Claudio Orlandi

  • Åbogade 34

    8200 Aarhus N

    Denmark

20092024

Research activity per year

Filter
Article in proceedings

Search results

  • 2023

    Improved Distributed RSA Key Generation Using the Miller-Rabin Test

    Burkhardt, J., Damgård, I., Frederiksen, T. K., Orlandi, C. & Ghosh, S., Nov 2023, CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. Meng, W., Jensen, C. D., Cremers, C. & Kirda, E. (eds.). New York: Association for Computing Machinery, p. 2501-2515 15 p.

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  • MPC with Low Bottleneck-Complexity: Information-Theoretic Security and More

    Keller, H., Orlandi, C., Paskin-Cherniavsky, A. & Ravi, D., Jul 2023, 4th Conference on Information-Theoretic Cryptography, ITC 2023. Chung, K-M. (ed.). Wadern: Schloss Dagstuhl--Leibniz-Zentrum für Informatik, p. 11:1-11:22 11. (Leibniz International Proceedings in Informatics, LIPIcs, Vol. 267).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

    Open Access
  • Secure Multiparty Computation from Threshold Encryption Based on Class Groups

    Braun, L., Damgård, I. B. & Orlandi, C., Aug 2023, Advances in Cryptology: CRYPTO 2023. Handschuh, H. & Lysyanskaya, A. (eds.). Cham: Springer, p. 613-645 33 p. (Lecture Notes in Computer Science, Vol. 14081).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

    Open Access
  • Structure-Preserving Compilers from New Notions of Obfuscations

    Campanelli, M., Francati, D. & Orlandi, C., May 2023, Public-Key Cryptography – PKC 2023: 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7–10, 2023, Proceedings, Part II. Boldyreva, A. & Kolesnikov, V. (eds.). Cham: Springer, p. 663-693 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 13941).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  • Two-Round Stateless Deterministic Two-Party Schnorr Signatures from Pseudorandom Correlation Functions

    Kondi, Y., Orlandi, C. & Roy, L., Aug 2023, Advances in Cryptology – CRYPTO 2023: 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023, Proceedings, Part I. Handschuh, H. & Lysyanskaya, A. (eds.). Cham: Springer, p. 646-677 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 14081).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  • Witness-Succinct Universally-Composable SNARKs

    Ganesh, C., Kondi, Y. M., Orlandi, C., Pancholi, M. R., Takahashi, A. & Tschudi, D., Apr 2023, Advances in Cryptology – EUROCRYPT 2023: 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23–27, 2023, Proceedings, Part II. Hazay, C. & Stam, M. (eds.). Cham: Springer, p. 315–346 32 p. (Lecture Notes in Computer Science, Vol. 14005).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

    Open Access
  • 2022

    An Algebraic Framework for Silent Preprocessing with Trustless Setup and Active Security

    Abram, D., Damgård, I., Orlandi, C. & Scholl, P., 2022, Advances in Cryptology – CRYPTO 2022. Dodis, Y. & Shrimpton, T. (eds.). Cham: Springer, p. 421-452 32 p. (Lecture Notes in Computer Science, Vol. 13510).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearch

  • ECLIPSE: Enhanced Compiling method for Pedersen-committed zkSNARK Engines

    Aranha, D. F., Bennedsen, E., Campanelli, M., Ganesh, C., Orlandi, C. & Takahashi, A., 2022, Public-Key Cryptography – PKC 2022 : 25th IACR International Conference on Practice and Theory of Public-Key Cryptography. Hanaoka, G., Shikata, J. & Watanabe, Y. (eds.). Cham: Springer, p. 584-614 31 p. (Lecture Notes in Computer Science, Vol. 13177).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  • Fiat-Shamir Bulletproofs are Non-Malleable (in the Algebraic Group Model)

    Ganesh, C., Orlandi, C., Pancholi, M. R., Takahashi, A. & Tschudi, D., 2022, Advances in Cryptology – EUROCRYPT 2022. Dunkelman, O. & Dziembowski, S. (eds.). Cham: Springer, p. 397-426 30 p. (Lecture Notes in Computer Science (LNCS), Vol. 13276).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

    Open Access
  • Laconic Private Set-Intersection From Pairings

    Aranha, D. F., Lin, C., Orlandi, C. & Simkin, M., Nov 2022, CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 111-124 14 p.

