Aarhus University Seal / Aarhus Universitets segl

Claudio Orlandi

  1. 2021
  2. Published

    High-Performance Multi-party Computation for Binary Circuits Based on Oblivious Transfer. / Burra, Sai Sheshank; Larraia, Enrique; Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Orlandi, Claudio; Orsini, Emmanuela; Scholl, Peter; Smart, Nigel P.

    In: Journal of Cryptology, Vol. 34, No. 3, 34, 07.2021.

    Research output: Contribution to journal/Conference contribution in journal/Contribution to newspaperJournal articleResearchpeer-review

  3. Published

    Two-round n-out-of-n and Multi-Signatures and Trapdoor Commitment from Lattices. / Damgård, Ivan Bjerre; Orlandi, Claudio; Takahashi, Akira; Tibouchi, Mehdi.

    Public-Key Cryptography – PKC 2021: 24rd IACR International Conference on Practice and Theory of Public-Key Cryptography, proceedings part 1. ed. / Juan A. Garay. Cham : Springer, 2021. p. 99-130 (Lecture Notes in Computer Science, Vol. 12710).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  4. Accepted/In press

    Improved Threshold Signatures, Proactive Secret Sharing and Input Certification from LSS Isomorphisms. / Aranha, Diego F.; Orlandi, Claudio; Escudero Ospina, Daniel Esteban; Dalskov, Anders Peter Kragh.

    Proceedings of LATINCRYPT 2021. 2021.

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  5. 2020
  6. Published

    Use your brain! Arithmetic 3PC for any modulus with active security. / Eerikson, Hendrik; Keller, Marcel; Orlandi, Claudio; Pullonen, Pille; Puura, Joonas; Simkin, Mark.

    1st Conference on Information-Theoretic Cryptography (ITC 2020). ed. / Yael Tauman Kalai; Adam D. Smith; Daniel Wichs. Schloss Dagstuhl--Leibniz-Zentrum für Informatik, 2020. 5 (Leibniz International Proceedings in Informatics, LIPIcs, Vol. 163).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  7. Published

    Black-box transformations from passive to covert security with public verifiability. / Damgård, Ivan; Orlandi, Claudio; Simkin, Mark.

    Advances in Cryptology - CRYPTO 2020. ed. / Daniele Micciancio; Thomas Ristenpart. Vol. Cham Springer, 2020. p. 647-676 (Lecture Notes in Computer Science, Vol. 12171).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  8. Published

    Optimal Transport Layer for Secure Computation. / Brandt, Markus; Orlandi, Claudio; Shrishak, Kris; Shulman, Haya.

    Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, ICETE 2020. ed. / Pierangela Samarati; Sabrina De Capitani di Vimercati; Mohammad S. Obaidat; Jalel Ben-Othman. Vol. Volume 3: SECRYPT SCITEPRESS Digital Library, 2020. p. 130-141.

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  9. Published

    Secure generalized deduplication via multi-key revealing encryption. / Lucani Rötter, Daniel Enrique; Nielsen, Lars; Orlandi, Claudio; Pagnin, Elena; Vestergaard, Rasmus.

    Security and Cryptography for Networks. ed. / Clemente Galdi; Vladimir Kolesnikov. Cham : Springer, 2020. p. 298-318 (Lecture Notes in Computer Science, Vol. 12238).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  10. Published

    Securing DNSSEC Keys via Threshold ECDSA from Generic MPC. / Dalskov, Anders Peter Kragh; Orlandi, Claudio; Keller, Marcel; Shrishak, Kris; Shulman, Haya.

    European Symposium on Research in Computer Security : Computer Security – ESORICS 2020. ed. / Liqun Chen; Steve Schneider; Ninghui Li; Kaitai Liang. Vol. I Cham : Springer, 2020. p. 654-673 (Lecture Notes in Computer Science, Vol. 12309).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  11. Published

    Security of Hedged Fiat–Shamir Signatures under Fault Attacks. / Aranha, Diego F.; Orlandi, Claudio; Takahashi, Akira; Zaverucha, Greg.

