Damgård, I. B., Ravi, D.
, Roy, L. D., Tschudi, D. & Yakoubov, S. (2025).
Efficient Secure Communication Over Dynamic Incomplete Networks With Minimal Connectivity. I E. Boyle, E. Boyle & M. Mahmoody (red.),
Theory of Cryptography - 22nd International Conference, TCC 2024, Proceedings (s. 266–292). Springer.
https://doi.org/10.1007/978-3-031-78023-3_9
Ganesh, C.
, Orlandi, C., Pancholi, M. R., Takahashi, A. & Tschudi, D. (2025).
Fiat-Shamir Bulletproofs are Non-Malleable (in the Random Oracle Model).
Journal of Cryptology,
38(1), Artikel 11.
https://doi.org/10.1007/s00145-024-09525-2
Årdal, M. A., Aranha, D. F., Boudgoust, K., Kolby, S. & Takahashi, A. (2024).
Aggregating Falcon Signatures with LaBRADOR. I L. Reyzin & D. Stebila (red.),
Advances in Cryptology – CRYPTO 2024 - 44th Annual International Cryptology Conference, Proceedings (s. 71-106)
https://doi.org/10.1007/978-3-031-68376-3_3
Braun, L., Castagnos, G.
, Damgård, I. B., Laguillaumie, F.
, Melissaris, K., Orlandi, C. & Tucker, I. (2024).
An Improved Threshold Homomorphic Cryptosystem Based on Class Groups.
https://eprint.iacr.org/2024/717
Braun, L., Castagnos, G.
, Damgård, I., Laguillaumie, F.
, Melissaris, K., Orlandi, C. & Tucker, I. (2024).
An Improved Threshold Homomorphic Cryptosystem Based on Class Groups. I C. Galdi & D. H. Phan (red.),
Security and Cryptography for Networks - 14th International Conference, SCN 2024, Amalfi, Italy, September 11-13, 2024, Proceedings, Part II (s. 24-46). Springer.
https://doi.org/10.1007/978-3-031-71073-5_2
Hansen, B., Aamand, J.
, Blicher-Mathiesen, G., Christiansen, A. V., Claes, N., Dalgaard, T., Frederiksen, R. R., Jacobsen, B. H., Jakobsen, R.
, Kallesøe, A., Kim, H., Koch, J., Møller, I., Madsen, R. B.
, Schaper, S., Sandersen, P. B. E., Voutchkova, D. D. & Wiborg, I. (2024).
Assessing groundwater denitrification spatially is the key to targeted agricultural nitrogen regulation.
Scientific Reports,
14(1), Artikel 5538.
https://doi.org/10.1038/s41598-024-55984-9
Damgård, I., Keller, H., Nelson, B., Orlandi, C. & Pagh, R. (2024).
Differentially Private Selection from Secure Distributed Computing. I T.-S. Chua, C.-W. Ngo, R. Kumar, H. W. Lauw & R. K.-W. Lee (red.),
WWW 2024 - Proceedings of the ACM Web Conference (s. 1103-1114). Association for Computing Machinery.
https://doi.org/10.1145/3589334.3645435
Brzuska, C., Couteau, G., Egger, C., Karanko, P.
& Meyer, P. E. (2024).
Instantiating the Hash-Then-Evaluate Paradigm: Strengthening PRFs, PCFs, and OPRFs. I C. Galdi & D. Hieu Phan (red.),
Security and Cryptography for Networks (s. 97–116). Springer Nature.
https://eprint.iacr.org/2023/1145
Fleischhacker, N.
, Larsen, K. G., Obremski, M. & Simkin, M. (2024).
Invertible Bloom Lookup Tables with Less Memory and Randomness. I T. Chan, J. Fischer, J. Iacono & G. Herman (red.),
32nd Annual European Symposium on Algorithms, ESA 2024 Artikel 54 Dagstuhl Publishing.
https://doi.org/10.4230/LIPIcs.ESA.2024.54
Burkhardt, J., Caragiannis, I., Fehrs, K., Russo, M.
, Schwiegelshohn, C. & Shyam, S. (2024).
Low-Distortion Clustering with Ordinal and Limited Cardinal Information. I M. Wooldridge, J. Dy & S. Natarajan (red.),
Technical Tracks 14 (9 udg., s. 9555-9563). Association for the Advancement of Artificial Intelligence.
https://doi.org/10.1609/aaai.v38i9.28811
Francati, D. & Venturi, D. (2024).
Non-malleable Fuzzy Extractors. I C. Pöpper & L. Batina (red.),
Applied Cryptography and Network Security: 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part I (s. 135-155). Springer.
https://doi.org/10.1007/978-3-031-54770-6_6
Baum, C., Beullens, W., Mukherjee, S., Orsini, E., Ramacher, S., Rechberger, C.