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  • Low-Bandwidth Threshold ECDSA via Pseudorandom Correlation Generators

    Abram, D., Nof, A., Orlandi, C., Scholl, P. & Shlomovits, O., 2022, 2022 IEEE Symposium on Security and Privacy (SP). IEEE, p. 2554-2572 19 p.

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearch

    1 Citation (Scopus)
  • On Access Control Encryption Without Sanitization

    Boschini, C., Damgård, I. & Orlandi, C., 2022, Security and Cryptography for Networks. SCN 2022. Galdi, C. & Jarecki, S. (eds.). Cham: Springer, p. 220-243 24 p. (Lecture Notes in Computer Science, Vol. 13409).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  • On the Bottleneck Complexity of MPC with Correlated Randomness

    Orlandi, C., Ravi, D. & Scholl, P., 2022, Public-Key Cryptography – PKC 2022: 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8–11, 2022, Proceedings, Part I. Hanaoka, G., Shikata, J. & Watanabe, Y. (eds.). Cham: Springer, p. 194-220 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 13177 LNCS).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  • Virtual ASICs: Generalized Proof-of-Stake Mining in Cryptocurrencies

    Ganesh, C., Orlandi, C., Tschudi, D. & Zohar, A., 2022, Data Privacy Management, Cryptocurrencies and Blockchain Technology : ESORICS 2021 International Workshops, DPM 2021 and CBT 2021. Garcia-Alfaro, J., Muñoz-Tapia, J. L., Navarro-Arribas, G. & Soriano, M. (eds.). Cham: Springer, p. 173-191 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 13140 LNCS).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  • Zero-Knowledge for Homomorphic Key-Value Commitments with Applications to Privacy-Preserving Ledgers

    Campanelli, M., Engelmann, F. & Orlandi, C., 2022, Security and Cryptography for Networks. Galdi, C. & Jarecki, S. (eds.). Cham: Springer, p. 761-784 24 p. (Lecture Notes in Computer Science, Vol. 13409).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearch

  • 2021

    Balancing Privacy and Accountability in Blockchain Identity Management

    Damgård, I., Ganesh, C., Khoshakhlagh, H., Orlandi, C. & Siniscalchi, L., 2021, Topics in Cryptology-CT-RSA 2021 - Cryptographers’ Track at the RSA Conference, Proceedings. Paterson, K. G. (ed.). Springer, p. 552-576 25 p. (Lecture Notes in Computer Science, Vol. 12704).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  • Improved Threshold Signatures, Proactive Secret Sharing and Input Certification from LSS Isomorphisms

    Aranha, D. F., Dalskov, A., Orlandi, C. & Escudero Ospina, D. E., 2021, Progress in Cryptology – LATINCRYPT 2021. Longa, P. & Ràfols, C. (eds.). Springer, p. 382-404 23 p. (Lecture Notes in Computer Science, Vol. 12912).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  • Refresh when you wake up: Proactive threshold wallets with offline devices

    Kondi, Y., Magri, B., Orlandi, C. & Shlomovits, O., May 2021, 2021 IEEE Symposium on Security and Privacy (SP). IEEE, p. 608-625 18 p.

