Afonso Arriaga

Orcid: 0000-0002-1967-3390

According to our database1, Afonso Arriaga authored at least 15 papers between 2012 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Tempo: ML-KEM to PAKE Compiler Resilient to Timing Attacks.
IACR Cryptol. ePrint Arch., 2025

NoIC: PAKE from KEM without Ideal Ciphers.
IACR Cryptol. ePrint Arch., 2025

2024
C'est Très CHIC: A Compact Password-Authenticated Key Exchange from Lattice-Based KEM.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

SweetPAKE: Key exchange with decoy passwords.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
Wireless-Channel Key Exchange.
Proceedings of the Topics in Cryptology - CT-RSA 2023, 2023

2019
Novel Collaborative Filtering Recommender Friendly to Privacy Protection.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

2018
CryptoRec: Secure Recommendations as a Service.
CoRR, 2018

Facilitating Privacy-preserving Recommendation-as-a-Service with Machine Learning.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Private Functional Encryption - Hiding What Cannot Be Learned Through Function Evaluation.
PhD thesis, 2017

Together or Alone: The Price of Privacy in Joint Learning.
CoRR, 2017

2016
Updatable Functional Encryption.
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016

Private Functional Encryption: Indistinguishability-Based Definitions and Constructions from Obfuscation.
Proceedings of the Progress in Cryptology - INDOCRYPT 2016, 2016

2014
Trapdoor Privacy in Asymmetric Searchable Encryption Schemes.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014

2013
Trapdoor Privacy in Asymmetric Searchable Encryption Schemes.
IACR Cryptol. ePrint Arch., 2013

2012
On the Joint Security of Signature and Encryption Schemes under Randomness Reuse: Efficiency and Security Amplification.
Proceedings of the Applied Cryptography and Network Security, 2012


  Loading...