Emmanuela Orsini
Orcid: 0000-0002-1917-1833Affiliations:
- Bocconi University, Milan, Italy
- KU Leuven, Belgium (former)
According to our database1,
Emmanuela Orsini
authored at least 50 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
On csauthors.net:
Bibliography
2024
Inf. Comput., 2024
One Tree to Rule Them All: Optimizing GGM Trees and OWFs for Post-Quantum Signatures.
IACR Cryptol. ePrint Arch., 2024
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024
2023
IACR Cryptol. ePrint Arch., 2023
Publicly Verifiable Zero-Knowledge and Post-Quantum Signatures From VOLE-in-the-Head.
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Cryptography and Coding - 19th IMA International Conference, 2023
2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the Theory of Cryptography - 20th International Conference, 2022
2021
High-Performance Multi-party Computation for Binary Circuits Based on Oblivious Transfer.
J. Cryptol., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
2020
IACR Cryptol. ePrint Arch., 2020
Overdrive2k: Efficient Secure MPC over $\mathbb {Z}_{2^k}$ from Somewhat Homomorphic Encryption.
Proceedings of the Topics in Cryptology - CT-RSA 2020, 2020
Semi-commutative Masking: A Framework for Isogeny-Based Protocols, with an Application to Fully Secure Two-Round Isogeny-Based OT.
Proceedings of the Cryptology and Network Security - 19th International Conference, 2020
2019
Overdrive2k: Efficient Secure MPC over Z<sub>2<sup>k</sup></sub> from Somewhat Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
2017
IEEE Trans. Inf. Theory, 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
2016
IET Inf. Secur., 2016
Actively Secure 1-out-of-N OT Extension with Application to Private Set Intersection.
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016
2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
2013
IACR Cryptol. ePrint Arch., 2013
2009
Proceedings of the Gröbner Bases, Coding, and Cryptography, 2009
Proceedings of the Gröbner Bases, Coding, and Cryptography, 2009
Proceedings of the Gröbner Bases, Coding, and Cryptography, 2009
2008
Proceedings of the Mathematical Methods in Computer Science, 2008
2007
IEEE Trans. Inf. Theory, 2007