Alessandra Scafuro
Alessandra Scafuro
Verified email at ncsu.edu - Homepage
Title
Cited by
Cited by
Year
Tumblebit: An untrusted bitcoin-compatible anonymous payment hub
E Heilman, L Alshenibr, F Baldimtsi, A Scafuro, S Goldberg
Network and Distributed System Security Symposium, 2017
1642017
Practical UC security with a global random oracle
R Canetti, A Jain, A Scafuro
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
752014
NIZKs with an untrusted CRS: Security in the face of parameter subversion
M Bellare, G Fuchsbauer, A Scafuro
International Conference on the Theory and Application of Cryptology and …, 2016
742016
Universally composable secure computation with (malicious) physically uncloneable functions
R Ostrovsky, A Scafuro, I Visconti, A Wadia
Annual International Conference on the Theory and Applications of …, 2013
682013
Garbled RAM from one-way functions
S Garg, S Lu, R Ostrovsky, A Scafuro
Proceedings of the forty-seventh annual ACM symposium on Theory of computing …, 2015
562015
Adaptively secure garbled circuits from one-way functions
B Hemenway, Z Jafargholi, R Ostrovsky, A Scafuro, D Wichs
Annual International Cryptology Conference, 149-178, 2016
432016
Improved or-composition of sigma-protocols
M Ciampi, G Persiano, A Scafuro, L Siniscalchi, I Visconti
Theory of Cryptography Conference, 112-141, 2016
402016
Round-optimal black-box two-party computation
R Ostrovsky, S Richelson, A Scafuro
Annual Cryptology Conference, 339-358, 2015
352015
Unconditionally secure and universally composable commitments from physical assumptions
I Damgård, A Scafuro
International Conference on the Theory and Application of Cryptology and …, 2013
352013
Online/offline OR composition of sigma protocols
M Ciampi, G Persiano, A Scafuro, L Siniscalchi, I Visconti
Annual International Conference on the Theory and Applications of …, 2016
332016
Black-box non-black-box zero knowledge
V Goyal, R Ostrovsky, A Scafuro, I Visconti
Proceedings of the forty-sixth annual ACM symposium on Theory of computing …, 2014
252014
On round-optimal zero knowledge in the bare public-key model
A Scafuro, I Visconti
Annual International Conference on the Theory and Applications of …, 2012
252012
Impossibility results for RFID privacy notions
F Armknecht, AR Sadeghi, A Scafuro, I Visconti, C Wachsmann
Transactions on computational science XI, 39-63, 2010
242010
Revisiting lower and upper bounds for selective decommitments
R Ostrovsky, V Rao, A Scafuro, I Visconti
Theory of Cryptography Conference, 559-578, 2013
222013
Simultaneously resettable arguments of knowledge
C Cho, R Ostrovsky, A Scafuro, I Visconti
Theory of Cryptography Conference, 530-547, 2012
222012
Revisiting DoS attacks and privacy in RFID-enabled networks
P D’Arco, A Scafuro, I Visconti
International Symposium on Algorithms and Experiments for Sensor Systems …, 2009
132009
Resettably sound zero-knowledge arguments from owfs-the (semi) black-box way
R Ostrovsky, A Scafuro, M Venkitasubramanian
Theory of Cryptography Conference, 345-374, 2015
112015
On Efficient Non-Interactive Oblivious Transfer with Tamper-Proof Hardware.
M Dubovitskaya, A Scafuro, I Visconti
IACR Cryptol. ePrint Arch. 2010, 509, 2010
112010
UC commitments for modular protocol design and applications to revocation and attribute tokens
J Camenisch, M Dubovitskaya, A Rial
Annual International Cryptology Conference, 208-239, 2016
102016
Adaptively indistinguishable garbled circuits
Z Jafargholi, A Scafuro, D Wichs
Theory of Cryptography Conference, 40-71, 2017
92017
The system can't perform the operation now. Try again later.
Articles 1–20