Applebaum, B.
, Damgård, I., Ishai, Y., Nielsen, M. & Zichron, L. (2017).
Secure Arithmetic Computation with Constant Computational Overhead. I H. Shacham & J. Katz (red.),
Advances in Cryptology – CRYPTO 2017 - 37th Annual International Cryptology Conference, Proceedings (Bind 10401, s. 223-254). Springer VS.
https://doi.org/10.1007/978-3-319-63688-7_8
Chillotti, I., Orsini, E.
, Scholl, P., Smart, N. P. & Leeuwen, B. V. (2022).
Scooby: Improved Multi-party Homomorphic Secret Sharing Based on FHE. I C. Galdi & S. Jarecki (red.),
Security and Cryptography for Networks - 13th International Conference, SCN 2022, Proceedings (s. 540-563). Springer.
https://doi.org/10.1007/978-3-031-14791-3_24
Damgård, I. B., Krøigaard, M., Ishai, Y.
, Nielsen, J. B. & Smith, A. (2008).
Scalable Multiparty Computation with Nearly Optimal Work and Resilience.
Lecture Notes in Computer Science,
5157, 241-261.
https://doi.org/10.1007/978-3-540-85174-5_14
Chakraborty, S., Ganesh, C.
, Pancholi, M. R. & Sarkar, P. (2021).
Reverse Firewalls for Adaptively Secure MPC without Setup. I M. Tibouchi & H. Wang (red.),
Advances in Cryptology – ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings, Part 2: 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6–10, 2021, Proceedings, Part II (s. 335-364). Springer.
https://doi.org/10.1007/978-3-030-92075-3_12
Haagh, H., Ji, Y., Li, C.
, Orlandi, C. & Song, Y. (2017).
Revealing Encryption for Partial Ordering. I M. O’Neill (red.),
Cryptography and Coding - 16th IMA International Conference, IMACC 2017, Proceedings (s. 3-22). Springer VS.
https://doi.org/10.1007/978-3-319-71045-7_1
Cascudo, I.
, Damgård, I., Farràs, O. & Ranellucci, S. (2017).
Resource-Efficient OT Combiners with Active Security. I Y. Kalai & L. Reyzin (red.),
Theory of Cryptography - 15th International Conference, TCC 2017, Proceedings (Bind 10678, s. 461-486). Springer VS.
https://doi.org/10.1007/978-3-319-70503-3_15
Canetti, R., Krawczyk, H.
& Nielsen, J. B. (2003).
Relaxing Chosen-Ciphertext Security. I D. Boneh (red.),
Advances in Cryptology - CRYPTO 2003: 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003. Proceedings (s. 565-582). Springer.
https://doi.org/10.1007/978-3-540-45146-4_33
Francati, D., Friolo, D., Maitra, M., Malavolta, G., Rahimi, A. & Venturi, D. (2023).
Registered (Inner-Product) Functional Encryption. I J. Guo & R. Steinfeld (red.),
Advances in Cryptology – ASIACRYPT 2023: 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4–8, 2023, Proceedings, Part V (s. 98-133). Springer.
https://doi.org/10.1007/978-981-99-8733-7_4
Cascudo, I.
, Damgård, I., David, B. M., Döttling, N.
& Nielsen, J. B. (2016).
Rate-1, linear time and additively homomorphic UC commitments. I M. Robshaw & J. Katz (red.),
Advances in Cryptology - 36th Annual International Cryptology Conference, CRYPTO 2016, Proceedings (Bind 9816, s. 179-207). Springer VS.
https://doi.org/10.1007/978-3-662-53015-3_7
Gentry, C., Halevi, S., Magri, B.
, Nielsen, J. B. & Yakoubov, S. (2021).
Random-Index PIR and Applications. I K. Nissim & B. Waters (red.),
Theory of Cryptography : 19th International Conference, TCC 2021, Proceedings (s. 32-61). Springer.
https://doi.org/10.1007/978-3-030-90456-2_2
Baum, C., Braun, L., Delpech de Saint Guilhem, C., Klooß, M., Orsini, E.
, Roy, L. D. & Scholl, P. (2023).
Publicly Verifiable Zero-Knowledge and Post-Quantum Signatures from VOLE-in-the-Head. I H. Handschuh & A. Lysyanskaya (red.),
Advances in Cryptology: CRYPTO 2023 (s. 581-615). Springer.
https://doi.org/10.1007/978-3-031-38554-4_19
Baum, C., Damgård, I. B. & Orlandi, C. (2014).
Publicly Auditable Secure Multi-Party Computation. I M. Abdalla & R. D. Prisco (red.),
Security and Cryptography for Networks: 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings (s. 175-196 ). Springer VS.
https://doi.org/10.1007/978-3-319-10879-7_11
Vanegas, H., Cabarcas, D.
& Aranha, D. F. (2023).
Privacy-Preserving Edit Distance Computation Using Secret-Sharing Two-Party Computation. I A. Aly & M. Tibouchi (red.),
Progress in Cryptology – LATINCRYPT 2023: 8th International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2023, Quito, Ecuador, October 3–6, 2023, Proceedings (s. 67-86). Springer.
https://doi.org/10.1007/978-3-031-44469-2_4
Frederiksen, T. K., Nielsen, J. B. & Orlandi, C. (2015).
Privacy-Free Garbled Circuits with Applications to Efficient Zero-Knowledge. I E. Oswald & M. Fischlin (red.),
Advances in Cryptology - EUROCRYPT 2015: 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II (s. 191-219). Springer VS.
https://doi.org/10.1007/978-3-662-46803-6_7
Meiklejohn, S.
& Orlandi, C. (2015).
Privacy-enhancing overlays in bitcoin. I M. Brenner , N. Christin , B. Johnson & K. Rohloff (red.),
Financial Cryptography and Data Security : FC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers (Bind 8976, s. 127-141). Springer.
https://doi.org/10.1007/978-3-662-48051-9_10
B. S. Reis, T.
, Aranha, D. F. & Lopez, J. (2017).
PRESENT Runs Fast: Efficient and Secure Implementation in Software. I W. Fischer & N. Homma (red.),
Cryptographic Hardware and Embedded Systems – CHES 2017 - 19th International Conference, Proceedings: 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings (s. 644-664). Springer.
https://doi.org/10.1007/978-3-319-66787-4_31