Antigoni Polychroniadou

According to our database1, Antigoni Polychroniadou authored at least 39 papers between 2012 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2022
MicroFedML: Privacy Preserving Federated Learning for Small Weights.
IACR Cryptol. ePrint Arch., 2022

Collusion Resistant Federated Learning with Oblivious Distributed Differential Privacy.
CoRR, 2022

Lightweight, Maliciously Secure Verifiable Function Secret Sharing.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

2021
Round-Optimal Secure Multi-party Computation.
J. Cryptol., 2021

Unconditional Communication-Efficient MPC via Hall's Marriage Theorem.
IACR Cryptol. ePrint Arch., 2021

ATLAS: Efficient and Scalable MPC in the Honest Majority Setting.
IACR Cryptol. ePrint Arch., 2021

Kicking-the-Bucket: Fast Privacy-Preserving Trading Using Buckets.
IACR Cryptol. ePrint Arch., 2021

Phoenix: Secure Computation in an Unstable Network with Dropouts and Comebacks.
IACR Cryptol. ePrint Arch., 2021

Lightweight, Verifiable Function Secret Sharing and its Applications.
IACR Cryptol. ePrint Arch., 2021

Prio+: Privacy Preserving Aggregate Statistics via Boolean Shares.
IACR Cryptol. ePrint Arch., 2021

Privacy-preserving portfolio pricing.
Proceedings of the ICAIF'21: 2nd ACM International Conference on AI in Finance, Virtual Event, November 3, 2021

ACCO: Algebraic Computation with Comparison.
Proceedings of the CCSW@CCS '21: Proceedings of the 2021 on Cloud Computing Security Workshop, 2021

2020
Constant-Overhead Unconditionally Secure Multiparty Computation over Binary Fields.
IACR Cryptol. ePrint Arch., 2020

Small Memory Robust Simulation of Client-Server Interactive Protocols over Oblivious Noisy Channels.
Proceedings of the 2020 ACM-SIAM Symposium on Discrete Algorithms, 2020

CryptoCredit: securely training fair models.
Proceedings of the ICAIF '20: The First ACM International Conference on AI in Finance, 2020

Differentially private secure multi-party computation for federated learning in financial applications.
Proceedings of the ICAIF '20: The First ACM International Conference on AI in Finance, 2020

SecretMatch: inventory matching from fully homomorphic encryption.
Proceedings of the ICAIF '20: The First ACM International Conference on AI in Finance, 2020

Privacy-Preserving Dark Pools.
Proceedings of the 19th International Conference on Autonomous Agents and Multiagent Systems, 2020

2019
Succinct Non-Interactive Secure Computation.
IACR Cryptol. ePrint Arch., 2019

2018
More is Less: Perfectly Secure Oblivious Algorithms in the Multi-Server Setting.
IACR Cryptol. ePrint Arch., 2018

Limits of Practical Sublinear Secure Computation.
IACR Cryptol. ePrint Arch., 2018

Two-Round Adaptively Secure Multiparty Computation from Standard Assumptions.
Proceedings of the Theory of Cryptography - 16th International Conference, 2018

2017
Constant Round Adaptively Secure Protocols in the Tamper-Proof Hardware Model.
IACR Cryptol. ePrint Arch., 2017

Laconic Oblivious Transfer and its Applications.
IACR Cryptol. ePrint Arch., 2017

Four Round Secure Computation without Setup.
IACR Cryptol. ePrint Arch., 2017

2016
The Exact Round Complexity of Secure Computation.
IACR Cryptol. ePrint Arch., 2016

Composable Security in the Tamper-Proof Hardware Model Under Minimal Complexity.
Proceedings of the Theory of Cryptography - 14th International Conference, 2016

Adaptively Secure Multi-Party Computation from LWE (via Equivocal FHE).
Proceedings of the Public-Key Cryptography - PKC 2016, 2016

On the Communication Required for Unconditionally Secure Multiplication.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

2015
Round-Optimal Token-Based Secure Computation.
IACR Cryptol. ePrint Arch., 2015

On the Communication required for Unconditionally Secure Multiplication.
IACR Cryptol. ePrint Arch., 2015

Efficient Leakage Resilient Circuit Compilers.
Proceedings of the Topics in Cryptology, 2015

Efficient Multi-party Computation: From Passive to Active Security via Secure SIMD Circuits.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

2014
Two-Round Adaptively Secure MPC from Indistinguishability Obfuscation.
IACR Cryptol. ePrint Arch., 2014

Adaptively Secure UC Constant Round Multi-Party Computation Protocols.
IACR Cryptol. ePrint Arch., 2014

2012
A Coding-Theoretic Approach to Recovering Noisy RSA Keys.
IACR Cryptol. ePrint Arch., 2012

A Compatible Implementation between Identity-based and Certificateless Encryption Schemes.
Proceedings of the WEBIST 2012 - Proceedings of the 8th International Conference on Web Information Systems and Technologies, Porto, Portugal, 18, 2012

Improved NetArgus - A Suite of Wi-fi Positioning & SNMP Monitor.
Proceedings of the SIGMAP and WINSYS 2012, 2012

The Concept of Compatibility between Identity-based and Certificateless Encryption Schemes.
Proceedings of the SECRYPT 2012, 2012


  Loading...