Publication List
Showing everything matching: clear
2024
SoK: Public Key Encryption with Openings

tl;dr: a massive systematization of PKE with different flavours of opening/corruptions compared using a modular framework.

Paper: PKC 2024 or ePrint Full Version.

2023
Multi-instance Secure Public-key Encryption

tl;dr: investigation of multi-instance security notions for non-perfectly correct PKE scheme, prove of multi-instance security inheritance for hybrid encryption scheme plus ad instantiation.

Paper: PKC 2023 or ePrint Full Version.

2021
Modelling Cryptographic Distinguishers Using Machine Learning

tl;dr: we show that sometimes ML has an advantage in distinguishing between Deterministic Random Bit Generators (DBRGs)

Paper: Journal of Cryptographic Engineering (Vol. 12 2022) or personal pdf.

Turn-Based Communication Channels

tl;dr: A protocol for instantiating a time-discrete, secure and consistent communication based on a one-way delay function.

Paper: PROVSEC 2021 or personal pdf.

DEVA: Decentralized, Verifiable Secure Aggregation for Privacy-Preserving Learning

tl;dr: design of a protocol for the secure aggregation of a federated learning model in a distributed manner.

Paper: ISC 2021 or personal pdf.

Non-Interactive, Secure Verifiable Aggregation for Decentralized, Privacy-Preserving Learning

tl;dr: design of a protocol for the secure aggregation of a federated learning model in a distributed manner.

Paper: ACISP 2021 or personal pdf.

2019
Code-Based Zero Knowledge PRF Arguments

tl;dr: Provide the existence of a code-based zero-knowledge PRF argument.

Paper: ISC 2019 or personal pdf.

2018
HIKE: Walking the Privacy Trail

tl;dr: We show that it is possible to take some of GDPR’s rules, translate them into a formal security property and design a protocol that achieves such privacy guarantees.

Paper: CANS 2018 or personal pdf.

2017
A Differentially Private Encryption Scheme

tl;dr: Prove that the incorrectness property of encryption scheme implies differential privacy. Plus, an example on how this can be exploited in a real scheme.

Paper: ISC 2017 or personal pdf.

Hidden Sums and Their Application on Block Ciphers

tl;dr: Better bounds on counting the number of hidden sums plus algorithms to search for them for attacking linear maps.

Paper: WCC 2017, extended version in Discrete Mathematics (Vol. 342) or personal pdf.

2015
Towards the Verification of Image Integrity in Online News

tl;dr: Search a suspicious news online, retrieve images and compare if there are similar ones creating relations between news, mainly (try to) reconstruct the timeline by using metadata.

Paper: ICMEW 2015 or personal pdf