Aarhus University Seal

Publications

List of publications

Sort by: Date | Author | Title

Cohen, R., Doerner, J., Lee, E., Lysyanskaya, A. & Roy, L. (2026). An Unstoppable Ideal Functionality for Signatures and a Modular Analysis of the Dolev-Strong Broadcast. In B. Applebaum & H. Lin (Eds.), Theory of Cryptography - 23rd International Conference, TCC 2025, Proceedings (pp. 675-708). Springer. https://doi.org/10.1007/978-3-032-12290-2_22
Canetti, R., Damgård, I. B., Kolby, S., Ravi, D. & Yakoubov, S. (2026). Deniable Secret Sharing. In 23rd International Conference, TCC 2025, proceedings Part II https://doi.org/10.1007/978-3-032-12293-3_13
Cominetti, E., Simplicio, M., Aranha, D. F., Matias, P. & Araujo, R. (2026). E2Easy: a simple lattice-based in-person end-to-end voting scheme. In B. Haslhofer, J. Xu, F. Victor, M. Bartoletti, A. Bracciali, K. Matsuura, J. Nabrzyski, V. Estrada-Galiñanes, C. Tessone, J. Budurushi & K. Marky (Eds.), Financial Cryptography and Data Security. FC 2025 International Workshops - CoDecFin, FinTeAchin, VOTING, 2025, Revised Selected Papers (pp. 281-296). Springer. https://doi.org/10.1007/978-3-032-00495-6_16
van Baarsen, A. N. & Pu, S. (2026). Fuzzy Private Set Intersection from VOLE. In G. Hanaoka & B.-Y. Yang (Eds.), Advances in Cryptology – ASIACRYPT 2025 : 31st International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, VIC, Australia, December 8–12, 2025, Proceedings, Part V (pp. 327-360). Springer. https://doi.org/10.1007/978-981-95-5116-3_11
Acharya, A., Hazay, C. & Venkitasubramaniam, M. (2026). On Achieving "Best-in-the-Multiverse" MPC. In Theory of Cryptography: 23rd International Conference, TCC 2025, Aarhus, Denmark, December 1–5, 2025, Proceedings, Part I (Vol. 16268, pp. 119–151). Springer LNCS. https://doi.org/10.1007/978-3-032-12287-2_5
Abram, D., Fehr, S., Obremski, M. & Scholl, P. (2026). On the Impossibility of Actively Secure Distributed Samplers. In B. Applebaum & H. Lin (Eds.), Theory of Cryptography: 23rd International Conference, TCC 2025, Aarhus, Denmark, December 1–5, 2025, Proceedings, Part IV (pp. 547-581). Springer Nature. https://doi.org/10.1007/978-3-032-12290-2_18
Escudero, D. & Damgård, I. (2026). Preface. In D. Escudero & I. Damgård (Eds.), Progress in Cryptology – LATINCRYPT 2025: 9th International Conference on Cryptology and Information Security in Latin America, Medellín, Colombia, October 1–3, 2025, Proceedings (pp. v). Springer. https://doi.org/10.1007/978-3-032-06754-8
Behera, A. R., Meyer, P., Orlandi, C., Roy, L. & Scholl, P. (2026). Privately Constrained PRFs from DCR: Puncturing and Bounded Waring Rank. In B. Applebaum & H. Lin (Eds.), Theory of Cryptography - 23rd International Conference, TCC 2025, Proceedings (pp. 301-332). Springer. https://doi.org/10.1007/978-3-032-12287-2_11
Chiang, J. H.-Y., Damgård, I., Orlandi, C., Pancholi, M. & Simkin, M. (2026). Securely Computing One-Sided Matching Markets. In C. Garman & P. Moreno-Sanchez (Eds.), Financial Cryptography and Data Security (pp. 126-143). Springer Nature. https://doi.org/10.1007/978-3-032-07024-1_8
Abram, D., Malavolta, G. & Roy, L. (2026). Slightly Sublinear Trapdoor Hash Functions and PIR from Low-Noise LPN. In B. Applebaum & H. Lin (Eds.), Theory of Cryptography - 23rd International Conference, TCC 2025, Proceedings (pp. 280-300). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-032-12287-2_10
Acharya, A., Hazay, C., Prabhakaran, M. & Kolesnikov, V. (2026). Towards Building Efficient SCALES Protocols. In Advances in Cryptology – ASIACRYPT 2025: 31st International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, VIC, Australia, December 8–12, 2025, Proceedings, Part V (Vol. 16249). Springer LNCS. https://doi.org/10.1007/978-981-95-5116-3_2
