The double ratchet: security notions, proofs, and modularization for the signal protocol J Alwen, S Coretti, Y Dodis Advances in Cryptology–EUROCRYPT 2019: 38th Annual International Conference …, 2019 | 132 | 2019 |
Security analysis and improvements for the IETF MLS standard for group messaging J Alwen, S Coretti, Y Dodis, Y Tselekounis Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020 | 80 | 2020 |
From single-bit to multi-bit public-key encryption via non-malleable codes S Coretti, U Maurer, B Tackmann, D Venturi Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015 …, 2015 | 70 | 2015 |
Random oracles and non-uniformity S Coretti, Y Dodis, S Guo, J Steinberger Advances in Cryptology–EUROCRYPT 2018: 37th Annual International Conference …, 2018 | 64 | 2018 |
Non-malleable encryption: simpler, shorter, stronger S Coretti, Y Dodis, B Tackmann, D Venturi Theory of Cryptography: 13th International Conference, TCC 2016-A, Tel Aviv …, 2015 | 51 | 2015 |
Non-uniform bounds in the random-permutation, ideal-cipher, and generic-group models S Coretti, Y Dodis, S Guo Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018 | 47 | 2018 |
Continuous group key agreement with active security J Alwen, S Coretti, D Jost, M Mularczyk Theory of Cryptography: 18th International Conference, TCC 2020, Durham, NC …, 2020 | 40 | 2020 |
Constant-round asynchronous multi-party computation based on one-way functions S Coretti, J Garay, M Hirt, V Zikas Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the …, 2016 | 40 | 2016 |
Constructing confidential channels from authenticated channels—public-key encryption revisited S Coretti, U Maurer, B Tackmann Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on the …, 2013 | 38 | 2013 |
Hydra: Fast isomorphic state channels MMT Chakravarty, S Coretti, M Fitzi, P Gazi, P Kant, A Kiayias, A Russell Cryptology ePrint Archive, 2020 | 34 | 2020 |
Probabilistic termination and composability of cryptographic protocols R Cohen, S Coretti, J Garay, V Zikas Advances in Cryptology–CRYPTO 2016: 36th Annual International Cryptology …, 2016 | 34 | 2016 |
Modular design of secure group messaging protocols and the security of MLS J Alwen, S Coretti, Y Dodis, Y Tselekounis Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 27 | 2021 |
Round-preserving parallel composition of probabilistic-termination cryptographic protocols R Cohen, S Coretti, J Garay, V Zikas Journal of Cryptology 34, 1-57, 2021 | 25 | 2021 |
Key exchange with unilateral authentication: Composable security definition and modular protocol design U Maurer, B Tackmann, S Coretti Cryptology ePrint Archive, 2013 | 22 | 2013 |
Nonlocality is transitive S Coretti, E Hänggi, S Wolf Physical Review Letters 107 (10), 100402, 2011 | 17 | 2011 |
Rate-optimizing compilers for continuously non-malleable codes S Coretti, A Faonio, D Venturi Applied Cryptography and Network Security: 17th International Conference …, 2019 | 13 | 2019 |
Seedless fruit is the sweetest: Random number generation, revisited S Coretti, Y Dodis, H Karthikeyan, S Tessaro Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019 | 12 | 2019 |
Probabilistic termination and composability of cryptographic protocols R Cohen, S Coretti, J Garay, V Zikas Journal of Cryptology 32 (3), 690-741, 2019 | 12 | 2019 |
The Generals’ Scuttlebutt: Byzantine-Resilient Gossip Protocols. S Coretti, A Kiayias, C Moore, A Russell IACR Cryptol. ePrint Arch. 2022, 541, 2022 | 10 | 2022 |
Self-destruct non-malleability S Coretti, Y Dodis, B Tackmann, D Venturi IACR Cryptology ePrint Archive 2014, 866, 2014 | 7 | 2014 |