What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Michele Ciampi
Google Scholar
ORCID:
0000-0001-5062-0388
28
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/acns
Delayed-Input Multi-party Computation.
Michele Ciampi
Jure Sternad
Yu Xia
2025
conf/ctrsa
Universal Adaptor Signatures from Blackbox Multi-party Computation.
Michele Ciampi
Xiangyu Liu
Ioannis Tzannetos
Vassilis Zikas
2025
conf/eurocrypt
Black-Box Constant-Round Secure 2PC with Succinct Communication.
Michele Ciampi
Ankit Kumar Misra
Rafail Ostrovsky
Akash Shah
2025
conf/eurocrypt
Round-Optimal Black-Box Multiparty Computation from Polynomial-Time Assumptions.
Michele Ciampi
Rafail Ostrovsky
Luisa Siniscalchi
Hendrik Waldner
2025
conf/crypto
Universally Composable SNARKs with Transparent Setup without Programmable Random Oracle.
Christian Badertscher
Matteo Campanelli
Michele Ciampi
Luigi Russo
Luisa Siniscalchi
2024
conf/crypto
Universal Composable Transaction Serialization with Order Fairness.
Michele Ciampi
Aggelos Kiayias
Yu Shen
2024
conf/crypto
Black-Box (and Fast) Non-malleable Zero Knowledge.
Vincenzo Botta
Michele Ciampi
Emmanuela Orsini
Luisa Siniscalchi
Ivan Visconti
2023
conf/crypto
List Oblivious Transfer and Applications to Round-Optimal Black-Box Multiparty Coin Tossing.
Michele Ciampi
Rafail Ostrovsky
Luisa Siniscalchi
Hendrik Waldner
2023
conf/acns
Multi-Theorem Fiat-Shamir Transform from Correlation-Intractable Hash Functions.
Michele Ciampi
Yu Xia
2023
conf/tcc
Broadcast-Optimal Four-Round MPC in the Plain Model.
Michele Ciampi
Ivan Damgård
Divya Ravi
Luisa Siniscalchi
Yu Xia
Sophia Yakoubov
2023
conf/tcc
Agile Cryptography: A Universally Composable Approach.
Christian Badertscher
Michele Ciampi
Aggelos Kiayias
2022
conf/eurocrypt
Round-Optimal and Communication-Efficient Multiparty Computation.
Michele Ciampi
Rafail Ostrovsky
Hendrik Waldner
Vassilis Zikas
2022
conf/eurocrypt
Round-Optimal Multi-party Computation with Identifiable Abort.
Michele Ciampi
Divya Ravi
Luisa Siniscalchi
Hendrik Waldner
2022
conf/tcc
Four-Round Black-Box Non-malleable Schemes from One-Way Permutations.
Michele Ciampi
Emmanuela Orsini
Luisa Siniscalchi
2022
conf/cans
Efficient NIZK Arguments with Straight-Line Simulation and Extraction.
Michele Ciampi
Ivan Visconti
2021
conf/pkc
Multi-Client Functional Encryption for Separable Functions.
Michele Ciampi
Luisa Siniscalchi
Hendrik Waldner
2021
conf/eurocrypt
Threshold Garbled Circuits and Ad Hoc Secure Computation.
Michele Ciampi
Vipul Goyal
Rafail Ostrovsky
2021
conf/tcc
Oblivious Transfer from Trapdoor Permutations in Minimal Rounds.
Arka Rai Choudhuri
Michele Ciampi
Vipul Goyal
Abhishek Jain
Rafail Ostrovsky
2020
conf/acns
Timed Signatures and Zero-Knowledge Proofs - Timestamping in the Blockchain Era -.
Aydin Abadi
Michele Ciampi
Aggelos Kiayias
Vassilis Zikas
2020
conf/esorics
Updatable Blockchains.
Michele Ciampi
Nikos Karayannidis
Aggelos Kiayias
Dionysis Zindros
2020
conf/tcc
Round Optimal Secure Multiparty Computation from Minimal Assumptions.
Arka Rai Choudhuri
Michele Ciampi
Vipul Goyal
Abhishek Jain
Rafail Ostrovsky
2017
conf/crypto
Four-Round Concurrent Non-Malleable Commitments from One-Way Functions.
Michele Ciampi
Rafail Ostrovsky
Luisa Siniscalchi
Ivan Visconti
2017
conf/tcc
Round-Optimal Secure Two-Party Computation from Trapdoor Permutations.
Michele Ciampi
Rafail Ostrovsky
Luisa Siniscalchi
Ivan Visconti
2017
conf/tcc
Delayed-Input Non-Malleable Zero Knowledge and Multi-Party Coin Tossing in Four Rounds.
Michele Ciampi
Rafail Ostrovsky
Luisa Siniscalchi
Ivan Visconti
2016
conf/crypto
Concurrent Non-Malleable Commitments (and More) in 3 Rounds.
Michele Ciampi
Rafail Ostrovsky
Luisa Siniscalchi
Ivan Visconti
2016
conf/eurocrypt
Online/Offline OR Composition of Sigma Protocols.
Michele Ciampi
Giuseppe Persiano
Alessandra Scafuro
Luisa Siniscalchi
Ivan Visconti
2016
conf/tcc
Improved OR-Composition of Sigma-Protocols.
Michele Ciampi
Giuseppe Persiano
Alessandra Scafuro
Luisa Siniscalchi
Ivan Visconti
2016
conf/tcc
A Transform for NIZK Almost as Efficient and General as the Fiat-Shamir Transform Without Programmable Random Oracles.
Michele Ciampi
Giuseppe Persiano
Luisa Siniscalchi
Ivan Visconti
Coauthors
Abhishek Jain
(2)
Aggelos Kiayias
(4)
Akash Shah
(1)
Alessandra Scafuro
(2)
Ankit Kumar Misra
(1)
Arka Rai Choudhuri
(2)
Aydin Abadi
(1)
Christian Badertscher
(2)
Dionysis Zindros
(1)
Divya Ravi
(2)
Emmanuela Orsini
(2)
Giuseppe Persiano
(3)
Hendrik Waldner
(5)
Ioannis Tzannetos
(1)
Ivan Damgård
(1)
Ivan Visconti
(9)
Jure Sternad
(1)
Luigi Russo
(1)
Luisa Siniscalchi
(15)
Matteo Campanelli
(1)
Michele Ciampi
(28)
Nikos Karayannidis
(1)
Rafail Ostrovsky
(11)
Sophia Yakoubov
(1)
Vassilis Zikas
(3)
Vincenzo Botta
(1)
Vipul Goyal
(3)
Xiangyu Liu
(1)
Yu Shen
(1)
Yu Xia
(3)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to