Baum, C., Damgård, I. B., Toft, T. & Zakarias, R. W. (2016).
Better Preprocessing for Secure Multiparty Computation. I M. Manulis, A.-R. Sadeghi & S. Schneider (red.),
Applied Cryptography and Network Security - 14th International Conference, ACNS 2016, Proceedings: 14th International Conference on Applied Cryptography and Network Security (Bind 9696, s. 327-345). Springer VS.
https://doi.org/10.1007/978-3-319-39555-5_18
Baum, C., de Saint Guilhem, C. D., Kales, D., Orsini, E.
, Scholl, P. & Zaverucha, G. (2021).
Banquet: Short and Fast Signatures from AES. I J. A. Garay (red.),
Public-Key Cryptography – PKC 2021: 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10–13, 2021, Proceedings, Part I (s. 266-297). Springer.
https://doi.org/10.1007/978-3-030-75245-3_11
Damgård, I., Ganesh, C., Khoshakhlagh, H., Orlandi, C. & Siniscalchi, L. (2021).
Balancing Privacy and Accountability in Blockchain Identity Management. I K. G. Paterson (red.),
Topics in Cryptology-CT-RSA 2021 - Cryptographers’ Track at the RSA Conference, Proceedings (s. 552-576). Springer.
https://doi.org/10.1007/978-3-030-75539-3_23
Damgård, I. B. (red.), Aceto, L., Goldberg, L. A., Halldórsson, M. M., Ingólfsdóttir, A. & Walukiewicz, I. (2008).
Automata, Languages and Programming: 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part I. Springer. Lecture Notes in Computer Science Bind 5125
https://doi.org/10.1007/978-3-540-70575-8
Aceto, L.
, Damgård, I. B., Goldberg, L. A., Halldórsson, M. M., Ingólfsdóttir, A. & Walukiewicz, I. (2008).
Automata, Languages and Programming: 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II. Springer. Lecture Notes in Computer Science Bind 5126
https://doi.org/10.1007/978-3-540-70583-3
Roy, L. & Xu, J. (2023).
A Universally Composable PAKE with Zero Communication Cost: (And Why It Shouldn’t Be Considered UC-Secure). I A. Boldyreva & V. Kolesnikov (red.),
Public-Key Cryptography – PKC 2023: 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7–10, 2023, Proceedings, Part I (s. 714-743). Springer.
https://doi.org/10.1007/978-3-031-31368-4_25
Damgård, I. B., Salvail, L., Fehr, S., Schaffner, C. & Renner, R. (2007).
A Tight High-Order Entropic Quantum Uncertainty Relation with Applications. I A. Menezes (red.),
Advances in Cryptology - CRYPTO 2007: 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007. Proceedings (s. 360-378). Springer.
https://doi.org/10.1007/978-3-540-74143-5_20
Faust, S.
, Mukherjee, P., Nielsen, J. B. & Venturi, D. (2015).
A Tamper and Leakage Resilient von Neumann Architecture. I J. Katz (red.),
Public-Key Cryptography, PKC 2015: 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 -- April 1, 2015, Proceedings (s. 579-603). Springer VS.
https://doi.org/10.1007/978-3-662-46447-2_26
Abspoel, M., Cramer, R.
, Damgård, I., Escudero, D., Rambaud, M., Xing, C. & Yuan, C. (2020).
Asymptotically Good Multiplicative LSSS over Galois Rings and Applications to MPC over Z/pkZ. I S. Moriai & H. Wang (red.),
Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, 2020, Proceedings (Bind III, s. 151-180). Springer.
https://doi.org/10.1007/978-3-030-64840-4_6
Faz-Hernandez, A., Fujii, H.
, Aranha, D. F. & Lopez, J. (2017).
A Secure and Efficient Implementation of the Quotient Digital Signature Algorithm (qDSA). I S. S. Ali, J.-L. Danger & T. Eisenbarth (red.),
Security, Privacy, and Applied Cryptography Engineering - 7th International Conference, SPACE 2017, Proceedings: 7th International Conference, SPACE 2017, Goa, India, December 13-17, 2017, Proceedings (s. 170-189). Springer.
https://doi.org/10.1007/978-3-319-71501-8_10
Damgård, I. B., Salvail, L. & Pedersen, T. B. (2005).
A Quantum Cipher with Near Optimal Key-Recycling. I V. Shoup (red.),
Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005. Proceedings (s. 494-510). Springer.
https://doi.org/10.1007/11535218_30
Damgård, I. B., Toft, T., Pagter, J. I., Jakobsen, T., Bogetoft, P. & Nielsen, K. (2006).
A Practical Implementation of Secure Auctions Based on Multiparty Integer Computation. I G. Di Crescenzo & A. Rubin (red.),
Financial Cryptography and Data Security: 10th International Conference, FC 2006 Anguilla, British West Indies, February 27-March 2, 2006 Revised Selected Papers (s. 142-147). Springer.
https://doi.org/10.1007/11889663_10
Maia Neto, A. L., Souza, A. L. F., Cunha, I., Nogueira, M., Oliveira Nunes, I., Cotta, L., Gentille, N., Loureido, A. A. F.
, Aranha, D. F., Kupwade Patil, H. & Oliveira, L. B. (2016).
AoT: Authentication and Access Control for the Entire IoT Device Life-Cycle. I
Proceedings of the 14th ACM Conference on Embedded Networked Sensor Systems, SenSys 2016 (s. 1-15). ACM.
https://doi.org/10.1145/2994551.2994555
Hansen, K. M., Larsen, S. B., Pagter, J. I., Pedersen, M. Ø. & Thomsen, J. (2004).
An Evaluation of an OSGi-based Residential Pervasive Computing Platform. I N. Guimarães & P. Isaías (red.),
Proceedings of the IADIS Applied Computing Conference (s. 246-253). International Association for Development, IADIS.
http://www.iadis.net/dl/Search_list_open.asp?code=602
Damgård, I. B., Lauritsen, R. & Toft, T. (2014).
An Empirical Study and some Improvements of the MiniMac Protocol for Secure Computation. I M. Abdalla & R. D. Prisco (red.),
Security and Cryptography for Networks: 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings (s. 398-415 ). Springer.
https://doi.org/10.1007/978-3-319-10879-7_23
Abspoel, M., Dalskov, A.
, Escudero Ospina, D. E. & Nof, A. (2021).
An Efficient Passive-to-Active Compiler for Honest-Majority MPC over Rings. I K. Sako & N. O. Tippenhauer (red.),
Applied Cryptography and Network Security - 19th International Conference, ACNS 2021, Proceedings: 19th International Conference, ACNS 2021, Kamakura, Japan, June 21–24, 2021, Proceedings (Bind II, s. 122-154). Springer.
https://doi.org/10.1007/978-3-030-78375-4_6
Coron, J.-S.
& Nielsen, J. B. (red.) (2017).
Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part I. I J.-S. Coron & J. Buus Nielsen (red.),
Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part I (Bind 10210). Springer VS.
https://doi.org/10.1007/978-3-319-56620-7
Coron, J.-S.
& Nielsen, J. B. (red.) (2017).
Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part II. I J.-S. Coron & J. Buus Nielsen (red.),
Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part II (Bind 10211). Springer VS.
https://doi.org/10.1007/978-3-319-56614-6