Follow
Alessandra Scafuro
Alessandra Scafuro
Verified email at ncsu.edu - Homepage
Title
Cited by
Cited by
Year
Tumblebit: An untrusted bitcoin-compatible anonymous payment hub
E Heilman, L Alshenibr, F Baldimtsi, A Scafuro, S Goldberg
Network and distributed system security symposium, 2017
3292017
NIZKs with an untrusted CRS: security in the face of parameter subversion
M Bellare, G Fuchsbauer, A Scafuro
Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the …, 2016
1362016
Practical UC security with a global random oracle
R Canetti, A Jain, A Scafuro
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
1342014
Universally composable secure computation with (malicious) physically uncloneable functions
R Ostrovsky, A Scafuro, I Visconti, A Wadia
Advances in Cryptology–EUROCRYPT 2013: 32nd Annual International Conference …, 2013
942013
Garbled RAM from one-way functions
S Garg, S Lu, R Ostrovsky, A Scafuro
Proceedings of the forty-seventh annual ACM symposium on Theory of computing …, 2015
822015
Adaptively secure garbled circuits from one-way functions
B Hemenway, Z Jafargholi, R Ostrovsky, A Scafuro, D Wichs
Annual International Cryptology Conference, 149-178, 2016
612016
Round-optimal black-box two-party computation
R Ostrovsky, S Richelson, A Scafuro
Advances in Cryptology--CRYPTO 2015: 35th Annual Cryptology Conference …, 2015
542015
Improved OR-composition of sigma-protocols
M Ciampi, G Persiano, A Scafuro, L Siniscalchi, I Visconti
Theory of Cryptography: 13th International Conference, TCC 2016-A, Tel Aviv …, 2016
512016
Unconditionally secure and universally composable commitments from physical assumptions
I Damgård, A Scafuro
Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on the …, 2013
482013
Online/offline OR composition of sigma protocols
M Ciampi, G Persiano, A Scafuro, L Siniscalchi, I Visconti
Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016
452016
Black-box non-black-box zero knowledge
V Goyal, R Ostrovsky, A Scafuro, I Visconti
Proceedings of the forty-sixth annual ACM symposium on Theory of computing …, 2014
342014
Impossibility results for RFID privacy notions
F Armknecht, AR Sadeghi, A Scafuro, I Visconti, C Wachsmann
Transactions on Computational Science XI: Special Issue on Security in …, 2010
322010
On round-optimal zero knowledge in the bare public-key model
A Scafuro, I Visconti
Annual International Conference on the Theory and Applications of …, 2012
262012
Revisiting lower and upper bounds for selective decommitments
R Ostrovsky, V Rao, A Scafuro, I Visconti
Theory of Cryptography: 10th Theory of Cryptography Conference, TCC 2013 …, 2013
242013
Simultaneously resettable arguments of knowledge
C Cho, R Ostrovsky, A Scafuro, I Visconti
Theory of Cryptography Conference, 530-547, 2012
242012
Sublinear zero-knowledge arguments for RAM programs
P Mohassel, M Rosulek, A Scafuro
Annual International Conference on the Theory and Applications of …, 2017
222017
Anonymous lottery in the proof-of-stake setting
F Baldimtsi, V Madathil, A Scafuro, L Zhou
2020 IEEE 33rd Computer Security Foundations Symposium (CSF), 318-333, 2020
202020
Adaptively indistinguishable garbled circuits
Z Jafargholi, A Scafuro, D Wichs
Theory of Cryptography Conference, 40-71, 2017
202017
Publicly verifiable proofs from blockchains
A Scafuro, L Siniscalchi, I Visconti
IACR International Workshop on Public Key Cryptography, 374-401, 2019
192019
Break-glass encryption
A Scafuro
Public-Key Cryptography–PKC 2019: 22nd IACR International Conference on …, 2019
182019
The system can't perform the operation now. Try again later.
Articles 1–20