\n \n \n
\n
\n\n \n \n \n \n \n \n Cryptographic reverse firewalls for interactive proof systems.\n \n \n \n \n\n\n \n Ganesh, C.; Magri, B.; and Venturi, D.\n\n\n \n\n\n\n
Theor. Comput. Sci., 855: 104–132. 2021.\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{DBLP:journals/tcs/GaneshMV21,\n author = {Chaya Ganesh and\n Bernardo Magri and\n Daniele Venturi},\n title = {Cryptographic reverse firewalls for interactive proof systems},\n journal = {Theor. Comput. Sci.},\n volume = {855},\n pages = {104--132},\n year = {2021},\n url = {https://doi.org/10.1016/j.tcs.2020.11.043},\n doi = {10.1016/J.TCS.2020.11.043},\n timestamp = {Mon, 28 Aug 2023 01:00:00 +0200},\n biburl = {https://dblp.org/rec/journals/tcs/GaneshMV21.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Immunization against complete subversion without random oracles.\n \n \n \n \n\n\n \n Ateniese, G.; Francati, D.; Magri, B.; and Venturi, D.\n\n\n \n\n\n\n
Theor. Comput. Sci., 859: 1–36. 2021.\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{DBLP:journals/tcs/AtenieseFMV21,\n author = {Giuseppe Ateniese and\n Danilo Francati and\n Bernardo Magri and\n Daniele Venturi},\n title = {Immunization against complete subversion without random oracles},\n journal = {Theor. Comput. Sci.},\n volume = {859},\n pages = {1--36},\n year = {2021},\n url = {https://doi.org/10.1016/j.tcs.2021.01.002},\n doi = {10.1016/J.TCS.2021.01.002},\n timestamp = {Tue, 02 Mar 2021 00:00:00 +0100},\n biburl = {https://dblp.org/rec/journals/tcs/AtenieseFMV21.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n YOSO: You Only Speak Once - Secure MPC with Stateless Ephemeral Roles.\n \n \n \n \n\n\n \n Gentry, C.; Halevi, S.; Krawczyk, H.; Magri, B.; Nielsen, J. B.; Rabin, T.; and Yakoubov, S.\n\n\n \n\n\n\n In Malkin, T.; and Peikert, C., editor(s),
Advances in Cryptology - CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16-20, 2021, Proceedings, Part II, volume 12826, of
Lecture Notes in Computer Science, pages 64–93, 2021. Springer\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/crypto/GentryHKMNRY21,\n author = {Craig Gentry and\n Shai Halevi and\n Hugo Krawczyk and\n Bernardo Magri and\n Jesper Buus Nielsen and\n Tal Rabin and\n Sophia Yakoubov},\n editor = {Tal Malkin and\n Chris Peikert},\n title = {{YOSO:} You Only Speak Once - Secure {MPC} with Stateless Ephemeral\n Roles},\n booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International\n Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,\n 2021, Proceedings, Part {II}},\n series = {Lecture Notes in Computer Science},\n volume = {12826},\n pages = {64--93},\n publisher = {Springer},\n year = {2021},\n url = {https://doi.org/10.1007/978-3-030-84245-1\\_3},\n doi = {10.1007/978-3-030-84245-1\\_3},\n timestamp = {Sun, 06 Oct 2024 01:00:00 +0200},\n biburl = {https://dblp.org/rec/conf/crypto/GentryHKMNRY21.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Broadcast-Optimal Two Round MPC with an Honest Majority.\n \n \n \n \n\n\n \n Damgård, I.; Magri, B.; Ravi, D.; Siniscalchi, L.; and Yakoubov, S.\n\n\n \n\n\n\n In Malkin, T.; and Peikert, C., editor(s),
Advances in Cryptology - CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16-20, 2021, Proceedings, Part II, volume 12826, of
