Tumblebit: An untrusted bitcoin-compatible anonymous payment hub E Heilman, L Alshenibr, F Baldimtsi, A Scafuro, S Goldberg Network and distributed system security symposium, 2017 | 358 | 2017 |
NIZKs with an untrusted CRS: security in the face of parameter subversion M Bellare, G Fuchsbauer, A Scafuro Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the …, 2016 | 144 | 2016 |
Practical UC security with a global random oracle R Canetti, A Jain, A Scafuro Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 143 | 2014 |
Universally composable secure computation with (malicious) physically uncloneable functions R Ostrovsky, A Scafuro, I Visconti, A Wadia Advances in Cryptology–EUROCRYPT 2013: 32nd Annual International Conference …, 2013 | 95 | 2013 |
Garbled RAM from one-way functions S Garg, S Lu, R Ostrovsky, A Scafuro Proceedings of the forty-seventh annual ACM symposium on Theory of computing …, 2015 | 86 | 2015 |
Adaptively secure garbled circuits from one-way functions B Hemenway, Z Jafargholi, R Ostrovsky, A Scafuro, D Wichs Annual International Cryptology Conference, 149-178, 2016 | 67 | 2016 |
Improved OR-composition of sigma-protocols M Ciampi, G Persiano, A Scafuro, L Siniscalchi, I Visconti Theory of Cryptography: 13th International Conference, TCC 2016-A, Tel Aviv …, 2016 | 58 | 2016 |
Round-optimal black-box two-party computation R Ostrovsky, S Richelson, A Scafuro Advances in Cryptology--CRYPTO 2015: 35th Annual Cryptology Conference …, 2015 | 56 | 2015 |
Online/offline OR composition of sigma protocols M Ciampi, G Persiano, A Scafuro, L Siniscalchi, I Visconti Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016 | 55 | 2016 |
Unconditionally secure and universally composable commitments from physical assumptions I Damgård, A Scafuro Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on the …, 2013 | 49 | 2013 |
Black-box non-black-box zero knowledge V Goyal, R Ostrovsky, A Scafuro, I Visconti Proceedings of the forty-sixth annual ACM symposium on Theory of computing …, 2014 | 36 | 2014 |
Impossibility results for RFID privacy notions F Armknecht, AR Sadeghi, A Scafuro, I Visconti, C Wachsmann Transactions on Computational Science XI: Special Issue on Security in …, 2010 | 33 | 2010 |
On round-optimal zero knowledge in the bare public-key model A Scafuro, I Visconti Annual International Conference on the Theory and Applications of …, 2012 | 29 | 2012 |
Sublinear zero-knowledge arguments for RAM programs P Mohassel, M Rosulek, A Scafuro Annual International Conference on the Theory and Applications of …, 2017 | 27 | 2017 |
Revisiting lower and upper bounds for selective decommitments R Ostrovsky, V Rao, A Scafuro, I Visconti Theory of Cryptography: 10th Theory of Cryptography Conference, TCC 2013 …, 2013 | 26 | 2013 |
Simultaneously resettable arguments of knowledge C Cho, R Ostrovsky, A Scafuro, I Visconti Theory of Cryptography Conference, 530-547, 2012 | 25 | 2012 |
Break-glass encryption A Scafuro Public-Key Cryptography–PKC 2019: 22nd IACR International Conference on …, 2019 | 23 | 2019 |
Anonymous lottery in the proof-of-stake setting F Baldimtsi, V Madathil, A Scafuro, L Zhou 2020 IEEE 33rd Computer Security Foundations Symposium (CSF), 318-333, 2020 | 22 | 2020 |
Publicly verifiable proofs from blockchains A Scafuro, L Siniscalchi, I Visconti IACR International Workshop on Public Key Cryptography, 374-401, 2019 | 21 | 2019 |
Threshold ring signatures: new definitions and post-quantum security A Haque, A Scafuro Public-Key Cryptography–PKC 2020: 23rd IACR International Conference on …, 2020 | 20 | 2020 |