Tozawa, K.
, Morita, H. & Mizuki, T. (2023).
Single-Shuffle Card-Based Protocol with Eight Cards per Gate. I D. Genova & J. Kari (red.),
Unconventional Computation and Natural Computation: 20th International Conference, UCNC 2023, Jacksonville, FL, USA, March 13–17, 2023, Proceedings (s. 171-185). Springer.
https://doi.org/10.1007/978-3-031-34034-5_12
Baum, C., Dittmer, S.
, Scholl, P. & Wang, X. (2023).
Sok: vector OLE-based zero-knowledge protocols.
Designs, Codes, and Cryptography,
91(11), 3527-3561.
https://doi.org/10.1007/s10623-023-01292-8
Goel, A.
, Hall-Andersen, M. N., Kaptchuk, G. & Spooner, N. (2023).
Speed-Stacking: Fast Sublinear Zero-Knowledge Proofs for Disjunctions. I C. Hazay & M. Stam (red.),
Advances in Cryptology – EUROCRYPT 2023: 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23–27, 2023, Proceedings, Part II (s. 347-378). Springer.
https://doi.org/10.1007/978-3-031-30617-4_12
Woodcock, J., Andersen, M. S., Aranha, D. F., Hallerstede, S., Hansen, S. T., Jakobsen, N. K.
, Kulik, T., Larsen, P. G., Macedo, H. D., Martin, C. I. I. & Norrild, V. A. M. (2023).
State of the Art Report: Verified Computation.
https://doi.org/10.48550/arXiv.2308.15191
Campanelli, M., Francati, D. & Orlandi, C. (2023).
Structure-Preserving Compilers from New Notions of Obfuscations. I A. Boldyreva & V. Kolesnikov (red.),
Public-Key Cryptography – PKC 2023: 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7–10, 2023, Proceedings, Part II (s. 663-693). Springer.
https://doi.org/10.1007/978-3-031-31371-4_23
Kondi, Y., Orlandi, C. & Roy, L. (2023).
Two-Round Stateless Deterministic Two-Party Schnorr Signatures from Pseudorandom Correlation Functions. I H. Handschuh & A. Lysyanskaya (red.),
Advances in Cryptology – CRYPTO 2023: 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023, Proceedings, Part I (s. 646-677). Springer.
https://doi.org/10.1007/978-3-031-38557-5_21
Ateniese, G., Chen, L.
, Francati, D., Papadopoulos, D. & Tang, Q. (2023).
Verifiable Capacity-Bound Functions: A New Primitive from Kolmogorov Complexity: (Revisiting Space-Based Security in the Adaptive Setting). I A. Boldyreva & V. Kolesnikov (red.),
Public-Key Cryptography – PKC 2023: 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7–10, 2023, Proceedings, Part II (s. 63-93). Springer.
https://doi.org/10.1007/978-3-031-31371-4_3
Ganesh, C.
, Kondi, Y. M., Orlandi, C., Pancholi, M. R., Takahashi, A. & Tschudi, D. (2023).
Witness-Succinct Universally-Composable SNARKs. I C. Hazay & M. Stam (red.),
Advances in Cryptology – EUROCRYPT 2023: 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23–27, 2023, Proceedings, Part II (s. 315–346). Springer.
https://doi.org/10.1007/978-3-031-30617-4_11
Boyle, E., Couteau, G., Gilboa, N., Ishai, Y., Kohl, L., Resch, N.
& Scholl, P. (2022).
Correlated Pseudorandomness from Expand-Accumulate Codes. I Y. Dodis & T. Shrimpton (red.),
Advances in Cryptology – CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Proceedings (s. 603-633). Springer.
https://doi.org/10.1007/978-3-031-15979-4_21
Aranha, D. F., Hall-Andersen, M. N., Nitulescu, A., Pagnin, E. & Yakoubov, S. (2022).
Count Me In! Extendability for Threshold Ring Signatures. I G. Hanaoka, J. Shikata & Y. Watanabe (red.),
Public-Key Cryptography – PKC 2022 : 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings, Part II (s. 379-406). Springer.
https://doi.org/10.1007/978-3-030-97131-1_13
Aranha, D. F., Bennedsen, E., Campanelli, M., Ganesh, C., Orlandi, C. & Takahashi, A. (2022).
ECLIPSE: Enhanced Compiling method for Pedersen-committed zkSNARK Engines. I G. Hanaoka, J. Shikata & Y. Watanabe (red.),
Public-Key Cryptography – PKC 2022 : 25th IACR International Conference on Practice and Theory of Public-Key Cryptography (s. 584-614). Springer.
https://doi.org/10.1007/978-3-030-97121-2_21
Baum, C., Escudero, D., Pedrouzo-Ulloa, A.
, Scholl, P. & Troncoso-Pastoriza, J. R. (2022).
Efficient protocols for oblivious linear function evaluation from ring-LWE.
Journal of Computer Security,
30(1), 39-78.
https://doi.org/10.3233/JCS-200116
Davi Resende, A. C., Railsback, D., Dowsley, R., Nascimento, A. C. A.
& Aranha, D. F. (2022).
Fast Privacy-Preserving Text Classification based on Secure Multiparty Computation.
IEEE Transactions on Information Forensics and Security,
17, 428-442.
https://doi.org/10.1109/TIFS.2022.3144007
Damgård, I., Jakobsen, T. P.
, Nielsen, J. B., Pagter, J. I. & Østergaard, M. B. (2022).
Fast threshold ECDSA with honest majority.
Journal of Computer Security,
30(1), 167-196.
https://doi.org/10.3233/JCS-200112
Ubys, L., Vancea, V. N.
, Kulik, T., Larsen, P. G., Boudjadar, J. & Aranha, D. F. (2022).
Formal Model In-The-Loop for Secure Industrial Control Networks. I
Formal Aspects of Component Software - 18th International Conference, FACS 2022, Proceedings (s. 74-89). Springer.
https://doi.org/10.1007/978-3-031-20872-0_5
Ishai, Y., Patra, A., Patranabis, S.
, Ravi, D. & Srinivasan, A. (2022).
Fully-Secure MPC with Minimal Trust. I
Theory of Cryptography - 20th International Conference, TCC 2022, Proceedings (s. 470–501). Springer.
https://doi.org/10.1007/978-3-031-22365-5_17
Espitau, T., Fouque, P.-A., Gérard, F., Rossi, M.
, Takahashi, A., Tibouchi, M., Wallet, A. & Yu, Y. (2022).
MITAKA: A Simpler, Parallelizable, Maskable Variant of Falcon. I O. Dunkelman & S. Dziembowski (red.),
Advances in Cryptology – EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2022, Proceedings (Bind 3, s. 222-253). Springer.
https://doi.org/10.1007/978-3-031-07082-2_9