Daniele Venturi
Orcid: 0000-0003-2379-8564Affiliations:
- Sapienza University of Rome, Italy
- University of Trento, Italy (former)
According to our database1,
Daniele Venturi
authored at least 89 papers
between 2009 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
On csauthors.net:
Bibliography
2025
J. Cryptol., March, 2025
2024
Multi-key and Multi-input Predicate Encryption (for Conjunctions) from Learning with Errors.
J. Cryptol., September, 2024
Improved Reductions from Noisy to Bounded and Probing Leakages via Hockey-Stick Divergences.
IACR Cryptol. ePrint Arch., 2024
CoRR, 2024
Proceedings of the Forty-first International Conference on Machine Learning, 2024
Proceedings of the Applied Cryptography and Network Security, 2024
2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Enterprise Design, Operations, and Computing, 2023
2022
IACR Trans. Symmetric Cryptol., 2022
The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free.
IEEE Trans. Inf. Theory, 2022
From Privacy-Only to Simulatable OT: Black-Box, Round-Optimal, Information-theoretic.
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
2021
Theor. Comput. Sci., 2021
Theor. Comput. Sci., 2021
Theor. Comput. Sci., 2021
IACR Cryptol. ePrint Arch., 2021
Continuously Non-Malleable Secret Sharing: Joint Tampering, Plain Model and Capacity.
IACR Cryptol. ePrint Arch., 2021
Proceedings of the Financial Cryptography and Data Security, 2021
2020
Theor. Comput. Sci., 2020
IACR Cryptol. ePrint Arch., 2020
Non-Malleable Secret Sharing against Bounded Joint-Tampering Attacks in the Plain Model.
IACR Cryptol. ePrint Arch., 2020
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020
2019
Non-Malleable Secret Sharing in the Computational Setting: Adaptive Tampering, Noisy-Leakage Resilience, and Improved Rate.
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
A Black-Box Construction of Fully-Simulatable, Round-Optimal Oblivious Transfer from Strongly Uniform Key Agreement.
Proceedings of the Theory of Cryptography - 17th International Conference, 2019
Affordable Security or Big Guy vs Small Guy - Does the Depth of Your Pockets Impact Your Protocols?
Proceedings of the Security Protocols XXVII, 2019
Proceedings of the 6th International Conference on Software Defined Systems, 2019
Proceedings of the Applied Cryptography and Network Security, 2019
2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Security Protocols XXVI, 2018
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
Proceedings of the Provable Security, 2018
2017
Fully leakage-resilient signatures revisited: Graceful degradation, noisy leakage, and construction in the bounded-retrieval model.
Theor. Comput. Sci., 2017
Theor. Comput. Sci., 2017
Proceedings of the International Conference on Underwater Networks & Systems, 2017
The Seconomics (Security-Economics) Vulnerabilities of Decentralized Autonomous Organizations.
Proceedings of the Security Protocols XXV, 2017
2016
IEEE Trans. Inf. Theory, 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015
Proceedings of the Progress in Cryptology - INDOCRYPT 2015, 2015
Proceedings of the 1st International Conference on Cloud Forward: From Distributed to Complete Computing, 2015
Proceedings of the 3rd International Workshop on Security in Cloud Computing, 2015
2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
A Multi-Party Protocol for Privacy-Preserving Cooperative Linear Systems of Equations.
Proceedings of the Cryptography and Information Security in the Balkans, 2014
2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
2012
IACR Cryptol. ePrint Arch., 2012
2011
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
2009
Electron. Colloquium Comput. Complex., 2009
Inadequacy of the Queue-Based Max-Weight Optimal Scheduler on Wireless Links with TCP Sources.
Proceedings of IEEE International Conference on Communications, 2009