, Roy, L. & Scholl, P. (2024).
One Tree to Rule Them All: Optimizing GGM Trees and OWFs for Post-Quantum Signatures. I K.-M. Chung & Y. Sasaki (red.),
Advances in Cryptology - ASIACRYPT 2024 (s. 463-493). Springer Nature.
https://doi.org/10.1007/978-981-96-0875-1_15
Årdal, M. A., Adj, G., Alblooshi, A.
, Aranha, D. F., A. Canales-Martínez, I., Chavez-Saab, J., Gazzoni Filho, D. L., Reijnders, K. & Rodriguez-Henriquez, F. (2024).
Optimized SQIsign one-dimensional verification on Intel and Cortex-M4.
IACR Transactions of Cryptographic Hardware and Embedded Systems,
2025(1), 487-522.
https://doi.org/10.46586/tches.v2025.i1.497-522
Haselwarter, P. G., Hvass, B. S., Hansen, L. L., Winterhalter, T., Hriţcu, C.
& Spitters, B. (2024).
The Last Yard: Foundational End-to-End Verification of High-Speed Cryptography. I A. Timany, D. Traytel, B. Pientka & S. Blazy (red.),
CPP 2024: Proceedings of the 13th ACM SIGPLAN International Conference on Certified Programs and Proofs (s. 30-44). Association for Computing Machinery.
https://doi.org/10.1145/3636501.3636961
Melissaris Papanikolaou, N., Ravi, D.
& Yakoubov, S. (2024).
Threshold-Optimal MPC With Friends and Foes. I A. Chattopadhyay, S. Bhasin, S. Picek & C. Rebeiro (red.),
Progress in Cryptology – INDOCRYPT 2023: 24th International Conference on Cryptology in India, Goa, India, December 10–13, 2023, Proceedings, Part II (Bind 2, s. 3-24). Springer.
https://doi.org/10.1007/978-3-031-56235-8_1
Roy, L. & Xu, J. (2023).
A Universally Composable PAKE with Zero Communication Cost: (And Why It Shouldn’t Be Considered UC-Secure). I A. Boldyreva & V. Kolesnikov (red.),
Public-Key Cryptography – PKC 2023: 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7–10, 2023, Proceedings, Part I (s. 714-743). Springer.
https://doi.org/10.1007/978-3-031-31368-4_25
Soureshjani, F. H.
, Hall-Andersen, M., Jahanara, M., Kam, J., Gorzny, J. & Ahmadvand, M. (2023).
Automated Analysis of Halo2 Circuits. I S. Graham-Lengrand & M. Preiner (red.),
Proceedings of the 21st International Workshop on Satisfiability Modulo Theories (SMT 2023) co-located with the 29th International Conference on Automated Deduction (CADE 2023), Rome, Italy, July, 5-6, 2023 (Bind 3429, s. 3-17). CEUR-WS.org.
https://ceur-ws.org/Vol-3429/paper3.pdf
Ciampi, M.
, Damgård, I., Ravi, D., Siniscalchi, L., Xia, Y.
& Yakoubov, S. (2023).
Broadcast-Optimal Four-Round MPC in the Plain Model. I G. Rothblum & H. Wee (red.),
Theory of Cryptography: 21st International Conference, TCC 2023, Taipei, Taiwan, November 29 – December 2, 2023, Proceedings, Part II (s. 3-32). Springer.
https://doi.org/10.1007/978-3-031-48618-0_1
Damgård, I., Ravi, D., Siniscalchi, L. & Yakoubov, S. (2023).
Broadcast-Optimal Two Round MPC with Asynchronous Peer-to-Peer Channels. I A. Aly & M. Tibouchi (red.),
Progress in Cryptology – LATINCRYPT 2023: 8th International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2023, Quito, Ecuador, October 3–6, 2023, Proceedings (s. 87-106). Springer.
https://doi.org/10.1007/978-3-031-44469-2_5
Baum, C., David, B., Dowsley, R., Kishore, R.
, Nielsen, J. B. & Oechsner, S. (2023).
CRAFT: Composable Randomness Beacons and Output-Independent Abort MPC From Time. I A. Boldyreva & V. Kolesnikov (red.),
Public-Key Cryptography – PKC 2023: 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7–10, 2023, Proceedings, Part I (Bind 1, s. 439-470). Springer Science and Business Media Deutschland GmbH.
https://doi.org/10.1007/978-3-031-31368-4_16
Abram, D., Beimel, A., Ishai, Y., Kushilevitz, E. & Narayanan, V. (2023).
Cryptography from Planted Graphs: Security with Logarithmic-Size Messages. Afhandling præsenteret på Theory of Cryptography. TCC 2023, Taipei, Taiwan.