Tumblebit: An untrusted bitcoin-compatible anonymous payment hub E Heilman, L Alshenibr, F Baldimtsi, A Scafuro, S Goldberg Network and distributed system security symposium, 2017 | 289 | 2017 |
Practical UC security with a global random oracle R Canetti, A Jain, A Scafuro Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 121 | 2014 |
NIZKs with an untrusted CRS: security in the face of parameter subversion M Bellare, G Fuchsbauer, A Scafuro Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the …, 2016 | 120 | 2016 |
Universally composable secure computation with (malicious) physically uncloneable functions R Ostrovsky, A Scafuro, I Visconti, A Wadia Advances in Cryptology–EUROCRYPT 2013: 32nd Annual International Conference …, 2013 | 90 | 2013 |
Garbled RAM from one-way functions S Garg, S Lu, R Ostrovsky, A Scafuro Proceedings of the forty-seventh annual ACM symposium on Theory of computing …, 2015 | 76 | 2015 |
Adaptively secure garbled circuits from one-way functions B Hemenway, Z Jafargholi, R Ostrovsky, A Scafuro, D Wichs Advances in Cryptology–CRYPTO 2016: 36th Annual International Cryptology …, 2016 | 61 | 2016 |
Round-optimal black-box two-party computation R Ostrovsky, S Richelson, A Scafuro Advances in Cryptology--CRYPTO 2015: 35th Annual Cryptology Conference …, 2015 | 50 | 2015 |
Improved OR-composition of sigma-protocols M Ciampi, G Persiano, A Scafuro, L Siniscalchi, I Visconti Theory of Cryptography: 13th International Conference, TCC 2016-A, Tel Aviv …, 2016 | 49 | 2016 |
Unconditionally secure and universally composable commitments from physical assumptions I Damgård, A Scafuro Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on the …, 2013 | 46 | 2013 |
Online/offline OR composition of sigma protocols M Ciampi, G Persiano, A Scafuro, L Siniscalchi, I Visconti Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016 | 41 | 2016 |
Black-box non-black-box zero knowledge V Goyal, R Ostrovsky, A Scafuro, I Visconti Proceedings of the forty-sixth annual ACM symposium on Theory of computing …, 2014 | 30 | 2014 |
Impossibility results for RFID privacy notions F Armknecht, AR Sadeghi, A Scafuro, I Visconti, C Wachsmann Transactions on Computational Science XI: Special Issue on Security in …, 2010 | 30 | 2010 |
On round-optimal zero knowledge in the bare public-key model A Scafuro, I Visconti Advances in Cryptology–EUROCRYPT 2012: 31st Annual International Conference …, 2012 | 26 | 2012 |
Simultaneously resettable arguments of knowledge C Cho, R Ostrovsky, A Scafuro, I Visconti Theory of Cryptography: 9th Theory of Cryptography Conference, TCC 2012 …, 2012 | 24 | 2012 |
Revisiting lower and upper bounds for selective decommitments R Ostrovsky, V Rao, A Scafuro, I Visconti Theory of Cryptography: 10th Theory of Cryptography Conference, TCC 2013 …, 2013 | 23 | 2013 |
Sublinear zero-knowledge arguments for RAM programs P Mohassel, M Rosulek, A Scafuro Advances in Cryptology–EUROCRYPT 2017: 36th Annual International Conference …, 2017 | 18 | 2017 |
Adaptively indistinguishable garbled circuits Z Jafargholi, A Scafuro, D Wichs Theory of Cryptography: 15th International Conference, TCC 2017, Baltimore …, 2017 | 17 | 2017 |
Publicly verifiable proofs from blockchains A Scafuro, L Siniscalchi, I Visconti Public-Key Cryptography–PKC 2019: 22nd IACR International Conference on …, 2019 | 16 | 2019 |
Anonymous lottery in the proof-of-stake setting F Baldimtsi, V Madathil, A Scafuro, L Zhou 2020 IEEE 33rd Computer Security Foundations Symposium (CSF), 318-333, 2020 | 15 | 2020 |
Server-aided secure computation with off-line parties F Baldimtsi, D Papadopoulos, S Papadopoulos, A Scafuro, ... Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017 | 13 | 2017 |