Gondelman, L., Gregersen, S. O., Nieto, A., Timany, A. & Birkedal, L. (2021).
Distributed causal memory: Modular specification and verification in higher-order distributed separation logic.
Proceedings of the ACM on Programming Languages ,
5(POPL), Artikel 42.
https://doi.org/10.1145/3434323
Gondelman, L., Hinrichsen, J. K., Pereira, M.
, Timany, A. & Birkedal, L. (2023).
Verifying Reliable Network Components in a Distributed Separation Logic with Dependent Separation Protocols.
Proceedings of the ACM on Programming Languages ,
7(ICFP), 847-877. Artikel 217.
https://doi.org/10.1145/3607859
Goel, A.
, Hall-Andersen, M. N., Kaptchuk, G. & Spooner, N. (2023).
Speed-Stacking: Fast Sublinear Zero-Knowledge Proofs for Disjunctions. I C. Hazay & M. Stam (red.),
Advances in Cryptology – EUROCRYPT 2023: 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23–27, 2023, Proceedings, Part II (s. 347-378). Springer.
https://doi.org/10.1007/978-3-031-30617-4_12
Gjerlufsen, T., Klokmose, C. N., Eagan, J., Pillias, C. & Beaudouin-Lafon, M. (2011).
Shared Substance: Developing Flexible Multi-Surface Applications. I D. S. Ten, S. Amershi, B. Begole, W. A. Kellogg & M. Tungare (red.),
Proceedings of the International Conference on Human Factors in Computing Systems, CHI 2011 (s. 3383-3392). Association for Computing Machinery.
https://doi.org/10.1145/1978942.1979446
Gilbert, S., Porat, E., King, V., Saia, J.
, Pettie, S. & Young, M. (2014).
(Near) optimal resource-competitive broadcast with jamming. I G. Blelloch & P. Sanders (red.),
Annual ACM Symposium on Parallelism in Algorithms and Architectures, SPAA '14 (s. 257-266). Association for Computing Machinery.
https://doi.org/10.1145/2612669.2612679
Giarrusso, P. G., Stefanesco, L.
, Timany, A., Birkedal, L. & Krebbers, R. (2020).
Scala step-by-step: Soundness for DOT with step-indexed logical relations in Iris.
Proceedings of the ACM on Programming Languages ,
4(ICFP), Artikel 114.
https://doi.org/10.1145/3408996
Giacomelli, I., Olimid, R.
& Ranellucci, S. (2015).
Security of Linear Secret-Sharing Schemes Against Mass Surveillance. I M. Reiter & D. Naccache (red.),
Cryptology and Network Security : 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings (Bind 9476, s. 43-58). Springer.
https://doi.org/10.1007/978-3-319-26823-1
Ghosh, S. & Simkin, M. (2019).
The Communication Complexity of Threshold Private Set Intersection. I A. Boldyreva & D. Micciancio (red.),
Advances in Cryptology – CRYPTO 2019: 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings (Bind II, s. 3-29). Springer.
https://doi.org/10.1007/978-3-030-26951-7_1
Georgiev, I., Křivánek, J.
, Hachisuka, T., Nowrouzezahrai , D. & Jarosz, W. (2013).
Joint importance sampling of low-order volumetric scattering.
A C M Transactions on Graphics, (6), Artikel 164 .
https://doi.org/10.1145/2508363.2508411
Georgiadis, L.
, Hansen, T. D., Italiano, G. F., Krinninger, S. & Parotsidis, N. (2017).
Decremental Data Structures for Connectivity and Dominators in Directed Graphs. I I. Chatzigiannakis, P. Indyk, F. Kuhn & A. Muscholl (red.),
44th International Colloquium on Automata, Languages, and Programming (ICALP 2017) (Bind 80, s. 42:1-42:15). Artikel 42 Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik GmbH.
https://doi.org/10.4230/LIPIcs.ICALP.2017.42
Georges, A. L., Guéneau, A., Van Strydonck, T.
, Timany, A., Trieu, A., Huyghebaert, S., Devriese, D.
& Birkedal, L. (2021).
Efficient and provable local capability revocation using uninitialized capabilities.
Proceedings of the ACM on Programming Languages ,
5(POPL), Artikel 6.
https://doi.org/10.1145/3434287
Georges, A. L., Guéneau, A., Van Strydonck, T.
, Timany, A., Trieu, A., Devriese, D.
& Birkedal, L. (2021).