Argo, S., Venema, M., Riepel, D., Güneysu, T. & Aranha, D. F. (2025). ABE Cubed: Advanced Benchmarking Extensions for ABE Squared. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2025(4), 544-587. https://doi.org/10.46586/tches.v2025.i4.544-587
Braun, L., Castagnos, G., Damgård, I., Laguillaumie, F., Melissaris, K., Orlandi, C. & Tucker, I. (2025). An Improved Threshold Homomorphic Cryptosystem Based on Class Groups. Cryptography and Communications, 17(5), 1367-1406. https://doi.org/10.1007/S12095-025-00826-2
Charbit, P., Couteau, G., Meyer, P. & Naserasr, R. (2025). A Note on Low-Communication Secure Multiparty Computation via Circuit Depth-Reduction. In E. Boyle, E. Boyle & M. Mahmoody (Eds.), Theory of Cryptography - 22nd International Conference, TCC 2024, Proceedings (pp. 167-199). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-031-78023-3_6
Abraham, I., Chouatt, E., Gilad, Y., Stern, G. & Yakoubov, S. (2025). Asynchronous Algorand: Reaching Agreement with Near Linear Communication and Constant Expected Time. In ACM Symposium on Principles of Distributed Computing (PODC 2025) https://doi.org/10.1145/3732772.3733533
Amores Sesar, I., Cachin, C., Villacis, J. & Zanolini, L. (2025). DAG-based Consensus with Asymmetric Trust. In PODC '25: Proceedings of the ACM Symposium on Principles of Distributed Computing
Amores Sesar, I., Grøndal, V. H., Holmgård, A. & Ottendal, M. (2025). DAG It Off: Latency Prefers No Common Coins. In 39th International Symposium on Distributed Computing (DISC 2025)
Ciampi, M., Sternad, J. & Xia, Y. (2025). Delayed-Input Multi-party Computation. In M. Fischlin & V. Moonsamy (Eds.), Applied Cryptography and Network Security - 23rd International Conference, ACNS 2025, Proceedings (pp. 339–368) https://doi.org/10.1007/978-3-031-95761-1_12
Boyle, E., Kohl, L., Li, Z. & Scholl, P. (2025). Direct FSS Constructions for Branching Programs and More from PRGs with Encoded-Output Homomorphism. In K.-M. Chung & Y. Sasaki (Eds.), Advances in Cryptology – ASIACRYPT 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings (pp. 266-298). Springer Nature. https://doi.org/10.1007/978-981-96-0938-3_9
Damgård, I. B., Ravi, D., Roy, L. D., Tschudi, D. & Yakoubov, S. (2025). Efficient Secure Communication Over Dynamic Incomplete Networks With Minimal Connectivity. In E. Boyle, E. Boyle & M. Mahmoody (Eds.), Theory of Cryptography - 22nd International Conference, TCC 2024, Proceedings (pp. 266–292). Springer. https://doi.org/10.1007/978-3-031-78023-3_9
Aranha, D. F., Costache, A., Guimaraes, A. & Soria-Vazquez, E. (2025). HELIOPOLIS: Verifiable Computation over Homomorphically Encrypted Data from Interactive Oracle Proofs is Practical. In K.-M. Chung & Y. Sasaki (Eds.), Advances in Cryptology – ASIACRYPT 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings (Vol. V, pp. 302-334). Springer. https://doi.org/10.1007/978-981-96-0935-2_10
Neumann, L., Guimaraes, A., Aranha, D. F. & Borin, E. (2025). Homomorphic WiSARDs: Efficient Weightless Neural Network training over encrypted data. In M. Fischlin & V. Moonsamy (Eds.), Applied Cryptography and Network Security - 23rd International Conference, ACNS 2025, Proceedings (pp. 309-338) https://doi.org/10.1007/978-3-031-95767-3_12
Agarwal, A., Bienstock, A., Damgård, I. & Escudero, D. (2025). Honest Majority GOD MPC with O(depth(C)) Rounds and Low Online Communication. In K.-M. Chung & Y. Sasaki (Eds.), Advances in Cryptology – ASIACRYPT 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings (pp. 234-265). Springer Nature. https://doi.org/10.1007/978-981-96-0938-3_8
