tl;dr: a massive systematization of PKE with different flavours of opening/corruptions compared using a modular framework.
Paper: PKC 2024 or ePrint Full Version.
tl;dr: investigation of multi-instance security notions for non-perfectly correct PKE scheme, prove of multi-instance security inheritance for hybrid encryption scheme plus ad instantiation.
Paper: PKC 2023 or ePrint Full Version.
tl;dr: we show that sometimes ML has an advantage in distinguishing between Deterministic Random Bit Generators (DBRGs)
Paper: Journal of Cryptographic Engineering (Vol. 12 2022) or personal pdf.
tl;dr: A protocol for instantiating a time-discrete, secure and consistent communication based on a one-way delay function.
Paper: PROVSEC 2021 or personal pdf.
tl;dr: design of a protocol for the secure aggregation of a federated learning model in a distributed manner.
Paper: ISC 2021 or personal pdf.
tl;dr: design of a protocol for the secure aggregation of a federated learning model in a distributed manner.
Paper: ACISP 2021 or personal pdf.
tl;dr: Provide the existence of a code-based zero-knowledge PRF argument.
Paper: ISC 2019 or personal pdf.
tl;dr:
Paper: ProvSec 2018’s Workshop, published in Journal of Internet Services and Information Security (JISIS) (Vol.8 Issue 4) or personal pdf.
tl;dr: We show that it is possible to take some of GDPR’s rules, translate them into a formal security property and design a protocol that achieves such privacy guarantees.
Paper: CANS 2018 or personal pdf.
tl;dr: Prove that the incorrectness property of encryption scheme implies differential privacy. Plus, an example on how this can be exploited in a real scheme.
Paper: ISC 2017 or personal pdf.
tl;dr: Better bounds on counting the number of hidden sums plus algorithms to search for them for attacking linear maps.
Paper: WCC 2017, extended version in Discrete Mathematics (Vol. 342) or personal pdf.
tl;dr: Search a suspicious news online, retrieve images and compare if there are similar ones creating relations between news, mainly (try to) reconstruct the timeline by using metadata.
Paper: ICMEW 2015 or personal pdf