Ateniese, G., Chen, L.
, Francati, D., Papadopoulos, D. & Tang, Q. (2023).
Verifiable Capacity-Bound Functions: A New Primitive from Kolmogorov Complexity: (Revisiting Space-Based Security in the Adaptive Setting). In A. Boldyreva & V. Kolesnikov (Eds.),
Public-Key Cryptography – PKC 2023: 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7–10, 2023, Proceedings, Part II (pp. 63-93). Springer.
https://doi.org/10.1007/978-3-031-31371-4_3
Aranha, D. F., Azarderakhsh, R. & Karabina, K. (2017).
Efficient Software Implementation of Laddering Algorithms Over Binary Elliptic Curves. In S. S. Ali, J.-L. Danger & T. Eisenbarth (Eds.),
Security, Privacy, and Applied Cryptography Engineering - 7th International Conference, SPACE 2017, Proceedings: 7th International Conference, SPACE 2017, Goa, India, December 13-17, 2017, Proceedings (pp. 74-92). Springer.
https://doi.org/10.1007/978-3-319-71501-8_5
Aranha, D. F., Fouque, P.-A., Gerard, B., Kammerer, J.-G., Tibouchi, M. & Zapalowicz, J.-C. (2014).
GLV/GLS Decomposition, Power Analysis, and Attacks on ECDSA Signatures with Single-Bit Nonce Bias. In P. Sarkar & T. Iwata (Eds.),
Advances in Cryptology – ASIACRYPT 2014 (pp. 262-281). Springer.
https://doi.org/10.1007/978-3-662-45611-8_14
Aranha, D. F., J. Dominguez Perez, L., Mrabet, A. & Swchabe, P. (2016).
Software Implementation. In N. El Mrabet & M. Joye (Eds.),
Guide to Pairing-Based Cryptography Chapman & Hall/CRC.
Aranha, D. F., Barbosa, P. Y. S., Cardoso, T. N. C., Araújo, C. L. & Matias, P. (2019).
The return of software vulnerabilities in the Brazilian voting machine.
Computers & Security,
86, 335-349.
https://doi.org/10.1016/j.cose.2019.06.009
Aranha, D. F., Baum, C., Gjøsteen, K., Silde, T. & Tunge, T. (2021).
Lattice-Based Proof of Shuffle and Applications to Electronic Voting. In K. G. Paterson (Ed.),
Topics in Cryptology-CT-RSA 2021 - Cryptographers’ Track at the RSA Conference, Proceedings (pp. 227-251). Springer.
https://doi.org/10.1007/978-3-030-75539-3_10
Aranha, D. F., Berndt, S., Eisenbarth, T., Seker, O.
, Takahashi, A., Wilke, L. & Zaverucha, G. (2021).
Side-Channel Protections for Picnic Signatures. Abstract from Third PQC Standardization Conference, Washington, United States.
Aranha, D. F., Bennedsen, E., Campanelli, M., Ganesh, C., Orlandi, C. & Takahashi, A. (2022).
ECLIPSE: Enhanced Compiling method for Pedersen-committed zkSNARK Engines. In G. Hanaoka, J. Shikata & Y. Watanabe (Eds.),
Public-Key Cryptography – PKC 2022 : 25th IACR International Conference on Practice and Theory of Public-Key Cryptography (pp. 584-614). Springer.
https://doi.org/10.1007/978-3-030-97121-2_21
Aranha, D. F., Hall-Andersen, M. N., Nitulescu, A., Pagnin, E. & Yakoubov, S. (2022).
Count Me In! Extendability for Threshold Ring Signatures. In G. Hanaoka, J. Shikata & Y. Watanabe (Eds.),
Public-Key Cryptography – PKC 2022 : 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings, Part II (pp. 379-406). Springer.
https://doi.org/10.1007/978-3-030-97131-1_13
Applebaum, B.
, Damgård, I., Ishai, Y.
, Nielsen, M. & Zichron, L. (2017).
Secure Arithmetic Computation with Constant Computational Overhead. In H. Shacham & J. Katz (Eds.),
Advances in Cryptology – CRYPTO 2017 - 37th Annual International Cryptology Conference, Proceedings (Vol. 10401, pp. 223-254). Springer VS.
https://doi.org/10.1007/978-3-319-63688-7_8
Andrychowicz, M.
, Damgård, I. B., Dziembowski, S.
, Faust, S. & Polychroniadou, A. (2015).
Efficient leakage resilient circuit compilers. In K. Nyberg (Ed.),
Topics in Cryptology - CT-RSA 2015: The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings (pp. 311-329). Springer VS.
https://doi.org/10.1007/978-3-319-16715-2_17
Aggarwal, D.
, Damgård, I., Nielsen, J. B., Obremski, M., Purwanto, E., Ribeiro, J.
& Simkin, M. (2019).
Stronger leakage-resilient and non-malleable secret sharing schemes for general access structures. In A. Boldyreva & D. Micciancio (Eds.),
Advances in Cryptology – CRYPTO 2019 : 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings (Vol. II, pp. 510-539). Springer.
https://doi.org/10.1007/978-3-030-26951-7_18
Aggarwal, D.
, Obremski, M., Ribeiro, J.
, Simkin, M. & Siniscalchi, L. (2022).
Privacy Amplification with Tamperable Memory via Non-Malleable Two-Source Extractors.
IEEE Transactions on Information Theory,
68(8), 5475-5495.
https://doi.org/10.1109/TIT.2022.3167404