Gentry, C., Halevi, S., Krawczyk, H.
, Magri, B., Nielsen, J. B., Rabin, T.
& Yakoubov, S. (2021).
YOSO: You Only Speak Once: Secure MPC with Stateless Ephemeral Roles. I T. Malkin & C. Peikert (red.),
Advances in Cryptology – CRYPTO 2021: Annual International Cryptology Conference (s. 64-93). Springer.
https://doi.org/10.1007/978-3-030-84245-1_3
Gentry, C., Halevi, S.
, Magri, B., Nielsen, J. B. & Yakoubov, S. (2021).
Random-Index PIR and Applications. I K. Nissim & B. Waters (red.),
Theory of Cryptography : 19th International Conference, TCC 2021, Proceedings (s. 32-61). Springer.
https://doi.org/10.1007/978-3-030-90456-2_2
Genkin, D., Ishai , Y.
& Polychroniadou, A. (2015).
Efficient Multi-party Computation: From Passive to Active Security via Secure SIMD Circuits. I R. Gennaro & M. Robshaw (red.),
Advances in Cryptology -- CRYPTO 2015: 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II (s. 721-741). Springer VS.
https://doi.org/10.1007/978-3-662-48000-7_35
Genay, A., Syiem, B. V., Wong, E.
, Feuchtner, T., Knibbe, J.
, Grønbæk, J. E. S. & Velloso, E. (2025).
Scaling Distributed Collaboration in Mixed Reality. I
CHI EA 2025 - Extended Abstracts of the 2025 CHI Conference on Human Factors in Computing Systems Artikel 798 Association for Computing Machinery.
https://doi.org/10.1145/3706599.3706722
Garg, S.
& Polychroniadou, A. (2015).
Two-round adaptively secure MPC from indistinguishability obfuscation. I Y. Dodis & J. Buus Nielsen (red.),
Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II (s. 614-637). Springer VS.
https://doi.org/10.1007/978-3-662-46497-7_24
Garavel, H., ter Beek, M. H.
& van de Pol, J. (2020).
The 2020 Expert Survey on Formal Methods. I M. H. ter Beek & D. Nickovic (red.),
Formal Methods for Industrial Critical Systems - 25th International Conference, FMICS 2020, Proceedings: FMICS 2020, Vienna, Austria, September 2-3, 2020, Proceedings (s. 3-69). Springer.
https://doi.org/10.1007/978-3-030-58298-2_1
Ganesh, C.
, Orlandi, C., Tschudi, D. & Zohar, A. (2022).
Virtual ASICs: Generalized Proof-of-Stake Mining in Cryptocurrencies. I J. Garcia-Alfaro, J. L. Muñoz-Tapia, G. Navarro-Arribas & M. Soriano (red.),
Data Privacy Management, Cryptocurrencies and Blockchain Technology : ESORICS 2021 International Workshops, DPM 2021 and CBT 2021 (s. 173-191). Springer.
https://doi.org/10.1007/978-3-030-93944-1_12
Ganesh, C.
, Kondi, Y. M., Orlandi, C., Pancholi, M. R., Takahashi, A. & Tschudi, D. (2023).
Witness-Succinct Universally-Composable SNARKs. I C. Hazay & M. Stam (red.),
Advances in Cryptology – EUROCRYPT 2023: 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23–27, 2023, Proceedings, Part II (s. 315–346). Springer.
https://doi.org/10.1007/978-3-031-30617-4_11
Ganesh, C.
, Orlandi, C., Pancholi, M. R., Takahashi, A. & Tschudi, D. (2025).
Fiat-Shamir Bulletproofs are Non-Malleable (in the Random Oracle Model).
Journal of Cryptology,
38(1), Artikel 11.
https://doi.org/10.1007/s00145-024-09525-2
Ganardi, M., Majumdar, R.
, Pavlogiannis, A., Schütze, L. & Zetzsche, G. (2022).
Reachability in Bidirected Pushdown VASS. I M. Bojanczyk, E. Merelli & D. P. Woodruff (red.),
49th EATCS International Conference on Automata, Languages, and Programming, ICALP 2022 Artikel 124 Dagstuhl Publishing.
https://doi.org/10.4230/LIPIcs.ICALP.2022.124
Gambs, S.
, Ranellucci, S. & Tapp, A. (2015).
The crypto-democracy and the trustworthy (position paper). I
Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance: 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers (Bind 8872, s. 58-76). Springer VS.
https://doi.org/10.1007/978-3-319-17016-9_5
Gamberini, L., Spagnolli, A., Corradi, N., Jacucci, G., Tusa, G., Mikkola, T., Zamboni, L.
& Hoggan, E. (2012).
Tailoring feedback to users’ actions in a persuasive game for household electricity conservation. I
International Conference on Persuasive Technology (s. 100-111)
Gal, A.
, Hansen, K. A., Koucky, M., Pudlak, P. & Viola, E. (2013).
Tight bounds on computing error-correcting codes by bounded-depth circuits with arbitrary gates.
I E E E Transactions on Information Theory,
59(10), 6611-6627.
https://doi.org/10.1109/TIT.2013.2270275
Fuchsberger, V., Murer, M., Tscheligi, M., Lindtner, S., Reiter, A.
, Bardzell, S., Bardzell, J. & Bjørn, P. (2015).
The Future of Making: Where Industrial and Personal Fabrication Meet.
Aarhus Series on Human Centered Computing,
1(1).
http://ojs.statsbiblioteket.dk/index.php/ashcc/article/view/21394/18857
Fuchsbauer, G., Gay, R., Kowalczyk, L.
& Orlandi, C. (2017).
Access Control Encryption for Equality, Comparison, and More. I S. Fehr (red.),
Public-Key Cryptography – PKC 2017 - 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings: 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part II (Bind 10175, s. 88-118). Springer VS.
https://doi.org/10.1007/978-3-662-54388-7_4
Frølunde, A. S., Ohlenbusch, M. E., Berg-Hansen, K., Jessen, N., Kim, S. & Boedtkjer, E. (2018).
Murine breast cancer feed arteries are thin-walled with reduced α1A-adrenoceptor expression and attenuated sympathetic vasocontraction.
Breast Cancer Research,
20(1), Artikel 20.
https://doi.org/10.1186/s13058-018-0952-8
Fritchman, K., Saminathan, K.
, Dowsley, R., Hughes, T., De Cock, M., Nascimento, A. & Teredesai, A. (2019).
Privacy-Preserving Scoring of Tree Ensembles: A Novel Framework for AI in Healthcare. I Y. Song, B. Liu, K. Lee, N. Abe, C. Pu, M. Qiao, N. Ahmed, D. Kossmann, J. Saltz, J. Tang, J. He, H. Liu & X. Hu (red.),
Proceedings - 2018 IEEE International Conference on Big Data, Big Data 2018 (s. 2413-2422). Artikel 8622627 IEEE.
https://doi.org/10.1109/BigData.2018.8622627