Årdal, M. A., Adj, G., Alblooshi, A.
, Aranha, D. F., A. Canales-Martínez, I., Chavez-Saab, J., Gazzoni Filho, D. L., Reijnders, K. & Rodriguez-Henriquez, F. (2025).
Optimized One-Dimensional SQIsign Verification on Intel and Cortex-M4.
IACR Transactions of Cryptographic Hardware and Embedded Systems,
2025(1), 497-522.
https://doi.org/10.46586/tches.v2025.i1.497-522
Brandt, M.
, Orlandi, C., Shrishak, K. & Shulman, H. (2020).
Optimal Transport Layer for Secure Computation. In P. Samarati, S. D. C. D. Vimercati, M. S. Obaidat & J. Ben-Othman (Eds.),
ICETE 2020 - Proceedings of the 17th International Joint Conference on e-Business and Telecommunications (Vol. Volume 3: SECRYPT, pp. 130-141). SCITEPRESS Digital Library.
https://doi.org/10.5220/0009826801300141
Hall-Andersen, M. N. & Nielsen, J. B. (2023).
On Valiant's Conjecture: Impossibility of Incrementally Verifiable Computation from Random Oracles. In C. Hazay & M. Stam (Eds.),
Advances in Cryptology – EUROCRYPT 2023: 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23–27, 2023, Proceedings, Part II (pp. 438-469). Springer.
https://doi.org/10.1007/978-3-031-30617-4_15,
https://doi.org/10.1007/978-3-031-30617-415
Orlandi, C., Ravi, D. & Scholl, P. (2022).
On the Bottleneck Complexity of MPC with Correlated Randomness. In G. Hanaoka, J. Shikata & Y. Watanabe (Eds.),
Public-Key Cryptography – PKC 2022: 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8–11, 2022, Proceedings, Part I (pp. 194-220). Springer.
https://doi.org/10.1007/978-3-030-97121-2_8
Cramer, R.
, Damgård, I. B. & Fehr, S. (2001).
On the Cost of Reconstructing a Secret or VSS with Optimal Reconstruction. In J. Killian (Ed.),
Advances in Cryptology - CRYPTO 2001: 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001 Proceedings (pp. 503-524). Springer.
https://doi.org/10.1007/3-540-44647-8_30
Trifiletti, R., Nielsen, J. B., Frederiksen, T. K. & Jakobsen, T. P. (2016).
On the Complexity of Additively Homomorphic UC Commitments. In E. Kushilevitz & T. Malkin (Eds.),
Theory of Cryptography - 13th International Conference, TCC 2016-A, Proceedings (Vol. 9562, pp. 542-565). Springer VS.
https://doi.org/10.1007/978-3-662-49096-9
Polychroniadou, A., Damgård, I. B., Garg, S., Mukherjee, P.
, Nielsen, J. B. & Pandey, O. (2016).
On the Communication and Round Complexity of Secure Computation. Institut for Datalogi, Aarhus Universitet.
http://cs.au.dk/fileadmin/user_upload/IvanFest_AP.pdf
Ben-Sasson, E., Ben-Tov, I.
, Damgård, I., Ishai, Y. & Ron-Zewi, N. (2016).
On public key encryption from noisy codewords. In
Public-Key Cryptography – PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings (Vol. 9615, pp. 417-446). Springer VS.
https://doi.org/10.1007/978-3-662-49387-8_16