Publications
Below is a "wordle" generated using the key words in the titles of my papers (December 2016). See also my page on DBLP and Google Scholar for a list of publications and for bibtex data.

Manuscripts

  • Cryptographic Reverse Firewalls for Interactive Proof Systems
    Chaya Ganesh, Bernardo Magri, Daniele Venturi [pdf]
  • Secure and Fair Computations on Forking Blockchains
    Vincenzo Botta, Daniele Friolo, Daniele Venturi, Ivan Visconti [pdf]

Conference Papers

2019

  • A Black-Box Construction of Fully-Simulatable, Round-Optimal Oblivious Transfer from Strongly Uniform Key Agreement
    Daniele Friolo, Daniel Masny, Daniele Venturi [pdf]
    TCC 2019
  • Continuously Non-Malleable Secret Sharing for General Access Structures
    Gianluca Brian, Antonio Faonio, Daniele Venturi [pdf]
    TCC 2019
  • Non-Malleable Secret Sharing in the Computational Setting: Adaptive Tampering, Noisy-Leakage Resilience, and Improved Rate
    Antonio Faonio, Daniele Venturi [pdf]
    CRYPTO 2019
  • Match Me if You Can: Matchmaking Encryption and its Applications
    Giuseppe Ateniese, Danilo Francati, David Nunez, Daniele Venturi [pdf]
    CRYPTO 2019
  • Rate-Optimizing Compilers for Continuously Non-Malleable Codes
    Sandro Coretti, Antonio Faonio, Daniele Venturi [pdf]
    ACNS 2019
  • Public Immunization against Complete Subversion without Random Oracles
    Giuseppe Ateniese, Danilo Francati, Bernardo Magri, Daniele Venturi [pdf]
    ACNS 2019
  • Affordable Security or Big Guy vs Small Guy: Does the depth of your pockets impact your protocols?
    Daniele Friolo, Fabio Massacci, Chan Nam Ngo, Daniele Venturi [pdf]
    SPW 2019

2018

  • Secure Outsourcing of Circuit Manufacturing
    Giuseppe Ateniese, Aggelos Kiayias, Bernardo Magri, Yiannis Tselekounis, Daniele Venturi [pdf]
    ProvSec 2018
  • Continuously Non-Malleable Codes in the Split-State Model from Minimal Assumptions
    Rafail Ostrovsky, Giuseppe Persiano, Daniele Venturi, Ivan Visconti [pdf]
    CRYPTO 2018
  • Continuously Non-Malleable Codes with Split-State Refresh
    Antonio Faonio, Jesper Buus Nielsen, Mark Simkin, Daniele Venturi [pdf]
    ACNS 2018
  • Non-Monotonic Security Protocols and Failures in Financial Intermediation
    Fabio Massacci, Chan Nam Ngo, Daniele Venturi, Julian Williams [pdf]
    SPW 2018
  • FuturesMEX: Secure Distributed Futures Market Exchange
    Fabio Massacci, Cham Nam Ngo, Jing Nie, Daniele Venturi, Julian Williams [pdf]
    IEEE S&P 2018

2017

  • Non-Malleable Codes for Space Bounded Tampering
    Sebastian Faust, Kristina Hostáková, Pratyay Mukherjee, Daniele Venturi [pdf]
    CRYPTO 2017
  • The Seconomics (Security-Economics) Vulnerabilities of Decentralized Autonomous Organizations
    Fabio Massacci, Chan Nam Ngo, Jing Nie, Daniele Venturi, Julian Williams [pdf]
    SPW 2017
  • Redactable Blockchain -- or -- Rewriting History in Bitcoin and Friends
    Giuseppe Ateniese, Bernardo Magri, Daniele Venturi, Ewerton Andrade [pdf] [press]
    IEEE Euro S&P 2017
  • Predictable Arguments of Knowledge
    Antonio Faonio, Jesper Buus Nielsen, Daniele Venturi) [pdf]
    PKC 2017

