Campanelli, M., Fiore, D., Greco, N., Kolonelos, D. & Nizzardo, L. (2020).
Incrementally Aggregatable Vector Commitments and Applications to Verifiable Decentralized Storage. I S. Moriai & H. Wang (red.),
Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings (s. 3-35). Springer.
https://doi.org/10.1007/978-3-030-64834-3_1
Deuber, D., Döttling, N.
, Magri, B., Malavolta, G. & Thyagarajan, S. A. K. (2020).
Minting Mechanism for Proof of Stake Blockchains. I M. Conti, J. Zhou, E. Casalicchio & A. Spognardi (red.),
Applied Cryptography and Network Security (s. 315-334). Springer.
https://doi.org/10.1007/978-3-030-57808-4_16
Brandt, M.
, Orlandi, C., Shrishak, K. & Shulman, H. (2020).
Optimal Transport Layer for Secure Computation. I P. Samarati, S. D. C. D. Vimercati, M. S. Obaidat & J. Ben-Othman (red.),
ICETE 2020 - Proceedings of the 17th International Joint Conference on e-Business and Telecommunications (Bind Volume 3: SECRYPT, s. 130-141). SCITEPRESS Digital Library.
https://doi.org/10.5220/0009826801300141
Baum, C., Frederiksen, T. K., Hesse, J., Lehmann, A. & Yanai, A. (2020).
Pesto: Proactively secure distributed single sign-on, or how to trust a hacked server. I
Proceedings - 5th IEEE European Symposium on Security and Privacy, Euro S and P 2020 (s. 587-606). Artikel 9230400 IEEE.
https://doi.org/10.1109/EuroSP48549.2020.00044
Dalskov, A. P. K., Orlandi, C., Keller, M., Shrishak, K. & Shulman, H. (2020).
Securing DNSSEC Keys via Threshold ECDSA from Generic MPC. I L. Chen, S. Schneider, N. Li & K. Liang (red.),
European Symposium on Research in Computer Security : Computer Security – ESORICS 2020 (Bind I, s. 654-673). Springer.
https://doi.org/10.1007/978-3-030-59013-0_32
Fehér, M., Yazdani, N., Aranha, D. F., Lucani Rötter, D. E., Hansen, M. T. & Vester, F. E. (2020).
Side Channel Security of Smart Meter Data Compression Techniques. I
2020 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2020: Proceedings Artikel 9302931 IEEE.
https://doi.org/10.1109/SmartGridComm47815.2020.9302931
Damgård, I., Haagh, H., Mercer, R.
, Nitulescu, A., Orlandi, C. & Yakoubov, S. (2020).
Stronger Security and Constructions of Multi-designated Verifier Signatures. I R. Pass & K. Pietrzak (red.),
Theory of Cryptography - 18th International Conference, TCC 2020, Proceedings: Proceedings (Bind II, s. 229-260). Springer.
https://doi.org/10.1007/978-3-030-64378-2_9
Eerikson, H.
, Keller, M., Orlandi, C., Pullonen, P., Puura, J.
& Simkin, M. (2020).
Use your brain! Arithmetic 3PC for any modulus with active security. I Y. T. Kalai, A. D. Smith & D. Wichs (red.),
1st Conference on Information-Theoretic Cryptography (ITC 2020) Artikel 5 Schloss Dagstuhl--Leibniz-Zentrum für Informatik.
https://doi.org/10.4230/LIPIcs.ITC.2020.5
Baum, C., Cozzo, D. & P. Smart, N. (2020).
Using TopGear in Overdrive: A more efficient ZKPoK for SPDZ. I K. G. Paterson & D. Stebila (red.),
Selected Areas in Cryptography – SAC 2019 - 26th International Conference, Revised Selected Papers: 26th International Conference, Waterloo, ON, Canada, August 12–16, 2019, Revised Selected Papers (s. 274-302). Springer.
https://doi.org/10.1007/978-3-030-38471-5_12
Abspoel, M., Cramer, R.
, Damgård, I. B., Escudero Ospina, D. E. & Yuan, C. (2019).
Efficient Information-Theoretic Secure Multiparty Computation over Z/p^k Z via Galois Rings. I D. Hofheinz & A. Rosen (red.),
Theory of Cryptography - 17th International Conference, TCC 2019, Proceedings: Proceedings (Bind Part 1, s. 471-501). Springer.
https://doi.org/10.1007/978-3-030-36030-6_19
Boyle, E., Couteau, G., Gilboa, N., Ishai, Y., Kohl, L.
& Scholl, P. (2019).
Efficient Pseudorandom Correlation Generators: Silent OT Extension and More. I D. Micciancio & A. Boldyreva (red.),
Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Proceedings: CRYPTO 2019 (s. 489-518). Springer.
https://doi.org/10.1007/978-3-030-26954-8_16
Hazay, C., Mikkelsen, G. L., Rabin, T., Toft, T. & Nicolosi, A. A. (2019).
Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting.
Journal of Cryptology,
32(2), 265-323.
https://doi.org/10.1007/s00145-017-9275-7
Boyle, E., Couteau, G., Gilboa, N., Ishai, Y., Kohl, L., Rindal, P.
& Scholl, P. (2019).
Efficient Two-Round OT Extension and Silent Non-Interactive Secure Computation. I L. Cavallaro, J. Kinder, X. Wang & J. Katz (red.),
CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (s. 291-308). Association for Computing Machinery.
https://doi.org/10.1145/3319535.3354255
Cascudo, I.
, Damgård, I., David, B., Döttling, N., Dowsley, R. & Giacomelli, I. (2019).
Efficient UC Commitment Extension with Homomorphism for Free (and Applications). I S. D. Galbraith & S. Moriai (red.),
Advances in Cryptology – ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings (s. 606-635). Springer.
https://doi.org/10.1007/978-3-030-34621-8_22
Damgård, I. B., Escudero Ospina, D. E., Frederiksen, T. K., Keller, M.
, Scholl, P. & Volgushev, N. (2019).
New Primitives for Actively-Secure MPC over Rings with Applications to Private Machine Learning. I
Proceedings - 2019 IEEE Symposium on Security and Privacy, SP 2019 (s. 1102-1120). Artikel 8835310 IEEE.
https://doi.org/10.1109/SP.2019.00078