Baum, C., Beullens, W., Mukherjee, S., Orsini, E., Ramacher, S., Rechberger, C.
, Roy, L. & Scholl, P. (2025).
One Tree to Rule Them All: Optimizing GGM Trees and OWFs for Post-Quantum Signatures. In K.-M. Chung & Y. Sasaki (Eds.),
Advances in Cryptology - ASIACRYPT 2024 (pp. 463-493). Springer Nature.
https://doi.org/10.1007/978-981-96-0875-1_15
Canetti, R.
, Damgård, I. B., Dziembowski, S., Ishai, Y. & Malkin, T. (2001).
On Adaptive vs. Non-adaptive Security of Multiparty Protocols. In B. Pfitzmann (Ed.),
Advances in Cryptology --- EUROCRYPT 2001: International Conference on the Theory and Application of Cryptographic Techniques Innsbruck, Austria, May 6-10, 2001 Proceedings (pp. 262-279). Springer.
https://doi.org/10.1007/3-540-44987-6_17
Boyle, E., Couteau, G., Gilboa, N., Ishai, Y., Kohl, L., Resch, N.
& Scholl, P. (2023).
Oblivious Transfer with Constant Computational Overhead. In C. Hazay & M. Stam (Eds.),
Advances in Cryptology – EUROCRYPT 2023: 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part I (pp. 271-302). Springer.
https://doi.org/10.1007/978-3-031-30545-0_10
Damgård, I. B., Fehr, S.
, Salvail, L. & Schaffner, C. (2006).
Oblivious Transfer and Linear Functions. In C. Dwork (Ed.),
Advances in Cryptology - CRYPTO 2006: 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006. Proceedings (pp. 427-444). Springer.
https://doi.org/10.1007/11818175_26
Damgård, I. B., Nicolosi, A. & Fazio, N. (2006).
Non-interactive Zero-Knowledge from Homomorphic Encryption. In S. Halevi & T. Rabin (Eds.),
Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006. Proceedings (pp. 41-59). Springer.
https://doi.org/10.1007/11681878_3
Bai, G.
, Damgård, I., Orlandi, C. & Xia, Y. (2016).
Non-Interactive Verifiable Secret Sharing for Monotone Circuits. In D. Pointcheval, A. Nitaj & T. Rachidi (Eds.),
Progress in Cryptology – AFRICACRYPT 2016 - 8th International Conference on Cryptology in Africa, Proceedings (Vol. 9646, pp. 225-244). Springer VS.
https://doi.org/10.1007/978-3-319-31517-1_12
Matias, P., Y. S. Barbosa, P., N. C. Cardoso, T., Mariano, D.
& Aranha, D. F. (2019).
NIZKCTF: A Non-Interactive Zero-Knowledge Capture the Flag Platform.
IEEE Security & Privacy,
16(6), 42-51. Article 8636460.
https://doi.org/10.1109/MSEC.2018.2875324
Damgård, I. B., Escudero Ospina, D. E., Frederiksen, T. K., Keller, M.
, Scholl, P. & Volgushev, N. (2019).
New Primitives for Actively-Secure MPC over Rings with Applications to Private Machine Learning. In
Proceedings - 2019 IEEE Symposium on Security and Privacy, SP 2019 (pp. 1102-1120). Article 8835310 IEEE.
https://doi.org/10.1109/SP.2019.00078
Baum, C., Damgård, I., Lyubashevsky, V.
, Oechsner, S. & Peikert, C. (2018).
More Efficient Commitments from Structured Lattice Assumptions. In D. Catalano & R. De Prisco (Eds.),
Security and Cryptography for Networks - 11th International Conference, SCN 2018, Proceedings (Vol. 11035, pp. 368-385). Springer VS.
https://doi.org/10.1007/978-3-319-98113-0_20
Damgård, I., Ravi, D., Siniscalchi, L. & Yakoubov, S. (2023).
Minimizing Setup in Broadcast-Optimal Two Round MPC. In C. Hazay & M. Stam (Eds.),
Advances in Cryptology – EUROCRYPT 2023: 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23–27, 2023, Proceedings, Part II (pp. 129-158). Springer.
https://doi.org/10.1007/978-3-031-30617-4_5
Frederiksen, T. K., Jakobsen, T. P., Nielsen, J. B., Nordholt, P. S. & Orlandi, C. (2013).
MiniLEGO: Efficient secure two-party computation from general assumptions. In T. Johansson & P. Q. Nguyen (Eds.),
Advances in Cryptology – EUROCRYPT 2013: 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings (pp. 537-556). Springer VS.
https://doi.org/10.1007/978-3-642-38348-9_32
Faonio, A., Nielsen, J. B. & Venturi, D. (2015).
Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation. In M. M. Halldórsson, K. Iwama, N. Kobayashi & B. Speckmann (Eds.),
Automata, Languages, and Programming: 42nd International Colloquium, ICALP 2015, Kyoto, Japan, July 6-10, 2015, Proceedings, Part I (Vol. Part 1, pp. 456-468). Springer VS.
https://doi.org/10.1007/978-3-662-47672-7_37
Burkhardt, J., Caragiannis, I., Fehrs, K., Russo, M.
, Schwiegelshohn, C. & Shyam, S. (2024).
Low-Distortion Clustering with Ordinal and Limited Cardinal Information.
Proceedings of the AAAI Conference on Artificial Intelligence,
38(9), 9555-9563.
https://doi.org/10.1609/aaai.v38i9.28811