2016

  • Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience
    Antonio Faonio, Daniele Venturi [pdf]
    ASIACRYPT 2016
  • Naor-Yung Paradigm with Shared Randomness and Applications
    Silvio Biagioni, Daniel Masny, Daniele Venturi [pdf]
    SCN 2016
  • Fiat-Shamir for Highly Sound Protocols is Instantiable
    Arno Mittelbach, Daniele Venturi [pdf]
    SCN 2016
  • Chosen-Ciphertext Security from Subset Sum
    Sebastian Faust, Daniel Masny, Daniele Venturi [pdf]
    PKC 2016
  • Non-Malleable Encryption: Simpler, Shorter, Stronger
    Sandro Coretti, Yevgeniy Dodis, Björn Tackmann, Daniele Venturi [pdf]
    TCC 2016-A

2015

  • (De-)Constructing TLS 1.3
    Markulf Kohlweiss, Ueli Maurer, Cristina Onete, Björn Tackmann, Daniele Venturi [pdf]
    INDOCRYPT 2015
  • Subversion-Resilient Signature Schemes
    Giuseppe Ateniese, Bernardo Magri, Daniele Venturi [pdf]
    ACM CCS 2015
  • Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation
    Antonio Faonio, Jesper Buus Nielsen, Daniele Venturi [pdf]
    ICALP 2015
  • The Chaining Lemma and its Application
    Ivan Damgård, Sebastian Faust, Pratyay Mukherjee, Daniele Venturi [pdf]
    ICITS 2015
  • Entangled Encodings and Data Entanglement
    Giuseppe Ateniese, Özgür Dagdelen, Ivan Damgård, Daniele Venturi [full version]
    SCC@AsiaCCS 2015
  • From Single-Bit to Multi-Bit Public-Key Encryption via Non-Malleable Codes
    Sandro Coretti, Ueli Maurer, Björn Tackmann, Daniele Venturi [pdf]
    TCC 2015
  • A Tamper and Leakage Resilient von Neumann Architecture
    Sebastian Faust, Pratyay Mukherjee, Jesper Buus Nielsen, Daniele Venturi [pdf]
    PKC 2015

2014

  • A Multi-Party Protocol for Privacy-Preserving Cooperative Linear Systems of Equations
    Özgür Dagdelen, Daniele Venturi [pdf]
    BalkanCryptSec 2014
  • A Second Look at Fischlin's Transformation
    Özgür Dagdelen, Daniele Venturi [pdf] [slides]
    AFRICACRYPT 2014
  • Efficient Non-Malleable Codes and Key-Derivation for Poly-Size Tampering Circuits
    Sebastian Faust, Pratyay Mukherjee, Daniele Venturi, Daniel Wichs [pdf] [slides]
    EUROCRYPT 2014
  • Leakage-Resilient Signatures with Graceful Degradation
    Jesper Buus Nielsen, Daniele Venturi, Angela Zottarel [pdf] [slides]
    PKC 2014
  • Continuous Non-malleable Codes
    Sebastian Faust, Pratyay Mukherjee, Jesper Buus Nielsen, Daniele Venturi [pdf] [slides]
    TCC 2014

2013

  • Bounded Tamper Resilience: How to go beyond the Algebraic Barrier
    Ivan Damgård, Sebastian Faust, Pratyay Mukherjee, Daniele Venturi [pdf] [slides]
    ASIACRYPT 2013
  • Outsourced Pattern Matching
    Sebastian Faust, Carmit Hazay, Daniele Venturi [pdf] [slides]
    ICALP 2013
  • Anonymity-preserving Public-Key Encryption: A Constructive Approach
    Markulf Kohlweiss, Ueli Maurer, Cristina Onete, Björn Tackmann, Daniele Venturi [pdf] [slides]
    PETS 2013
  • On the Connection between Leakage Tolerance and Adaptive Security
    Jesper Buus Nielsen, Daniele Venturi, Angela Zottarel [pdf] [slides]
    PKC 2013
  • Rate-Limited Secure Function Evaluation: Definitions and Constructions
    Özgür Dagdelen, Payman Mohassel, Daniele Venturi [pdf] [slides]
    PKC 2013

