Enrique Larraia

Orcid: 0009-0004-6801-0667

According to our database1, Enrique Larraia authored at least 19 papers between 2012 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Enforcing arbitrary constraints on Bitcoin transactions.
IACR Cryptol. ePrint Arch., 2025

2024
How to Redact the Bitcoin Backbone Protocol.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2024

Practical Implementation of Pairing-Based zkSNARK in Bitcoin Script.
Proceedings of the Computer Security. ESORICS 2024 International Workshops, 2024

2023
Private Timestamps and Selective Verification of Notarised Data on a Blockchain.
IACR Cryptol. ePrint Arch., 2023

Publicly Verifiable Auctions with Privacy.
Proceedings of the Financial Cryptography and Data Security. FC 2023 International Workshops, 2023

NFT Trades in Bitcoin with Off-Chain Receipts.
Proceedings of the Applied Cryptography and Network Security Workshops, 2023

2022
sVote with Control Components Voting Protocol. Computational Proof of Complete Verifiability and Privacy.
IACR Cryptol. ePrint Arch., 2022

2021
How (not) to Achieve both Coercion Resistance and Cast as Intended Verifiability in Remote eVoting.
Proceedings of the Cryptology and Network Security - 20th International Conference, 2021

2020
Multilinear Maps from Obfuscation.
J. Cryptol., 2020

2018
Graded Encoding Schemes from Obfuscation.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

2017
Notes On GGH13 Without The Presence Of Ideals.
IACR Cryptol. ePrint Arch., 2017

Notes on GGH13 Without the Presence of Ideals.
Proceedings of the Cryptography and Coding - 16th IMA International Conference, 2017

2016
Multilinear Maps from Obfuscation.
Proceedings of the Theory of Cryptography - 13th International Conference, 2016

2015
Universally composable protocols for multi-party computation and oblivious transfer.
PhD thesis, 2015

High Performance Multi-Party Computation for Binary Circuits Based on Oblivious Transfer.
IACR Cryptol. ePrint Arch., 2015

2014
Extending Oblivious Transfer Efficiently - or - How to Get Active Security with Constant Cryptographic Overhead.
Proceedings of the Progress in Cryptology - LATINCRYPT 2014, 2014

Dishonest Majority Multi-Party Computation for Binary Circuits.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

2013
Practical Covertly Secure MPC for Dishonest Majority - Or: Breaking the SPDZ Limits.
Proceedings of the Computer Security - ESORICS 2013, 2013

2012
Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocol.
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012


  Loading...