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  • Stronger Notions and a More Efficient Construction of Threshold Ring Signatures

    Munch-Hansen, A., Orlandi, C. & Yakoubov, S., 2021, Progress in Cryptology – LATINCRYPT 2021 : 7th International Conference on Cryptology and Information Security in Latin America, Proceedings. Longa, P. & Ràfols, C. (eds.). Springer, p. 363-381 19 p. (Lecture Notes in Computer Science, Vol. 12912).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  • The Rise of Paillier: Homomorphic Secret Sharing and Public-Key Silent OT

    Orlandi, C., Scholl, P. & Yakoubov, S., 2021, Advances in Cryptology – EUROCRYPT 2021 : 7th International Conference on Cryptology and Information Security in Latin America, Proceedings. Canteaut, A. & Standaert, F-X. (eds.). Springer, p. 678-708 31 p. (Lecture Notes in Computer Science, Vol. 12696).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  • Two-round n-out-of-n and Multi-Signatures and Trapdoor Commitment from Lattices

    Damgård, I. B., Orlandi, C., Takahashi, A. & Tibouchi, M., May 2021, Public-Key Cryptography – PKC 2021 - 24th IACR International Conference on Practice and Theory of Public Key Cryptography, 2021, Proceedings: 24rd IACR International Conference on Practice and Theory of Public-Key Cryptography, proceedings part 1. Garay, J. A. (ed.). Cham: Springer, p. 99-130 32 p. (Lecture Notes in Computer Science, Vol. 12710).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

    Open Access
  • 2020

    Black-box transformations from passive to covert security with public verifiability

    Damgård, I., Orlandi, C. & Simkin, M., 2020, Advances in Cryptology - CRYPTO 2020. Micciancio, D. & Ristenpart, T. (eds.). Springer, Vol. Cham. p. 647-676 30 p. (Lecture Notes in Computer Science, Vol. 12171).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  • Optimal Transport Layer for Secure Computation

    Brandt, M., Orlandi, C., Shrishak, K. & Shulman, H., 2020, ICETE 2020 - Proceedings of the 17th International Joint Conference on e-Business and Telecommunications. Samarati, P., Vimercati, S. D. C. D., Obaidat, M. S. & Ben-Othman, J. (eds.). SCITEPRESS Digital Library, Vol. Volume 3: SECRYPT. p. 130-141 12 p.

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

    Open Access
  • Secure generalized deduplication via multi-key revealing encryption

    Lucani Rötter, D. E., Nielsen, L., Orlandi, C., Pagnin, E. & Vestergaard, R., 2020, Security and Cryptography for Networks. Galdi, C. & Kolesnikov, V. (eds.). Cham: Springer, p. 298-318 21 p. (Lecture Notes in Computer Science, Vol. 12238).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  • Securing DNSSEC Keys via Threshold ECDSA from Generic MPC

    Dalskov, A. P. K., Orlandi, C., Keller, M., Shrishak, K. & Shulman, H., 2020, European Symposium on Research in Computer Security : Computer Security – ESORICS 2020. Chen, L., Schneider, S., Li, N. & Liang, K. (eds.). Cham: Springer, Vol. I. p. 654-673 19 p. (Lecture Notes in Computer Science, Vol. 12309).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  • Security of Hedged Fiat–Shamir Signatures under Fault Attacks

    Aranha, D. F., Orlandi, C., Takahashi, A. & Zaverucha, G., 2020, Advances in Cryptology – EUROCRYPT 2020. Canteaut, A. & Ishai, Y. (eds.). Cham: Springer, p. 644-674 31 p. (Lecture Notes in Computer Science, Vol. 12105).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

    Open Access
  • Stronger Security and Constructions of Multi-designated Verifier Signatures

    Damgård, I., Haagh, H., Mercer, R., Nitulescu, A., Orlandi, C. & Yakoubov, S., 2020, Theory of Cryptography - 18th International Conference, TCC 2020, Proceedings: Proceedings. Pass, R. & Pietrzak, K. (eds.). Cham: Springer, Vol. II. p. 229-260 32 p. (Lecture Notes in Computer Science, Vol. 12551).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  • Use your brain! Arithmetic 3PC for any modulus with active security

    Eerikson, H., Keller, M., Orlandi, C., Pullonen, P., Puura, J. & Simkin, M., Jun 2020, 1st Conference on Information-Theoretic Cryptography (ITC 2020). Kalai, Y. T., Smith, A. D. & Wichs, D. (eds.). Schloss Dagstuhl--Leibniz-Zentrum für Informatik, 24 p. 5. (Leibniz International Proceedings in Informatics, LIPIcs, Vol. 163).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

