(Note: Some links may not be working - generally this means
that the full version is in the process of being completed.)
Preprints
2024
- Partially Non-Interactive Two-Round Lattice-Based Threshold Signatures
Rutchathon Chairattana-Apirom, Stefano Tessaro, and Chenzhi Zhu
ASIACRYPT 2024
- One-More Unforgeability for Multi- and Threshold
Signatures
Sela Navot, Stefano Tessaro
ASIACRYPT 2024
- Count Corruptions,
Not Users: Improved Tightness for Signatures, Encryption and Authenticated
Key Exchange
Mihir Bellare, Doreen Riepel, Stefano Tessaro, Yizhao Zhang
ASIACRYPT 2024
- POPSTAR: Lightweight Threshold Reporting with Reduced Leakage
Hanjun Li, Sela Navot, and Stefano Tessaro
USENIX Security 2024
- Is ML-Based Cryptanalysis Inherently Limited? Simulating
Cryptographic Adversaries via Gradient-Based Methods
Avital Shafran,
Eran Malach,
Thomas Ristenpart,
Gil Segev, and
Stefano Tessaro
CRYPTO 2024
- Collision Resistance from Multi-Collision Resistance for all Constant Parameters
Jan Buzek and Stefano Tessaro
CRYPTO 2024
- Fully Malicious Authenticated PIR
Marian Dietz and Stefano Tessaro
CRYPTO 2024
- Pairing-Free Blind Signatures from CDH Assumptions
Rutchathon Chairattana-Apirom, Stefano Tessaro, and Chenzhi Zhu
CRYPTO 2024
- Oblivious issuance of proofs
Michele Orrù, Stefano Tessaro, Greg Zaverucha, Chenzhi Zhu
CRYPTO 2024
- Twinkle: Threshold Signatures from DDH with Full Adaptive Security
Renas Bacho, Julian Loss, Stefano Tessaro,
Benedikt Wagner, and Chenzhi Zhu
EUROCRYPT 2024
2023
- LERNA: Secure Single-Server Aggregation via Key-Homomorphic Masking
Hanjun Li, Huijia Lin, Antigoni Polychroniadou, and Stefano Tessaro
ASIACRYPT 2023
- The Query-Complexity of Preprocessing Attacks
Asrhujit Ghoshal and Stefano Tessaro
CRYPTO 2023
- Snowblind: A Threshold Blind Signature in
Pairing-Free Groups
Elizabeth Crites, Chelsea Komlo, Mary Maller, Stefano Tessaro, and Chenzhi Zhu
CRYPTO 2023
- Layout Graphs, Random Walks and the t-wise Independence of SPN Block Ciphers
Tianren Liu, Angelos Pelecanos, Stefano Tessaro, and Vinod Vaikuntanathan
CRYPTO 2023
- Threshold and Multi-Signature Schemes from Linear Hash Functions
Stefano Tessaro and Chenzhi Zhu
EUROCRYPT 2023
- Revisiting BBS Signatures
Stefano Tessaro and Chenzhi Zhu
EUROCRYPT 2023
2022
- VeRSA: Verifiable Registries with Efficient Client Audits from RSA Authenticated Dictionaries
Nirvan Tyagi, Ben Fisch, Andrew Zitek, Joseph Bonneau, and Stefano Tessaro
ACM CCS 2022
- Better than Advertised Security for Non-Interactive Threshold Signatures
Mihir Bellare, Elizabeth Crites, Chelsea Komlo, Mary Maller, Stefano Tessaro, and Chenzhi Zhu
CRYPTO 2022
Note: This is a merge of https://eprint.iacr.org/2022/833.pdf and https://eprint.iacr.org/2021/1375.pdf. Please refer to the individual papers for a full version.