Kolby, S., Roy, L. D., Sternad, J. & Yakoubov, S. (2025). Information-Theoretic Random-Index PIR. In N. Gilboa (Ed.), 6th Conference on Information-Theoretic Cryptography (ITC 2025) (pp. 5:1-5:15). Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.ITC.2025.5
Abram, D., Malavolta, G. & Roy, L. (2025). Key-Homomorphic Computations for RAM: Fully Succinct Randomised Encodings and More. In Y. Tauman Kalai & S. F. Kamara (Eds.), Advances in Cryptology – CRYPTO 2025 - 45th Annual International Cryptology Conference, Proceedings (pp. 236-268). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-032-01881-6_8
Constantin-Sukul, L. R. J., Ø. Gammelgaard, R., Henriksen, A. & Aranha, D. F. (2025). Key recovery on static Kyber based on transient execution attacks. In Proceedings of the 1st Microarchitecture Security Conference https://doi.org/10.46586/uasc.2025.006
Agarwal, A., Baum, C., Braun, L. & Scholl, P. (2025). Low-Bandwidth Mixed Arithmetic in VOLE-Based ZK from Low-Degree PRGs. In S. Fehr & P.-A. Fouque (Eds.), Advances in Cryptology: EUROCRYPT 2025 (Vol. 4, pp. 396-426). Springer. https://doi.org/10.1007/978-3-031-91134-7_14
Januzelli, J., Rosulek, M. & Roy, L. (2025). Lower Bounds for Garbled Circuits from Shannon-Type Information Inequalities. In Y. Tauman Kalai & S. F. Kamara (Eds.), Advances in Cryptology – CRYPTO 2025 - 45th Annual International Cryptology Conference, Proceedings (pp. 589-618). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-032-01884-7_19
Morita, H., Pohle, E., Sadakane, K., Scholl, P., Tozawa, K. & Tschudi, D. (2025). MAESTRO: Multi-Party AES Using Lookup Tables. In 34th USENIX Security Symposium USENIX - The Advanced Computing Systems Association. https://doi.org/10.5555/3766078.3766180
Boudgoust, K. & Keller, H. (2025). Module Learning with Errors with Truncated Matrices. In R. Niederhagen & M.-J. O. Saarinen (Eds.), Post-Quantum Cryptography - 16th International Workshop, PQCrypto 2025, Proceedings (Vol. Part 1, pp. 255-277). Springer. https://doi.org/10.1007/978-3-031-86599-2_9
Hansen, A. B., Nielsen, J. B. & Simkin, M. (2025). OCash: Fully Anonymous Payments Between Blockchain Light Clients. In T. Jager & J. Pan (Eds.), Public-Key Cryptography – PKC 2025 - 28th IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings (pp. 169-202). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-031-91832-2_6
Baum, C., Beullens, W., Mukherjee, S., Orsini, E., Ramacher, S., Rechberger, C., Roy, L. & Scholl, P. (2025). One Tree to Rule Them All: Optimizing GGM Trees and OWFs for Post-Quantum Signatures. In K.-M. Chung & Y. Sasaki (Eds.), Advances in Cryptology - ASIACRYPT 2024 (pp. 463-493). Springer Nature. https://doi.org/10.1007/978-981-96-0875-1_15
Acharya, A., Azari, K. & Kamath, C. (2025). On the Adaptive Security of Free-XOR-Based Garbling Schemes in the Plain Model. In S. Fehr & P.-A. Fouque (Eds.), Advances in Cryptology – EUROCRYPT 2025: 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4–8, 2025, Proceedings, Part VI (Vol. 15606, pp. 214-244). Springer LNCS. https://doi.org/10.1007/978-3-031-91095-1\_8
Årdal, M. A., Adj, G., Alblooshi, A., Aranha, D. F., A. Canales-Martínez, I., Chavez-Saab, J., Gazzoni Filho, D. L., Reijnders, K. & Rodriguez-Henriquez, F. (2025). Optimized One-Dimensional SQIsign Verification on Intel and Cortex-M4. IACR Transactions of Cryptographic Hardware and Embedded Systems, 2025(1), 497-522. https://doi.org/10.46586/tches.v2025.i1.497-522
