Faust, S., Mukherjee, P., Nielsen, J. B. & Venturi, D. (2014).
Continuous Non-malleable Codes. I Y. Lindell (red.),
Theory of Cryptography: 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings (s. 465-488). Springer.
https://doi.org/10.1007/978-3-642-54242-8_20
Damgård, I., Kazana, T.
, Obremski, M., Raj, V. & Siniscalchi, L. (2018).
Continuous NMC Secure Against Permutations and Overwrites, with Applications to CCA Secure Commitments. I A. Beimel & S. Dziembowski (red.),
Theory of Cryptography - 16th International Conference, TCC 2018, Proceedings (Bind 11240, s. 225-254). Springer VS.
https://doi.org/10.1007/978-3-030-03810-6_9
Faonio, A.
, Nielsen, J. B., Simkin, M. & Venturi, D. (2018).
Continuously Non-malleable Codes with Split-State Refresh. I B. Preneel & F. Vercauteren (red.),
Applied Cryptography and Network Security - 16th International Conference, ACNS 2018, Proceedings (Bind 10892, s. 121-139). Springer VS.
https://doi.org/10.1007/978-3-319-93387-0_7
Damgård, I., Damgård, K., Nielsen, K.
, Nordholt, P. S. & Toft, T. (2017).
Confidential benchmarking based on multiparty computation. I J. Grossklags & B. Preneel (red.),
Financial Cryptography and Data Security - 20th International Conference, FC 2016, Revised Selected Papers (Bind 9603 LNCS, s. 169-187). Springer VS.
https://doi.org/10.1007/978-3-662-54970-4_10
Hazay, C., Orsini, E.
, Scholl, P. & Soria-Vazquez, E. (2018).
Concretely Efficient Large-Scale MPC with Active Security (or, TinyKeys for TinyOT). I T. Peyrin & S. Galbraith (red.),
Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings (Bind 11274, s. 86-117). Springer VS.
https://doi.org/10.1007/978-3-030-03332-3_4
Haagh, H., Karbyshev, A., Oechsner, S., Spitters, B. & Strub, P. (2018).
Computer-Aided Proofs for Multiparty Computation with Active Security. I
Proceedings - IEEE 31st Computer Security Foundations Symposium, CSF 2018 (Bind 2018, s. 119-131). Artikel 8429300 IEEE.
https://doi.org/10.1109/CSF.2018.00016
Damgård, I., Luo, J.
, Oechsner, S., Scholl, P. & Simkin, M. (2018).
Compact Zero-Knowledge Proofs of Small Hamming Weight. I M. Abdalla & R. Dahab (red.),
Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings (Bind 10770, s. 530-560). Springer VS.
https://doi.org/10.1007/978-3-319-76581-5_18
Damgård, I. B., David, B. M., Giacomelli, I. & Nielsen, J. B. (2014).
Compact VSS and Efficient Homomorphic UC Commitments. I P. Sarkar & T. Iwata (red.),
Advances in Cryptology – ASIACRYPT 2014: 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part II (s. 213-232 ). Springer VS.
https://doi.org/10.1007/978-3-662-45608-8_12
Dalskov, A. P. K., Lee, E.
& Soria Vazquez, E. (2020).
Circuit Amortization Friendly Encodings and their Application to Statistically Secure Multiparty Computation. I S. Moriai & H. Wang (red.),
Advances in Cryptology – ASIACRYPT 2020: 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings (Bind III). Springer.
Damgård, I., Ravi, D., Siniscalchi, L. & Yakoubov, S. (2023).
Broadcast-Optimal Two Round MPC with Asynchronous Peer-to-Peer Channels. I A. Aly & M. Tibouchi (red.),
Progress in Cryptology – LATINCRYPT 2023: 8th International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2023, Quito, Ecuador, October 3–6, 2023, Proceedings (s. 87-106). Springer.
https://doi.org/10.1007/978-3-031-44469-2_5
Ciampi, M.
, Damgård, I., Ravi, D., Siniscalchi, L., Xia, Y.
& Yakoubov, S. (2023).
Broadcast-Optimal Four-Round MPC in the Plain Model. I G. Rothblum & H. Wee (red.),
Theory of Cryptography: 21st International Conference, TCC 2023, Taipei, Taiwan, November 29 – December 2, 2023, Proceedings, Part II (s. 3-32). Springer.
https://doi.org/10.1007/978-3-031-48618-0_1
Damgård, I. B., Faust, S., Mukherjee, P. & Venturi, D. (2013).
Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier. I K. Sako & P. Sarkar (red.),
Advances in Cryptology - ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II (s. 140-160 ). Springer VS.
https://doi.org/10.1007/978-3-642-42045-0_8
Baum, C., Damgård, I. B., Toft, T. & Zakarias, R. W. (2016).
Better Preprocessing for Secure Multiparty Computation. I M. Manulis, A.-R. Sadeghi & S. Schneider (red.),
Applied Cryptography and Network Security - 14th International Conference, ACNS 2016, Proceedings: 14th International Conference on Applied Cryptography and Network Security (Bind 9696, s. 327-345). Springer VS.
https://doi.org/10.1007/978-3-319-39555-5_18
Baum, C., de Saint Guilhem, C. D., Kales, D., Orsini, E.
, Scholl, P. & Zaverucha, G. (2021).
Banquet: Short and Fast Signatures from AES. I J. A. Garay (red.),
Public-Key Cryptography – PKC 2021: 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10–13, 2021, Proceedings, Part I (s. 266-297). Springer.
https://doi.org/10.1007/978-3-030-75245-3_11