Emmanuela Orsini

Orcid: 0000-0002-1917-1833

Affiliations:
  • KU Leuven, Belgium


According to our database1, Emmanuela Orsini authored at least 47 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
One Tree to Rule Them All: Optimizing GGM Trees and OWFs for Post-Quantum Signatures.
IACR Cryptol. ePrint Arch., 2024

2023
Simple Two-Round OT in the Explicit Isogeny Model.
IACR Cryptol. ePrint Arch., 2023

MPC With Delayed Parties Over Star-Like Networks.
IACR Cryptol. ePrint Arch., 2023

ZK-for-Z2K: MPC-in-the-Head Zero-Knowledge Proofs for ℤ<sub>2<sup>k</sup></sub>.
IACR Cryptol. ePrint Arch., 2023

Publicly Verifiable Zero-Knowledge and Post-Quantum Signatures From VOLE-in-the-Head.
IACR Cryptol. ePrint Arch., 2023

ZK-for-Z2K: MPC-in-the-Head Zero-Knowledge Proofs for $\mathbb {Z}_{2^k}$.
Proceedings of the Cryptography and Coding - 19th IMA International Conference, 2023

2022
TinyKeys: A New Approach to Efficient Multi-Party Computation.
J. Cryptol., 2022

Efficient, Actively Secure MPC with a Dishonest Majority: a Survey.
IACR Cryptol. ePrint Arch., 2022

Efficient Proof of RAM Programs from Any Public-Coin Zero-Knowledge System.
IACR Cryptol. ePrint Arch., 2022

Four-Round Black-Box Non-Malleable Commitments from One-Way Permutations.
IACR Cryptol. ePrint Arch., 2022

Scooby: Improved Multi-Party Homomorphic Secret Sharing Based on FHE.
IACR Cryptol. ePrint Arch., 2022

Feta: Efficient Threshold Designated-Verifier Zero-Knowledge Proofs.
IACR Cryptol. ePrint Arch., 2022

Four-Round Black-Box Non-malleable Schemes from One-Way Permutations.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

2021
High-Performance Multi-party Computation for Binary Circuits Based on Oblivious Transfer.
J. Cryptol., 2021

Limbo: Efficient Zero-knowledge MPCitH-based Arguments.
IACR Cryptol. ePrint Arch., 2021

Error Term Checking: Towards Chosen Ciphertext Security without Re-encryption.
IACR Cryptol. ePrint Arch., 2021

Large Scale, Actively Secure Computation from LPN and Free-XOR Garbled Circuits.
IACR Cryptol. ePrint Arch., 2021

Banquet: Short and Fast Signatures from AES.
IACR Cryptol. ePrint Arch., 2021

Compilation of Function Representations for Secure Computing Paradigms.
IACR Cryptol. ePrint Arch., 2021

2020
Efficient Constant-Round MPC with Identifiable Abort and Public Verifiability.
IACR Cryptol. ePrint Arch., 2020

Overdrive2k: Efficient Secure MPC over $\mathbb {Z}_{2^k}$ from Somewhat Homomorphic Encryption.
Proceedings of the Topics in Cryptology - CT-RSA 2020, 2020

Semi-commutative Masking: A Framework for Isogeny-Based Protocols, with an Application to Fully Secure Two-Round Isogeny-Based OT.
Proceedings of the Cryptology and Network Security - 19th International Conference, 2020

2019
Overdrive2k: Efficient Secure MPC over Z<sub>2<sup>k</sup></sub> from Somewhat Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2019

BBQ: Using AES in Picnic Signatures.
IACR Cryptol. ePrint Arch., 2019

Zaphod: Efficiently Combining LSSS and Garbled Circuits in SCALE.
IACR Cryptol. ePrint Arch., 2019

2018
Concretely Efficient Large-Scale MPC with Active Security (or, TinyKeys for TinyOT).
IACR Cryptol. ePrint Arch., 2018

Secure Oblivious Transfer from Semi-Commutative Masking.
IACR Cryptol. ePrint Arch., 2018

2017
On the Shape of the General Error Locator Polynomial for Cyclic Codes.
IEEE Trans. Inf. Theory, 2017

Faster Secure Multi-Party Computation of AES and DES Using Lookup Tables.
IACR Cryptol. ePrint Arch., 2017

Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts.
IACR Cryptol. ePrint Arch., 2017

2016
Bootstrapping BGV ciphertexts with a wider choice of <i>p</i> and <i>q</i>.
IET Inf. Secur., 2016

Actively Secure 1-out-of-N OT Extension with Application to Private Set Intersection.
IACR Cryptol. ePrint Arch., 2016

MASCOT: Faster Malicious Arithmetic Secure Computation with Oblivious Transfer.
IACR Cryptol. ePrint Arch., 2016

Efficient Secure Multiparty Computation with Identifiable Abort.
IACR Cryptol. ePrint Arch., 2016

Linear Overhead Optimally-Resilient Robust MPC Using Preprocessing.
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016

2015
Actively Secure OT Extension with Optimal Overhead.
IACR Cryptol. ePrint Arch., 2015

A Unified Approach to MPC with Preprocessing using OT.
IACR Cryptol. ePrint Arch., 2015

Linear Overhead Robust MPC with Honest Majority Using Preprocessing.
IACR Cryptol. ePrint Arch., 2015

2014
Bootstrapping BGV Ciphertexts With A Wider Choice of p and q.
IACR Cryptol. ePrint Arch., 2014

Dishonest Majority Multi-Party Computation for Binary Circuits.
IACR Cryptol. ePrint Arch., 2014

2013
Between a Rock and a Hard Place: Interpolating Between MPC and FHE.
IACR Cryptol. ePrint Arch., 2013

2009
Computing the distance distribution of systematic non-linear codes
CoRR, 2009

Decoding Cyclic Codes: the Cooper Philosophy.
Proceedings of the Gröbner Bases, Coding, and Cryptography, 2009

Gröbner Bases for the Distance Distribution of Systematic Codes.
Proceedings of the Gröbner Bases, Coding, and Cryptography, 2009

An Introduction to Linear and Cyclic Codes.
Proceedings of the Gröbner Bases, Coding, and Cryptography, 2009

2008
Invited Talk: Decoding Cyclic Codes: The Cooper Philosophy.
Proceedings of the Mathematical Methods in Computer Science, 2008

2007
General Error Locator Polynomials for Binary Cyclic Codes With t<=2 and n<63.
IEEE Trans. Inf. Theory, 2007


  Loading...