Stefano Tessaro

3.3k total citations
15 papers, 271 citations indexed

About

Stefano Tessaro is a scholar working on Artificial Intelligence, Computer Networks and Communications and Information Systems. According to data from OpenAlex, Stefano Tessaro has authored 15 papers receiving a total of 271 indexed citations (citations by other indexed papers that have themselves been cited), including 12 papers in Artificial Intelligence, 5 papers in Computer Networks and Communications and 4 papers in Information Systems. Recurrent topics in Stefano Tessaro's work include Cryptography and Data Security (10 papers), Cryptographic Implementations and Security (5 papers) and Chaos-based Image/Signal Encryption (4 papers). Stefano Tessaro is often cited by papers focused on Cryptography and Data Security (10 papers), Cryptographic Implementations and Security (5 papers) and Chaos-based Image/Signal Encryption (4 papers). Stefano Tessaro collaborates with scholars based in United States, Switzerland and France. Stefano Tessaro's co-authors include Christian Cachin, Huijia Lin, Amr El Abbadi, Thomas Holenstein, Viet Tung Hoang, Mihir Bellare, Daniele Micciancio, Muriel Médard, Mayank Varia and Ken R. Duffy and has published in prestigious journals such as Journal of Cryptology, DSpace@MIT (Massachusetts Institute of Technology) and IEEE Data(base) Engineering Bulletin.

In The Last Decade

Stefano Tessaro

15 papers receiving 254 citations

Peers

Stefano Tessaro
Young-Ho Park South Korea
Ioana Boureanu United Kingdom
Antonio Nicolosi United States
David Derler Austria
Greg Zaverucha United Kingdom
Benjamin Mood United States
Bertram Poettering United Kingdom
Young-Ho Park South Korea
Stefano Tessaro
Citations per year, relative to Stefano Tessaro Stefano Tessaro (= 1×) peers Young-Ho Park

Countries citing papers authored by Stefano Tessaro

Since Specialization
Citations

This map shows the geographic impact of Stefano Tessaro's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Stefano Tessaro with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Stefano Tessaro more than expected).

Fields of papers citing papers by Stefano Tessaro

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Stefano Tessaro. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Stefano Tessaro. The network helps show where Stefano Tessaro may publish in the future.

Co-authorship network of co-authors of Stefano Tessaro

This figure shows the co-authorship network connecting the top 25 collaborators of Stefano Tessaro. A scholar is included among the top collaborators of Stefano Tessaro based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Stefano Tessaro. Stefano Tessaro is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

15 of 15 papers shown
1.
Fisch, Ben, et al.. (2022). VeRSA. Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. 2793–2807. 4 indexed citations
2.
Chan, Justin, Dean P. Foster, Eric Horvitz, et al.. (2020). PACT: Privacy Sensitive Protocols and Mechanisms for Mobile Contact Tracing. IEEE Data(base) Engineering Bulletin. 43(2). 15–35. 2 indexed citations
3.
Siddarth, Divya, Peter Eckersley, John Langford, et al.. (2020). Outpacing the Virus: Digital Response to Containing the Spread of COVID-19 while Mitigating Privacy Risks. 16 indexed citations
4.
Hoang, Viet Tung, et al.. (2018). The Multi-user Security of GCM, Revisited. 1429–1440. 6 indexed citations
5.
Boyle, Elette, Niv Gilboa, Yuval Ishai, Huijia Lin, & Stefano Tessaro. (2018). Foundations of Homomorphic Secret Sharing. DROPS (Schloss Dagstuhl – Leibniz Center for Informatics). 94. 21. 5 indexed citations
6.
Ji, Shiyu, et al.. (2018). Privacy and Efficiency Tradeoffs for Multiword TopKSearch with Linear Additive Rank Scoring. 1725–1734. 5 indexed citations
7.
Abbadi, Amr El, et al.. (2016). TaoStore: Overcoming Asynchronicity in Oblivious Data Storage. 198–217. 43 indexed citations
8.
Bellare, Mihir, Viet Tung Hoang, & Stefano Tessaro. (2016). Message-Recovery Attacks on Feistel-Based Format Preserving Encryption. 444–455. 12 indexed citations
9.
Gaži, Peter & Stefano Tessaro. (2015). Secret-key cryptography from ideal primitives: A systematic overview. 5912. 1–5. 4 indexed citations
10.
Coron, Jean-Sébastien, et al.. (2014). How to Build an Ideal Cipher: The Indifferentiability of the Feistel Construction. Journal of Cryptology. 29(1). 61–114. 12 indexed citations
11.
Calmon, Flávio P., et al.. (2013). Bounds on inference. DSpace@MIT (Massachusetts Institute of Technology). 567–574. 17 indexed citations
12.
Micciancio, Daniele & Stefano Tessaro. (2013). An equational approach to secure multi-party computation. 355–372. 8 indexed citations
13.
Holenstein, Thomas, et al.. (2011). The equivalence of the random oracle model and the ideal cipher model, revisited. 89–98. 15 indexed citations
14.
Cachin, Christian & Stefano Tessaro. (2006). Optimal Resilience for Erasure-Coded Byzantine Distributed Storage. 115–124. 62 indexed citations
15.
Cachin, Christian & Stefano Tessaro. (2006). Asynchronous Veri.able Information Dispersal. 191–202. 60 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026