Acharya, A., Hazay, C. & Venkitasubramaniam, M. (2026).
On Achieving "Best-in-the-Multiverse" MPC. In
Theory of Cryptography: 23rd International Conference, TCC 2025, Aarhus, Denmark, December 1–5, 2025, Proceedings, Part I (Vol. 16268, pp. 119–151). Springer LNCS.
https://doi.org/10.1007/978-3-032-12287-2_5
Acharya, A., Azari, K. & Kamath, C. (2025).
On the Adaptive Security of Free-XOR-Based Garbling Schemes in the Plain Model. In S. Fehr & P.-A. Fouque (Eds.),
Advances in Cryptology – EUROCRYPT 2025: 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4–8, 2025, Proceedings, Part VI (Vol. 15606, pp. 214-244). Springer LNCS.
https://doi.org/10.1007/978-3-031-91095-1\_8
Acharya, A., Hazay, C., Prabhakaran, M. & Kolesnikov, V. (2026).
Towards Building Efficient SCALES Protocols. In
Advances in Cryptology – ASIACRYPT 2025: 31st International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, VIC, Australia, December 8–12, 2025, Proceedings, Part V (Vol. 16249, pp. 35-67). Springer LNCS.
https://doi.org/10.1007/978-981-95-5116-3_2
Aceto, L.
, Damgård, I. B., Goldberg, L. A., Halldórsson, M. M., Ingólfsdóttir, A. & Walukiewicz, I. (2008).
Automata, Languages and Programming: 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II. Springer. Lecture Notes in Computer Science Vol. 5126
https://doi.org/10.1007/978-3-540-70583-3
Abspoel, M., Cramer, R.
, Damgård, I. B., Escudero Ospina, D. E. & Yuan, C. (2019).
Efficient Information-Theoretic Secure Multiparty Computation over Z/p^k Z via Galois Rings. In D. Hofheinz & A. Rosen (Eds.),
Theory of Cryptography - 17th International Conference, TCC 2019, Proceedings: Proceedings (Vol. Part 1, pp. 471-501). Springer.
https://doi.org/10.1007/978-3-030-36030-6_19
Abspoel, M., Cramer, R.
, Damgård, I., Escudero, D., Rambaud, M., Xing, C. & Yuan, C. (2020).
Asymptotically Good Multiplicative LSSS over Galois Rings and Applications to MPC over Z/pkZ. In S. Moriai & H. Wang (Eds.),
Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, 2020, Proceedings (Vol. III, pp. 151-180). Springer.
https://doi.org/10.1007/978-3-030-64840-4_6
Abram, D., Beimel, A., Ishai, Y., Kushilevitz, E. & Narayanan, V. (2023).
Cryptography from Planted Graphs: Security with Logarithmic-Size Messages. 286-315. Paper presented at Theory of Cryptography. TCC 2023, Taipei, Taiwan.
https://doi.org/10.1007/978-3-031-48615-9_11
Abram, D., Fehr, S., Obremski, M.
& Scholl, P. (2026).
On the Impossibility of Actively Secure Distributed Samplers. In B. Applebaum & H. Lin (Eds.),
Theory of Cryptography: 23rd International Conference, TCC 2025, Aarhus, Denmark, December 1–5, 2025, Proceedings, Part IV (pp. 547-581). Springer Nature.
https://doi.org/10.1007/978-3-032-12290-2_18
Abdolmaleki, B.
, Khoshakhlagh, H. & Lipmaa, H. (2021).
Smooth Zero-Knowledge Hash Functions. In A. Adhikari, R. Küsters & B. Preneel (Eds.),
Progress in Cryptology – INDOCRYPT 2021 - 22nd International Conference on Cryptology in India, 2021, Proceedings: 22nd International Conference on Cryptology in India, Jaipur, India, December 12-15, 2021, Proceedings (pp. 510-535). Springer.
https://doi.org/10.1007/978-3-030-92518-5_23
Aardal, M. A., Adj, G.
, F. Aranha, D., Basso, A., Canales Martínez, I. A., Chávez-Saab, J., Corte-Real Santos, M., Dartois, P., De Feo, L., Duparc, M., Komada Eriksen, J., Fouotsa, T. B., Filho, D. L. G., Hess, B., Kohel, D., Leroux, A., Longa, P., Maino, L., Meyer, M. ... Wesolowski, B. (2025).
SQIsign 2.0: Algorithm specifications and supporting documentation.
https://sqisign.org/spec/sqisign-20250205.pdf