Tumblebit: An untrusted bitcoin-compatible anonymous payment hub E Heilman, L Alshenibr, F Baldimtsi, A Scafuro, S Goldberg Cryptology ePrint Archive, 2016 | 243 | 2016 |
NIZKs with an untrusted CRS: security in the face of parameter subversion M Bellare, G Fuchsbauer, A Scafuro International Conference on the Theory and Application of Cryptology and …, 2016 | 106 | 2016 |
Practical UC security with a global random oracle R Canetti, A Jain, A Scafuro Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 104 | 2014 |
Universally composable secure computation with (malicious) physically uncloneable functions R Ostrovsky, A Scafuro, I Visconti, A Wadia Annual International Conference on the Theory and Applications of …, 2013 | 78 | 2013 |
Garbled RAM from one-way functions S Garg, S Lu, R Ostrovsky, A Scafuro Proceedings of the forty-seventh annual ACM symposium on Theory of computing …, 2015 | 69 | 2015 |
Adaptively secure garbled circuits from one-way functions B Hemenway, Z Jafargholi, R Ostrovsky, A Scafuro, D Wichs Annual International Cryptology Conference, 149-178, 2016 | 55 | 2016 |
Round-optimal black-box two-party computation R Ostrovsky, S Richelson, A Scafuro Annual Cryptology Conference, 339-358, 2015 | 46 | 2015 |
Unconditionally secure and universally composable commitments from physical assumptions I Damgård, A Scafuro International Conference on the Theory and Application of Cryptology and …, 2013 | 44 | 2013 |
Improved OR-composition of sigma-protocols M Ciampi, G Persiano, A Scafuro, L Siniscalchi, I Visconti Theory of Cryptography Conference, 112-141, 2016 | 43 | 2016 |
Online/offline OR composition of sigma protocols M Ciampi, G Persiano, A Scafuro, L Siniscalchi, I Visconti Annual International Conference on the Theory and Applications of …, 2016 | 37 | 2016 |
Black-box non-black-box zero knowledge V Goyal, R Ostrovsky, A Scafuro, I Visconti Proceedings of the forty-sixth annual ACM symposium on Theory of computing …, 2014 | 28 | 2014 |
Impossibility results for RFID privacy notions F Armknecht, AR Sadeghi, A Scafuro, I Visconti, C Wachsmann Transactions on Computational Science XI, 39-63, 2010 | 26 | 2010 |
On round-optimal zero knowledge in the bare public-key model A Scafuro, I Visconti Annual International Conference on the Theory and Applications of …, 2012 | 25 | 2012 |
Simultaneously resettable arguments of knowledge C Cho, R Ostrovsky, A Scafuro, I Visconti Theory of Cryptography Conference, 530-547, 2012 | 24 | 2012 |
Revisiting lower and upper bounds for selective decommitments R Ostrovsky, V Rao, A Scafuro, I Visconti Theory of Cryptography Conference, 559-578, 2013 | 21 | 2013 |
Publicly verifiable proofs from blockchains A Scafuro, L Siniscalchi, I Visconti IACR International Workshop on Public Key Cryptography, 374-401, 2019 | 15 | 2019 |
Adaptively indistinguishable garbled circuits Z Jafargholi, A Scafuro, D Wichs Theory of Cryptography Conference, 40-71, 2017 | 13 | 2017 |
Sublinear zero-knowledge arguments for RAM programs P Mohassel, M Rosulek, A Scafuro Annual International Conference on the Theory and Applications of …, 2017 | 13 | 2017 |
Revisiting DoS attacks and privacy in RFID-enabled networks P D’Arco, A Scafuro, I Visconti International Symposium on Algorithms and Experiments for Sensor Systems …, 2009 | 13 | 2009 |
Revisiting DoS attacks and privacy in RFID-enabled networks P D’Arco, A Scafuro, I Visconti International Symposium on Algorithms and Experiments for Sensor Systems …, 2009 | 13 | 2009 |