Cap’ ou pas cap’ ?: Preuve de programmes pour une machine à capacités en présence de code inconnu. I
Journées Francophones des Langages Applicatifs 2021 Institut de Recherche en Informatique Fondamentale.
https://researchportal.vub.be/en/publications/cap-ou-pas-cap-preuve-de-programmes-pour-une-machine-%C3%A0-capacit%C3%A9s-
Georges, A. L., Guéneau, A., Van Strydonck, T.
, Timany, A., Trieu, A., Devriese, D.
& Birkedal, L. (2024).
Cerise: Program Verification on a Capability Machine in the Presence of Untrusted Code.
Journal of the ACM,
71(1), Artikel 3.
https://doi.org/10.1145/3623510
Georges, A. L., Guéneau, A., Van Strydonck, T.
, Timany, A., Trieu, A., Devriese, D.
& Birkedal, L. (2021).
Cap’ ou pas cap’ ? Preuve de programmes pour une machine à capacités en présence de code inconnu. 157-173. Afhandling præsenteret på 32emes Journees Francophones des Langages Applicatifs, JFLA 2021 - 32nd French-Speaking Conference on Applicative Languages, JFLA 2021, Virtual, Online.
Gentry, C., Halevi, S., Krawczyk, H.
, Magri, B., Nielsen, J. B., Rabin, T.
& Yakoubov, S. (2021).
YOSO: You Only Speak Once: Secure MPC with Stateless Ephemeral Roles. I T. Malkin & C. Peikert (red.),
Advances in Cryptology – CRYPTO 2021: Annual International Cryptology Conference (s. 64-93). Springer.
https://doi.org/10.1007/978-3-030-84245-1_3
Gentry, C., Halevi, S.
, Magri, B., Nielsen, J. B. & Yakoubov, S. (2021).
Random-Index PIR and Applications. I K. Nissim & B. Waters (red.),
Theory of Cryptography : 19th International Conference, TCC 2021, Proceedings (s. 32-61). Springer.
https://doi.org/10.1007/978-3-030-90456-2_2
Genkin, D., Ishai , Y.
& Polychroniadou, A. (2015).
Efficient Multi-party Computation: From Passive to Active Security via Secure SIMD Circuits. I R. Gennaro & M. Robshaw (red.),
Advances in Cryptology -- CRYPTO 2015: 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II (s. 721-741). Springer VS.
https://doi.org/10.1007/978-3-662-48000-7_35
Garg, S.
& Polychroniadou, A. (2015).
Two-round adaptively secure MPC from indistinguishability obfuscation. I Y. Dodis & J. Buus Nielsen (red.),
Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II (s. 614-637). Springer VS.
https://doi.org/10.1007/978-3-662-46497-7_24
Garavel, H., ter Beek, M. H.
& van de Pol, J. (2020).
The 2020 Expert Survey on Formal Methods. I M. H. ter Beek & D. Nickovic (red.),
Formal Methods for Industrial Critical Systems - 25th International Conference, FMICS 2020, Proceedings: FMICS 2020, Vienna, Austria, September 2-3, 2020, Proceedings (s. 3-69). Springer.
https://doi.org/10.1007/978-3-030-58298-2_1
Ganesh, C.
, Magri, B. & Venturi, D. (2020).
Cryptographic reverse firewalls for interactive proof systems. I A. Czumaj, A. Dawar & E. Merelli (red.),
47th International Colloquium on Automata, Languages, and Programming, ICALP 2020 (s. 55:1-55:16). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing.
https://doi.org/10.4230/LIPIcs.ICALP.2020.55
Ganesh, C.
, Orlandi, C., Tschudi, D. & Zohar, A. (2022).
Virtual ASICs: Generalized Proof-of-Stake Mining in Cryptocurrencies. I J. Garcia-Alfaro, J. L. Muñoz-Tapia, G. Navarro-Arribas & M. Soriano (red.),
Data Privacy Management, Cryptocurrencies and Blockchain Technology : ESORICS 2021 International Workshops, DPM 2021 and CBT 2021 (s. 173-191). Springer.
https://doi.org/10.1007/978-3-030-93944-1_12
Ganesh, C.
, Kondi, Y. M., Orlandi, C., Pancholi, M. R., Takahashi, A. & Tschudi, D. (2023).
Witness-Succinct Universally-Composable SNARKs. I C. Hazay & M. Stam (red.),
Advances in Cryptology – EUROCRYPT 2023: 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23–27, 2023, Proceedings, Part II (s. 315–346). Springer.
https://doi.org/10.1007/978-3-031-30617-4_11