    Open Access
  • 2019

    Commodity-Based 2PC for Arithmetic Circuits

    Damgård, I., Haagh, H., Nielsen, M. & Orlandi, C., 2019, Cryptography and Coding - 17th IMA International Conference, IMACC 2019, Proceedings. Albrecht, M. (ed.). Springer, p. 154-177 24 p. (Lecture Notes in Computer Science, Vol. 11929).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

    Open Access
  • Proof-of-Stake Protocols for Privacy-Aware Blockchains

    Ganesh, C., Orlandi, C. & Tschudi, D., 2019, Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Ishai, Y. & Rijmen, V. (eds.). Cham: Springer, p. 690-719 29 p. (Lecture Notes in Computer Science, Vol. 11476).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  • Proofs of Replicated Storage Without Timing Assumptions

    Damgård, I. B., Ganesh, C. & Orlandi, C., Aug 2019, Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Proceedings. Springer, p. 355-380 25 p. (Lecture Notes in Computer Science, Vol. 11692).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  • Quisquis: A New Design for Anonymous Cryptocurrencies

    Fauzi, P. M., Meiklejohn, S., Mercer, R. H. & Orlandi, C., Nov 2019, Advances in Cryptology – ASIACRYPT 2019. p. 649-678 29 p. (Lecture Notes in Computer Science, Vol. 11921).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  • Sharing Information with Competitors

    Branzei, S., Orlandi, C. & Yang, G., 2019, Algorithmic Game Theory - 12th International Symposium, SAGT 2019, Proceedings: SAGT 2019. Fotakis, D. & Markakis, E. (eds.). Cham: Springer, p. 34-48 15 p. (Lecture Notes in Computer Science, Vol. 11801).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  • 2018

    Can You Trust Your Encrypted Cloud?: An Assessment of SpiderOakONE's Security

    Dalskov, A. P. K. & Orlandi, C., 29 May 2018, ASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security. Kim, J., Ahn, G-J. & Kim, S. (eds.). New York, NY, USA: Association for Computing Machinery, p. 343-355 13 p.

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  • Combining Private Set-Intersection with Secure Two-Party Computation

    Ciampi, M. & Orlandi, C., 2018, Security and Cryptography for Networks - 11th International Conference, SCN 2018, Proceedings. Catalano, D. & De Prisco, R. (eds.). Cham: Springer VS, Vol. 11035. p. 464-482 19 p. (Lecture Notes in Computer Science (LNCS); No. 11035).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  • Yet Another Compiler for Active Security or: Efficient MPC Over Arbitrary Rings

    Damgård, I., Orlandi, C. & Simkin, M., 2018, Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings. Shacham, H. & Boldyreva, A. (eds.). Cham: Springer VS, Vol. 10992. p. 799-829 31 p. (Lecture Notes in Computer Science (LNCS); No. 10992).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  • 2017

    Access Control Encryption for Equality, Comparison, and More

    Fuchsbauer, G., Gay, R., Kowalczyk, L. & Orlandi, C., 1 Jan 2017, Public-Key Cryptography – PKC 2017 - 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings: 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part II. Fehr, S. (ed.). Springer, Berlin, Heidelberg: Springer VS, Vol. 10175. p. 88-118 31 p. (Lecture Notes in Computer Science, Vol. 10175).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  • Faster Zero-Knowledge Protocols and Applications: Invited Talk Abstract

    Orlandi, C., 1 Jan 2017, Innovative Security Solutions for Information Technology and Communications - 10th International Conference,SecITC 2017, Revised Selected Papers: Innovative Security Solutions for Information Technology and Communications. Farshim, P. & Simion, E. (eds.). Springer VS, Vol. 10543. p. 1-11 11 p. (Lecture Notes in Computer Science, Vol. 10543).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  • Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives

    Chase, M., Derler, D., Goldfeder, S., Orlandi, C., Ramacher, S., Rechberger, C., Slamanig, D. & Zaverucha, G., 30 Oct 2017, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: Association for Computing Machinery, p. 1825-1842 18 p.