- QuORAM: A Quorum-Replicated Fault Tolerant ORAM Datastore
Sujaya Maiyya, Seif Ibrahim, Caitlin Scarberry, Divyakant Agrawal, Amr El Abbadi, Huijia Lin, Stefano Tessaro, Victor Zakhary
USENIX Security 2022
- On Seedless PRNGs and Premature Next
Sandro Coretti, Yevgeniy Dodis, Harish Karthikeyan, Noah Stephens-Davidowitz, and Stefano Tessaro
ITC 2022
- Short Pairing-Free Blind Signatures with Exponential Security
Stefano Tessaro and Chenzhi Zhu
EUROCRYPT 2022
- A Fast and Simple Partially Oblivious PRF, with Applications
Nirvan Tyagi, Sofı́a Celi, Thomas Ristenpart, Nick Sullivan, Stefano Tessaro, and Christopher A. Wood
EUROCRYPT 2022
- Hiding in Plain Sight: Memory-tight Proofs via Randomness Programming
Ashrujit Ghoshal, Riddhi Ghosal, Joseph Jaeger, and Stefano Tessaro
EUROCRYPT 2022
2021
2020
- Towards Defeating Backdoored Random Oracles: Indifferentiability with Bounded Adaptivity
Yevgeniy Dodis, Pooya Farshim, Sogol Mazaheri, and Stefano Tessaro
TCC 2020
- Expected-Time Cryptography: Generic Techniques and Applications to Concrete Soundness
Joseph Jaeger and Stefano Tessaro
TCC 2020
- Super-Linear Time-Memory Trade-Offs for Symmetric Encryption
Wei Dai, Stefano Tessaro, and Xihu Zhang
TCC 2020
- On the Query Complexity of Constructing PRFs from Non-adaptive PRFs
Pratik Soni and Stefano Tessaro
SCN 2020
- The Memory-Tightness of Authenticated Encryption
Ashrujit Ghoshal, Joseph Jaeger, and Stefano Tessaro
CRYPTO 2020
- PACT: Privacy-Sensitive Protocols and Mechanisms for Mobile Contact Tracing
Justin Chan, Landon Cox, Dean Foster, Shyam Gollakota, Eric Horvitz, Joseph Jaeger, Sham Kakade, Tadayoshi Kohno, John Langford, Jonathan Larson, Puneet Sharma, Sudheesh Singanamalla, Jacob Sunshine, and Stefano Tessaro
IEEE Data Engineering Bulletin June 2020
- On the Memory-Tightness of Hashed ElGamal
Ashrujit Ghoshal and Stefano Tessaro
EUROCRYPT 2020
2019
2018
- Provable Time-Memory
Trade-Offs: Symmetric Cryptography Against Memory-Bounded
Adversaries
Stefano Tessaro and Aishwarya
Thiruvengadam
TCC 2018 (Full version coming soon!) Invited to
Journal of Cryptology
- The Multi-user
Security of GCM, Revisited: Tight Bounds for Nonce
Randomization
Viet Tung Hoang, Stefano
Tessaro, and Aishwarya Thiruvengadam
CCS
2018
- The Curse
of Small Domains: New Attacks on Format-Preserving Encryption
Viet Tung Hoang, Stefano Tessaro, and Ni Trieu
CRYPTO 2018
- Privacy and
Efficiency Tradeoffs for Multiword Top K Search with Linear Additive
Rank Scoring
Daniel Agun, Jinjin Shao, Shiyu Ji, Stefano
Tessaro, and Tao Yang
WWW 2018
- Revisiting AES-GCM-SIV:
Multi-user Security, Faster Key Derivation, and Better
Bounds
Priyanka Bose, Viet Tung Hoang, and Stefano
Tessaro
EUROCRYPT 2018
- Naor-Reingold
Goes Public: The Complexity of Known-key Security
Pratik
Soni and Stefano Tessaro
EUROCRYPT 2018
- Foundations of Homomorphic Secret
Sharing
Elette Boyle, Niv Gilboa, Yuval
Ishai, Huijia Lin, and Stefano Tessaro
ITCS
2018
2017
2016
- Message-recovery