    Advances in Cryptology – EUROCRYPT 2020. ed. / Anne Canteaut; Yuval Ishai. Cham : Springer, 2020. p. 644-674 (Lecture Notes in Computer Science, Vol. 12105).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  12. Published

    Stronger Security and Constructions of Multi-designated Verifier Signatures. / Damgård, Ivan; Haagh, Helene; Mercer, Rebekah; Nitulescu, Anca; Orlandi, Claudio; Yakoubov, Sophia.

    Theory of Cryptography: Proceedings. ed. / Rafael Pass; Krzysztof Pietrzak. Vol. II Cham : Springer, 2020. p. 229-260 (Lecture Notes in Computer Science, Vol. 12551).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  13. 2019
  14. Published

    Quisquis: A New Design for Anonymous Cryptocurrencies. / Fauzi, Prastudy Mungkas; Meiklejohn, Sarah; Mercer, Rebekah Hannah; Orlandi, Claudio.

    Advances in Cryptology – ASIACRYPT 2019. 2019. p. 649-678 (Lecture Notes in Computer Science, Vol. 11921).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  15. Published

    TOPPool : Time-aware Optimized Privacy-Preserving Ridesharing. / Pagnin, Elena; Gunnarsson, Gunnar; Talebi, Pedram; Orlandi, Claudio; Sabelfeld, Andrei.

    In: Proceedings on Privacy Enhancing Technologies, Vol. 2019, No. 4, 10.2019, p. 93-111.

    Research output: Contribution to journal/Conference contribution in journal/Contribution to newspaperJournal articleResearchpeer-review

  16. Published

    Proofs of Replicated Storage Without Timing Assumptions. / Damgård, Ivan Bjerre; Ganesh, Chaya; Orlandi, Claudio.

    Advances in Cryptology – CRYPTO 2019 . Springer, 2019. p. 355-380 (Lecture Notes in Computer Science, Vol. 11692).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  17. Published

    Commodity-Based 2PC for Arithmetic Circuits. / Damgård, Ivan; Haagh, Helene; Nielsen, Michael; Orlandi, Claudio.

    Cryptography and Coding - 17th IMA International Conference, IMACC 2019, Proceedings. ed. / Martin Albrecht. Springer, 2019. p. 154-177 (Lecture Notes in Computer Science, Vol. 11929).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  18. Published

    Commodity-Based 2PC for Arithmetic Circuits. / Damgård, Ivan Bjerre; Haagh, Helene; Nielsen, Michael; Orlandi, Claudio.

    Cryptology ePrint Archive. 2019.

    Research output: Other contributionNet publication - Internet publicationResearch

  19. Published

    Proof-of-Stake Protocols for Privacy-Aware Blockchains. / Ganesh, Chaya; Orlandi, Claudio; Tschudi, Daniel.

    Advances in Cryptology – EUROCRYPT 2019 . ed. / Yuval Ishai; Vincent Rijmen. Cham : Springer, 2019. p. 690-719 (Lecture Notes in Computer Science, Vol. 11476).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  20. Published

    Sharing Information with Competitors. / Branzei, Simina; Orlandi, Claudio; Yang, Guang.

    Algorithmic Game Theory: SAGT 2019. ed. / Dimitris Fotakis; Evangelos Markakis. Cham : Springer, 2019. p. 34-48 (Lecture Notes in Computer Science, Vol. 11801).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  21. 2018
  22. Published

    Can You Trust Your Encrypted Cloud?: An Assessment of SpiderOakONE's Security. / Dalskov, Anders P. K.; Orlandi, Claudio.

    ASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security. ed. / Jong Kim; Gail-Joon Ahn; Seungjoo Kim. New York, NY, USA : Association for Computing Machinery, 2018. p. 343-355 (ASIACCS '18).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  23. Published

    Combining Private Set-Intersection with Secure Two-Party Computation. / Ciampi, Michele; Orlandi, Claudio.

