, David A.
3
2014
Amplification of chosen-ciphertext security. Zbl 1306.94071
Lin, Huijia; Tessaro, Stefano
3
2013
An equational approach to secure multi-party computation. Zbl 1362.68080
Micciancio, Daniele; Tessaro, Stefano
3
2013
Efficient and optimally secure key-length extension for block ciphers via randomized cascading. Zbl 1290.94076
Gaži, Peter; Tessaro, Stefano
3
2012
Provably robust sponge-based PRNGs and KDFs. Zbl 1347.94033
Gaži, Peter; Tessaro, Stefano
2
2016
Two-round man-in-the-middle security from LPN. Zbl 1378.94074
Cash, David; Kiltz, Eike; Tessaro, Stefano
2
2016
Computational indistinguishability amplification: tight product theorems for system composition. Zbl 1252.94086
Maurer, Ueli; Tessaro, Stefano
2
2009
A hardcore lemma for computational indistinguishability: security amplification for arbitrarily weak PRGs with optimal stretch. Zbl 1274.94098
Maurer, Ueli; Tessaro, Stefano
2
2010
Security amplification for the cascade of arbitrarily weak PRPs. Tight bounds via the interactive hardcore lemma. Zbl 1281.94058
Tessaro, Stefano
2
2011
The multi-user security of double encryption. Zbl 1415.94438
Hoang, Viet Tung; Tessaro, Stefano
2
2017
Relaxing full-codebook security: a refined analysis of key-length extension schemes. Zbl 1382.94109
Gaži, Peter; Lee, Jooyoung; Seurin, Yannick; Steinberger, John; Tessaro, Stefano
2
2015
Basing PRFs on constant-query weak PRFs: minimizing assumptions for efficient symmetric cryptography. Zbl 1206.94081
Maurer, Ueli; Tessaro, Stefano
2
2008
Generic security of NMAC and HMAC with input whitening. Zbl 1375.94128
Gaži, Peter; Pietrzak, Krzysztof; Tessaro, Stefano
1
2015
A modular design for hash functions: towards making the mix-compress-mix approach practical. Zbl 1267.94080
Lehmann, Anja; Tessaro, Stefano
1
2009
Scrypt is maximally memory-hard. Zbl 1394.94925
Alwen, Joël; Chen, Binyi; Pietrzak, Krzysztof; Reyzin, Leonid; Tessaro, Stefano
1
2017
Abstract storage devices. Zbl 1206.68109
König, Robert; Maurer, Ueli; Tessaro, Stefano
1
2009
Information-theoretic indistinguishability via the chi-squared method. Zbl 1418.94042
Dai, Wei; Hoang, Viet Tung; Tessaro, Stefano
6
2017
Indistinguishability obfuscation from trilinear maps and block-wise local PRGs. Zbl 1407.94139
Lin, Huijia; Tessaro, Stefano
3
2017
The multi-user security of double encryption. Zbl 1415.94438
Hoang, Viet Tung; Tessaro, Stefano
2
2017
Scrypt is maximally memory-hard. Zbl 1394.94925
Alwen, Joël; Chen, Binyi; Pietrzak, Krzysztof; Reyzin, Leonid; Tessaro, Stefano
1
2017
Contention in cryptoland: obfuscation, leakage and UCE. Zbl 1382.94062
Bellare, Mihir; Stepanovs, Igors; Tessaro, Stefano
7
2016
Key-alternating ciphers and key-length extension: exact bounds and multi-user security. Zbl 1351.94051
Hoang, Viet Tung; Tessaro, Stefano
7
2016
On the complexity of scrypt and proofs of space in the parallel random oracle model. Zbl 1369.94518
Alwen, Joël; Chen, Binyi; Kamath, Chethan; Kolmogorov, Vladimir; Pietrzak, Krzysztof; Tessaro, Stefano
5
2016
Hash-function based PRFs: AMAC and its multi-user security. Zbl 1385.94010
Bellare, Mihir; Bernstein, Daniel J.; Tessaro, Stefano
4
2016
How to build an ideal cipher: the indifferentiability of the Feistel construction. Zbl 1351.94037
Coron, Jean-Sébastien; Holenstein, Thomas; Künzler, Robin; Patarin, Jacques; Seurin, Yannick; Tessaro, Stefano
3
2016
Oblivious parallel RAM: improved efficiency and generic constructions. Zbl 1377.94043
Chen, Binyi; Lin, Huijia; Tessaro, Stefano
3
2016
Provably robust sponge-based PRNGs and KDFs. Zbl 1347.94033
Gaži, Peter; Tessaro, Stefano
2
2016
Two-round man-in-the-middle security from LPN. Zbl 1378.94074
Cash, David; Kiltz, Eike; Tessaro, Stefano
2
2016
