Dalskov, A. P. K., Orlandi, C., Keller, M., Shrishak, K. & Shulman, H. (2020).
Securing DNSSEC Keys via Threshold ECDSA from Generic MPC. I L. Chen, S. Schneider, N. Li & K. Liang (red.),
European Symposium on Research in Computer Security : Computer Security – ESORICS 2020 (Bind I, s. 654-673). Springer.
https://doi.org/10.1007/978-3-030-59013-0_32
Nielsen, J. B. & Spitters, B. (2020).
Smart contract interactions in coq. I E. Sekerinski, N. Moreira, J. N. Oliveira, D. Ratiu, R. Guidotti, M. Farrell, M. Luckcuck, D. Marmsoler, J. Campos, T. Astarte, L. Gonnord, A. Cerone, L. Couto, B. Dongol, M. Kutrib, P. Monteiro & D. Delmas (red.),
Formal Methods- FM 2019 International Workshops - Revised Selected Papers (s. 380-391). Springer.
https://doi.org/10.1007/978-3-030-54994-7_29
Damgård, I., Haagh, H., Mercer, R.
, Nitulescu, A., Orlandi, C. & Yakoubov, S. (2020).
Stronger Security and Constructions of Multi-designated Verifier Signatures. I R. Pass & K. Pietrzak (red.),
Theory of Cryptography - 18th International Conference, TCC 2020, Proceedings: Proceedings (Bind II, s. 229-260). Springer.
https://doi.org/10.1007/978-3-030-64378-2_9
Teli, M., Foth, M., Sciannamblo, M., Anastasiu, I.
& Lyle, P. J. (2020).
Tales of Institutioning and Commoning: Participatory Design Processes with a Strategic and Tactical Perspective. I C. Del Gaudio, L. Parra-Agudelo, R. Clarke, J. Saad-Sulonen, A. Botero, A. Botero, F. C. Londono, F. C. Londono & P. A. Escandon Suarez (red.),
Proceedings of the 16th Participatory Design Conference 2020 (PDC2020 udg., Bind 1, s. 159-171). Association for Computing Machinery.
https://doi.org/10.1145/3385010.3385020
Garavel, H., ter Beek, M. H.
& van de Pol, J. (2020).
The 2020 Expert Survey on Formal Methods. I M. H. ter Beek & D. Nickovic (red.),
Formal Methods for Industrial Critical Systems - 25th International Conference, FMICS 2020, Proceedings: FMICS 2020, Vienna, Austria, September 2-3, 2020, Proceedings (s. 3-69). Springer.
https://doi.org/10.1007/978-3-030-58298-2_1
Tsitsulin, A., Munkhoeva, M.
, Mottin, D., Karras, P., Bronstein, A., Oseledets, I. & Müller, E. (2020).
The Shape of Data: Intrinsic Distance for Data Distributions. Afhandling præsenteret på The International Conference on Learning Representations (ICLR), Ababa, Etiopien.
Eerikson, H.
, Keller, M., Orlandi, C., Pullonen, P., Puura, J.
& Simkin, M. (2020).
Use your brain! Arithmetic 3PC for any modulus with active security. I Y. T. Kalai, A. D. Smith & D. Wichs (red.),
1st Conference on Information-Theoretic Cryptography (ITC 2020) Artikel 5 Dagstuhl Publishing.
https://doi.org/10.4230/LIPIcs.ITC.2020.5
Baum, C., Cozzo, D. & P. Smart, N. (2020).
Using TopGear in Overdrive: A more efficient ZKPoK for SPDZ. I K. G. Paterson & D. Stebila (red.),
Selected Areas in Cryptography – SAC 2019 - 26th International Conference, Revised Selected Papers: 26th International Conference, Waterloo, ON, Canada, August 12–16, 2019, Revised Selected Papers (s. 274-302). Springer.
https://doi.org/10.1007/978-3-030-38471-5_12
Mathiasen, A., Hvilshøj, F., Jørgensen, J. R., Nasery, A.
& Mottin, D. (2020).
What if Neural Networks had SVDs? I H. Larochelle, M. Ranzato, R. Hadsell, M. F. Balcan & H. Lin (red.),
Advances in Neural Information Processing Systems 33 pre-proceedings (NeurIPS 2020)
Ledo, D.
, Vermeulen, J., Carpendale, S., Greenberg, S., Oehlberg, L. & Boring, S. (2019).
Astral: prototyping mobile and smart object interactive behaviours using familiar applications. I
DIS 2019 - Proceedings of the 2019 ACM Designing Interactive Systems Conference (s. 711-724). Association for Computing Machinery.
https://doi.org/10.1145/3322276.3322329