    Security and Cryptography for Networks. ed. / Dario Catalano; Roberto De Prisco. Vol. 11035 Cham : Springer VS, 2018. p. 464-482 (Lecture Notes in Computer Science (LNCS); No. 11035).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  24. Published

    Yet Another Compiler for Active Security or: Efficient MPC Over Arbitrary Rings. / Damgård, Ivan; Orlandi, Claudio; Simkin, Mark.

    Advances in Cryptology - CRYPTO 2018. ed. / Hovav Shacham; Alexandra Boldyreva. Vol. 10992 Cham : Springer VS, 2018. p. 799-829 (Lecture Notes in Computer Science (LNCS); No. 10992).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  25. 2017
  26. Published

    Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives. / Chase, Melissa; Derler, David; Goldfeder, Steven; Orlandi, Claudio; Ramacher, Sebastian; Rechberger, Christian; Slamanig, Daniel; Zaverucha, Greg.

    CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA : Association for Computing Machinery, 2017. p. 1825-1842 (CCS '17).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  27. Published

    Access Control Encryption for Equality, Comparison, and More. / Fuchsbauer, Georg; Gay, Romain; Kowalczyk, Lucas; Orlandi, Claudio.

    Public-Key Cryptography – PKC 2017 - 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings: 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part II. ed. / Serge Fehr. Vol. 10175 Springer, Berlin, Heidelberg : Springer VS, 2017. p. 88-118 (Lecture Notes in Computer Science, Vol. 10175).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  28. Published

    Faster Zero-Knowledge Protocols and Applications : Invited Talk Abstract. / Orlandi, Claudio.

    Innovative Security Solutions for Information Technology and Communications - 10th International Conference,SecITC 2017, Revised Selected Papers: Innovative Security Solutions for Information Technology and Communications. ed. / Pooya Farshim; Emil Simion. Vol. 10543 Springer VS, 2017. p. 1-11 (Lecture Notes in Computer Science, Vol. 10543).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  29. Published

    Revealing Encryption for Partial Ordering. / Haagh, Helene; Ji, Yue; Li, Chenxing; Orlandi, Claudio; Song, Yifan.

    Cryptography and Coding - 16th IMA International Conference, IMACC 2017, Proceedings. ed. / Maire O’Neill. Cham : Springer VS, 2017. p. 3-22 (Lecture Notes in Computer Science, Vol. 10655).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  30. Published

    PrivatePool: Privacy-Preserving Ridesharing. / Hallgren, Per A.; Orlandi, Claudio; Sabelfeld, Andrei.

    30th IEEE Computer Security Foundations Symposium, CSF 2017, Santa Barbara, CA, USA, August 21-25, 2017. IEEE Press, 2017. p. 276-291.

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  31. Published

    Security of Symmetric Primitives under Incorrect Usage of Keys. / Farshim, Pooya; Orlandi, Claudio; Rosie, Razvan.

    In: IACR Trans. Symmetric Cryptol., Vol. 2017, No. 1, 2017, p. 449-473.

    Research output: Contribution to journal/Conference contribution in journal/Contribution to newspaperJournal articleResearchpeer-review

  32. 2016
  33. Published

    On the CCA (in)security of MTProto. / Jakobsen, Jakob; Orlandi, Claudio.

    Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices: SPSM '16. New York, NY, USA : Association for Computing Machinery, 2016. p. 113-116.

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  34. Published

    A Framework for Outsourcing of Secure Computation. / Jakobsen, Thomas P.; Nielsen, Jesper Buus; Orlandi, Claudio.

    2016Internet Archive.

    Research output: Other contributionNet publication - Internet publicationResearch

  35. Published

    Access Control Encryption: Enforcing Information Flow with Cryptography. / Damgård, Ivan Bjerre; Haagh, Helene Flyvholm; Orlandi, Claudio.

