Canetti, R.
, Damgård, I. B., Dziembowski, S., Ishai, Y. & Malkin, T. (2001).
On Adaptive vs. Non-adaptive Security of Multiparty Protocols. In B. Pfitzmann (Ed.),
Advances in Cryptology --- EUROCRYPT 2001: International Conference on the Theory and Application of Cryptographic Techniques Innsbruck, Austria, May 6-10, 2001 Proceedings (pp. 262-279). Springer.
https://doi.org/10.1007/3-540-44987-6_17
Boyle, E., Couteau, G., Gilboa, N., Ishai, Y., Kohl, L., Resch, N.
& Scholl, P. (2023).
Oblivious Transfer with Constant Computational Overhead. In C. Hazay & M. Stam (Eds.),
Advances in Cryptology – EUROCRYPT 2023: 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part I (pp. 271-302). Springer.
https://doi.org/10.1007/978-3-031-30545-0_10
Damgård, I. B., Fehr, S.
, Salvail, L. & Schaffner, C. (2006).
Oblivious Transfer and Linear Functions. In C. Dwork (Ed.),
Advances in Cryptology - CRYPTO 2006: 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006. Proceedings (pp. 427-444). Springer.
https://doi.org/10.1007/11818175_26
Francati, D. & Venturi, D. (2024).
Non-malleable Fuzzy Extractors. In C. Pöpper & L. Batina (Eds.),
Applied Cryptography and Network Security: 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part I (pp. 135-155). Springer.
https://doi.org/10.1007/978-3-031-54770-6_6
Damgård, I. B., Nicolosi, A. & Fazio, N. (2006).
Non-interactive Zero-Knowledge from Homomorphic Encryption. In S. Halevi & T. Rabin (Eds.),
Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006. Proceedings (pp. 41-59). Springer.
https://doi.org/10.1007/11681878_3
Bai, G.
, Damgård, I., Orlandi, C. & Xia, Y. (2016).
Non-Interactive Verifiable Secret Sharing for Monotone Circuits. In D. Pointcheval, A. Nitaj & T. Rachidi (Eds.),
Progress in Cryptology – AFRICACRYPT 2016 - 8th International Conference on Cryptology in Africa, Proceedings (Vol. 9646, pp. 225-244). Springer VS.
https://doi.org/10.1007/978-3-319-31517-1_12
Matias, P., Y. S. Barbosa, P., N. C. Cardoso, T., Mariano, D.
& Aranha, D. F. (2018).
NIZKCTF: A Non-Interactive Zero-Knowledge Capture the Flag Platform.
IEEE Security & Privacy,
16(6), 42-51. Article 8636460.
https://doi.org/10.1109/MSEC.2018.2875324
Damgård, I. B., Escudero Ospina, D. E., Frederiksen, T. K., Keller, M.
, Scholl, P. & Volgushev, N. (2019).
New Primitives for Actively-Secure MPC over Rings with Applications to Private Machine Learning. In
Proceedings - 2019 IEEE Symposium on Security and Privacy, SP 2019 (pp. 1102-1120). Article 8835310 IEEE.
https://doi.org/10.1109/SP.2019.00078
Francati, D., Friolo, D., Malavolta, G.
& Venturi, D. (2023).
Multi-key and Multi-input Predicate Encryption from Learning with Errors. In C. Hazay & M. Stam (Eds.),
Advances in Cryptology – EUROCRYPT 2023: 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part III (pp. 573-604). Springer.
https://doi.org/10.1007/978-3-031-30620-4_19
Ciampi, M.
, Siniscalchi, L. & Waldner, H. (2021).
Multi-Client Functional Encryption for Separable Functions. In J. A. Garay (Ed.),
Public-Key Cryptography – PKC 2021: 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10–13, 2021, Proceedings, Part I (pp. 724-753). Springer.
https://doi.org/10.1007/978-3-030-75245-3_26
Baum, C., Damgård, I., Lyubashevsky, V.
, Oechsner, S. & Peikert, C. (2018).
More Efficient Commitments from Structured Lattice Assumptions. In D. Catalano & R. De Prisco (Eds.),
Security and Cryptography for Networks - 11th International Conference, SCN 2018, Proceedings (Vol. 11035, pp. 368-385). Springer VS.
https://doi.org/10.1007/978-3-319-98113-0_20
Espitau, T.
, Takahashi, A., Tibouchi, M. & Wallet, A. (2021).
Mitaka: A simpler, parallelizable, maskable variant of Falcon. Paper presented at Third PQC Standardization Conference, Washington, United States.
https://csrc.nist.gov/CSRC/media/Events/third-pqc-standardization-conference/documents/accepted-papers/espitau-mitaka-pqc2021.pdf
Espitau, T., Fouque, P.-A., Gérard, F., Rossi, M.
, Takahashi, A., Tibouchi, M., Wallet, A. & Yu, Y. (2022).
MITAKA: A Simpler, Parallelizable, Maskable Variant of Falcon. In O. Dunkelman & S. Dziembowski (Eds.),
Advances in Cryptology – EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2022, Proceedings (Vol. 3, pp. 222-253). Springer.
https://doi.org/10.1007/978-3-031-07082-2_9
Deuber, D., Döttling, N.
, Magri, B., Malavolta, G. & Thyagarajan, S. A. K. (2020).
Minting Mechanism for Proof of Stake Blockchains. In M. Conti, J. Zhou, E. Casalicchio & A. Spognardi (Eds.),
Applied Cryptography and Network Security (pp. 315-334). Springer.
https://doi.org/10.1007/978-3-030-57808-4_16