Practical provably secure flooding for blockchains CD Liu-Zhang, C Matt, U Maurer, G Rito, SE Thomsen International Conference on the Theory and Application of Cryptology and …, 2022 | 8 | 2022 |
Revisiting (R) CCA security and replay protection C Badertscher, U Maurer, C Portmann, G Rito IACR International Conference on Public-Key Cryptography, 173-202, 2021 | 7 | 2021 |
Giving an adversary guarantees (or: How to model designated verifier signatures in a composable framework) U Maurer, C Portmann, G Rito Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021 | 7 | 2021 |
Deniable authentication when signing keys leak S Chakraborty, D Hofheinz, U Maurer, G Rito Annual International Conference on the Theory and Applications of …, 2023 | 5 | 2023 |
Multi-designated receiver signed public key encryption U Maurer, C Portmann, G Rito Annual International Conference on the Theory and Applications of …, 2022 | 5 | 2022 |
Scheduling computations with provably low synchronization overheads G Rito, H Paulino Journal of Scheduling, 1-18, 2022 | 5 | 2022 |
Anamorphic Encryption, Revisited F Banfi, K Gegier, M Hirt, U Maurer, G Rito Annual International Conference on the Theory and Applications of …, 2024 | | 2024 |
On Deniable Authentication G Rito ETH Zurich, 2023 | | 2023 |
Efficient Synchronization-Light Work Stealing R Custódio, H Paulino, G Rito Proceedings of the 35th ACM Symposium on Parallelism in Algorithms and …, 2023 | | 2023 |
On the analysis of scheduling algorithms for structured parallel computations G Rito, H Paulino arXiv preprint arXiv:1810.10632, 2018 | | 2018 |
Scheduling computations G Rito NOVA University of Lisbon, 2016 | | 2016 |