Lecture Notes in Computer Science, pages 155–184, 2021. Springer\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/crypto/DamgardMRSY21,\n author = {Ivan Damg{\\aa}rd and\n Bernardo Magri and\n Divya Ravi and\n Luisa Siniscalchi and\n Sophia Yakoubov},\n editor = {Tal Malkin and\n Chris Peikert},\n title = {Broadcast-Optimal Two Round {MPC} with an Honest Majority},\n booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International\n Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,\n 2021, Proceedings, Part {II}},\n series = {Lecture Notes in Computer Science},\n volume = {12826},\n pages = {155--184},\n publisher = {Springer},\n year = {2021},\n url = {https://doi.org/10.1007/978-3-030-84245-1\\_6},\n doi = {10.1007/978-3-030-84245-1\\_6},\n timestamp = {Sun, 06 Oct 2024 01:00:00 +0200},\n biburl = {https://dblp.org/rec/conf/crypto/DamgardMRSY21.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Reparo: Publicly Verifiable Layer to Repair Blockchains.\n \n \n \n \n\n\n \n Thyagarajan, S. A. K.; Bhat, A.; Magri, B.; Tschudi, D.; and Kate, A.\n\n\n \n\n\n\n In Borisov, N.; and Díaz, C., editor(s),
Financial Cryptography and Data Security - 25th International Conference, FC 2021, Virtual Event, March 1-5, 2021, Revised Selected Papers, Part II, volume 12675, of
Lecture Notes in Computer Science, pages 37–56, 2021. Springer\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/fc/ThyagarajanBMTK21,\n author = {Sri Aravinda Krishnan Thyagarajan and\n Adithya Bhat and\n Bernardo Magri and\n Daniel Tschudi and\n Aniket Kate},\n editor = {Nikita Borisov and\n Claudia D{\\'{\\i}}az},\n title = {Reparo: Publicly Verifiable Layer to Repair Blockchains},\n booktitle = {Financial Cryptography and Data Security - 25th International Conference,\n {FC} 2021, Virtual Event, March 1-5, 2021, Revised Selected Papers,\n Part {II}},\n series = {Lecture Notes in Computer Science},\n volume = {12675},\n pages = {37--56},\n publisher = {Springer},\n year = {2021},\n url = {https://doi.org/10.1007/978-3-662-64331-0\\_2},\n doi = {10.1007/978-3-662-64331-0\\_2},\n timestamp = {Sat, 30 Sep 2023 01:00:00 +0200},\n biburl = {https://dblp.org/rec/conf/fc/ThyagarajanBMTK21.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Weight-Based Nakamoto-Style Blockchains.\n \n \n \n \n\n\n \n Kamp, S. H.; Magri, B.; Matt, C.; Nielsen, J. B.; Thomsen, S. E.; and Tschudi, D.\n\n\n \n\n\n\n In Longa, P.; and Ràfols, C., editor(s),
Progress in Cryptology - LATINCRYPT 2021 - 7th International Conference on Cryptology and Information Security in Latin America, Bogotá, Colombia, October 6-8, 2021, Proceedings, volume 12912, of
Lecture Notes in Computer Science, pages 299–319, 2021. Springer\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/latincrypt/KampM0NTT21,\n author = {Simon Holmgaard Kamp and\n Bernardo Magri and\n Christian Matt and\n Jesper Buus Nielsen and\n S{\\o}ren Eller Thomsen and\n Daniel Tschudi},\n editor = {Patrick Longa and\n Carla R{\\`{a}}fols},\n title = {Weight-Based Nakamoto-Style Blockchains},\n booktitle = {Progress in Cryptology - {LATINCRYPT} 2021 - 7th International Conference\n on Cryptology and Information Security in Latin America, Bogot{\\'{a}},\n Colombia, October 6-8, 2021, Proceedings},\n series = {Lecture Notes in Computer Science},\n volume = {12912},\n pages = {299--319},\n publisher = {Springer},\n year = {2021},\n url = {https://doi.org/10.1007/978-3-030-88238-9\\_15},\n doi = {10.1007/978-3-030-88238-9\\_15},\n timestamp = {Wed, 15 Dec 2021 00:00:00 +0100},\n biburl = {https://dblp.org/rec/conf/latincrypt/KampM0NTT21.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Refresh When You Wake Up: Proactive Threshold Wallets with Offline Devices.\n \n \n \n \n\n\n \n Kondi, Y.; Magri, B.; Orlandi, C.; and Shlomovits, O.\n\n\n \n\n\n\n In
42nd IEEE Symposium on Security and Privacy, SP 2021, San Francisco, CA, USA, 24-27 May 2021, pages 608–625, 2021. IEEE\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/sp/KondiMOS21,\n author = {Yashvanth Kondi and\n Bernardo Magri and\n Claudio Orlandi and\n Omer Shlomovits},\n title = {Refresh When You Wake Up: Proactive Threshold Wallets with Offline\n Devices},\n booktitle = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco,\n CA, USA, 24-27 May 2021},\n pages = {608--625},\n publisher = {{IEEE}},\n year = {2021},\n url = {https://doi.org/10.1109/SP40001.2021.00067},\n doi = {10.1109/SP40001.2021.00067},\n timestamp = {Thu, 21 Sep 2023 15:57:26 +0200},\n biburl = {https://dblp.org/rec/conf/sp/KondiMOS21.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Random-Index PIR and Applications.\n \n \n \n \n\n\n \n Gentry, C.; Halevi, S.; Magri, B.; Nielsen, J. B.; and Yakoubov, S.\n\n\n \n\n\n\n In Nissim, K.; and Waters, B., editor(s),
