Sandro Coretti
Sandro Coretti
IOHK
Verified email at iohk.io - Homepage
Title
Cited by
Cited by
Year
From single-bit to multi-bit public-key encryption via non-malleable codes
S Coretti, U Maurer, B Tackmann, D Venturi
Theory of Cryptography Conference, 532-560, 2015
612015
The double ratchet: Security notions, proofs, and modularization for the signal protocol
J Alwen, S Coretti, Y Dodis
Annual International Conference on the Theory and Applications of …, 2019
412019
Non-malleable encryption: simpler, shorter, stronger
S Coretti, Y Dodis, B Tackmann, D Venturi
Theory of Cryptography Conference, 306-335, 2016
412016
Random oracles and non-uniformity
S Coretti, Y Dodis, S Guo, J Steinberger
Annual International Conference on the Theory and Applications of …, 2018
282018
Constructing confidential channels from authenticated channels—public-key encryption revisited
S Coretti, U Maurer, B Tackmann
International Conference on the Theory and Application of Cryptology and …, 2013
242013
Probabilistic termination and composability of cryptographic protocols
R Cohen, S Coretti, J Garay, V Zikas
Annual International Cryptology Conference, 240-269, 2016
222016
Constant-round asynchronous multi-party computation based on one-way functions
S Coretti, J Garay, M Hirt, V Zikas
International Conference on the Theory and Application of Cryptology and …, 2016
212016
Key Exchange with Unilateral Authentication: Composable Security Definition and Modular Protocol Design.
U Maurer, B Tackmann, S Coretti
IACR Cryptol. ePrint Arch. 2013, 555, 2013
182013
Nonlocality is transitive
S Coretti, E Hänggi, S Wolf
Physical review letters 107 (10), 100402, 2011
152011
Non-uniform bounds in the random-permutation, ideal-cipher, and generic-group models
S Coretti, Y Dodis, S Guo
Annual International Cryptology Conference, 693-721, 2018
132018
Round-preserving parallel composition of probabilistic-termination cryptographic protocols
R Cohen, S Coretti, J Garay, V Zikas
44th International Colloquium on Automata, Languages, and Programming (ICALP …, 2017
122017
Security analysis and improvements for the IETF MLS standard for group messaging
J Alwen, S Coretti, Y Dodis, Y Tselekounis
Annual International Cryptology Conference, 248-277, 2020
102020
Rate-optimizing compilers for continuously non-malleable codes
S Coretti, A Faonio, D Venturi
International Conference on Applied Cryptography and Network Security, 3-23, 2019
92019
Self-destruct non-malleability
S Coretti, Y Dodis, B Tackmann, D Venturi
IACR Cryptology ePrint Archive 2014, 866, 2014
72014
Hydra: Fast Isomorphic State Channels.
MMT Chakravarty, S Coretti, M Fitzi, P Gazi, P Kant, A Kiayias, A Russell
IACR Cryptol. ePrint Arch. 2020, 299, 2020
52020
Seedless fruit is the sweetest: Random number generation, revisited
S Coretti, Y Dodis, H Karthikeyan, S Tessaro
Annual International Cryptology Conference, 205-234, 2019
42019
Probabilistic termination and composability of cryptographic protocols
R Cohen, S Coretti, J Garay, V Zikas
Journal of Cryptology 32 (3), 690-741, 2019
42019
Continuous group key agreement with active security
J Alwen, S Coretti, D Jost, M Mularczyk
Theory of Cryptography-18th International Conference, TCC, 15-19, 2020
22020
Efficiency lower bounds for commit-and-prove constructions
C Badertscher, S Coretti, U Maurer
2017 IEEE International Symposium on Information Theory (ISIT), 1788-1792, 2017
12017
A Constructive Perspective on Key Encapsulation
S Coretti, U Maurer, B Tackmann
Number Theory and Cryptography, 226-239, 2013
12013
The system can't perform the operation now. Try again later.
Articles 1–20