    TCC 2016-B: Fourteenth IACR Theory of Cryptography Conference. ed. / Martin Hirt; Adam Smith. Vol. 9986 Springer VS, 2016. p. 547-576 (Lecture Notes in Computer Science, Vol. 9986).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  36. Published

    Cross and Clean: Amortized Garbled Circuits with Constant Overhead. / Nielsen, Jesper Buus; Orlandi, Claudio.

    Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part I. ed. / Martin Hirt; Adam Smith. Vol. 9985 Berlin : Springer VS, 2016. p. 582-603 (Lecture Notes in Computer Science (LNCS), Vol. 9985).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  37. Published

    How To Bootstrap Anonymous Communication. / Jakobsen, Sune K.; Orlandi, Claudio.

    Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science, Cambridge, MA, USA, January 14-16, 2016. New York, NY : Association for Computing Machinery, 2016. p. 333-344.

    Research output: Contribution to book/anthology/report/proceedingBook chapterResearchpeer-review

  38. Published

    Non-Interactive Verifiable Secret Sharing for Monotone Circuits. / Bai, Ge; Damgård, Ivan; Orlandi, Claudio; Xia, Yu.

    Progress in Cryptology - AFRICACRYPT 2016 - 8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedings. ed. / David Pointcheval; Abderrahmane Nitaj; Tajjeeddine Rachidi. Vol. 9646 Springer VS, 2016. p. 225-244 (Lecture Notes in Computer Science (LNCS), Vol. 9646).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  39. Published

    Revealing Encryption for Partial Ordering. / Haagh, Helene; Ji, Yue; Li, Chenxing; Orlandi, Claudio; Song, Yifan.

    2016Internetudgivelse.

    Research output: Other contributionNet publication - Internet publicationResearch

  40. Published

    ZKBoo: Faster Zero-Knowledge for Boolean Circuits. / Giacomelli, Irene; Madsen, Jesper; Orlandi, Claudio.

    25th USENIX Security Symposium : (USENIX Security 16). USENIX - The Advanced Computing Systems Association, 2016. p. 1069-1083.

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  41. 2015
  42. Published

    High Performance Multi-Party Computation for Binary Circuits Based on Oblivious Transfer. / Burra, Sai Sheshank; Larraia, Enrique; Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Orlandi, Claudio; Orsini, Emmanuela ; Scholl, Peter; Smart, Nigel P.

    2015Report 2015/472.

    Research output: Other contributionNet publication - Internet publicationResearch

  43. Published

    How to Bootstrap Anonymous Communication. / Jakobsen, Sune K.; Orlandi, Claudio.

    2015IACR eprint.

    Research output: Other contributionNet publication - Internet publicationResearch

  44. Published

    How to Bootstrap Anonymous Communication. / Jakobsen, Sune K.; Orlandi, Claudio.

    2015Arxiv eprint.

    Research output: Other contributionNet publication - Internet publicationResearch

  45. Published

    On the CCA (in)security of MTProto. / Jakobsen, Jakob; Orlandi, Claudio.

    2015Report 2015/1177.

    Research output: Other contributionNet publication - Internet publicationResearch

  46. Published

    Privacy-Free Garbled Circuits with Applications to Efficient Zero-Knowledge. / Frederiksen, Tore Kasper; Nielsen, Jesper Buus; Orlandi, Claudio.

    Advances in Cryptology - EUROCRYPT 2015: 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II. ed. / Elisabeth Oswald; Marc Fischlin. Springer VS, 2015. p. 191-219 (Lecture Notes in Computer Science, Vol. 9057).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  47. Published

    Privacy-enhancing overlays in bitcoin. / Meiklejohn, Sarah; Orlandi, Claudio.

    Financial Cryptography and Data Security : FC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers. ed. / Michael Brenner ; Nicolas Christin ; Benjamin Johnson ; Kurt Rohloff . Vol. 8976 Springer, 2015. p. 127-141 (Lecture Notes in Computer Science).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  48. Published

    The Simplest Protocol for Oblivious Transfer. / Chou, Tung; Orlandi, Claudio.

    2015eprint.

