Luisa Siniscalchi

Orcid: 0000-0003-1813-1132

Affiliations:
  • Aarhus University, Denmark


According to our database1, Luisa Siniscalchi authored at least 36 papers between 2015 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Heuristics for constrained role mining in the post-processing framework.
J. Ambient Intell. Humaniz. Comput., 2023

Broadcast-Optimal Two Round MPC with Asynchronous Peer-to-Peer Channels.
IACR Cryptol. ePrint Arch., 2023

Round-Optimal Black-Box Multiparty Computation from Polynomial-Time Assumptions.
IACR Cryptol. ePrint Arch., 2023

List Oblivious Transfer and Applications to Round-Optimal Black-Box Multiparty Coin Tossing.
IACR Cryptol. ePrint Arch., 2023

Broadcast-Optimal Four-Round MPC in the Plain Model.
IACR Cryptol. ePrint Arch., 2023

2022
Privacy Amplification With Tamperable Memory via Non-Malleable Two-Source Extractors.
IEEE Trans. Inf. Theory, 2022

Minimizing Setup in Broadcast-Optimal Two Round MPC.
IACR Cryptol. ePrint Arch., 2022

Round-Optimal Multi-Party Computation with Identifiable Abort.
IACR Cryptol. ePrint Arch., 2022

Four-Round Black-Box Non-Malleable Commitments from One-Way Permutations.
IACR Cryptol. ePrint Arch., 2022

Role Mining Heuristics for Permission-Role-Usage Cardinality Constraints.
Comput. J., 2022

Four-Round Black-Box Non-malleable Schemes from One-Way Permutations.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

2021
On Sufficient Oracles for Secure Computation with Identifiable Abort.
IACR Cryptol. ePrint Arch., 2021

Multiparty Computation with Covert Security and Public Verifiability.
IACR Cryptol. ePrint Arch., 2021

Balancing Privacy and Accountability in Blockchain Identity Management.
Proceedings of the Topics in Cryptology - CT-RSA 2021, 2021

Broadcast-Optimal Two Round MPC with an Honest Majority.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

2020
Publicly Verifiable Zero Knowledge from (Collapsing) Blockchains.
IACR Cryptol. ePrint Arch., 2020

Broadcast-Optimal Two Round MPC with an Honest Majority.
IACR Cryptol. ePrint Arch., 2020

Balancing Privacy and Accountability in Blockchain Transactions.
IACR Cryptol. ePrint Arch., 2020

Multi-Client Functional Encryption for Separable Functions.
IACR Cryptol. ePrint Arch., 2020

Two-Source Non-Malleable Extractors and Applications to Privacy Amplification with Tamperable Memory.
IACR Cryptol. ePrint Arch., 2020

Computational and Information-Theoretic Two-Source (Non-Malleable) Extractors.
IACR Cryptol. ePrint Arch., 2020

Managing Constraints in Role Based Access Control.
IEEE Access, 2020

2019
Publicly Verifiable Proofs from Blockchains.
IACR Cryptol. ePrint Arch., 2019

How to Extract Useful Randomness from Unreliable Sources.
IACR Cryptol. ePrint Arch., 2019

An intelligent and private method to profile social network users.
Proceedings of the 2019 IEEE International Conference on Fuzzy Systems, 2019

2018
Continuous NMC Secure Against Permutations and Overwrites, with Applications to CCA Secure Commitments.
IACR Cryptol. ePrint Arch., 2018

PostProcessing in Constrained Role Mining.
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2018, 2018

2017
Delayed-Input Non-Malleable Zero Knowledge and Multi-Party Coin Tossing in Four Rounds.
IACR Cryptol. ePrint Arch., 2017

Round-Optimal Secure Two-Party Computation from Trapdoor Permutations.
IACR Cryptol. ePrint Arch., 2017

Four-Round Concurrent Non-Malleable Commitments from One-Way Functions.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

PRUCC-RM: Permission-Role-Usage Cardinality Constrained Role Mining.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

2016
Online/Offline OR Composition of Sigma Protocols.
IACR Cryptol. ePrint Arch., 2016

On Round-Efficient Non-Malleable Protocols.
IACR Cryptol. ePrint Arch., 2016

Concurrent Non-Malleable Commitments (and More) in 3 Rounds.
IACR Cryptol. ePrint Arch., 2016

2015
A Transform for NIZK Almost as Efficient and General as the Fiat-Shamir Transform Without Programmable Random Oracles.
IACR Cryptol. ePrint Arch., 2015

Improved OR Composition of Sigma-Protocols.
IACR Cryptol. ePrint Arch., 2015


  Loading...