Chiara Marcolla

Orcid: 0000-0001-8292-9830

According to our database1, Chiara Marcolla authored at least 19 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Breaking the power-of-two barrier: noise estimation for BGV in NTT-friendly rings.
IACR Cryptol. ePrint Arch., 2023

Improving and Automating BFV Parameters Selection: An Average-Case Approach.
IACR Cryptol. ePrint Arch., 2023

FANNG-MPC: Framework for Artificial Neural Networks and Generic MPC.
IACR Cryptol. ePrint Arch., 2023

2022
Finding and Evaluating Parameters for BGV.
IACR Cryptol. ePrint Arch., 2022

Survey on Fully Homomorphic Encryption, Theory, and Applications.
IACR Cryptol. ePrint Arch., 2022

2021
Constant Time Algorithms for ROLLO-I-128.
SN Comput. Sci., 2021

On the decoding of 1-Fibonacci error correcting codes.
Discret. Math. Algorithms Appl., 2021

Exipnos: An Efficient Verifiable Dynamic Symmetric Searchable Encryption Scheme with Forward and Backward Privacy.
Proceedings of the Progress in Cryptology - INDOCRYPT 2021, 2021

2020
Hermitian codes and complete intersections.
Finite Fields Their Appl., 2020

2019
Advances and Challenges of Rank Metric Cryptography Implementations.
Proceedings of the 37th IEEE International Conference on Computer Design, 2019

2016
On the small-weight codewords of some Hermitian codes.
J. Symb. Comput., 2016

Collaborative Multi-Authority KP-ABE for Shorter Keys and Parameters.
IACR Cryptol. ePrint Arch., 2016

Higher Hamming weights for locally recoverable codes on algebraic curves.
Finite Fields Their Appl., 2016

2015
Key-Policy Multi-authority Attribute-Based Encryption.
Proceedings of the Algebraic Informatics - 6th International Conference, 2015

2014
Some security bounds for the DGHV scheme.
IACR Cryptol. ePrint Arch., 2014

Two novel applications of bilinear groups to ABE encryption.
IACR Cryptol. ePrint Arch., 2014

On the Hermitian curve and its intersections with some conics.
Finite Fields Their Appl., 2014

Some security bounds for the key sizes of DGHV scheme.
Appl. Algebra Eng. Commun. Comput., 2014

2011
On the geometry of small weight codewords of dual algebraic geometric codes
CoRR, 2011


  Loading...