Aarhus University Seal

Publications

List of publications

Sort by: Date | Author | Title

Keilty, A. P., Aranha, D. F., Pagnin, E. & Henríquez, F. R. (2025). That's AmorE: Amortized Efficiency for Pairing Delegation. In Y. Tauman Kalai & S. F. Kamara (Eds.), Advances in Cryptology – CRYPTO 2025 - 45th Annual International Cryptology Conference, Proceedings (pp. 211-246) https://doi.org/10.1007/978-3-032-01913-4_7
Kamp, S. H. (2025). Towards Scalable & Robust Distributed Computing. [PhD dissertation, Aarhus University]. Institut for Datalogi, Aarhus Universitet.
Januzelli, J., Roy, L. & Xu, J. (2025). Under What Conditions Is Encrypted Key Exchange Actually Secure? In S. Fehr & P.-A. Fouque (Eds.), Advances in Cryptology – EUROCRYPT 2025 - 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques: Proceedings (pp. 451-481). Springer Science+Business Media. https://doi.org/10.1007/978-3-031-91124-8_16
Amores-Sesar, I. & Cachin, C. (2025). We Will DAG You. In J. Garcia-Alfaro, K. Barker, G. Navarro-Arribas, C. Pérez-Solà, S. Delgado-Segura, S. Katsikas, F. Cuppens, C. Lambrinoudakis, N. Cuppens-Boulahia, M. Pawlicki & M. Choraś (Eds.), Computer Security. ESORICS 2024 International Workshops - DPM, CBT, and CyberICPS, Bydgoszcz, 2024, Revised Selected Papers (pp. 276-291). Springer Science+Business Media. https://doi.org/10.1007/978-3-031-82349-7_19
Aardal, M. A. & Aranha, D. F. (2024). 2DT-GLS: Faster and Exception-Free Scalar Multiplication in the GLS254 Binary Curve. In B. Smith & H. Wu (Eds.), Selected Areas in Cryptography - 29th International Conference, SAC 2022, Revised Selected Papers (Vol. 13742, pp. 53-74). Springer Science+Business Media. https://doi.org/10.1007/978-3-031-58411-4_3
Årdal, M. A., Aranha, D. F., Boudgoust, K., Kolby, S. & Takahashi, A. (2024). Aggregating Falcon Signatures with LaBRADOR. In L. Reyzin & D. Stebila (Eds.), Advances in Cryptology – CRYPTO 2024 - 44th Annual International Cryptology Conference, Proceedings (pp. 71-106) https://doi.org/10.1007/978-3-031-68376-3_3
Braun, L., Castagnos, G., Damgård, I., Laguillaumie, F., Melissaris, K., Orlandi, C. & Tucker, I. (2024). An Improved Threshold Homomorphic Cryptosystem Based on Class Groups. In C. Galdi & D. H. Phan (Eds.), Security and Cryptography for Networks - 14th International Conference, SCN 2024, Amalfi, Italy, September 11-13, 2024, Proceedings, Part II (pp. 24-46). Springer. https://doi.org/10.1007/978-3-031-71073-5_2
Charbit, P., Couteau, G., Meyer, P. E. & Naserasr, R. (2024). A Note on Low-Communication Secure Multiparty Computation via Circuit Depth-Reduction. 167–199. Abstract from Theory of Cryptography, Milan, Italy. https://eprint.iacr.org/2024/1473
Aranha, D. F., Costache, A., Guimaraes, A. & Soria-Vazquez, E. (2024). A Practical Framework for Verifiable Computation over Encrypted Data. Abstract from 3rd Annual FHE.org Conference on Fully Homomorphic Encryption, Toronto, Canada. https://eprint.iacr.org/2023/1949
Hansen, B., Aamand, J., Blicher-Mathiesen, G., Christiansen, A. V., Claes, N., Dalgaard, T., Frederiksen, R. R., Jacobsen, B. H., Jakobsen, R., Kallesøe, A., Kim, H., Koch, J., Møller, I., Madsen, R. B., Schaper, S., Sandersen, P. B. E., Voutchkova, D. D. & Wiborg, I. (2024). Assessing groundwater denitrification spatially is the key to targeted agricultural nitrogen regulation. Scientific Reports, 14(1), Article 5538. https://doi.org/10.1038/s41598-024-55984-9
Melissaris Papanikolaou, N., Rachuri, R., Baum, C. & Scholl, P. (2024). Cheater Identification on a Budget: MPC with Identifiable Abort from Pairwise MACs. 454-488. Paper presented at 44th Annual International Cryptology Conference - CRYPTO 2024, Santa Barbara, California, United States. https://doi.org/10.1007/978-3-031-68397-8_14
Nan Cheng, Gupta, N., Mitrokotsa, A. & Tozawa, K. (2024). Constant-Round Private Decision Tree Evaluation for Secret Shared Data. Proceedings on Privacy Enhancing Technologies, 2024(1), 397-412. https://doi.org/10.56553/popets-2024-0023
Abram, D., Doerner, J., Ishai, Y. & Narayanan, V. (2024). Constant-Round Simulation-Secure Coin Tossing Extension with Guaranteed Output. In M. Joye & G. Leander (Eds.), Advances in Cryptology – EUROCRYPT 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2024, Proceedings (pp. 122–154). Springer. https://doi.org/10.1007/978-3-031-58740-5_5
Braun, L. (2024). Cryptography After Prime Time. [PhD dissertation, Aarhus University]. Aarhus University.
