Ishai, Y., Patra, A., Patranabis, S.
, Ravi, D. & Srinivasan, A. (2022).
Fully-Secure MPC with Minimal Trust. In
Theory of Cryptography - 20th International Conference, TCC 2022, Proceedings (pp. 470–501). Springer.
https://doi.org/10.1007/978-3-031-22365-5_17
Hubacek, P., Nielsen, J. B. & Rosen, A. (2013).
Limits on the Power of Cryptographic Cheap Talk. In R. Canetti & J. A. Garay (Eds.),
Advances in Cryptology – CRYPTO 2013: 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part I (pp. 277-297 ). Springer VS.
https://doi.org/10.1007/978-3-642-40041-4_16
Hazay, C., Orsini, E.
, Scholl, P. & Soria-Vazquez, E. (2018).
TinyKeys: A New Approach to Efficient Multi-Party Computation. In H. Shacham & A. Boldyreva (Eds.),
Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings (Vol. 10993, pp. 3-33). Springer VS.
https://doi.org/10.1007/978-3-319-96878-0_1
Hazay, C., Orsini, E.
, Scholl, P. & Soria-Vazquez, E. (2018).
Concretely Efficient Large-Scale MPC with Active Security (or, TinyKeys for TinyOT). In T. Peyrin & S. Galbraith (Eds.),
Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings (Vol. 11274, pp. 86-117). Springer VS.
https://doi.org/10.1007/978-3-030-03332-3_4
Hazay, C., Mikkelsen, G. L., Rabin, T., Toft, T. & Nicolosi, A. A. (2019).
Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting.
Journal of Cryptology,
32(2), 265-323.
https://doi.org/10.1007/s00145-017-9275-7
Haselwarter, P. G., Hvass, B. S., Hansen, L. L., Winterhalter, T., Hriţcu, C.
& Spitters, B. (2024).
The Last Yard: Foundational End-to-End Verification of High-Speed Cryptography. In A. Timany, D. Traytel, B. Pientka & S. Blazy (Eds.),
CPP 2024: Proceedings of the 13th ACM SIGPLAN International Conference on Certified Programs and Proofs (pp. 30-44). Association for Computing Machinery.
https://doi.org/10.1145/3636501.3636961
Hansen, K. M., Larsen, S. B., Pagter, J. I., Pedersen, M. Ø. & Thomsen, J. (2004).
An Evaluation of an OSGi-based Residential Pervasive Computing Platform. In N. Guimarães & P. Isaías (Eds.),
Proceedings of the IADIS Applied Computing Conference (pp. 246-253). International Association for Development, IADIS.
http://www.iadis.net/dl/Search_list_open.asp?code=602
Hansen, K. M., Antolin Rafael, P., Camara, J., Carro, S., Metha, G., Rosengren, P.
, Pagter, J. I. & Pedersen, M. Ø. (2005).
eu-DOMAIN D3.1 + D4.1 Software Architecture Specification.
Hall-Andersen, M. N. & Schwartzbach, N. I. (2021).
Game Theory on the Blockchain: A Model for Games with Smart Contracts. In I. Caragiannis & K. A. Hansen (Eds.),
Algorithmic Game Theory - 14th International Symposium, SAGT 2021, Proceedings: 14th International Symposium, SAGT 2021, Aarhus, Denmark, September 21–24, 2021Proceedings (pp. 156-170). Springer.
https://doi.org/10.1007/978-3-030-85947-3_11
Haagh, H., Ji, Y., Li, C.
, Orlandi, C. & Song, Y. (2017).
Revealing Encryption for Partial Ordering. In M. O’Neill (Ed.),
Cryptography and Coding - 16th IMA International Conference, IMACC 2017, Proceedings (pp. 3-22). Springer VS.
https://doi.org/10.1007/978-3-319-71045-7_1
Haagh, H., Karbyshev, A., Oechsner, S., Spitters, B. & Strub, P. (2018).
Computer-Aided Proofs for Multiparty Computation with Active Security. In
Proceedings - IEEE 31st Computer Security Foundations Symposium, CSF 2018 (Vol. 2018, pp. 119-131). Article 8429300 IEEE.
https://doi.org/10.1109/CSF.2018.00016
Green, M.
, Hall-Andersen, M. N., Hennenfent, E., Kaptchuk, G., Perez, B. & Van Laer, G. (2023).
Efficient Proofs of Software Exploitability for Real-world Processors.
Proceedings on Privacy Enhancing Technologies,
2023(1), 627-640.
https://doi.org/10.56553/popets-2023-0036