Espitau, T., Fouque, P.-A., Gérard, F., Rossi, M.
, Takahashi, A., Tibouchi, M., Wallet, A. & Yu, Y. (2022).
MITAKA: A Simpler, Parallelizable, Maskable Variant of Falcon. I O. Dunkelman & S. Dziembowski (red.),
Advances in Cryptology – EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2022, Proceedings (Bind 3, s. 222-253). Springer.
https://doi.org/10.1007/978-3-031-07082-2_9
Gratzer, D., Cavallo, E.
, Kavvos, G. A., Guatto, A.
& Birkedal, L. (2022).
Modalities and Parametric Adjoints.
ACM Transactions on Computational Logic,
23(3), Artikel 18.
https://doi.org/10.1145/3514241
Nieto, A., Gondelman, L., Reynaud, A.
, Timany, A. & Birkedal, L. (2022).
Modular verification of op-based CRDTs in separation logic.
Proceedings of the ACM on Programming Languages ,
6(OOPSLA2), 1788-1816. Artikel 188.
https://doi.org/10.1145/3563351
Afshani, P., de Berg, M., Buchin, K., Gao, J., Löffler, M., Nayyeri, A., Raichel, B., Sarkar, R., Wang, H. & Yang, H. T. (2022).
On Cyclic Solutions to the Min-Max Latency Multi-Robot Patrolling Problem. I X. Goaoc & M. Kerber (red.),
38th International Symposium on Computational Geometry, SoCG 2022 Artikel 2 Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing.
https://doi.org/10.4230/LIPIcs.SoCG.2022.2
Esteves, A., Bouquet, E.
, Pfeuffer, K. & Alt, F. (2022).
One-handed Input for Mobile Devices via Motion Matching and Orbits Controls.
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies,
6(2), 1-24. Artikel 51.
https://doi.org/10.1145/3534624
Orlandi, C., Ravi, D. & Scholl, P. (2022).
On the Bottleneck Complexity of MPC with Correlated Randomness. I G. Hanaoka, J. Shikata & Y. Watanabe (red.),
Public-Key Cryptography – PKC 2022: 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8–11, 2022, Proceedings, Part I (s. 194-220). Springer.
https://doi.org/10.1007/978-3-030-97121-2_8
Aggarwal, D.
, Obremski, M., Ribeiro, J.
, Simkin, M. & Siniscalchi, L. (2022).
Privacy Amplification with Tamperable Memory via Non-Malleable Two-Source Extractors.
IEEE Transactions on Information Theory,
68(8), 5475-5495.
https://doi.org/10.1109/TIT.2022.3167404
Strydonck, T. V.
, Georges, A. L., Guéneau, A., Trieu, A., Timany, A., Piessens, F.
, Birkedal, L. & Devriese, D. (2022).
Proving full-system security properties under multiple attacker models on capability machines. I
Proceedings - 2022 IEEE 35th Computer Security Foundations Symposium, CSF 2022 (s. 80-95). IEEE.
https://doi.org/10.1109/CSF54842.2022.9919645
Ganardi, M., Majumdar, R.
, Pavlogiannis, A., Schütze, L. & Zetzsche, G. (2022).
Reachability in Bidirected Pushdown VASS. I M. Bojanczyk, E. Merelli & D. P. Woodruff (red.),
49th EATCS International Conference on Automata, Languages, and Programming, ICALP 2022 Artikel 124 Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing.
https://doi.org/10.4230/LIPIcs.ICALP.2022.124