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  • PrivatePool: Privacy-Preserving Ridesharing

    Hallgren, P. A., Orlandi, C. & Sabelfeld, A., 2017, Proceedings - IEEE 30th Computer Security Foundations Symposium, CSF 2017. IEEE Press, p. 276-291 16 p. 8049726

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  • Revealing Encryption for Partial Ordering

    Haagh, H., Ji, Y., Li, C., Orlandi, C. & Song, Y., 1 Jan 2017, Cryptography and Coding - 16th IMA International Conference, IMACC 2017, Proceedings. O’Neill, M. (ed.). Cham: Springer VS, p. 3-22 20 p. (Lecture Notes in Computer Science, Vol. 10655).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  • 2016

    Access Control Encryption: Enforcing Information Flow with Cryptography

    Damgård, I. B., Haagh, H. F. & Orlandi, C., 2016, Theory of Cryptography - 14th International Conference, TCC 2016-B, Proceedings. Hirt, M. & Smith, A. (eds.). Springer VS, Vol. 9986. p. 547-576 29 p. (Lecture Notes in Computer Science, Vol. 9986).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  • Cross and Clean: Amortized Garbled Circuits with Constant Overhead

    Nielsen, J. B. & Orlandi, C., 2016, Theory of Cryptography - 14th International Conference, TCC 2016-B, Proceedings. Hirt, M. & Smith, A. (eds.). Berlin: Springer VS, Vol. 9985. p. 582-603 22 p. (Lecture Notes in Computer Science (LNCS), Vol. 9985).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  • Non-Interactive Verifiable Secret Sharing for Monotone Circuits

    Bai, G., Damgård, I., Orlandi, C. & Xia, Y., 2016, Progress in Cryptology – AFRICACRYPT 2016 - 8th International Conference on Cryptology in Africa, Proceedings. Pointcheval, D., Nitaj, A. & Rachidi, T. (eds.). Springer VS, Vol. 9646. p. 225-244 20 p. (Lecture Notes in Computer Science (LNCS), Vol. 9646).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  • On the CCA (in)security of MTProto

    Jakobsen, J. & Orlandi, C., 24 Oct 2016, Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices: SPSM '16. New York, NY, USA: Association for Computing Machinery, p. 113-116 4 p.

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  • ZKBoo: Faster Zero-Knowledge for Boolean Circuits

    Giacomelli, I., Madsen, J. & Orlandi, C., 2016, Proceedings of the 25th USENIX Security Symposium: (USENIX Security 16). USENIX - The Advanced Computing Systems Association, p. 1069-1083 16 p.

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

    Open Access
  • 2015

    Privacy-enhancing overlays in bitcoin

    Meiklejohn, S. & Orlandi, C., 2015, Financial Cryptography and Data Security : FC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers. Brenner, M., Christin, N., Johnson, B. & Rohloff, K. (eds.). Springer, Vol. 8976. p. 127-141 15 p. (Lecture Notes in Computer Science).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  • Privacy-Free Garbled Circuits with Applications to Efficient Zero-Knowledge

    Frederiksen, T. K., Nielsen, J. B. & Orlandi, C., 2015, Advances in Cryptology - EUROCRYPT 2015: 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II. Oswald, E. & Fischlin, M. (eds.). Springer VS, p. 191-219 30 p. (Lecture Notes in Computer Science, Vol. 9057).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  • The simplest protocol for oblivious transfer

    Chou, T. & Orlandi, C., 2015, Progress in Cryptology - LATINCRYPT 2015: 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015, Proceedings. Lauter, K. & Rodríguez-Henríquez, F. (eds.). Springer, Vol. 9230. p. 40-58 19 p. (Lecture Notes in Computer Science).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  • 2014

    Framework for Outsourcing of Secure Computation

    Jakobsen, T. P., Nielsen, J. B. & Orlandi, C., 2014, Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, CCSW '14 . Ahn, G-J., Oprea, A. & Safavi-Naini, R. (eds.). Association for Computing Machinery, p. 81-92 12 p.

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review