About

Brief Bio:

I received my Ph.D. from the Massachusetts Institute of Technology in 1996, and was a researcher at the IBM T.J.Watson Research Center before joining City College in the Summer of 2012. My research focuses on cryptography and network security and more in general on theoretical computer science. My most recent works address the security of the cloud computing infrastructure, the issues of privacy and anonymity in electronic communication, and proactive security to minimize the effects of system break-ins.

Interests

Google Presence

Introducing Orbs' New Advisors, from Cryptography to Game Theory ...
Introducing Orbs' New Advisors, from Cryptography to Game Theory ...
Il y a 4 jours - ... advisors to guide our company into the next era of blockchain. ... Rosario Gennaro, Ph.D. is a Professor of Computer Science and the ..."
CESC2017 - Rosario Gennaro - Zero-Knowledge Contingent ...
CESC2017 - Rosario Gennaro - Zero-Knowledge Contingent ...
CESC2017 - Rosario Gennaro - Zero-Knowledge Contingent Payments. Blockchain at Berkeley. Loading ..."
dblp: Rosario Gennaro
dblp: Rosario Gennaro
15 août 2018 - List of computer science publications by Rosario Gennaro. ... DSA/ECDSA signatures and an application to Bitcoin wallet security."
Rosario Gennaro (@rgennaro67) | Twitter
Rosario Gennaro (@rgennaro67) | Twitter
The latest Tweets from Rosario Gennaro (@rgennaro67). Professor of computer science at the City College of New York. Cryptographer. NYC."
Bitcoin, Cryptocurrencies, and Blockchains &mdash Arvind Narayanan
Bitcoin, Cryptocurrencies, and Blockchains &mdash Arvind Narayanan
Escrow protocols for cryptocurrencies: How to buy physical goods using Bitcoin Steven Goldfeder, Joseph Bonneau, Rosario Gennaro, Arvind Narayanan."
Steven Goldfeder
Steven Goldfeder
Dan Boneh, Rosario Gennaro, Steven Goldfeder, Aayush Jain, Sam Kim, Peter ... When the cookie meets the blockchain: Privacy risks of web payments via ..."
The Blockchain Technology
The Blockchain Technology
Schedule. Sunday 3/3: Mooly Sagiv An overview of the Blockchain technology ... Matteo Campanelli, Rosario Gennaro, Steven Goldfeder, Luca Nizzardo."
Escrow protocols for cryptocurrencies: How to buy ... - Joseph Bonneau
Escrow protocols for cryptocurrencies: How to buy ... - Joseph Bonneau
[email protected] Abstract. ... compatible with Bitcoin and similar blockchain-based cryptocurrencies. ...... Rosario Gennaro is supported by NSF Grant."
(PDF) Multi-Agent Systems and Blockchain Technology to enable ...
(PDF) Multi-Agent Systems and Blockchain Technology to enable ...
11 sept. 2018 - PDF | Blockchain Technology at the service of Multi-Agent Systems to enable coordination and ... [4] Shoup, Victor, and Rosario Gennaro."
ROSARIO GENNARO Professional Interests Education Work Experience
ROSARIO GENNARO Professional Interests Education Work Experience
ROSARIO GENNARO .... E. Bresson, D. Catalano, M. Di Raimondo, D. Fiore and R. Gennaro. Off-line/on .... natures and an Application to Bitcoin Wallet Security."