Damgård, I., Keller, H., Nelson, B., Orlandi, C. & Pagh, R. (2024). Differentially Private Selection from Secure Distributed Computing. In T.-S. Chua, C.-W. Ngo, R. Kumar, H. W. Lauw & R. K.-W. Lee (Eds.), WWW 2024 - Proceedings of the ACM Web Conference (pp. 1103-1114). Association for Computing Machinery. https://doi.org/10.1145/3589334.3645435
Loss, J. & Nielsen, J. B. (2024). Early Stopping for Any Number of Corruptions. In M. Joye & G. Leander (Eds.), Advances in Cryptology – EUROCRYPT 2024: 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings (Vol. III, pp. 457-488). Springer. https://doi.org/10.1007/978-3-031-58734-4_16
Aranha, D. F., Battagliola, M. & Roy, L. D. (2024). Faster coercion-resistant e-voting by encrypted sorting. In E-Vote-ID 2023 (pp. 53-70). Gesellschaft fur Informatik (GI). https://doi.org/10.18420/e-vote-id2023_03
Bui, D., Couteau, G., Meyer, P., Passelègue, A. & Riahinia, M. (2024). Fast Public-Key Silent OT and More from Constrained Naor-Reingold. In M. Joye & G. Leander (Eds.), Advances in Cryptology – EUROCRYPT 2024 (pp. 88-118). Springer. https://doi.org/10.1007/978-3-031-58751-1_4
Neumann, L., Guimaraes, A., Aranha, D. F. & Borin, E. (2024). Homomorphic WiSARDs: Efficient Weightless Neural Network training over encrypted data. Abstract from 4th Workshop on Artificial Intelligence and Cryptography, Zurich, Switzerland. https://arxiv.org/abs/2403.20190
Obremski, M., Ribeiro, J., Roy, L., Standaert, F.-X. & Venturi, D. (2024). Improved Reductions from Noisy to Bounded and Probing Leakages via Hockey-Stick Divergences. In L. Reyzin & D. Stebila (Eds.), Advances in Cryptology -- CRYPTO 2024 (pp. 461-491). Springer Nature. https://doi.org/10.1007/978-3-031-68391-6_14
Brzuska, C., Couteau, G., Egger, C., Karanko, P. & Meyer, P. E. (2024). Instantiating the Hash-Then-Evaluate Paradigm: Strengthening PRFs, PCFs, and OPRFs. In C. Galdi & D. Hieu Phan (Eds.), Security and Cryptography for Networks - 14th International Conference, SCN 2024, Proceedings (pp. 97–116). Springer Nature. https://doi.org/10.1007/978-3-031-71073-5_5
Fleischhacker, N., Larsen, K. G., Obremski, M. & Simkin, M. (2024). Invertible Bloom Lookup Tables with Less Memory and Randomness. In T. Chan, J. Fischer, J. Iacono & G. Herman (Eds.), 32nd Annual European Symposium on Algorithms, ESA 2024 Article 54 Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.ESA.2024.54
Braun, L., Gascón, A., Raykova, M., Schoppmann, P. & Seth, K. (2024). Malicious Security for Sparse Private Histogram. https://eprint.iacr.org/2024/469
Guimaraes, A., Borin, E. & Aranha, D. F. (2024). MOSFHET: Optimized Software for FHE over the Torus. Journal of Cryptographic Engineering, 14(3), 577-593. https://doi.org/10.1007/s13389-024-00359-z
Chillotti, I., Orsini, E., Scholl, P. & Van Leeuwen, B. (2024). Scooby: Improved multi-party homomorphic secret sharing based on FHE. Information and Computation, 297, Article 105133. https://doi.org/10.1016/j.ic.2023.105133
Keller, H., Möllering, H., Schneider, T., Tkachenko, O. & Zhao, L. (2024). Secure Noise Sampling for DP in MPC with Finite Precision. In ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and Security Article 25 Association for Computing Machinery. https://doi.org/10.1145/3664476.3664490
Abram, D., Roy, L. & Scholl, P. (2024). Succinct Homomorphic Secret Sharing. In M. Joye & G. Leander (Eds.), Advances in Cryptology -- EUROCRYPT 2024 (pp. 301-330). Springer Nature. https://doi.org/10.1007/978-3-031-58751-1_11
Melissaris Papanikolaou, N., Ravi, D. & Yakoubov, S. (2024). Threshold-Optimal MPC With Friends and Foes. In A. Chattopadhyay, S. Bhasin, S. Picek & C. Rebeiro (Eds.), Progress in Cryptology – INDOCRYPT 2023: 24th International Conference on Cryptology in India, Goa, India, December 10–13, 2023, Proceedings, Part II (Vol. 2, pp. 3-24). Springer. https://doi.org/10.1007/978-3-031-56235-8_1
Grønkjær Jensen, M. V., Kjeldsen, H.-C., Skriver Nielsen, A., Olesen, N. B. & Aranha, D. F. (2024). Verifying ElectionGuard: a theoretical and empirical analysis. In E-Vote-ID 2024 - Ninth International Joint Conference on Electronic Voting: Proceedings (pp. 17-33). Gesellschaft fur Informatik (GI). https://doi.org/10.18420/e-vote-id2024_01
