Bernardo Magri

Dr

Accepting PhD Students

Search results

  • 2023

    Certified Private Inference on Neural Networks via Lipschitz-Guided Abstraction Refinement⋆

    Manino, E., Magri, B., Mustafa, M. A. & Cordeiro, L. C., 6 Jun 2023, (Accepted/In press) 6th Workshop on Formal Methods for ML-Enabled Autonomous Systems (FoMLAS 2023), July 17 - 18, 2023, Paris, France.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    File
    11 Downloads (Pure)
  • McFly: Verifiable Encryption to the Future Made Practical

    Döttling, N., Hanzlik, L., Magri, B. & Wohnig, S., 1 Dec 2023, Financial Cryptography and Data Security - 27th International Conference, FC 2023, Revised Selected Papers. Baldimtsi, F. & Cachin, C. (eds.). Springer Nature, p. 252-269 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13950).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2022

    Everlasting UC Commitments from Fully Malicious PUFs

    Magri, B., Malavolta, G., Schröder, D. & Unruh, D., 1 Jul 2022, In: Journal of Cryptology. 35, 3, 39 p., 20.

    Research output: Contribution to journalArticlepeer-review

    Open Access
  • GearBox: Optimal-size Shard Committees by Leveraging the Safety-Liveness Dichotomy

    David, B., Magri, B., Matt, C., Nielsen, J. B. & Tschudi, D., 7 Nov 2022, CCS 2022 - Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 683-696 14 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • Universally Composable Subversion-Resilient Cryptography

    Chakraborty, S., Magri, B., Nielsen, J. B. & Venturi, D., 25 May 2022, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Dunkelman, O. & Dziembowski, S. (eds.). Springer Nature, p. 272-302 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13275 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2021

    Broadcast-Optimal Two Round MPC with an Honest Majority

    Damgård, I., Magri, B., Ravi, D., Siniscalchi, L. & Yakoubov, S., 11 Aug 2021, Advances in Cryptology - CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16-20, 2021, Proceedings, Part II. Malkin, T. & Peikert, C. (eds.). Springer Berlin, Vol. 12826. p. 155-184 30 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • Cryptographic reverse firewalls for interactive proof systems

    Ganesh, C., Magri, B. & Venturi, D., 6 Feb 2021, In: Theoretical Computer Science. 855, p. 104-132 29 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    File
    117 Downloads (Pure)
  • Immunization against complete subversion without random oracles

    Ateniese, G., Francati, D., Magri, B. & Venturi, D., 6 Mar 2021, In: Theoretical Computer Science. 859, p. 1-36 36 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    File
    112 Downloads (Pure)
  • Random-Index PIR and Applications

    Gentry, C., Halevi, S., Magri, B., Nielsen, J. B. & Yakoubov, S., 4 Nov 2021, Theory of Cryptography - 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part III. Nissim, K. & Waters, B. (eds.). Springer Berlin, Vol. 13044. p. 32-61 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13044 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    Open Access
  • Refresh When You Wake Up: Proactive Threshold Wallets with Offline Devices

    Kondi, Y., Magri, B., Orlandi, C. & Shlomovits, O., 1 May 2021, 42nd IEEE Symposium on Security and Privacy, SP 2021, San Francisco, CA, USA, 24-27 May 2021. IEEE Conference Publications, p. 608-625 18 p. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2021-May).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    Open Access
  • Reparo: Publicly Verifiable Layer to Repair Blockchains

    Thyagarajan, S. A. K., Bhat, A., Magri, B., Tschudi, D. & Kate, A., 23 Oct 2021, Financial Cryptography and Data Security - 25th International Conference, FC 2021, Virtual Event, March 1-5, 2021, Revised Selected Papers, Part II. Borisov, N. & Diaz, C. (eds.). Springer Berlin, Vol. 12675. p. 37-56 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12675 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • Weight-Based Nakamoto-Style Blockchains

    Kamp, S. H., Magri, B., Matt, C., Nielsen, J. B., Thomsen, S. E. & Tschudi, D., 2021, Progress in Cryptology – LATINCRYPT 2021 - 7th International Conference on Cryptology and Information Security in Latin America, Proceedings. Longa, P. & Ràfols, C. (eds.). Springer Berlin, Vol. 12912. p. 299-319 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12912 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • YOSO: You Only Speak Once - Secure MPC with Stateless Ephemeral Roles

