Mario Larangeira
Orcid: 0000-0001-7168-898X
According to our database1,
Mario Larangeira
authored at least 40 papers
between 2011 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Adaptively Secure Blockchain-Aided Decentralized Storage Networks: Formalization and Generic Construction.
IACR Cryptol. ePrint Arch., 2025
IACR Cryptol. ePrint Arch., 2025
Proceedings of the 22nd International Conference on Security and Cryptography, 2025
Proceedings of the Applied Cryptography and Network Security, 2025
2024
IACR Cryptol. ePrint Arch., 2024
Proceedings of the Security and Cryptography for Networks - 14th International Conference, 2024
Proceedings of the Cryptology and Network Security - 23rd International Conference, 2024
Proceedings of the Applied Cryptography and Network Security, 2024
2023
Auditable Attribute-Based Credentials Scheme and Its Applications in Contact Tracing.
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Network and System Security - 17th International Conference, 2023
Proceedings of the Financial Cryptography and Data Security, 2023
Proceedings of the Second ACM Data Economy Workshop, 2023
Reducing Latency of DAG-based Consensus in the Asynchronous Setting via the UTXO Model.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023
Proceedings of the Progress in Cryptology - AFRICACRYPT 2023, 2023
2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Environmental Adaptive Privacy Preserving Contact Tracing System: A Construction From Public Key Rerandomizable BLS Signatures.
IEEE Access, 2022
Proceedings of the 19th International Conference on Security and Cryptography, 2022
Proceedings of the 3rd International Conference on Mathematical Research for Blockchain Economy, 2022
Tweakable S<sub>leeve</sub>: A Novel S<sub>leeve</sub> Construction Based on Tweakable Hash Functions.
Proceedings of the 3rd International Conference on Mathematical Research for Blockchain Economy, 2022
Reputation at Stake! A Trust Layer over Decentralized Ledger for Multiparty Computation and Reputation-Fair Lottery.
Proceedings of the Information Security and Cryptology - ICISC 2022, 2022
WOTSwana: A Generalized <i>S</i><sub> leeve </sub> Construction for Multiple Proofs of Ownership.
Proceedings of the Information Security and Cryptology - ICISC 2022, 2022
2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the Provable and Practical Security, 2021
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021
Proceedings of the Financial Cryptography and Data Security, 2021
Proceedings of the Computer Security - ESORICS 2021, 2021
Environmental Adaptive Privacy Preserving Contact Tracing System for Respiratory Infectious Diseases.
Proceedings of the Cyberspace Safety and Security - 13th International Symposium, 2021
Proceedings of the Applied Cryptography and Network Security, 2021
2020
Proceedings of the Security and Cryptography for Networks - 12th International Conference, 2020
Proceedings of the Cryptology and Network Security - 19th International Conference, 2020
2019
IACR Cryptol. ePrint Arch., 2019
ROYALE: A Framework for Universally Composable Card Games with Financial Rewards and Penalties Enforcement.
Proceedings of the Financial Cryptography and Data Security, 2019
2018
Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems, 2018
Kaleidoscope: An Efficient Poker Protocol with Payment Distribution and Penalty Enforcement.
Proceedings of the Financial Cryptography and Data Security, 2018
21 - Bringing Down the Complexity: Fast Composable Protocols for Card Games Without Secret State.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
2016
A Prunable Blockchain Consensus Protocol Based on Non-Interactive Proofs of Past States Retrievability.
CoRR, 2016
2012
Reduction-Centric Non-programmable Security Proof for the Full Domain Hash in the Random Oracle Model.
Proceedings of the Information Security Applications - 13th International Workshop, 2012
2011
J. Internet Serv. Inf. Secur., 2011