Diego F. Aranha
Orcid: 0000-0002-2457-0783Affiliations:
- Aarhus University, Denmark
- University of Campinas, Brazil (former)
According to our database1,
Diego F. Aranha
authored at least 105 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on d-nb.info
On csauthors.net:
Bibliography
2024
J. Cryptogr. Eng., September, 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Homomorphic WiSARDs: Efficient Weightless Neural Network training over encrypted data.
CoRR, 2024
Lattice-Based Homomorphic Encryption For Privacy-Preserving Smart Meter Data Analytics.
Comput. J., 2024
A short-list of pairing-friendly curves resistant to the Special TNFS algorithm at the 192-bit security level.
IACR Commun. Cryptol., 2024
2023
Performance of hierarchical transforms in homomorphic encryption: a case study on logistic regression inference.
J. Cryptogr. Eng., September, 2023
User-centric security analysis of MitID: The Danish passwordless digital identity solution.
Comput. Secur., September, 2023
Privacy-preserving edit distance computation using secret-sharing two-party computation.
IACR Cryptol. ePrint Arch., 2023
Faster constant-time evaluation of the Kronecker symbol with application to elliptic curve hashing.
IACR Cryptol. ePrint Arch., 2023
HELIOPOLIS: Verifiable Computation over Homomorphically Encrypted Data from Interactive Oracle Proofs is Practical.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Privacy-Preserving Edit Distance Computation Using Secret-Sharing Two-Party Computation.
Proceedings of the Progress in Cryptology - LATINCRYPT 2023, 2023
2022
IEEE Trans. Inf. Forensics Secur., 2022
IACR Cryptol. ePrint Arch., 2022
Verifiable Mix-Nets and Distributed Decryption for Voting from Lattice-Based Assumptions.
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Homomorphic evaluation of large look-up tables for inference on human genome data in the cloud.
Proceedings of the International Symposium on Computer Architecture and High Performance Computing Workshops, 2022
Proceedings of the Formal Aspects of Component Software - 18th International Conference, 2022
2021
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021
J. Cryptogr. Eng., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Improved Threshold Signatures, Proactive Secret Sharing, and Input Certification from LSS Isomorphisms.
Proceedings of the Progress in Cryptology - LATINCRYPT 2021, 2021
Proceedings of the 9th IEEE/ACM International Conference on Formal Methods in Software Engineering, 2021
Proceedings of the Applied Cryptography and Network Security, 2021
2020
Computing the optimal ate pairing over elliptic curves with embedding degrees 54 and 48 at the 256-bit security level.
Int. J. Appl. Cryptogr., 2020
Log. J. IGPL, 2020
IACR Cryptol. ePrint Arch., 2020
LSS Homomorphisms and Applications to Secure Signatures, Proactive Secret Sharing and Input Certification.
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Proceedings of the FormaliSE@ICSE 2020: 8th International Conference on Formal Methods in Software Engineering, 2020
2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Concurr. Comput. Pract. Exp., 2019
Building secure protocols for extensible distributed coordination through secure extensions.
Comput. Secur., 2019
Comput. Secur., 2019
Proceedings of the 22nd Euromicro Conference on Digital System Design, 2019
Proceedings of the Code-Based Cryptography - 7th International Workshop, 2019
2018
Microprocess. Microsystems, 2018
Fog orchestration for the Internet of Everything: state-of-the-art and research challenges.
J. Internet Serv. Appl., 2018
J. Internet Serv. Appl., 2018
IEEE Secur. Priv., 2018
IEEE Secur. Priv., 2018
Evaluation and Mitigation of Timing Side-Channel Leakages on Multiple-Target Dynamic Binary Translators.
Proceedings of the High Performance Computing Systems - 19th Symposium, 2018
Evaluation of Timing Side-Channel Leakage on a Multiple-Target Dynamic Binary Translator.
Proceedings of the Symposium on High Performance Computing Systems, 2018
Proceedings of the XXXVI Brazilian Symposium on Computer Networks and Distributed Systems, 2018
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018
Proceedings of the Financial Cryptography and Data Security, 2018
2017
A Secure and Efficient Implementation of the Quotient Digital Signature Algorithm (qDSA).
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2017
Efficient Software Implementation of Laddering Algorithms Over Binary Elliptic Curves.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2017
Privacidade em Dados Armazenados em Memória Compartilhada através de Espaços de Tuplas.
Proceedings of the XXXV Brazilian Symposium on Computer Networks and Distributed Systems, 2017
Proceedings of the Progress in Cryptology - LATINCRYPT 2017, 2017
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2017, 2017
2016
Crowdsourced integrity verification of election results - An experience from Brazilian elections.
Ann. des Télécommunications, 2016
Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems, SenSys 2016, 2016
Proceedings of the 2016 Euromicro Conference on Digital System Design, 2016
Proceedings of the 25th International Conference on Compiler Construction, 2016
2015
PUF-Based Mutual Multifactor Entity and Transaction Authentication for Secure Banking.
Proceedings of the Lightweight Cryptography for Security and Privacy, 2015
Proceedings of the 2015 International Conference on Hardware/Software Codesign and System Synthesis, 2015
2014
J. Cryptogr. Eng., 2014
Fast point multiplication algorithms for binary elliptic curves with and without precomputation.
IACR Cryptol. ePrint Arch., 2014
GLV/GLS Decomposition, Power Analysis, and Attacks on ECDSA Signatures with Single-Bit Nonce Bias.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014
2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2013, 2013
2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Secure-TWS: Authenticating Node to Multi-user Communication in Shared Sensor Networks.
Comput. J., 2012
2011
PhD thesis, 2011
Speeding scalar multiplication over binary elliptic curves using the new carry-less multiplication instruction.
J. Cryptogr. Eng., 2011
Software implementation of binary elliptic curves: impact of the carry-less multiplier on scalar multiplication.
IACR Cryptol. ePrint Arch., 2011
TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks.
Comput. Commun., 2011
Proceedings of the Cryptography and Coding - 13th IMA International Conference, 2011
2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
Adv. Math. Commun., 2010
Efficient Software Implementation of Binary Field Arithmetic Using Vector Instruction Sets.
Proceedings of the Progress in Cryptology, 2010
Proceedings of the Topics in Cryptology, 2010
2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of the Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007), 12, 2007
2005
Proceedings of the XXV International Conference of the Chilean Computer Science Society, 2005