Follow
Alessandra Scafuro
Alessandra Scafuro
Verified email at ncsu.edu - Homepage
Title
Cited by
Cited by
Year
Tumblebit: An untrusted bitcoin-compatible anonymous payment hub
E Heilman, L Alshenibr, F Baldimtsi, A Scafuro, S Goldberg
Network and distributed system security symposium, 2017
2892017
Practical UC security with a global random oracle
R Canetti, A Jain, A Scafuro
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
1212014
NIZKs with an untrusted CRS: security in the face of parameter subversion
M Bellare, G Fuchsbauer, A Scafuro
Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the …, 2016
1202016
Universally composable secure computation with (malicious) physically uncloneable functions
R Ostrovsky, A Scafuro, I Visconti, A Wadia
Advances in Cryptology–EUROCRYPT 2013: 32nd Annual International Conference …, 2013
902013
Garbled RAM from one-way functions
S Garg, S Lu, R Ostrovsky, A Scafuro
Proceedings of the forty-seventh annual ACM symposium on Theory of computing …, 2015
762015
Adaptively secure garbled circuits from one-way functions
B Hemenway, Z Jafargholi, R Ostrovsky, A Scafuro, D Wichs
Advances in Cryptology–CRYPTO 2016: 36th Annual International Cryptology …, 2016
612016
Round-optimal black-box two-party computation
R Ostrovsky, S Richelson, A Scafuro
Advances in Cryptology--CRYPTO 2015: 35th Annual Cryptology Conference …, 2015
502015
Improved OR-composition of sigma-protocols
M Ciampi, G Persiano, A Scafuro, L Siniscalchi, I Visconti
Theory of Cryptography: 13th International Conference, TCC 2016-A, Tel Aviv …, 2016
492016
Unconditionally secure and universally composable commitments from physical assumptions
I Damgård, A Scafuro
Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on the …, 2013
462013
Online/offline OR composition of sigma protocols
M Ciampi, G Persiano, A Scafuro, L Siniscalchi, I Visconti
Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016
412016
Black-box non-black-box zero knowledge
V Goyal, R Ostrovsky, A Scafuro, I Visconti
Proceedings of the forty-sixth annual ACM symposium on Theory of computing …, 2014
302014
Impossibility results for RFID privacy notions
F Armknecht, AR Sadeghi, A Scafuro, I Visconti, C Wachsmann
Transactions on Computational Science XI: Special Issue on Security in …, 2010
302010
On round-optimal zero knowledge in the bare public-key model
A Scafuro, I Visconti
Advances in Cryptology–EUROCRYPT 2012: 31st Annual International Conference …, 2012
262012
Simultaneously resettable arguments of knowledge
C Cho, R Ostrovsky, A Scafuro, I Visconti
Theory of Cryptography: 9th Theory of Cryptography Conference, TCC 2012 …, 2012
242012
Revisiting lower and upper bounds for selective decommitments
R Ostrovsky, V Rao, A Scafuro, I Visconti
Theory of Cryptography: 10th Theory of Cryptography Conference, TCC 2013 …, 2013
232013
Sublinear zero-knowledge arguments for RAM programs
P Mohassel, M Rosulek, A Scafuro
Advances in Cryptology–EUROCRYPT 2017: 36th Annual International Conference …, 2017
182017
Adaptively indistinguishable garbled circuits
Z Jafargholi, A Scafuro, D Wichs
Theory of Cryptography: 15th International Conference, TCC 2017, Baltimore …, 2017
172017
Publicly verifiable proofs from blockchains
A Scafuro, L Siniscalchi, I Visconti
Public-Key Cryptography–PKC 2019: 22nd IACR International Conference on …, 2019
162019
Anonymous lottery in the proof-of-stake setting
F Baldimtsi, V Madathil, A Scafuro, L Zhou
2020 IEEE 33rd Computer Security Foundations Symposium (CSF), 318-333, 2020
152020
Server-aided secure computation with off-line parties
F Baldimtsi, D Papadopoulos, S Papadopoulos, A Scafuro, ...
Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017
132017
The system can't perform the operation now. Try again later.
Articles 1–20