Projects

Papers

2018
Fine-Grained Secure Computation
Fine-Grained Secure Computation
M Campanelli, R Gennaro
Theory of Cryptography Conference, 66-97
1
2018
2018
Fast Multiparty Threshold ECDSA with Fast Trustless Setup
Fast Multiparty Threshold ECDSA with Fast Trustless Setup
R Gennaro, S Goldfeder
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …
1
2018
2018
Threshold cryptosystems from threshold fully homomorphic encryption
Threshold cryptosystems from threshold fully homomorphic encryption
D Boneh, R Gennaro, S Goldfeder, A Jain, S Kim, PMR Rasmussen, ...
Annual International Cryptology Conference, 565-596
7
2018
2018
Lattice-Based zk-SNARKs from Square Span Programs
Lattice-Based zk-SNARKs from Square Span Programs
R Gennaro, M Minelli, A Nitulescu, M Orrù
1
2018
2017
Zero-knowledge contingent payments revisited: Attacks and payments for services
Zero-knowledge contingent payments revisited: Attacks and payments for services
M Campanelli, R Gennaro, S Goldfeder, L Nizzardo
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …
19
2017
2017
Homomorphic secret sharing from paillier encryption
N Fazio, R Gennaro, T Jafarikhah, WE Skeith
International Conference on Provable Security, 381-399
7
2017
2017
Efficient Rational Proofs for Space Bounded Computations
Efficient Rational Proofs for Space Bounded Computations
M Campanelli, R Gennaro
International Conference on Decision and Game Theory for Security, 53-73
3
2017
2017
Verifiable Outsourced Computation: A Survey
Verifiable Outsourced Computation: A Survey
R Gennaro
Proceedings of the ACM Symposium on Principles of Distributed Computing, 313-313
0
2017
2017
2017
A certificateless approach to onion routing
A certificateless approach to onion routing
D Catalano, D Fiore, R Gennaro
International Journal of Information Security 16 (3), 327-343
1
2017
2017
Escrow protocols for cryptocurrencies: How to buy physical goods using Bitcoin
Escrow protocols for cryptocurrencies: How to buy physical goods using Bitcoin
S Goldfeder, J Bonneau, R Gennaro, A Narayanan
International Conference on Financial Cryptography and Data Security, 321-339
12
2017
2017
2017
A Lattice-Based Universal Thresholdizer for Cryptographic Systems.
A Lattice-Based Universal Thresholdizer for Cryptographic Systems.
D Boneh, R Gennaro, S Goldfeder, S Kim
IACR Cryptology ePrint Archive 2017, 251
5
2017
2016
Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security
Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security
R Gennaro, S Goldfeder, A Narayanan
International Conference on Applied Cryptography and Network Security, 156-174
49
2016
2016
of host publication: Revised Selected Papers of the 23rd International Conference on Fast Software Encryption (FSE 2016)
of host publication: Revised Selected Papers of the 23rd International Conference on Fast Software Encryption (FSE 2016)
S Banik, HA Alkhzaimi, LR Knudsen, S Banik, T Isobe, S Kölbl, ...
Cryptography and Communications 9665 (1), 322-342
0
2016
2015
Sequentially composable rational proofs
Sequentially composable rational proofs
M Campanelli, R Gennaro
International Conference on Decision and Game Theory for Security, 270-288
12
2015
2015
Highly scalable verifiable encrypted search
Highly scalable verifiable encrypted search
WA Drazen, E Ekwedike, R Gennaro
Communications and Network Security (CNS), 2015 IEEE Conference on, 497-505
2
2015
2015
2015
Securing Bitcoin wallets via a new DSA/ECDSA threshold signature scheme
Securing Bitcoin wallets via a new DSA/ECDSA threshold signature scheme
S Goldfeder, R Gennaro, H Kalodner, J Bonneau, JA Kroll, EW Felten, ...
Accessed 2015-06-09
36
2015
2014
Efficiently verifiable computation on encrypted data
Efficiently verifiable computation on encrypted data
D Fiore, R Gennaro, V Pastro
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …
100
2014
Read more

Google Trends (past one year)

26.3
Learn about Google Trends

Academic Achievement

Twitter Influence

0/100
Learn about weight

Recent Twitter Hashtags

Recent Tweets

Popular People

Alexander Zaidelson
Alexander Zaidelson Entrepreneur @ BEAM
Rosario Gennaro
Rosario Gennaro Scholar @ CUNY | Center For Algorithms And Interactive Scientific Software (CAISS) | MIT | City College Of New York | IBM T.J.Watson Research Center
Oded Goldreich
Oded Goldreich Scholar @ The Weizmann Institute Of Science
Aviv Zohar
Aviv Zohar Scholar @ Hebrew University
Browse all people