Polychroniadou, A.
, Damgård, I. B., Garg, S., Mukherjee, P.
, Nielsen, J. B. & Pandey, O. (2016).
On the Communication and Round Complexity of Secure Computation. Institut for Datalogi, Aarhus Universitet.
http://cs.au.dk/fileadmin/user_upload/IvanFest_AP.pdf
Ben-Sasson, E., Ben-Tov, I.
, Damgård, I., Ishai, Y. & Ron-Zewi, N. (2016).
On public key encryption from noisy codewords. I
Public-Key Cryptography – PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings (Bind 9615, s. 417-446). Springer VS.
https://doi.org/10.1007/978-3-662-49387-8_16
Canetti, R.
, Damgård, I. B., Dziembowski, S., Ishai, Y. & Malkin, T. (2001).
On Adaptive vs. Non-adaptive Security of Multiparty Protocols. I B. Pfitzmann (red.),
Advances in Cryptology --- EUROCRYPT 2001: International Conference on the Theory and Application of Cryptographic Techniques Innsbruck, Austria, May 6-10, 2001 Proceedings (s. 262-279). Springer.
https://doi.org/10.1007/3-540-44987-6_17
Boyle, E., Couteau, G., Gilboa, N., Ishai, Y., Kohl, L., Resch, N.
& Scholl, P. (2023).
Oblivious Transfer with Constant Computational Overhead. I C. Hazay & M. Stam (red.),
Advances in Cryptology – EUROCRYPT 2023: 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part I (s. 271-302). Springer.
https://doi.org/10.1007/978-3-031-30545-0_10
Damgård, I. B., Fehr, S., Salvail, L. & Schaffner, C. (2006).
Oblivious Transfer and Linear Functions. I C. Dwork (red.),
Advances in Cryptology - CRYPTO 2006: 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006. Proceedings (s. 427-444). Springer.
https://doi.org/10.1007/11818175_26
Francati, D. & Venturi, D. (2024).
Non-malleable Fuzzy Extractors. I C. Pöpper & L. Batina (red.),
Applied Cryptography and Network Security: 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part I (s. 135-155). Springer.
https://doi.org/10.1007/978-3-031-54770-6_6
Damgård, I. B., Nicolosi, A. & Fazio, N. (2006).
Non-interactive Zero-Knowledge from Homomorphic Encryption. I S. Halevi & T. Rabin (red.),
Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006. Proceedings (s. 41-59). Springer.
https://doi.org/10.1007/11681878_3
Bai, G.
, Damgård, I., Orlandi, C. & Xia, Y. (2016).
Non-Interactive Verifiable Secret Sharing for Monotone Circuits. I D. Pointcheval, A. Nitaj & T. Rachidi (red.),
Progress in Cryptology – AFRICACRYPT 2016 - 8th International Conference on Cryptology in Africa, Proceedings (Bind 9646, s. 225-244). Springer VS.
https://doi.org/10.1007/978-3-319-31517-1_12
Matias, P., Y. S. Barbosa, P., N. C. Cardoso, T., Mariano, D.
& Aranha, D. F. (2018).
NIZKCTF: A Non-Interactive Zero-Knowledge Capture the Flag Platform.
IEEE Security & Privacy,
16(6), 42-51. Artikel 8636460.
https://doi.org/10.1109/MSEC.2018.2875324
Damgård, I. B., Escudero Ospina, D. E.
, Frederiksen, T. K., Keller, M.
, Scholl, P. & Volgushev, N. (2019).
New Primitives for Actively-Secure MPC over Rings with Applications to Private Machine Learning. I
Proceedings - 2019 IEEE Symposium on Security and Privacy, SP 2019 (s. 1102-1120). Artikel 8835310 IEEE.
https://doi.org/10.1109/SP.2019.00078
Francati, D., Friolo, D., Malavolta, G. & Venturi, D. (2023).
Multi-key and Multi-input Predicate Encryption from Learning with Errors. I C. Hazay & M. Stam (red.),
Advances in Cryptology – EUROCRYPT 2023: 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part III (s. 573-604). Springer.
https://doi.org/10.1007/978-3-031-30620-4_19