Emmanuela Orsini

Orcid: 0000-0002-1917-1833

Affiliations:
  • Bocconi University, Milan, Italy
  • KU Leuven, Belgium (former)


According to our database1, Emmanuela Orsini authored at least 52 papers between 2007 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Row Reduction Techniques for n-Party Garbling.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

Shorter, Tighter, FAESTer: Optimizations and Improved (QROM) Analysis for VOLE-in-the-Head Signatures.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

2024
Scooby: Improved multi-party homomorphic secret sharing based on FHE.
Inf. Comput., 2024

Simple Two-Message OT in the Explicit Isogeny Model.
IACR Commun. Cryptol., 2024

Black-Box (and Fast) Non-malleable Zero Knowledge.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

One Tree to Rule Them All: Optimizing GGM Trees and OWFs for Post-Quantum Signatures.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

2023
Simple Two-Round OT in the Explicit Isogeny Model.
IACR Cryptol. ePrint Arch., 2023

ZK-for-Z2K: MPC-in-the-Head Zero-Knowledge Proofs for ℤ<sub>2<sup>k</sup></sub>.
IACR Cryptol. ePrint Arch., 2023

ZK-for-Z2K: MPC-in-the-Head Zero-Knowledge Proofs for $\mathbb {Z}_{2^k}$.
Proceedings of the Cryptography and Coding - 19th IMA International Conference, 2023

Publicly Verifiable Zero-Knowledge and Post-Quantum Signatures from VOLE-in-the-Head.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

MPC with Delayed Parties over Star-Like Networks.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

2022
Four-Round Black-Box Non-Malleable Commitments from One-Way Permutations.
IACR Cryptol. ePrint Arch., 2022

Four-Round Black-Box Non-malleable Schemes from One-Way Permutations.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

Efficient Proof of RAM Programs from Any Public-Coin Zero-Knowledge System.
Proceedings of the Security and Cryptography for Networks - 13th International Conference, 2022

Scooby: Improved Multi-party Homomorphic Secret Sharing Based on FHE.
Proceedings of the Security and Cryptography for Networks - 13th International Conference, 2022

Feta: Efficient Threshold Designated-Verifier Zero-Knowledge Proofs.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Banquet: Short and Fast Signatures from AES.
Proceedings of the Public-Key Cryptography - PKC 2021, 2021

Large Scale, Actively Secure Computation from LPN and Free-XOR Garbled Circuits.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

Compilation of Function Representations for Secure Computing Paradigms.
Proceedings of the Topics in Cryptology - CT-RSA 2021, 2021

Limbo: Efficient Zero-knowledge MPCitH-based Arguments.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Error Term Checking: Towards Chosen Ciphertext Security without Re-encryption.
Proceedings of the 8th on ASIA Public-Key Cryptography Workshop, 2021

2020
Efficient, Actively Secure MPC with a Dishonest Majority: A Survey.
Proceedings of the Arithmetic of Finite Fields - 8th International Workshop, 2020

Overdrive2k: Efficient Secure MPC over $\mathbb {Z}_{2^k}$ from Somewhat Homomorphic Encryption.
Proceedings of the Topics in Cryptology - CT-RSA 2020, 2020

Efficient Constant-Round MPC with Identifiable Abort and Public Verifiability.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

Semi-commutative Masking: A Framework for Isogeny-Based Protocols, with an Application to Fully Secure Two-Round Isogeny-Based OT.
Proceedings of the Cryptology and Network Security - 19th International Conference, 2020

2019
Overdrive2k: Efficient Secure MPC over Z<sub>2<sup>k</sup></sub> from Somewhat Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2019

BBQ: Using AES in Picnic Signatures.
Proceedings of the Selected Areas in Cryptography - SAC 2019, 2019

Zaphod: Efficiently Combining LSSS and Garbled Circuits in SCALE.
Proceedings of the 7th ACM Workshop on Encrypted Computing & Applied Homomorphic Cryptography, 2019

2018
Secure Oblivious Transfer from Semi-Commutative Masking.
IACR Cryptol. ePrint Arch., 2018

TinyKeys: A New Approach to Efficient Multi-Party Computation.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

Concretely Efficient Large-Scale MPC with Active Security (or, TinyKeys for TinyOT).
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2017
On the Shape of the General Error Locator Polynomial for Cyclic Codes.
IEEE Trans. Inf. Theory, 2017

Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts.
Proceedings of the Computer Security - ESORICS 2017, 2017

Actively Secure 1-out-of-N OT Extension with Application to Private Set Intersection.
Proceedings of the Topics in Cryptology - CT-RSA 2017, 2017

Faster Secure Multi-party Computation of AES and DES Using Lookup Tables.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
Bootstrapping BGV ciphertexts with a wider choice of <i>p</i> and <i>q</i>.
IET Inf. Secur., 2016

Efficient Secure Multiparty Computation with Identifiable Abort.
Proceedings of the Theory of Cryptography - 14th International Conference, 2016

Linear Overhead Optimally-Resilient Robust MPC Using Preprocessing.
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016

MASCOT: Faster Malicious Arithmetic Secure Computation with Oblivious Transfer.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Linear Overhead Robust MPC with Honest Majority Using Preprocessing.
IACR Cryptol. ePrint Arch., 2015

High Performance Multi-Party Computation for Binary Circuits Based on Oblivious Transfer.
IACR Cryptol. ePrint Arch., 2015

Bootstrapping BGV Ciphertexts with a Wider Choice of p and q.
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015

Actively Secure OT Extension with Optimal Overhead.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

A Unified Approach to MPC with Preprocessing Using OT.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2014
Dishonest Majority Multi-Party Computation for Binary Circuits.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

2013
Between a Rock and a Hard Place: Interpolating between MPC and FHE.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

2009
Computing the distance distribution of systematic non-linear codes
CoRR, 2009

Decoding Cyclic Codes: the Cooper Philosophy.
Proceedings of the Gröbner Bases, Coding, and Cryptography, 2009

Gröbner Bases for the Distance Distribution of Systematic Codes.
Proceedings of the Gröbner Bases, Coding, and Cryptography, 2009

An Introduction to Linear and Cyclic Codes.
Proceedings of the Gröbner Bases, Coding, and Cryptography, 2009

2008
Invited Talk: Decoding Cyclic Codes: The Cooper Philosophy.
Proceedings of the Mathematical Methods in Computer Science, 2008

2007
General Error Locator Polynomials for Binary Cyclic Codes With t<=2 and n<63.
IEEE Trans. Inf. Theory, 2007


  Loading...