    Research output: Other contributionNet publication - Internet publicationResearch

  49. Published

    The simplest protocol for oblivious transfer. / Chou, Tung; Orlandi, Claudio.

    Progress in Cryptology - LATINCRYPT 2015: 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015, Proceedings. ed. / Kristin Lauter ; Francisco Rodríguez-Henríquez . Vol. 9230 Springer, 2015. p. 40-58 (Lecture Notes in Computer Science).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  50. 2014
  51. Published

    Framework for Outsourcing of Secure Computation. / Jakobsen, Thomas Pelle; Nielsen, Jesper Buus; Orlandi, Claudio.

    Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, CCSW '14 . ed. / Gail-Joon Ahn ; Alina Oprea; Reihaneh Safavi-Naini. Association for Computing Machinery, 2014. p. 81-92 .

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  52. Published

    Obfuscation ⇒ (IND-CPA Security ⇏ Circular Security). / Marcedone , Antonio ; Orlandi, Claudio.

    Security and Cryptography for Networks: 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings. ed. / Michel Abdalla ; Roberto De Prisco . Springer VS, 2014. p. 77-90 (Lecture Notes in Computer Science, Vol. 8642).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  53. Published

    Privacy-Free Garbled Circuits with Applications To Efficient Zero-Knowledge. / Frederiksen, Tore Kasper; Nielsen, Jesper Buus; Orlandi, Claudio.

    Cryptology ePrint Archive, 2014. p. 30.

    Research output: Working paper/Preprint Working paperResearch

  54. Published

    Publicly Auditable Secure Multi-Party Computation. / Baum, Carsten; Damgård, Ivan Bjerre; Orlandi, Claudio.

    Security and Cryptography for Networks: 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings. ed. / Michel Abdalla ; Roberto De Prisco . Springer VS, 2014. p. 175-196 (Lecture Notes in Computer Science, Vol. 8642).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  55. Published

    Statistical Concurrent Non-malleable Zero Knowledge. / Orlandi, Claudio; Ostrovsky, Rafail; Rao, Vanishree; Sahai, Amit; Visconti, Ivan.

    Theory of Cryptography: 11th Theory of Cryptography Conference, TCC 2014, 2014. Proceedings. ed. / Yehuda Lindell. Springer Publishing Company, 2014. p. 167-191 (Lecture Notes in Computer Science, Vol. 8349).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  56. 2013
  57. Published

    Zero-knowledge using garbled circuits : Or how to prove non-algebraic statements efficiently. / Jawurek, Marek; Kerschbaum, Florian; Orlandi, Claudio.

    Proceedings of the ACM Conference on Computer and Communications Security, CCS '13. ed. / Ahmad-Reza Sadeghi ; Virgil Gligor; Moti Yung . Association for Computing Machinery, 2013. p. 955-966 (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  58. Published

    Hiding the Input-Size in Secure Two-Party Computation. / Lindell, Yehuda ; Nissim, Kobbi ; Orlandi, Claudio.

    Advances in Cryptology - ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II. ed. / Kazue Sako; Palash Sarkar. Vol. 8197 Springer VS, 2013. p. 421-440 (Lecture Notes in Computer Science, Vol. 8270).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  59. Published

    MiniLEGO : Efficient secure two-party computation from general assumptions. / Frederiksen, Tore Kasper; Jakobsen, Thomas Pelle; Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Orlandi, Claudio.

    Advances in Cryptology – EUROCRYPT 2013: 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings. ed. / Thomas Johansson; Phong Q. Nguyen. Springer VS, 2013. p. 537-556 (Lecture Notes in Computer Science, Vol. 7881 ).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  60. Published

    On the Power of Correlated Randomness in Secure Computation. / Ishai, Yuval ; Kushilevitz, Eyal ; Meldgaard, Sigurd Torkel; Orlandi, Claudio; Paskin-Cherniavsky, Anat .

    Theory of Cryptography: 10th TCC 2013. Proceedings. ed. / Amit Sahai. Springer VS, 2013. p. 600-620 (Lecture Notes in Computer Science, Vol. 7785).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  61. 2012
  62. Published

    Privacy-aware mechanism design. / Nissim, K.; Orlandi, Claudio; Smorodinsky, R.

