| 1 | 2013 | PKC | pc |
| year | title | booktitle | pages | |
|---|---|---|---|---|
| 1 | 2012 | A New Approach to Practical Active-Secure Two-Party Computation | crypto | 681-700 |
| 2 | 2011 | Lower and Upper Bounds for Deniable Public-Key Encryption | asiacrypt | 125-142 |
| 3 | 2011 | Semi-Homomorphic Encryption and Multiparty Computation | eurocrypt | 169 |
| 4 | 2010 | On Invertible Sampling and Adaptive Security | asiacrypt | 466-482 |
| 5 | 2010 | On the Necessary and Sufficient Assumptions for UC Computation | tcc | 109-127 |
| 6 | 2010 | Multiparty Computation for Dishonest Majority: From Passive to Active Security at Low Cost | crypto | 558-576 |
| 7 | 2010 | Multiparty Computation for Dishonest Majority: from Passive to Active Security at Low Cost | eprint | online |
| 8 | 2009 | LEGO for Two-Party Secure Computation | tcc | 368-386 |
| 9 | 2008 | LEGO for Two Party Secure Computation | eprint | online |
| 10 | 2008 | Essentially Optimal Universally Composable Oblivious Transfer | eprint | online |
Coauthors of Claudio Orlandi |