Faonio, A.
, Nielsen, J. B., Simkin, M. & Venturi, D. (2018).
Continuously Non-malleable Codes with Split-State Refresh. In B. Preneel & F. Vercauteren (Eds.),
Applied Cryptography and Network Security - 16th International Conference, ACNS 2018, Proceedings (Vol. 10892, pp. 121-139). Springer VS.
https://doi.org/10.1007/978-3-319-93387-0_7
Espitau, T.
, Takahashi, A., Tibouchi, M. & Wallet, A. (2021).
Mitaka: A simpler, parallelizable, maskable variant of Falcon. Paper presented at Third PQC Standardization Conference, Washington, United States.
https://csrc.nist.gov/CSRC/media/Events/third-pqc-standardization-conference/documents/accepted-papers/espitau-mitaka-pqc2021.pdf
Espitau, T., Fouque, P.-A., Gérard, F., Rossi, M.
, Takahashi, A., Tibouchi, M., Wallet, A. & Yu, Y. (2022).
MITAKA: A Simpler, Parallelizable, Maskable Variant of Falcon. In O. Dunkelman & S. Dziembowski (Eds.),
Advances in Cryptology – EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2022, Proceedings (Vol. 3, pp. 222-253). Springer.
https://doi.org/10.1007/978-3-031-07082-2_9
Erkin, Z., Franz, M., Guajardo, J., Katzenbeisser, S., Lagendijk, I.
& Toft, T. (2009).
Privacy-Preserving Face Recognition.
Lecture Notes in Computer Science, 235-253.
https://doi.org/10.1007/978-3-642-03168-7_14
Eerikson, H.
, Keller, M., Orlandi, C., Pullonen, P., Puura, J.
& Simkin, M. (2020).
Use your brain! Arithmetic 3PC for any modulus with active security. In Y. T. Kalai, A. D. Smith & D. Wichs (Eds.),
1st Conference on Information-Theoretic Cryptography (ITC 2020) Article 5 Schloss Dagstuhl--Leibniz-Zentrum für Informatik.
https://doi.org/10.4230/LIPIcs.ITC.2020.5
Deuber, D., Döttling, N.
, Magri, B., Malavolta, G. & Thyagarajan, S. A. K. (2020).
Minting Mechanism for Proof of Stake Blockchains. In M. Conti, J. Zhou, E. Casalicchio & A. Spognardi (Eds.),
Applied Cryptography and Network Security (pp. 315-334). Springer.
https://doi.org/10.1007/978-3-030-57808-4_16
Davi Resende, A. C.
& Aranha, D. F. (2018).
Faster Unbalanced Private Set Intersection. In S. Meiklejohn & K. Sako (Eds.),
Financial Cryptography and Data Security - 22nd International Conference, FC 2018, Revised Selected Papers: 22nd International Conference, FC 2018, Nieuwpoort, Curaçao, February 26 – March 2, 2018, Revised Selected Papers (1 ed., pp. 203-221). Springer.
https://doi.org/10.1007/978-3-662-58387-6
Davi Resende, A. C., Railsback, D., Dowsley, R., Nascimento, A. C. A.
& Aranha, D. F. (2022).
Fast Privacy-Preserving Text Classification based on Secure Multiparty Computation.
IEEE Transactions on Information Forensics and Security,
17, 428-442.
https://doi.org/10.1109/TIFS.2022.3144007
Damgård, I. B., Fehr, S., Morozov, K.
& Salvail, L. (2004).
Unfair Noisy Channels and Oblivious Transfer. In M. Naor (Ed.),
Theory of Cryptography: First Theory of Cryptography Conference, TCC 2004, Cambridge, MA, USA, February 19-21, 2004. Proceedings (pp. 355-373). Springer.
https://doi.org/10.1007/978-3-540-24638-1_20
Damgård, I. B., Fehr, S.
& Salvail, L. (2004).
Zero-Knowledge Proofs and String Commitments Withstanding Quantum Attacks. In M. Franklin (Ed.),
Advances in Cryptology - CRYPTO 2004: 24th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 2004. Proceedings (pp. 254-272). Springer.
https://doi.org/10.1007/978-3-540-28628-8_16
Damgård, I. B., Cramer, R. & Ishai, Y. (2005).
Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation. In J. Killian (Ed.),
Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005. Proceedings (pp. 342-362). Springer.
https://doi.org/10.1007/978-3-540-30576-7_19