attacks on Feistel-based Format Preserving
Encryption
Mihir Bellare, Viet Tung Hoang and
Stefano Tessaro
CCS 2016
- Simultaneous
Secrecy and Reliability Amplification for a General Channel Model
Russell Impagliazzo, Ragesh Jaiswal, Valentine
Kabanets, Bruce M. Kapron, Valerie King, and Stefano Tessaro
TCC 2016-B
- Key-alternating ciphers
and key-length extension: Exact bounds and multi-user
security
Viet Tung Hoang and Stefano Tessaro
CRYPTO 2016 Invited to
Journal of Cryptology
- TaoStore: Overcoming Asynchronicity in Oblivious
Data Storage
Cetin Sahin, Victor Zakhary, Amr El
Abbadi, Huijia Lin, and Stefano Tessaro
S&P 2016
- On the
Complexity of Scrypt and Proofs of Space in the Parallel Random Oracle
Model
Joel Alwen, Binyi Chen, Chethan Kamath, Vladimir
Kolmogorov, Krzysztof Pietrzak, and Stefano Tessaro
EUROCRYPT 2016
- Hash-Function
based PRFs: AMAC and its Multi-User Security
Mihir
Bellare, Daniel J. Bernstein, and Stefano Tessaro
EUROCRYPT
2016
- Provably
Robust Sponge-Based PRNGs and KDFs
Peter Gazi and
Stefano Tessaro
EUROCRYPT 2016
- Oblivious
Parallel RAM: Improved Efficiency and Generic Constructions
Binyi Chen, Huijia Lin, and Stefano Tessaro
TCC
2016-A
- Contention in
Cryptoland: Obfuscation, Leakage and UCE
Mihir Bellare,
Igors Stepanovs, and Stefano Tessaro
TCC 2016-A
- Two-Round
Man-in-the-Middle Security from LPN
David Cash, Eike
Kiltz, and Stefano Tessaro
TCC 2016-A
2015
- Optimally
Secure Block Ciphers from Ideal Primitives
Stefano
Tessaro
ASIACRYPT 2015
- Generic
Security of NMAC and HMAC with Input Whitening
Peter
Gazi, Krzysztof Pietrzak, and Stefano Tessaro
ASIACRYPT
2015
- The Exact PRF
Security of Truncation: Tight Bounds for Keyed Sponges and Truncated
CBC
Peter Gazi, Krzysztof Pietrzak, and Stefano Tessaro
CRYPTO 2015
- Secret-key Cryptography from
Ideal Primitives: A Systematic Overview
Peter Gaži and
Stefano Tessaro
ITW 2015 - Invited paper
- Obfuscation of
Probabilistic Circuits and Applications
Ran Canetti,
Huijia Lin, Stefano Tessaro, and Vinod Vaikuntanathan
TCC
2015
- Relaxing
Full-Codebook Security: A Refined Analysis of Key-Length Extension
Schemes
Peter Gazi, Jooyoung Lee, Yannick Seurin, John
Steinberger, and Stefano Tessaro
FSE 2015
2014
2013
- On the Relationship between Functional Encryption,
Obfuscation, and Fully Homomorphic Encryption
Joel Alwen, Manuel Barbosa, Pooya Farshim, Rosario
Gennaro, S. Dov Gordon, Stefano Tessaro, and David
A. Wilson
Cryptography and Coding 2013
- Bounds on Inference
Flavio Calmon, Mayank Varia,
Muriel Medard, Mark Christiansen, Ken Duffy, and Stefano Tessaro
Allerton 2013
- Amplification of
Chosen-Ciphertext Security [MIT
News]
Huijia Lin and Stefano Tessaro
EUROCRYPT 2013
- Communication Locality in Secure Multi-Party Computation:
How to Run Sublinear Algorithms in a Distributed
Setting
Elette Boyle, Shafi Goldwasser, and
Stefano Tessaro.
TCC 2013
- An Equational Approach to Secure Multi-Party
Computation
Daniele Micciancio and Stefano
Tessaro.
ITCS 2013
2012
2011
2010 and earlier
Manuscripts