Obfuscation of probabilistic circuits and applications. Zbl 1382.94078
Canetti, Ran; Lin, Huijia; Tessaro, Stefano; Vaikuntanathan, Vinod
22
2015
The exact PRF security of truncation: tight bounds for keyed sponges and truncated CBC. Zbl 1375.94127
Gaži, Peter; Pietrzak, Krzysztof; Tessaro, Stefano
7
2015
Optimally secure block ciphers from ideal primitives. Zbl 1382.94165
Tessaro, Stefano
5
2015
Relaxing full-codebook security: a refined analysis of key-length extension schemes. Zbl 1382.94109
Gaži, Peter; Lee, Jooyoung; Seurin, Yannick; Steinberger, John; Tessaro, Stefano
2
2015
Generic security of NMAC and HMAC with input whitening. Zbl 1375.94128
Gaži, Peter; Pietrzak, Krzysztof; Tessaro, Stefano
1
2015
Poly-many hardcore bits for any one-way function and a framework for differing-inputs obfuscation. Zbl 1317.94085
Bellare, Mihir; Stepanovs, Igors; Tessaro, Stefano
18
2014
The locality of searchable symmetric encryption. Zbl 1332.94061
Cash, David; Tessaro, Stefano
3
2014
Bounded-collusion identity-based encryption from semantically-secure public-key encryption: generic constructions with short ciphertexts. Zbl 1335.94081
Tessaro, Stefano; Wilson, David A.
3
2014
Communication locality in secure multi-party computation. How to run sublinear algorithms in a distributed setting. Zbl 1315.94063
Boyle, Elette; Goldwasser, Shafi; Tessaro, Stefano
7
2013
On the relationship between functional encryption, obfuscation, and fully homomorphic encryption. Zbl 1317.94080
Alwen, Joël; Barbosa, Manuel; Farshim, Pooya; Gennaro, Rosario; Gordon, S. Dov; Tessaro, Stefano; Wilson, David A.
4
2013
Amplification of chosen-ciphertext security. Zbl 1306.94071
Lin, Huijia; Tessaro, Stefano
3
2013
An equational approach to secure multi-party computation. Zbl 1362.68080
Micciancio, Daniele; Tessaro, Stefano
3
2013
Semantic security for the wiretap channel. Zbl 1296.94081
Bellare, Mihir; Tessaro, Stefano; Vardy, Alexander
8
2012
Multi-instance security and its application to password-based cryptography. Zbl 1296.94080
Bellare, Mihir; Ristenpart, Thomas; Tessaro, Stefano
5
2012
To hash or not to hash again? (In)differentiability results for \(H^2\) and HMAC. Zbl 1296.94106
Dodis, Yevgeniy; Ristenpart, Thomas; Steinberger, John; Tessaro, Stefano
4
2012
Efficient and optimally secure key-length extension for block ciphers via randomized cascading. Zbl 1290.94076
Gaži, Peter; Tessaro, Stefano
3
2012
The equivalence of the random oracle model and the ideal cipher model, revisited. Zbl 1288.94065
Holenstein, Thomas; Künzler, Robin; Tessaro, Stefano
7
2011
Security amplification for the cascade of arbitrarily weak PRPs. Tight bounds via the interactive hardcore lemma. Zbl 1281.94058
Tessaro, Stefano
2
2011
Random oracles with(out) programmability. Zbl 1253.94047
Fischlin, Marc; Lehmann, Anja; Ristenpart, Thomas; Shrimpton, Thomas; Stam, Martijn; Tessaro, Stefano
5
2010
A hardcore lemma for computational indistinguishability: security amplification for arbitrarily weak PRGs with optimal stretch. Zbl 1274.94098
Maurer, Ueli; Tessaro, Stefano
2
2010
Computational indistinguishability amplification: tight product theorems for system composition. Zbl 1252.94086
Maurer, Ueli; Tessaro, Stefano
2
2009
A modular design for hash functions: towards making the mix-compress-mix approach practical. Zbl 1267.94080
Lehmann, Anja; Tessaro, Stefano
1
2009
Abstract storage devices. Zbl 1206.68109
König, Robert; Maurer, Ueli; Tessaro, Stefano
1
2009
Basing PRFs on constant-query weak PRFs: minimizing assumptions for efficient symmetric cryptography. Zbl 1206.94081
Maurer, Ueli; Tessaro, Stefano
2
2008
Domain extension of public random functions: beyond the birthday barrier. Zbl 1215.94063
Maurer, Ueli; Tessaro, Stefano
5
2007
all top 5

Cited by 252 Authors