2012

  • On the Non-malleability of the Fiat-Shamir Transform
    Sebastian Faust, Markulf Kohlweiss, Giorgia Azzurra Marson, Daniele Venturi [pdf] [slides]
    INDOCRYPT 2012

2011

  • Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience
    Sebastian Faust, Krzysztof Pietrzak, Daniele Venturi [pdf] [slides]
    ICALP 2011
  • Efficient Authentication from Hard Learning Problems
    Eike Kiltz, Krzysztof Pietrzak, David Cash, Abhishek Jain, Daniele Venturi [pdf]
    EUROCRYPT 2011 Best Paper Award

2010

  • Leakage Resilient Storage
    Francesco Davì, Stefan Dziembowski, Daniele Venturi [pdf]
    SCN 2010

2009

  • Inadequacy of the Queue-Based Max-Weight Optimal Scheduler on Wireless Links with TCP Sources
    Alfredo Todini, Andrea Baiocchi, Daniele Venturi [pdf]
    IEEE ICC 2009

Journal Papers

  • Continuously Non-Malleable Codes with Split-State Refresh. Antonio Faonio, Jesper Buus Nielsen, Mark Simkin, Daniele Venturi. Theoretical Computer Science Journal. Full version of the ACNS 2018 paper. DOI: 10.1016/j.tcs.2018.05.001.
  • Fiat-Shamir for Highly Sound Protocols is Instantiable. Arno Mittelbach, Daniele Venturi. Theoretical Computer Science Journal. Full version of the SCN 2016 paper. DOI: 10.1016/j.tcs.2018.05.001.
  • Naor-Yung Paradigm with Shared Randomness and Applications. Silvio Biagioni, Daniel Masny, Daniele Venturi. Theoretical Computer Science Journal. Full version of the SCN 2016 paper. DOI: 10.1016/j.tcs.2017.06.019.
  • Outsourced Pattern Matching. Sebastian Faust, Carmit Hazay, Daniele Venturi. International Journal of Information Security. Full version of the ICALP 2013 paper. DOI: 10.1007/s10207-017-0374-0.
  • Rate-Limited Secure Function Evaluation: Definitions and Constructions. Özgür Dagdelen, Payman Mohassel, Daniele Venturi. Theoretical Computer Science Journal. Full version of the PKC 2013 paper. DOI: 10.1016/j.tcs.2016.09.020.
  • Efficient Non-Malleable Codes and Key-Derivation for Poly-Size Tampering Circuits. Sebastian Faust, Pratyay Mukherjee, Daniele Venturi, Daniel Wichs. IEEE Transactions on Information Theory. Full version of the Eurocrypt 2014 paper. DOI: 10.1109/TIT.2016.2613919.
  • Fully Leakage-Resilient Signatures Revisited: Graceful Degradation, Noisy Leakage, and Construction in the Bounded-Retrieval Model. Antonio Faonio, Jesper Buus Nielsen, Daniele Venturi. Theoretical Computer Science Journal. Full version of the ICALP 2015 paper. DOI: 10.1016/j.tcs.2016.11.016.
  • Efficient Authentication from Hard Learning Problems. Eike Kiltz, Krzysztof Pietrzak, Daniele Venturi, David Cash, Abhishek Jain. Journal of cryptology. Full version of the Eurocrypt 2011 paper. DOI: 10.1007/s00145-016-9247-3.
  • Bounded Tamper Resilience: How to go beyond the Algebraic Barrier. Ivan Damgård, Sebastian Faust, Pratyay Mukherjee, Daniele Venturi. Journal of Cryptology. Full version of the Asiacrypt 2013 paper. DOI: 10.1007/s00145-015-9218-0.
  • Entangled Cloud Storage. Giuseppe Ateniese, Özgür Dagdelen, Ivan Damgård, Daniele Venturi. Future Generation Computer Systems - Special Issue on Cloud Cryptography. Full version of the AsiaCCS 2015 paper. DOI: 10.1016/j.future.2016.01.008.

© 2010 Daniele Venturi
Design: COSIC Webteam | Content: Daniele Venturi
Last modified on 2016/04/21 09:22 Thanks for visiting :-)