Theory of Cryptography - 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part III, volume 13044, of
Lecture Notes in Computer Science, pages 32–61, 2021. Springer\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/tcc/GentryHMNY21,\n author = {Craig Gentry and\n Shai Halevi and\n Bernardo Magri and\n Jesper Buus Nielsen and\n Sophia Yakoubov},\n editor = {Kobbi Nissim and\n Brent Waters},\n title = {Random-Index {PIR} and Applications},\n booktitle = {Theory of Cryptography - 19th International Conference, {TCC} 2021,\n Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part {III}},\n series = {Lecture Notes in Computer Science},\n volume = {13044},\n pages = {32--61},\n publisher = {Springer},\n year = {2021},\n url = {https://doi.org/10.1007/978-3-030-90456-2\\_2},\n doi = {10.1007/978-3-030-90456-2\\_2},\n timestamp = {Sun, 06 Oct 2024 01:00:00 +0200},\n biburl = {https://dblp.org/rec/conf/tcc/GentryHMNY21.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n YOSO: You Only Speak Once / Secure MPC with Stateless Ephemeral Roles.\n \n \n \n \n\n\n \n Gentry, C.; Halevi, S.; Krawczyk, H.; Magri, B.; Nielsen, J. B.; Rabin, T.; and Yakoubov, S.\n\n\n \n\n\n\n
IACR Cryptol. ePrint Arch.,210. 2021.\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{DBLP:journals/iacr/GentryHKMNRY21,\n author = {Craig Gentry and\n Shai Halevi and\n Hugo Krawczyk and\n Bernardo Magri and\n Jesper Buus Nielsen and\n Tal Rabin and\n Sophia Yakoubov},\n title = {{YOSO:} You Only Speak Once / Secure {MPC} with Stateless Ephemeral\n Roles},\n journal = {{IACR} Cryptol. ePrint Arch.},\n pages = {210},\n year = {2021},\n url = {https://eprint.iacr.org/2021/210},\n timestamp = {Wed, 07 Apr 2021 01:00:00 +0200},\n biburl = {https://dblp.org/rec/journals/iacr/GentryHKMNRY21.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n GearBox: An Efficient UC Sharded Ledger Leveraging the Safety-Liveness Dichotomy.\n \n \n \n \n\n\n \n David, B.; Magri, B.; Matt, C.; Nielsen, J. B.; and Tschudi, D.\n\n\n \n\n\n\n
IACR Cryptol. ePrint Arch.,211. 2021.\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{DBLP:journals/iacr/DavidM0NT21,\n author = {Bernardo David and\n Bernardo Magri and\n Christian Matt and\n Jesper Buus Nielsen and\n Daniel Tschudi},\n title = {GearBox: An Efficient {UC} Sharded Ledger Leveraging the Safety-Liveness\n Dichotomy},\n journal = {{IACR} Cryptol. ePrint Arch.},\n pages = {211},\n year = {2021},\n url = {https://eprint.iacr.org/2021/211},\n timestamp = {Wed, 07 Apr 2021 01:00:00 +0200},\n biburl = {https://dblp.org/rec/journals/iacr/DavidM0NT21.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Everlasting UC Commitments from Fully Malicious PUFs.\n \n \n \n \n\n\n \n Magri, B.; Malavolta, G.; Schröder, D.; and Unruh, D.\n\n\n \n\n\n\n
IACR Cryptol. ePrint Arch.,248. 2021.\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{DBLP:journals/iacr/MagriMSU21,\n author = {Bernardo Magri and\n Giulio Malavolta and\n Dominique Schr{\\"{o}}der and\n Dominique Unruh},\n title = {Everlasting {UC} Commitments from Fully Malicious PUFs},\n journal = {{IACR} Cryptol. ePrint Arch.},\n pages = {248},\n year = {2021},\n url = {https://eprint.iacr.org/2021/248},\n timestamp = {Wed, 07 Apr 2021 01:00:00 +0200},\n biburl = {https://dblp.org/rec/journals/iacr/MagriMSU21.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n