Benarroch, D.
, Campanelli, M., Fiore, D., Gurkan, K. & Kolonelos, D. (2021).
Zero-Knowledge Proofs for Set Membership: Efficient, Succinct, Modular. In N. Borisov & C. Diaz (Eds.),
Financial Cryptography and Data Security: 25th International Conference, FC 2021, Virtual Event, March 1–5, 2021, Revised Selected Papers, Part I (pp. 393-414). Springer.
https://doi.org/10.1007/978-3-662-64322-8_19
Damgård, I. B., Fehr, S.
& Salvail, L. (2004).
Zero-Knowledge Proofs and String Commitments Withstanding Quantum Attacks. In M. Franklin (Ed.),
Advances in Cryptology - CRYPTO 2004: 24th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 2004. Proceedings (pp. 254-272). Springer.
https://doi.org/10.1007/978-3-540-28628-8_16
Gentry, C., Halevi, S., Krawczyk, H.
, Magri, B., Nielsen, J. B., Rabin, T.
& Yakoubov, S. (2021).
YOSO: You Only Speak Once: Secure MPC with Stateless Ephemeral Roles. In T. Malkin & C. Peikert (Eds.),
Advances in Cryptology – CRYPTO 2021: Annual International Cryptology Conference (pp. 64-93). Springer.
https://doi.org/10.1007/978-3-030-84245-1_3
Ganesh, C.
, Kondi, Y. M., Orlandi, C., Pancholi, M. R., Takahashi, A. & Tschudi, D. (2023).
Witness-Succinct Universally-Composable SNARKs. In C. Hazay & M. Stam (Eds.),
Advances in Cryptology – EUROCRYPT 2023: 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23–27, 2023, Proceedings, Part II (pp. 315–346). Springer.
https://doi.org/10.1007/978-3-031-30617-4_11
Kamp, S. H., Magri, B., Matt, C.
, Nielsen, J. B., Thomsen, S. E. & Tschudi, D. (2021).
Weight-Based Nakamoto-Style Blockchains. In P. Longa & C. Ràfols (Eds.),
Progress in Cryptology – LATINCRYPT 2021: 7th International Conference on Cryptology and Information Security in Latin America Bogotá, Colombia, October 6–8, 2021, Proceedings (pp. 299-319). Springer International Publishing.
https://doi.org/10.1007/978-3-030-88238-9_15
Ganesh, C.
, Orlandi, C., Tschudi, D. & Zohar, A. (2022).
Virtual ASICs: Generalized Proof-of-Stake Mining in Cryptocurrencies. In J. Garcia-Alfaro, J. L. Muñoz-Tapia, G. Navarro-Arribas & M. Soriano (Eds.),
Data Privacy Management, Cryptocurrencies and Blockchain Technology : ESORICS 2021 International Workshops, DPM 2021 and CBT 2021 (pp. 173-191). Springer.
https://doi.org/10.1007/978-3-030-93944-1_12
Ateniese, G., Chen, L.
, Francati, D., Papadopoulos, D. & Tang, Q. (2023).
Verifiable Capacity-Bound Functions: A New Primitive from Kolmogorov Complexity: (Revisiting Space-Based Security in the Adaptive Setting). In A. Boldyreva & V. Kolesnikov (Eds.),
Public-Key Cryptography – PKC 2023: 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7–10, 2023, Proceedings, Part II (pp. 63-93). Springer.
https://doi.org/10.1007/978-3-031-31371-4_3
Attema, T., Cascudo, I., Cramer, R.
, Damgård, I. & Escudero, D. (2022).
Vector Commitments over Rings and Compressed Σ -Protocols. In E. Kiltz & V. Vaikuntanathan (Eds.),
Theory of Cryptography - 20th International Conference, TCC 2022, Proceedings (Vol. Part 1, pp. 173-202). Springer.
https://doi.org/10.1007/978-3-031-22318-1_7
Baum, C., Cozzo, D. & P. Smart, N. (2020).
Using TopGear in Overdrive: A more efficient ZKPoK for SPDZ. In K. G. Paterson & D. Stebila (Eds.),
Selected Areas in Cryptography – SAC 2019 - 26th International Conference, Revised Selected Papers: 26th International Conference, Waterloo, ON, Canada, August 12–16, 2019, Revised Selected Papers (pp. 274-302). Springer.
https://doi.org/10.1007/978-3-030-38471-5_12
Eerikson, H.
, Keller, M., Orlandi, C., Pullonen, P., Puura, J.
& Simkin, M. (2020).
Use your brain! Arithmetic 3PC for any modulus with active security. In Y. T. Kalai, A. D. Smith & D. Wichs (Eds.),
1st Conference on Information-Theoretic Cryptography (ITC 2020) Article 5 Schloss Dagstuhl--Leibniz-Zentrum für Informatik.
https://doi.org/10.4230/LIPIcs.ITC.2020.5
Damgård, I. B., Fehr, S., Morozov, K.
& Salvail, L. (2004).
Unfair Noisy Channels and Oblivious Transfer. In M. Naor (Ed.),
Theory of Cryptography: First Theory of Cryptography Conference, TCC 2004, Cambridge, MA, USA, February 19-21, 2004. Proceedings (pp. 355-373). Springer.
https://doi.org/10.1007/978-3-540-24638-1_20
Damgård, I. B., Nielsen, J. B., Toft, T., Kiltz, E.
& Fitzi, M. (2006).
Unconditionally Secure Constant-Rounds Multi-party Computation for Equality, Comparison, Bits and Exponentiation. In S. Halevi & T. Rabin (Eds.),
Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006. Proceedings (pp. 285-304). Springer.
https://doi.org/10.1007/11681878_15
Kondi, Y., Orlandi, C. & Roy, L. (2023).
Two-Round Stateless Deterministic Two-Party Schnorr Signatures from Pseudorandom Correlation Functions. In H. Handschuh & A. Lysyanskaya (Eds.),
Advances in Cryptology – CRYPTO 2023: 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023, Proceedings, Part I (pp. 646-677). Springer.
https://doi.org/10.1007/978-3-031-38557-5_21
Damgård, I. B., Orlandi, C., Takahashi, A. & Tibouchi, M. (2021).
Two-round n-out-of-n and Multi-Signatures and Trapdoor Commitment from Lattices. In J. A. Garay (Ed.),
Public-Key Cryptography – PKC 2021 - 24th IACR International Conference on Practice and Theory of Public Key Cryptography, 2021, Proceedings: 24rd IACR International Conference on Practice and Theory of Public-Key Cryptography, proceedings part 1 (pp. 99-130). Springer.
https://doi.org/10.1007/978-3-030-75245-3_5