Cascudo Pueyo, I., Damgård, I. B., David, B. M., Giacomelli, I., Nielsen, J. B. & Trifiletti, R. (2015).
Additively Homomorphic UC commitments with Optimal Amortized Overhead. I J. Katz (red.),
Public-Key Cryptography, PKC 2015: 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30-April 1, 2015, Proceedings (s. 495–515). Springer.
https://doi.org/10.1007/978-3-662-46447-2_22
Faust, S.
, Mukherjee, P., Nielsen, J. B. & Venturi, D. (2015).
A Tamper and Leakage Resilient von Neumann Architecture. I J. Katz (red.),
Public-Key Cryptography, PKC 2015: 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 -- April 1, 2015, Proceedings (s. 579-603). Springer VS.
https://doi.org/10.1007/978-3-662-46447-2_26
Andrychowicz, M.
, Damgård, I. B., Dziembowski, S.
, Faust, S. & Polychroniadou, A. (2015).
Efficient leakage resilient circuit compilers. I K. Nyberg (red.),
Topics in Cryptology - CT-RSA 2015: The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings (s. 311-329). Springer VS.
https://doi.org/10.1007/978-3-319-16715-2_17
Burra, S. S., Larraia, E.
, Nielsen, J. B., Nordholt, P. S., Orlandi, C., Orsini, E., Scholl, P. & Smart, N. P. (2015).
High Performance Multi-Party Computation for Binary Circuits Based on Oblivious Transfer.
http://eprint.iacr.org/2015/472
Cramer, R.
, Damgård, I. B., Döttling, N. M., Fehr, S. & Spini, G. (2015).
Linear secret sharing schemes from error correcting codes and universal hash functions. I E. Oswald & M. F. Fischlin (red.),
Advances in Cryptology - EUROCRYPT 2015: 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II (s. 313-336). Springer VS.
https://doi.org/10.1007/978-3-662-46803-6_11
Faonio, A., Nielsen, J. B. & Venturi, D. (2015).
Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation. I M. M. Halldórsson, K. Iwama, N. Kobayashi & B. Speckmann (red.),
Automata, Languages, and Programming: 42nd International Colloquium, ICALP 2015, Kyoto, Japan, July 6-10, 2015, Proceedings, Part I (Bind Part 1, s. 456-468). Springer VS.
https://doi.org/10.1007/978-3-662-47672-7_37
Meiklejohn, S.
& Orlandi, C. (2015).
Privacy-enhancing overlays in bitcoin. I M. Brenner , N. Christin , B. Johnson & K. Rohloff (red.),
Financial Cryptography and Data Security : FC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers (Bind 8976, s. 127-141). Springer.
https://doi.org/10.1007/978-3-662-48051-9_10
Frederiksen, T. K., Nielsen, J. B. & Orlandi, C. (2015).
Privacy-Free Garbled Circuits with Applications to Efficient Zero-Knowledge. I E. Oswald & M. Fischlin (red.),
Advances in Cryptology - EUROCRYPT 2015: 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II (s. 191-219). Springer VS.
https://doi.org/10.1007/978-3-662-46803-6_7
Damgård, I. B., Faust, S., Mukherjee, P. & Venturi, D. (2015).
The Chaining Lemma and its application. I A. Lehmann & S. Wolf (red.),
Information Theoretic Security: 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings (s. 181-196). Springer VS.
https://doi.org/10.1007/978-3-319-17470-9_11
Damgård, I. B. & Nielsen, J. B. (2014).
Adaptive versus static security in the UC Model. I S. S. M. Chow , J. K. Liu, L. C. K. Hui & S. M. Yiu (red.),
Provable Security: 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings (s. 10-28). Springer VS.
https://doi.org/10.1007/978-3-319-12475-9_2
Damgård, I. B., Lauritsen, R. & Toft, T. (2014).
An Empirical Study and some Improvements of the MiniMac Protocol for Secure Computation. I M. Abdalla & R. D. Prisco (red.),
Security and Cryptography for Networks: 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings (s. 398-415 ). Springer.
https://doi.org/10.1007/978-3-319-10879-7_23
Damgård, I. B., David, B. M., Giacomelli, I. & Nielsen, J. B. (2014).
Compact VSS and Efficient Homomorphic UC Commitments. I P. Sarkar & T. Iwata (red.),
Advances in Cryptology – ASIACRYPT 2014: 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part II (s. 213-232 ). Springer VS.
https://doi.org/10.1007/978-3-662-45608-8_12
Faust, S., Mukherjee, P., Nielsen, J. B. & Venturi, D. (2014).
Continuous Non-malleable Codes. I Y. Lindell (red.),
Theory of Cryptography: 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings (s. 465-488). Springer.
https://doi.org/10.1007/978-3-642-54242-8_20
Frederiksen, T. K., Jakobsen, T. P. & Nielsen, J. B. (2014).
Faster Maliciously Secure Two-Party Computation Using the GPU. I M. Abdalla & R. D. Prisco (red.),
Security and Cryptography for Networks: 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings (s. 358-379 ). Springer.
https://doi.org/10.1007/978-3-319-10879-7_21
Aranha, D. F., Fouque, P.-A., Gerard, B., Kammerer, J.-G., Tibouchi, M. & Zapalowicz, J.-C. (2014).
GLV/GLS Decomposition, Power Analysis, and Attacks on ECDSA Signatures with Single-Bit Nonce Bias. I P. Sarkar & T. Iwata (red.),
Advances in Cryptology – ASIACRYPT 2014 (s. 262-281). Springer.
https://doi.org/10.1007/978-3-662-45611-8_14
Baum, C., Damgård, I. B. & Orlandi, C. (2014).
Publicly Auditable Secure Multi-Party Computation. I M. Abdalla & R. D. Prisco (red.),
Security and Cryptography for Networks: 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings (s. 175-196 ). Springer VS.
https://doi.org/10.1007/978-3-319-10879-7_11
Orlandi, C., Ostrovsky, R., Rao, V., Sahai, A. & Visconti, I. (2014).
Statistical Concurrent Non-malleable Zero Knowledge. I Y. Lindell (red.),
Theory of Cryptography: 11th Theory of Cryptography Conference, TCC 2014, 2014. Proceedings (s. 167-191). Springer Publishing Company.
https://doi.org/10.1007/978-3-642-54242-8_8