Ikuti
Claudio Orlandi
Claudio Orlandi
Professor, Department of Computer Science, Aarhus University, Denmark
Email yang diverifikasi di cs.au.dk - Beranda
Judul
Dikutip oleh
Dikutip oleh
Tahun
A new approach to practical active-secure two-party computation
J Nielsen, P Nordholt, C Orlandi, SS Burra
Advances in Cryptology–CRYPTO 2012, 681-700, 2012
5252012
Semi-homomorphic encryption and multiparty computation
R Bendlin, I Damgård, C Orlandi, S Zakarias
Annual International Conference on the Theory and Applications of …, 2011
4832011
Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives.
M Chase, D Derler, S Goldfeder, C Orlandi, S Ramacher, C Rechberger, ...
ACM Conference on Computer and Communications Security 2017 2017, 1825-1842, 2017
3712017
ZKBoo: Faster Zero-Knowledge for Boolean Circuits.
I Giacomelli, J Madsen, C Orlandi
USENIX Security Symposium 2016, 1069--1083, 2016
3332016
The simplest protocol for oblivious transfer
T Chou, C Orlandi
Progress in Cryptology--LATINCRYPT 2015: 4th International Conference on …, 2015
2362015
Zero-Knowledge Using Garbled Circuits: How To Prove Non-Algebraic Statements Efficiently
M Jawurek, F Kerschbaum, C Orlandi
ACM Conference on Computer and Communications Security 2013, 955-966, 2013
2082013
LEGO for two-party secure computation
JB Nielsen, C Orlandi
Theory of Cryptography Conference, 368-386, 2009
1942009
Oblivious neural network computing via homomorphic encryption
C Orlandi, A Piva, M Barni
EURASIP Journal on Information Security 2007, 1-11, 2007
1872007
A privacy-preserving protocol for neural-network-based computation
M Barni, C Orlandi, A Piva
Proceedings of the 8th workshop on Multimedia and security, 146-151, 2006
1792006
Privacy-enhancing overlays in bitcoin
S Meiklejohn, C Orlandi
International Conference on Financial Cryptography and Data Security, 127-141, 2015
1692015
Publicly auditable secure multi-party computation
C Baum, I Damgård, C Orlandi
Security and Cryptography for Networks: 9th International Conference, SCN …, 2014
1582014
Quisquis: A new design for anonymous cryptocurrencies
P Fauzi, S Meiklejohn, R Mercer, C Orlandi
Advances in Cryptology–ASIACRYPT 2019: 25th International Conference on the …, 2019
1392019
On the power of correlated randomness in secure computation
Y Ishai, E Kushilevitz, S Meldgaard, C Orlandi, A Paskin-Cherniavsky
Theory of Cryptography: 10th Theory of Cryptography Conference, TCC 2013 …, 2013
1372013
Privacy-aware mechanism design
K Nissim, C Orlandi, R Smorodinsky
Proceedings of the 13th ACM conference on electronic commerce, 774-789, 2012
1232012
PrivatePool: Privacy-preserving ridesharing
P Hallgren, C Orlandi, A Sabelfeld
2017 IEEE 30th Computer Security Foundations Symposium (CSF), 276-291, 2017
1092017
Combining private set-intersection with secure two-party computation
M Ciampi, C Orlandi
International Conference on Security and Cryptography for Networks, 464-482, 2018
1062018
Access control encryption: Enforcing information flow with cryptography
I Damgård, H Haagh, C Orlandi
Theory of Cryptography: 14th International Conference, TCC 2016-B, Beijing …, 2016
1062016
MiniLEGO: Efficient Secure Two-Party Computation From General Assumptions
TK Frederiksen, TP Jakobsen, JB Nielsen, PS Nordholt, C Orlandi
Advances in Cryptology–EUROCRYPT 2013, 537-556, 2013
1032013
Multiparty computation for dishonest majority: From passive to active security at low cost
I Damgård, C Orlandi
Annual cryptology conference, 558-576, 2010
932010
Two-Round n-out-of-n and Multi-Signatures and Trapdoor Commitment from Lattices
I Damgård, C Orlandi, A Takahashi, M Tibouchi
Journal of Cryptology 35 (2), 14, 2022
892022
Sistem tidak dapat melakukan operasi ini. Coba lagi nanti.
Artikel 1–20