What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Eduardo Soria-Vazquez
Google Scholar
ORCID:
0000-0002-4882-0230
17
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tches
FANNG-MPC: Framework for Artificial Neural Networks and Generic MPC.
Najwa Aaraj
Abdelrahaman Aly
Tim Güneysu
Chiara Marcolla
Johannes Mono
Rogerio Paludo
Iván Santos-González
Mireia Scholz
Eduardo Soria-Vazquez
Victor Sucasas
Ajith Suresh
2025
conf/crypto
Verifiable Computation for Approximate Homomorphic Encryption Schemes.
Ignacio Cascudo
Anamaria Costache
Daniele Cozzo
Dario Fiore
Antonio Guimarães
Eduardo Soria-Vazquez
2024
conf/asiacrypt
HELIOPOLIS: Verifiable Computation over Homomorphically Encrypted Data from Interactive Oracle Proofs is Practical.
Diego F. Aranha
Anamaria Costache
Antonio Guimarães
Eduardo Soria-Vazquez
2023
journals/joc
Rinocchio: SNARKs for Ring Arithmetic.
Chaya Ganesh
Anca Nitulescu
Eduardo Soria-Vazquez
2023
conf/tcc
Taming Adaptivity in YOSO Protocols: The Modular Way.
Ran Canetti
Sebastian Kolby
Divya Ravi
Eduardo Soria-Vazquez
Sophia Yakoubov
2022
journals/joc
TinyKeys: A New Approach to Efficient Multi-Party Computation.
Carmit Hazay
Emmanuela Orsini
Peter Scholl
Eduardo Soria-Vazquez
2022
conf/tcc
Doubly Efficient Interactive Proofs over Infinite and Non-commutative Rings.
Eduardo Soria-Vazquez
2021
conf/crypto
Efficient Information-Theoretic Multi-party Computation over Non-commutative Rings.
Daniel Escudero
Eduardo Soria-Vazquez
2021
conf/eurocrypt
Large Scale, Actively Secure Computation from LPN and Free-XOR Garbled Circuits.
Aner Ben-Efraim
Kelong Cong
Eran Omri
Emmanuela Orsini
Nigel P. Smart
Eduardo Soria-Vazquez
2020
journals/joc
Low Cost Constant Round MPC Combining BMR and Oblivious Transfer.
Carmit Hazay
Peter Scholl
Eduardo Soria-Vazquez
2020
conf/crypto
Efficient Constant-Round MPC with Identifiable Abort and Public Verifiability.
Carsten Baum
Emmanuela Orsini
Peter Scholl
Eduardo Soria-Vazquez
2020
conf/asiacrypt
Circuit Amortization Friendly Encodingsand Their Application to Statistically Secure Multiparty Computation.
Anders P. K. Dalskov
Eysa Lee
Eduardo Soria-Vazquez
2018
conf/crypto
TinyKeys: A New Approach to Efficient Multi-Party Computation.
Carmit Hazay
Emmanuela Orsini
Peter Scholl
Eduardo Soria-Vazquez
2018
conf/asiacrypt
Concretely Efficient Large-Scale MPC with Active Security (or, TinyKeys for TinyOT).
Carmit Hazay
Emmanuela Orsini
Peter Scholl
Eduardo Soria-Vazquez
2017
conf/acns
Faster Secure Multi-party Computation of AES and DES Using Lookup Tables.
Marcel Keller
Emmanuela Orsini
Dragos Rotaru
Peter Scholl
Eduardo Soria-Vazquez
Srinivas Vivek
2017
conf/asiacrypt
Low Cost Constant Round MPC Combining BMR and Oblivious Transfer.
Carmit Hazay
Peter Scholl
Eduardo Soria-Vazquez
2016
conf/tcc
More Efficient Constant-Round Multi-party Computation from BMR and SHE.
Yehuda Lindell
Nigel P. Smart
Eduardo Soria-Vazquez
Coauthors
Abdelrahaman Aly
(1)
Ajith Suresh
(1)
Anamaria Costache
(2)
Anca Nitulescu
(1)
Anders P. K. Dalskov
(1)
Aner Ben-Efraim
(1)
Antonio Guimarães
(2)
Carmit Hazay
(5)
Carsten Baum
(1)
Chaya Ganesh
(1)
Chiara Marcolla
(1)
Daniel Escudero
(1)
Daniele Cozzo
(1)
Dario Fiore
(1)
Diego F. Aranha
(1)
Divya Ravi
(1)
Dragos Rotaru
(1)
Eduardo Soria-Vazquez
(17)
Emmanuela Orsini
(6)
Eran Omri
(1)
Eysa Lee
(1)
Ignacio Cascudo
(1)
Iván Santos-González
(1)
Johannes Mono
(1)
Kelong Cong
(1)
Marcel Keller
(1)
Mireia Scholz
(1)
Najwa Aaraj
(1)
Nigel P. Smart
(2)
Peter Scholl
(7)
Ran Canetti
(1)
Rogerio Paludo
(1)
Sebastian Kolby
(1)
Sophia Yakoubov
(1)
Srinivas Vivek
(1)
Tim Güneysu
(1)
Victor Sucasas
(1)
Yehuda Lindell
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to