Alessandra Scafuro

Works (16)

2018 conference paper

Population Stability: Regulating Size in the Presence of an Adversary

PODC'18: PROCEEDINGS OF THE 2018 ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING, 397–406.

By: S. Goldwasser, R. Ostrovsky, A. Scafuro & A. Sealfon

Source: NC State University Libraries
Added: February 25, 2019

2017 chapter

Adaptively Indistinguishable Garbled Circuits

In Theory of Cryptography (pp. 40–71).

By: Z. Jafargholi, A. Scafuro & D. Wichs

Source: Crossref
Added: February 24, 2020

2017 chapter

Server-Aided Secure Computation with Off-line Parties

In Computer Security – ESORICS 2017 (pp. 103–123).

By: F. Baldimtsi, D. Papadopoulos, S. Papadopoulos, A. Scafuro & N. Triandopoulos

Source: Crossref
Added: February 24, 2020

2017 conference paper

Sublinear zero-knowledge arguments for RAM programs

Advances in cryptology - eurocrypt 2017, pt i, 10210, 501–531.

By: P. Mohassel, M. Rosulek & A. Scafuro

Source: NC State University Libraries
Added: August 6, 2018

2016 chapter

Adaptively Secure Garbled Circuits from One-Way Functions

In Advances in Cryptology – CRYPTO 2016 (pp. 149–178).

By: B. Hemenway, Z. Jafargholi, R. Ostrovsky, A. Scafuro & D. Wichs

Source: Crossref
Added: February 24, 2020

2016 chapter

NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion

In Advances in Cryptology – ASIACRYPT 2016 (pp. 777–804).

By: M. Bellare, G. Fuchsbauer & A. Scafuro

Source: Crossref
Added: February 24, 2020

2016 chapter

Online/Offline OR Composition of Sigma Protocols

In Advances in Cryptology – EUROCRYPT 2016 (pp. 63–92).

By: M. Ciampi, G. Persiano, A. Scafuro, L. Siniscalchi & I. Visconti

Source: Crossref
Added: February 24, 2020

2015 chapter

Resettably Sound Zero-Knowledge Arguments from OWFs - The (Semi) Black-Box Way

In Theory of Cryptography (pp. 345–374).

By: R. Ostrovsky, A. Scafuro & M. Venkitasubramanian

Source: Crossref
Added: February 24, 2020

2015 chapter

Round-Optimal Black-Box Two-Party Computation

In Lecture Notes in Computer Science (pp. 339–358).

By: R. Ostrovsky, S. Richelson & A. Scafuro

Source: Crossref
Added: February 24, 2020

2013 chapter

Revisiting Lower and Upper Bounds for Selective Decommitments

In Theory of Cryptography (pp. 559–578).

By: R. Ostrovsky, V. Rao, A. Scafuro & I. Visconti

Source: Crossref
Added: August 28, 2020

2013 chapter

Unconditionally Secure and Universally Composable Commitments from Physical Assumptions

In Advances in Cryptology - ASIACRYPT 2013 (pp. 100–119).

By: I. Damgård & A. Scafuro

Source: Crossref
Added: August 28, 2020

2013 chapter

Universally Composable Secure Computation with (Malicious) Physically Uncloneable Functions

In Advances in Cryptology – EUROCRYPT 2013 (pp. 702–718).

By: R. Ostrovsky, A. Scafuro, I. Visconti & A. Wadia

Source: Crossref
Added: August 28, 2020

2012 chapter

On Round-Optimal Zero Knowledge in the Bare Public-Key Model

In Advances in Cryptology – EUROCRYPT 2012 (pp. 153–171).

By: A. Scafuro & I. Visconti

Source: Crossref
Added: August 28, 2020

2012 chapter

Simultaneously Resettable Arguments of Knowledge

In Theory of Cryptography (pp. 530–547).

By: C. Cho, R. Ostrovsky, A. Scafuro & I. Visconti

Source: Crossref
Added: August 28, 2020

2010 chapter

Impossibility Results for RFID Privacy Notions

In Transactions on Computational Science XI (pp. 39–63).

By: F. Armknecht, A. Sadeghi, A. Scafuro, I. Visconti & C. Wachsmann

Source: Crossref
Added: August 28, 2020

2009 chapter

Revisiting DoS Attacks and Privacy in RFID-Enabled Networks

In Algorithmic Aspects of Wireless Sensor Networks (pp. 76–87).

By: P. D’Arco, A. Scafuro & I. Visconti

Source: Crossref
Added: August 28, 2020