Method and apparatus for the secure distributed storage and retrieval of information JA Garay, R Gennaro, CS Jutla, TD Rabin US Patent 5,991,414, 1999 | 1495 | 1999 |
Method and apparatus for the secure distributed storage and retrieval of information JA Garay, R Gennaro, CS Jutla, TD Rabin US Patent 6,192,472, 2001 | 1486 | 2001 |
Non-interactive verifiable computing: Outsourcing computation to untrusted workers R Gennaro, C Gentry, B Parno Advances in Cryptology–CRYPTO 2010: 30th Annual Cryptology Conference, Santa …, 2010 | 1461 | 2010 |
A secure and optimally efficient multi‐authority election scheme R Cramer, R Gennaro, B Schoenmakers European transactions on Telecommunications 8 (5), 481-490, 1997 | 1383 | 1997 |
Quadratic span programs and succinct NIZKs without PCPs R Gennaro, C Gentry, B Parno, M Raykova Advances in Cryptology–EUROCRYPT 2013: 32nd Annual International Conference …, 2013 | 1015 | 2013 |
Secure distributed key generation for discrete-log based cryptosystems R Gennaro, S Jarecki, H Krawczyk, T Rabin Advances in Cryptology—EUROCRYPT’99: International Conference on the Theory …, 1999 | 768 | 1999 |
Robust threshold DSS signatures R Gennaro, S Jarecki, H Krawczyk, T Rabin Advances in Cryptology—EUROCRYPT’96: International Conference on the Theory …, 1996 | 741 | 1996 |
Simplified VSS and fast-track multiparty computations with applications to threshold cryptography R Gennaro, MO Rabin, T Rabin Proceedings of the seventeenth annual ACM symposium on Principles of …, 1998 | 694 | 1998 |
How to sign digital streams R Gennaro, P Rohatgi Annual International Cryptology Conference, 180-197, 1997 | 561 | 1997 |
Secure distributed key generation for discrete-log based cryptosystems R Gennaro, S Jarecki, H Krawczyk, T Rabin Journal of Cryptology 20, 51-83, 2007 | 521 | 2007 |
Secure hash-and-sign signatures without the random oracle R Gennaro, S Halevi, T Rabin Advances in Cryptology—EUROCRYPT’99: International Conference on the Theory …, 1999 | 462 | 1999 |
Verifiable delegation of computation over large datasets S Benabbas, R Gennaro, Y Vahlis Annual Cryptology Conference, 111-131, 2011 | 458 | 2011 |
A framework for password-based authenticated key exchange R Gennaro, Y Lindell International Conference on the Theory and Applications of Cryptographic …, 2003 | 436 | 2003 |
Robust and efficient sharing of RSA functions R Gennaro, S Jarecki, H Krawczyk, T Rabin Advances in Cryptology—CRYPTO’96: 16th Annual International Cryptology …, 1996 | 374* | 1996 |
Two-phase cryptographic key recovery system R Gennaro, DB Johnson, PA Karger, SM Matyas Jr, M Peyravian, ... US Patent 5,937,066, 1999 | 342 | 1999 |
Securing threshold cryptosystems against chosen ciphertext attack V Shoup, R Gennaro International conference on the theory and applications of cryptographic …, 1998 | 341 | 1998 |
Publicly verifiable delegation of large polynomials and matrix computations, with applications D Fiore, R Gennaro Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 304 | 2012 |
Biometric authentication system with encrypted models R Gennaro, S Halevi, S Maes, T Rabin, J Sorensen US Patent 6,317,834, 2001 | 301 | 2001 |
MARS-a candidate cipher for AES C Burwick, D Coppersmith, E D’Avignon, R Gennaro, S Halevi, C Jutla, ... NIST AES Proposal 268, 80, 1998 | 300 | 1998 |
Threshold-optimal DSA/ECDSA signatures and an application to bitcoin wallet security R Gennaro, S Goldfeder, A Narayanan Applied Cryptography and Network Security: 14th International Conference …, 2016 | 291 | 2016 |