Aranha, D. F., El Housni, Y. & Guillevic, A. (2023). A survey of elliptic curves for proof systems. Designs, Codes and Cryptography, 91(11), 3333–3378. https://doi.org/10.1007/s10623-022-01135-y
Roy, L. & Xu, J. (2023). A Universally Composable PAKE with Zero Communication Cost: (And Why It Shouldn’t Be Considered UC-Secure). In A. Boldyreva & V. Kolesnikov (Eds.), Public-Key Cryptography – PKC 2023: 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7–10, 2023, Proceedings, Part I (pp. 714-743). Springer. https://doi.org/10.1007/978-3-031-31368-4_25
Ciampi, M., Damgård, I., Ravi, D., Siniscalchi, L., Xia, Y. & Yakoubov, S. (2023). Broadcast-Optimal Four-Round MPC in the Plain Model. In G. Rothblum & H. Wee (Eds.), Theory of Cryptography: 21st International Conference, TCC 2023, Taipei, Taiwan, November 29 – December 2, 2023, Proceedings, Part II (pp. 3-32). Springer. https://doi.org/10.1007/978-3-031-48618-0_1
Damgård, I., Ravi, D., Siniscalchi, L. & Yakoubov, S. (2023). Broadcast-Optimal Two Round MPC with Asynchronous Peer-to-Peer Channels. In A. Aly & M. Tibouchi (Eds.), Progress in Cryptology – LATINCRYPT 2023: 8th International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2023, Quito, Ecuador, October 3–6, 2023, Proceedings (pp. 87-106). Springer. https://doi.org/10.1007/978-3-031-44469-2_5
Chiang, J. H. Y., David, B., Gama, M. & Lebeda, C. J. (2023). Correlated-Output Differential Privacy and Applications to Dark Pools. In J. Bonneau & S. M. Weinberg (Eds.), 5th Conference on Advances in Financial Technologies, AFT 2023 Article 11 Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.AFT.2023.11
Baum, C., David, B., Dowsley, R., Kishore, R., Nielsen, J. B. & Oechsner, S. (2023). CRAFT: Composable Randomness Beacons and Output-Independent Abort MPC From Time. In A. Boldyreva & V. Kolesnikov (Eds.), Public-Key Cryptography – PKC 2023: 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7–10, 2023, Proceedings, Part I (Vol. 1, pp. 439-470). Springer Science+Business Media. https://doi.org/10.1007/978-3-031-31368-4_16
Abram, D., Beimel, A., Ishai, Y., Kushilevitz, E. & Narayanan, V. (2023). Cryptography from Planted Graphs: Security with Logarithmic-Size Messages. 286-315. Paper presented at Theory of Cryptography. TCC 2023, Taipei, Taiwan. https://doi.org/10.1007/978-3-031-48615-9_11
Campanelli, M., Hall-Andersen, M. N. & Kamp, S. H. (2023). Curve Trees: Practical and Transparent Zero-Knowledge Accumulators. In J. Calandrino & C. Troncoso (Eds.), SEC '23: Proceedings of the 32nd USENIX Conference on Security Symposium (pp. 4391–4408). Article 246 Association for Computing Machinery. https://doi.org/10.5555/3620237.3620483
Larsen, K. G., Obremski, M. & Simkin, M. (2023). Distributed Shuffling in Adversarial Environments. In K.-M. Chung (Ed.), 4th Conference on Information-Theoretic Cryptography, ITC 2023 Article 10 Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.ITC.2023.10
Chiang, J. H. Y., David, B., Eyal, I. & Gong, T. (2023). FairPoS: Input Fairness in Permissionless Consensus. In J. Bonneau & S. M. Weinberg (Eds.), 5th Conference on Advances in Financial Technologies, AFT 2023 Article 10 Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.AFT.2023.10
Aranha, D. F., Hvass, B. S., Spitters, B. & Tibouchi, M. (2023). Faster constant-time evaluation of the Kronecker symbol with application to elliptic curve hashing. In CCS'23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security (pp. 3228-3238). Association for Computing Machinery. https://doi.org/10.1145/3576915.3616597
Braun, L., Huppert, M., Khayata, N., Schneider, T. & Tkachenko, O. (2023). FUSE - Flexible File Format and Intermediate Representation for Secure Multi-Party Computation. In J. Liu, Y. Xiang, S. Nepal & G. Tsudik (Eds.), ASIA CCS 2023 - Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security (pp. 649-663). Association for Computing Machinery. https://doi.org/10.1145/3579856.3590340