    Gentry, C., Halevi, S., Krawczyk, H., Magri, B., Nielsen, J. B., Rabin, T. & Yakoubov, S., 11 Aug 2021, Advances in Cryptology - CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16-20, 2021, Proceedings, Part II. Malkin, T. & Peikert, C. (eds.). Springer Berlin, Vol. 12826. p. 64-93 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12826 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • 2020

    Afgjort: A Partially Synchronous Finality Layer for Blockchains

    Dinsdale-Young, T., Magri, B., Matt, C., Nielsen, J. B. & Tschudi, D., 2020, Security and Cryptography for Networks - 12th International Conference, SCN 2020, Amalfi, Italy, September 14-16, 2020, Proceedings. Galdi, C. & Kolesnikov, V. (eds.). Springer Berlin, Vol. 12238. p. 24-44 21 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Cryptographic reverse firewalls for interactive proof systems

    Ganesh, C., Magri, B. & Venturi, D., 29 Jun 2020, 47th International Colloquium on Automata, Languages, and Programming, ICALP 2020. Czumaj, A., Dawar, A. & Merelli, E. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, p. 1-16 16 p. 55. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 168).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • Minting Mechanism for Proof of Stake Blockchains

    Deuber, D., Döttling, N., Magri, B., Malavolta, G. & Thyagarajan, S. A. K., 2020, Applied Cryptography and Network Security - 18th International Conference, ACNS 2020, Proceedings. Conti, M., Zhou, J., Casalicchio, E. & Spognardi, A. (eds.). Springer Berlin, Vol. 12146. p. 315-334 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12146 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Subversion-resilient signatures: Definitions, constructions and applications

    Ateniese, G., Magri, B. & Venturi, D., 8 Jun 2020, In: Theoretical Computer Science. 820, p. 91-122 32 p.

    Research output: Contribution to journalArticlepeer-review

  • 2019

    Public immunization against complete subversion without random oracles

    Ateniese, G., Francati, D., Magri, B. & Venturi, D., 2019, Applied Cryptography and Network Security - 17th International Conference, ACNS 2019, Proceedings. Gauthier-Umaña, V., Deng, R. H., Yung, M. & Ochoa, M. (eds.). Springer-Verlag Italia, p. 465-485 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11464 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Redactable blockchain in the permissionless setting

    Deuber, D., Magri, B. & Thyagarajan, S. A. K., 16 Sept 2019, Proceedings - 2019 IEEE Symposium on Security and Privacy, SP 2019. IEEE, p. 124-138 15 p. 8835372. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2019-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    File
    185 Downloads (Pure)
  • 2018

    A family of FDH signature schemes based on the quadratic residuosity assumption

    Ateniese, G., Fech, K. & Magri, B., 2018, Progress in Cryptology – INDOCRYPT 2018 - 19th International Conference on Cryptology in India, Proceedings. Chakraborty, D. & Iwata, T. (eds.). Springer-Verlag Italia, p. 248-262 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11356 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Secure outsourcing of cryptographic circuits manufacturing

    Ateniese, G., Kiayias, A., Magri, B., Tselekounis, Y. & Venturi, D., 2018, Provable Security - 12th International Conference, ProvSec 2018, Proceedings. Baek, J., Susilo, W. & Kim, J. (eds.). Springer-Verlag Italia, p. 75-93 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11192 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2017

    Redactable Blockchain - Or - Rewriting History in Bitcoin and Friends

    Ateniese, G., Magri, B., Venturi, D. & Andrade, E. R., 28 Jun 2017, Proceedings - 2nd IEEE European Symposium on Security and Privacy, EuroS and P 2017. IEEE, p. 111-126 16 p. 7961975. (Proceedings - 2nd IEEE European Symposium on Security and Privacy, EuroS and P 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2015

    Subversion-resilient signature schemes

    Ateniese, G., Magri, B. & Venturi, D., 12 Oct 2015, CCS 2015 - Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 364-375 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 2015-October).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2014

    Certified bitcoins

    Ateniese, G., Faonio, A., Magri, B. & De Medeiros, B., 2014, Applied Cryptography and Network Security - 12th International Conference, ACNS 2014, Proceedings. Springer-Verlag Italia, p. 80-96 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8479 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review