Aranha, D. F., Bennedsen, E., Campanelli, M., Ganesh, C.
, Orlandi, C. & Takahashi, A. (2022).
ECLIPSE: Enhanced Compiling method for Pedersen-committed zkSNARK Engines. I G. Hanaoka, J. Shikata & Y. Watanabe (red.),
Public-Key Cryptography – PKC 2022 : 25th IACR International Conference on Practice and Theory of Public-Key Cryptography (s. 584-614). Springer.
https://doi.org/10.1007/978-3-030-97121-2_21
Cramer, R.
, Damgård, I. B., Kiltz, E., Zakarias, S. N. H.
& Zottarel, A. (2012).
DDH-Like Assumptions Based on Extension Rings.
Lecture Notes in Computer Science,
7293, 644-661 .
https://doi.org/10.1007/978-3-642-30057-8_38
Abram, D., Beimel, A., Ishai, Y., Kushilevitz, E. & Narayanan, V. (2023).
Cryptography from Planted Graphs: Security with Logarithmic-Size Messages. Afhandling præsenteret på Theory of Cryptography. TCC 2023, Taipei, Taiwan.
Aranha, D. F., Hall-Andersen, M. N., Nitulescu, A., Pagnin, E.
& Yakoubov, S. (2022).
Count Me In! Extendability for Threshold Ring Signatures. I G. Hanaoka, J. Shikata & Y. Watanabe (red.),
Public-Key Cryptography – PKC 2022 : 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings, Part II (s. 379-406). Springer.
https://doi.org/10.1007/978-3-030-97131-1_13
Boyle, E., Couteau, G., Gilboa, N., Ishai, Y., Kohl, L., Resch, N.
& Scholl, P. (2022).
Correlated Pseudorandomness from Expand-Accumulate Codes. I Y. Dodis & T. Shrimpton (red.),
Advances in Cryptology – CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Proceedings (s. 603-633). Springer.
https://doi.org/10.1007/978-3-031-15979-4_21
Boyle, E., Couteau, G., Gilboa, N., Ishai, Y., Kohl, L.
& Scholl, P. (2020).
Correlated Pseudorandom Functions from Variable-Density LPN. I S. Irani (red.),
Proceedings - 2020 IEEE 61st Annual Symposium on Foundations of Computer Science, FOCS 2020 (s. 1069-1080). Artikel 9317926 IEEE.
https://doi.org/10.1109/FOCS46700.2020.00103
Faust, S., Mukherjee, P.
, Nielsen, J. B. & Venturi, D. (2014).
Continuous Non-malleable Codes. I Y. Lindell (red.),
Theory of Cryptography: 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings (s. 465-488). Springer.
https://doi.org/10.1007/978-3-642-54242-8_20
Damgård, I., Kazana, T., Obremski, M., Raj, V. & Siniscalchi, L. (2018).
Continuous NMC Secure Against Permutations and Overwrites, with Applications to CCA Secure Commitments. I A. Beimel & S. Dziembowski (red.),
Theory of Cryptography - 16th International Conference, TCC 2018, Proceedings (Bind 11240, s. 225-254). Springer VS.
https://doi.org/10.1007/978-3-030-03810-6_9
Faonio, A.
, Nielsen, J. B., Simkin, M. & Venturi, D. (2018).
Continuously Non-malleable Codes with Split-State Refresh. I B. Preneel & F. Vercauteren (red.),
Applied Cryptography and Network Security - 16th International Conference, ACNS 2018, Proceedings (Bind 10892, s. 121-139). Springer VS.
https://doi.org/10.1007/978-3-319-93387-0_7
Damgård, I., Damgård, K., Nielsen, K., Nordholt, P. S. & Toft, T. (2017).
Confidential benchmarking based on multiparty computation. I J. Grossklags & B. Preneel (red.),
Financial Cryptography and Data Security - 20th International Conference, FC 2016, Revised Selected Papers (Bind 9603 LNCS, s. 169-187). Springer VS.
https://doi.org/10.1007/978-3-662-54970-4_10
Hazay, C., Orsini, E.
, Scholl, P. & Soria-Vazquez, E. (2018).
Concretely Efficient Large-Scale MPC with Active Security (or, TinyKeys for TinyOT). I T. Peyrin & S. Galbraith (red.),
Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings (Bind 11274, s. 86-117). Springer VS.
https://doi.org/10.1007/978-3-030-03332-3_4
Damgård, I., Luo, J., Oechsner, S.
, Scholl, P. & Simkin, M. (2018).
Compact Zero-Knowledge Proofs of Small Hamming Weight. I M. Abdalla & R. Dahab (red.),
Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings (Bind 10770, s. 530-560). Springer VS.
https://doi.org/10.1007/978-3-319-76581-5_18
Damgård, I. B., David, B. M., Giacomelli, I.
& Nielsen, J. B. (2014).
Compact VSS and Efficient Homomorphic UC Commitments. I P. Sarkar & T. Iwata (red.),
Advances in Cryptology – ASIACRYPT 2014: 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part II (s. 213-232 ). Springer VS.
https://doi.org/10.1007/978-3-662-45608-8_12