    Proceedings of the ACM Conference on Electronic Commerce, EC '12. ed. / Boi Faltings. Association for Computing Machinery, 2012. p. 774-789.

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  63. Published

    Calling Out Cheaters : Covert Security with Public VerifiabilitySecurity. / Asharov, Gilad; Orlandi, Claudio.

    In: Lecture Notes in Computer Science, Vol. 7658, 2012, p. 681-698 .

    Research output: Contribution to journal/Conference contribution in journal/Contribution to newspaperConference articleResearchpeer-review

  64. 2011
  65. Published

    Is Multiparty Computation Any Good In Practice? / Orlandi, Claudio.

    In: I E E E International Conference on Acoustics, Speech and Signal Processing. Proceedings, 2011, p. 5848-5851.

    Research output: Contribution to journal/Conference contribution in journal/Contribution to newspaperConference articleResearchpeer-review

  66. Published

    Lower and Upper Bounds for Deniable Public-Key Encryption. / Bendlin, Rikke; Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Orlandi, Claudio.

    In: Lecture Notes in Computer Science, Vol. 7073, 2011, p. 125-142.

    Research output: Contribution to journal/Conference contribution in journal/Contribution to newspaperConference articleResearchpeer-review

  67. Published

    On Invertible Sampling and Adaptive Security. / Ishai, Yuval; Kumarasubramanian, Abishek; Orlandi, Claudio; Sahai, Amit.

    In: Lecture Notes in Computer Science, Vol. 6477, 2011, p. 466-482.

    Research output: Contribution to journal/Conference contribution in journal/Contribution to newspaperConference articleResearchpeer-review

  68. Published

    Secure Computation in Untrusted Environments. / Orlandi, Claudio.

    Department of Computer Science, Aarhus University, 2011. 130 p.

    Research output: Book/anthology/dissertation/reportPh.D. thesis

  69. Published

    Semi-Homomorphic Encryption and Multiparty Computation. / Bendlin, Rikke; Damgård, Ivan Bjerre; Orlandi, Claudio; Zakarias, Sarah Nouhad Haddad.

    In: Lecture Notes in Computer Science, Vol. 6632, 2011, p. 169-188.

    Research output: Contribution to journal/Conference contribution in journal/Contribution to newspaperConference articleResearchpeer-review

  70. 2010
  71. Published

    Multiparty Computation for Dishonest Majority : From Passive to Active Security at Low Cost. / Damgård, Ivan Bjerre; Orlandi, Claudio.

    In: Lecture Notes in Computer Science, Vol. 6223, 2010, p. 558-576.

    Research output: Contribution to journal/Conference contribution in journal/Contribution to newspaperConference articleResearchpeer-review

  72. Published

    On the Necessary and Sufficient Assumptions for UC Computation. / Damgård, Ivan Bjerre; Nielsen, Jesper Buus; Orlandi, Claudio.

    In: Lecture Notes in Computer Science, Vol. 5978, 2010, p. 109-127.

    Research output: Contribution to journal/Conference contribution in journal/Contribution to newspaperConference articleResearchpeer-review

  73. 2009
  74. Published

    Essentially Optimal Universally Composable Oblivious Transfer. / Damgård, Ivan Bjerre; Nielsen, Jesper Buus; Orlandi, Claudio.

    In: Lecture Notes in Computer Science, Vol. 5461, 2009, p. 1-14.

    Research output: Contribution to journal/Conference contribution in journal/Contribution to newspaperConference articleResearchpeer-review

  75. Published

    LEGO for Two-Party Secure Computation. / Nielsen, Jesper Buus; Orlandi, Claudio.

    In: Lecture Notes in Computer Science, Vol. 5444, 2009, p. 368-386.

    Research output: Contribution to journal/Conference contribution in journal/Contribution to newspaperConference articleResearchpeer-review