About

Brief Bio:

I received my Ph.D. from the Massachusetts Institute of Technology in 1996, and was a researcher at the IBM T.J.Watson Research Center before joining City College in the Summer of 2012. My research focuses on cryptography and network security and more in general on theoretical computer science. My most recent works address the security of the cloud computing infrastructure, the issues of privacy and anonymity in electronic communication, and proactive security to minimize the effects of system break-ins.

Interests

Google Presence

Projects

Papers

2018
Fine-Grained Secure Computation
Fine-Grained Secure Computation
M Campanelli, R Gennaro
Theory of Cryptography Conference, 66-97
1
2018
2018
Fast multiparty threshold ecdsa with fast trustless setup
Fast multiparty threshold ecdsa with fast trustless setup
R Gennaro, S Goldfeder
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …
7
2018
2018
Lattice-based zk-snarks from square span programs
Lattice-based zk-snarks from square span programs
R Gennaro, M Minelli, A Nitulescu, M Orrù
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …
2
2018
2018
Threshold cryptosystems from threshold fully homomorphic encryption
Threshold cryptosystems from threshold fully homomorphic encryption
D Boneh, R Gennaro, S Goldfeder, A Jain, S Kim, PMR Rasmussen, ...
Annual International Cryptology Conference, 565-596
0
2018
2017
Zero-knowledge contingent payments revisited: Attacks and payments for services
Zero-knowledge contingent payments revisited: Attacks and payments for services
M Campanelli, R Gennaro, S Goldfeder, L Nizzardo
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …
28
2017
2017
Homomorphic secret sharing from paillier encryption
N Fazio, R Gennaro, T Jafarikhah, WE Skeith
International Conference on Provable Security, 381-399
8
2017
2017
Efficient rational proofs for space bounded computations
Efficient rational proofs for space bounded computations
M Campanelli, R Gennaro
International Conference on Decision and Game Theory for Security, 53-73
3
2017
2017
Verifiable Outsourced Computation: A Survey
Verifiable Outsourced Computation: A Survey
R Gennaro
Proceedings of the ACM Symposium on Principles of Distributed Computing, 313-313
0
2017
2017
2017
Escrow protocols for cryptocurrencies: How to buy physical goods using bitcoin
Escrow protocols for cryptocurrencies: How to buy physical goods using bitcoin
S Goldfeder, J Bonneau, R Gennaro, A Narayanan
International Conference on Financial Cryptography and Data Security, 321-339
18
2017
2017
2016
Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security
Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security
R Gennaro, S Goldfeder, A Narayanan
International Conference on Applied Cryptography and Network Security, 156-174
64
2016
2015
Sequentially composable rational proofs
Sequentially composable rational proofs
M Campanelli, R Gennaro
International Conference on Decision and Game Theory for Security, 270-288
11
2015
2015
Highly scalable verifiable encrypted search
Highly scalable verifiable encrypted search
WA Drazen, E Ekwedike, R Gennaro
2015 IEEE Conference on communications and network security (CNS), 497-505
5
2015
2015
2015
Securing Bitcoin wallets via a new DSA/ECDSA threshold signature scheme
Securing Bitcoin wallets via a new DSA/ECDSA threshold signature scheme
S Goldfeder, R Gennaro, H Kalodner, J Bonneau, JA Kroll, EW Felten, ...
et al.
27
2015
2014
Efficiently verifiable computation on encrypted data
Efficiently verifiable computation on encrypted data
D Fiore, R Gennaro, V Pastro
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …
121
2014
2014
2014
Combating Insider Attacks in IEEE 802.11 Wireless Networks with Broadcast Encryption
Combating Insider Attacks in IEEE 802.11 Wireless Networks with Broadcast Encryption
J Soryal, IM Perera, I Darwish, N Fazio, R Gennaro, T Saadawi
2014 IEEE 28th International Conference on Advanced Information Networking …
1
2014
2014
Generalizing homomorphic MACs for arithmetic circuits
Generalizing homomorphic MACs for arithmetic circuits
D Catalano, D Fiore, R Gennaro, L Nizzardo
International Workshop on Public Key Cryptography, 538-555
39
2014
Read more

Google Trends (past one year)

35.5
Learn about Google Trends

Academic Achievement

Twitter Influence

0/100
Learn about weight

Recent Twitter Hashtags

Recent Tweets

Popular People

Naval Ravikant
Naval Ravikant Entrepreneur | Investor @ AngelList | Bitwise Asset Management
Craig Steven Wright
Craig Steven Wright Programmer | Entrepreneur @ nChain | DeMorgan
Benedikt Bünz
Benedikt Bünz Scholar @ Stanford University | Applied Crypto Group
Meltem Demirors
Meltem Demirors Investor | Entrepreneur @ CoinShares | Shiny Pony Ventures | Digital Currency Group
Browse all people