11 Tessaro, Stefano
6 Bitansky, Nir
6 Maurer, Ueli M.
5 Farshim, Pooya
5 Mennink, Bart
5 Nandi, Mridul
5 Pietrzak, Krzysztof
5 Segev, Gil
5 Vaikuntanathan, Vinod
5 Venturi, Daniele
5 Wichs, Daniel
4 Asharov, Gilad
4 Canetti, Ran
4 Guo, Chun
4 Komargodski, Ilan
4 Seurin, Yannick
4 Zhandry, Mark
3 Albrecht, Martin R.
3 Alwen, Joël
3 Bellare, Mihir
3 Chung, Kai-Min
3 Dodis, Yevgeniy
3 Garg, Sanjam
3 Haitner, Iftach
3 Kiltz, Eike
3 Lin, Dongdai
3 Pass, Rafael
3 Tackmann, Björn
3 Yasuda, Kan
2 Ananth, Prabhanjan Vijendra
2 Berman, Itay
2 Blocki, Jeremiah
2 Boyle, Elette
2 Cash, David M.
2 Cogliati, Benoît
2 Duc, Alexandre
2 Faust, Sebastian
2 Halevi, Shai
2 Hoang, Viet Tung
2 Hofheinz, Dennis
2 Ishai, Yuval
2 Jain, Aayush
2 Jain, Abhishek
2 Jha, Ashwin
2 Kapron, Bruce M.
2 King, Valerie
2 Larraia, Enrique
2 Lee, Jooyoung
2 Lin, Huijia
2 Long, Dongyang
2 Luykx, Atul
2 Mittelbach, Arno
2 Movahedi, Mahnush
2 Naor, Moni
2 Nishimaki, Ryo
2 Passelègue, Alain
2 Paterson, Kenneth G.
2 Raghuraman, Srinivasan
2 Ren, Ling
2 Renner, Renato
2 Reyzin, Leonid
2 Sahai, Amit
2 Saia, Jared
2 Steinberger, John P.
2 Stepanovs, Igors
2 Sun, Zhi-Wei
2 Yogev, Eylon
2 Zamani, Mahdi
2 Zhang, Cai
1 Abraham, Ittai
1 Agrawal, Shashank
1 Antunes, Luis
1 Arriaga, Afonso
1 Ateniese, Giuseppe
1 Aumasson, Jean-Philippe
1 Barbosa, Manuel
1 Basin, David A.
1 Bhattacharjee, Arghya
1 Bhattacharya, Srimanta
1 Bhattacharyya, Rishiraj
1 Boneh, Dan
1 Braun, Johannes
1 Buchmann, Johannes A.
1 Buhrman, Harry
1 Cao, Zhenfu
1 Chen, Binyi
1 Chen, Liqun
1 Chen, Shan
1 Chen, Yilei
1 Chen, Yu
1 Chen, Yuan
1 Chen, Yuchi
1 Cheraghchi, Mahdi
1 Cho, Jihoon
1 Choi, Kyu Young
1 Chow, Sherman S. M.
1 Coretti, Sandro
1 Coron, Jean-Sébastien
1 Corrigan-Gibbs, Henry
1 Dai, Yuanxi
...and 152 more Authors

Citations by Year