Chillotti, I., Orsini, E.
, Scholl, P., Smart, N. P. & Leeuwen, B. V. (2022).
Scooby: Improved Multi-party Homomorphic Secret Sharing Based on FHE. In C. Galdi & S. Jarecki (Eds.),
Security and Cryptography for Networks - 13th International Conference, SCN 2022, Proceedings (pp. 540-563). Springer.
https://doi.org/10.1007/978-3-031-14791-3_24
Damgård, I. B., Krøigaard, M., Ishai, Y.
, Nielsen, J. B. & Smith, A. (2008).
Scalable Multiparty Computation with Nearly Optimal Work and Resilience.
Lecture Notes in Computer Science,
5157, 241-261.
https://doi.org/10.1007/978-3-540-85174-5_14
Haagh, H., Ji, Y., Li, C.
, Orlandi, C. & Song, Y. (2017).
Revealing Encryption for Partial Ordering. In M. O’Neill (Ed.),
Cryptography and Coding - 16th IMA International Conference, IMACC 2017, Proceedings (pp. 3-22). Springer VS.
https://doi.org/10.1007/978-3-319-71045-7_1
Cascudo, I., Damgård, I., Farràs, O.
& Ranellucci, S. (2017).
Resource-Efficient OT Combiners with Active Security. In Y. Kalai & L. Reyzin (Eds.),
Theory of Cryptography - 15th International Conference, TCC 2017, Proceedings (Vol. 10678, pp. 461-486). Springer VS.
https://doi.org/10.1007/978-3-319-70503-3_15
Canetti, R., Krawczyk, H.
& Nielsen, J. B. (2003).
Relaxing Chosen-Ciphertext Security. In D. Boneh (Ed.),
Advances in Cryptology - CRYPTO 2003: 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003. Proceedings (pp. 565-582). Springer.
https://doi.org/10.1007/978-3-540-45146-4_33
Cascudo, I.
, Damgård, I., David, B. M., Döttling, N. & Nielsen, J. B. (2016).
Rate-1, linear time and additively homomorphic UC commitments. In M. Robshaw & J. Katz (Eds.),
Advances in Cryptology - 36th Annual International Cryptology Conference, CRYPTO 2016, Proceedings (Vol. 9816, pp. 179-207). Springer VS.
https://doi.org/10.1007/978-3-662-53015-3_7
Gentry, C., Halevi, S.
, Magri, B., Nielsen, J. B. & Yakoubov, S. (2021).
Random-Index PIR and Applications. In K. Nissim & B. Waters (Eds.),
Theory of Cryptography : 19th International Conference, TCC 2021, Proceedings (pp. 32-61). Springer.
https://doi.org/10.1007/978-3-030-90456-2_2
Baum, C., Braun, L., Delpech de Saint Guilhem, C., Klooß, M., Orsini, E.
, Roy, L. D. & Scholl, P. (2023).
Publicly Verifiable Zero-Knowledge and Post-Quantum Signatures from VOLE-in-the-Head. In H. Handschuh & A. Lysyanskaya (Eds.),
Advances in Cryptology: CRYPTO 2023 (pp. 581-615). Springer.
https://doi.org/10.1007/978-3-031-38554-4_19
Baum, C., Damgård, I. B. & Orlandi, C. (2014).
Publicly Auditable Secure Multi-Party Computation. In M. Abdalla & R. D. Prisco (Eds.),
Security and Cryptography for Networks: 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings (pp. 175-196 ). Springer VS.
https://doi.org/10.1007/978-3-319-10879-7_11
Vanegas, H., Cabarcas, D.
& Aranha, D. F. (2023).
Privacy-Preserving Edit Distance Computation Using Secret-Sharing Two-Party Computation. In A. Aly & M. Tibouchi (Eds.),
Progress in Cryptology – LATINCRYPT 2023: 8th International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2023, Quito, Ecuador, October 3–6, 2023, Proceedings (pp. 67-86). Springer.
https://doi.org/10.1007/978-3-031-44469-2_4
Frederiksen, T. K., Nielsen, J. B. & Orlandi, C. (2015).
Privacy-Free Garbled Circuits with Applications to Efficient Zero-Knowledge. In E. Oswald & M. Fischlin (Eds.),
Advances in Cryptology - EUROCRYPT 2015: 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II (pp. 191-219). Springer VS.
https://doi.org/10.1007/978-3-662-46803-6_7
Meiklejohn, S.
& Orlandi, C. (2015).
Privacy-enhancing overlays in bitcoin. In M. Brenner , N. Christin , B. Johnson & K. Rohloff (Eds.),
Financial Cryptography and Data Security : FC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers (Vol. 8976, pp. 127-141). Springer.
https://doi.org/10.1007/978-3-662-48051-9_10
B. S. Reis, T.
, Aranha, D. F. & Lopez, J. (2017).
PRESENT Runs Fast: Efficient and Secure Implementation in Software. In W. Fischer & N. Homma (Eds.),
Cryptographic Hardware and Embedded Systems – CHES 2017 - 19th International Conference, Proceedings: 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings (pp. 644-664). Springer.
https://doi.org/10.1007/978-3-319-66787-4_31
Damgård, I. B., Keller, M., Larraia , E.
, Pastro, V., Scholl, P. & Smart, N. P. (2013).
Practical Covertly Secure MPC for Dishonest Majority – or: Breaking the SPDZ Limits. In J. Crampton , S. Jajodia & K. Mayes (Eds.),
Computer Security – ESORICS 2013: 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings (pp. 1-18 ). Springer VS.
https://doi.org/10.1007/978-3-642-40203-6_1
Chase, M., Derler, D., Goldfeder, S.
, Orlandi, C., Ramacher, S., Rechberger, C., Slamanig, D. & Zaverucha, G. (2017).
Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives. In
CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (pp. 1825-1842). Association for Computing Machinery.
https://doi.org/10.1145/3133956.3133997