Damgård, I., Ravi, D., Siniscalchi, L. & Yakoubov, S. (2023).
Minimizing Setup in Broadcast-Optimal Two Round MPC. In C. Hazay & M. Stam (Eds.),
Advances in Cryptology – EUROCRYPT 2023: 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23–27, 2023, Proceedings, Part II (pp. 129-158). Springer.
https://doi.org/10.1007/978-3-031-30617-4_5
Frederiksen, T. K., Jakobsen, T. P., Nielsen, J. B., Nordholt, P. S. & Orlandi, C. (2013).
MiniLEGO: Efficient secure two-party computation from general assumptions. In T. Johansson & P. Q. Nguyen (Eds.),
Advances in Cryptology – EUROCRYPT 2013: 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings (pp. 537-556). Springer VS.
https://doi.org/10.1007/978-3-642-38348-9_32
Faonio, A., Nielsen, J. B. & Venturi, D. (2015).
Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation. In M. M. Halldórsson, K. Iwama, N. Kobayashi & B. Speckmann (Eds.),
Automata, Languages, and Programming: 42nd International Colloquium, ICALP 2015, Kyoto, Japan, July 6-10, 2015, Proceedings, Part I (Vol. Part 1, pp. 456-468). Springer VS.
https://doi.org/10.1007/978-3-662-47672-7_37
Campanelli, M., Faonio, A., Fiore, D., Querol, A. & Rodríguez, H. (2021).
Lunar: A Toolbox for More Efficient Universal and Updatable zkSNARKs and Commit-and-Prove Extensions. In M. Tibouchi & H. Wang (Eds.),
Advances in Cryptology – ASIACRYPT 2021: 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6–10, 2021, Proceedings, Part III (pp. 3-33). Springer.
https://doi.org/10.1007/978-3-030-92078-4_1
Burkhardt, J., Caragiannis, I., Fehrs, K., Russo, M.
, Schwiegelshohn, C. & Shyam, S. (2024).
Low-Distortion Clustering with Ordinal and Limited Cardinal Information. In M. Wooldridge, J. Dy & S. Natarajan (Eds.),
Technical Tracks 14 (9 ed., pp. 9555-9563). Association for the Advancement of Artificial Intelligence.
https://doi.org/10.1609/aaai.v38i9.28811
Boyle, E., Couteau, G., Gilboa, N., Ishai, Y., Kohl, L.
& Scholl, P. (2021).
Low-Complexity Weak Pseudorandom Functions in textdollartextbackslashmathtt AC0[textbackslashmathtt MOD2]textdollar. In T. Malkin & C. Peikert (Eds.),
Advances in Cryptology – CRYPTO 2021: 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16–20, 2021, Proceedings, Part IV (pp. 487-516). Springer.
https://doi.org/10.1007/978-3-030-84259-8_17
Cramer, R.
, Damgård, I., Döttling, N., Giacomelli, I. & Xing, C. (2017).
Linear-Time Non-Malleable Codes in the Bit-Wise Independent Tampering Model. In J. Shikata (Ed.),
Information Theoretic Security - 10th International Conference, ICITS 2017, Proceedings (Vol. 10681, pp. 1-25). Springer VS.
https://doi.org/10.1007/978-3-319-72089-0_1
Cramer, R.
, Damgård, I. B., Döttling, N. M., Fehr, S. & Spini, G. (2015).
Linear secret sharing schemes from error correcting codes and universal hash functions. In E. Oswald & M. F. Fischlin (Eds.),
Advances in Cryptology - EUROCRYPT 2015: 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II (pp. 313-336). Springer VS.
https://doi.org/10.1007/978-3-662-46803-6_11
Damgård, I. B. & Thorbek, R. (2006).
Linear Integer Secret Sharing and Distributed Exponentiation. In M. Yung, Y. Dodis, A. Kiayias & T. Malkin (Eds.),
Public Key Cryptography - PKC 2006: 9th International Conference on Theory and Practice in Public-Key Cryptography, New York, NY, USA, April 24-26, 2006. Proceedings (pp. 75-90). Springer.
https://doi.org/10.1007/11745853_6
Hubacek, P., Nielsen, J. B. & Rosen, A. (2013).
Limits on the Power of Cryptographic Cheap Talk. In R. Canetti & J. A. Garay (Eds.),
Advances in Cryptology – CRYPTO 2013: 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part I (pp. 277-297 ). Springer VS.
https://doi.org/10.1007/978-3-642-40041-4_16
Aranha, D. F., Baum, C., Gjøsteen, K., Silde, T. & Tunge, T. (2021).
Lattice-Based Proof of Shuffle and Applications to Electronic Voting. In K. G. Paterson (Ed.),
Topics in Cryptology-CT-RSA 2021 - Cryptographers’ Track at the RSA Conference, Proceedings (pp. 227-251). Springer.
https://doi.org/10.1007/978-3-030-75539-3_10
Campanelli, M., Fiore, D., Greco, N., Kolonelos, D. & Nizzardo, L. (2020).
Incrementally Aggregatable Vector Commitments and Applications to Verifiable Decentralized Storage. In S. Moriai & H. Wang (Eds.),
Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings (pp. 3-35). Springer.
https://doi.org/10.1007/978-3-030-64834-3_1