Chiang, J. H. Y., Damgård, I., Duro, W. R., Engan, S., Kolby, S. & Scholl, P. (2025). Post-Quantum Threshold Ring Signature Applications from VOLE-in-the-Head. In CCS 2025 - Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security (pp. 4664-4678). Association for Computing Machinery. https://doi.org/10.1145/3719027.3744854
Meyer, P., Orlandi, C., Roy, L. & Scholl, P. (2025). Rate-1 Arithmetic Garbling From Homomorphic Secret Sharing. In E. Boyle & M. Mahmoody (Eds.), Theory of Cryptography - 22nd International Conference, TCC 2024, Proceedings (pp. 71-97). Article 323579 Springer Nature. https://doi.org/10.1007/978-3-031-78023-3_3
Kyster, A., Nielsen, F. H., Oechsner, S. & Scholl, P. (2025). Rushing at SPDZ: On the Practical Security of Malicious MPC Implementations. In M. Blanton, W. Enck & C. Nita-Rotaru (Eds.), 2025 IEEE Symposium on Security and Privacy (SP) (pp. 2491-2508). IEEE. https://doi.org/10.1109/SP61157.2025.00176
Aranha, D. F., Guimaraes, A., Hoffman, C. & Méaux, P. (2025). Secure and efficient transciphering for FHE-based MPC. IACR Transactions of Cryptographic Hardware and Embedded Systems, 2025(3), 745-780. https://doi.org/10.46586/tches.v2025.i3.745-780
Acharya, A., Baig, M. A., Hofheinz, D., Azari, K. & Kamath, C. (2025). Securely Instantiating 'Half Gates' Garbling in the Standard Model. In Securely Instantiating 'Half Gates' Garbling in the Standard Model (Vol. 15677, pp. 37-75). Springer LNCS. https://doi.org/10.1007/978-3-031-91829-2
Baum, C., Beullens, W., Braun, L., Delpech de Saint Guilhem, C., Klooß, M., Majenz, C., Mukherjee, S., Orsini, E., Ramacher, S., Rechberger, C., Roy, L. & Scholl, P. (2025). Shorter, Tighter, FAESTer: Optimizations and Improved (QROM) Analysis for VOLE-in-the-Head Signatures. In Y. Tauman Kalai & S. F. Kamara (Eds.), Advances in Cryptology – CRYPTO 2025 - 45th Annual International Cryptology Conference, Proceedings (pp. 124-156). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-032-01887-8_5
Meyer, P., Orlandi, C., Roy, L. & Scholl, P. (2025). Silent Circuit Relinearisation: Sublinear-Size (Boolean and Arithmetic) Garbled Circuits from DCR. In Y. Tauman Kalai & S. F. Kamara (Eds.), Advances in Cryptology – CRYPTO 2025 - 45th Annual International Cryptology Conference, Proceedings (pp. 426-458). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-032-01884-7_14
Aardal, M. A., Adj, G., F. Aranha, D., Basso, A., Canales Martínez, I. A., Chávez-Saab, J., Corte-Real Santos, M., Dartois, P., De Feo, L., Duparc, M., Komada Eriksen, J., Fouotsa, T. B., Filho, D. L. G., Hess, B., Kohel, D., Leroux, A., Longa, P., Maino, L., Meyer, M. ... Wesolowski, B. (2025). SQIsign 2.0: Algorithm specifications and supporting documentation. https://sqisign.org/spec/sqisign-20250205.pdf
Kolby, S. (2025). Studies on Scalable Security. [PhD dissertation, Aarhus University].
Abram, D., Malavolta, G. & Roy, L. (2025). Succinct Oblivious Tensor Evaluation and Applications: Adaptively-Secure Laconic Function Evaluation and Trapdoor Hashing for All Circuits. In M. Koucky & N. Bansal (Eds.), STOC 2025 - Proceedings of the 57th Annual ACM Symposium on Theory of Computing (pp. 1875-1886). Association for Computing Machinery. https://doi.org/10.1145/3717823.3718164
Keilty, A. P., Aranha, D. F., Pagnin, E. & Henríquez, F. R. (2025). That's AmorE: Amortized Efficiency for Pairing Delegation. In Y. Tauman Kalai & S. F. Kamara (Eds.), Advances in Cryptology – CRYPTO 2025 - 45th Annual International Cryptology Conference, Proceedings (pp. 211-246) https://doi.org/10.1007/978-3-032-01913-4_7