Brzuska, C., Couteau, G., Egger, C., Karanko, P.
& Meyer, P. E. (2024).
Instantiating the Hash-Then-Evaluate Paradigm: Strengthening PRFs, PCFs, and OPRFs. In C. Galdi & D. Hieu Phan (Eds.),
Security and Cryptography for Networks - 14th International Conference, SCN 2024, Proceedings (pp. 97–116). Springer Nature.
https://doi.org/10.1007/978-3-031-71073-5_5
Burkhardt, J., Damgård, I., Frederiksen, T. K., Orlandi, C. & Ghosh, S. (2023).
Improved Distributed RSA Key Generation Using the Miller-Rabin Test. In W. Meng, C. D. Jensen, C. Cremers & E. Kirda (Eds.),
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security (pp. 2501-2515). Association for Computing Machinery.
https://doi.org/10.1145/3576915.3623163
Damgård, I. B., Keller, M., Keller, E., Miles, C. & Smart, N. P. (2012).
Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocol.
Lecture Notes in Computer Science,
7485, 241-263.
https://doi.org/10.1007/978-3-642-32928-9_14
Baum, C., Damgård, I. B., Larsen, K. G. & Nielsen, M. (2016).
How to prove knowledge of small secrets. In J. Katz & M. Robshaw (Eds.),
Advances in Cryptology - 36th Annual International Cryptology Conference, CRYPTO 2016, Proceedings: CRYPTO 2016: Advances in Cryptology – CRYPTO 2016 (Vol. 9816, pp. 478-498). Springer VS.
https://doi.org/10.1007/978-3-662-53015-3_17
Fleischhacker, N.
, Larsen, K. G. & Simkin, M. (2023).
How to Compress Encrypted Data. In C. Hazay & M. Stam (Eds.),
Advances in Cryptology – EUROCRYPT 2023: 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part I (pp. 551-577). Springer.
https://doi.org/10.1007/978-3-031-30545-0_19
Damgård, I. B., Goldreich, O., Okamoto, T. & Wigderson, A. (1995).
Honest Verifier vs Dishonest Verifier in Public Coin Zero-Knowledge Proofs. In D. Coppersmith (Ed.),
Advances in Cryptology - CRYPT0' 95: 15th Annual International Cryptology Conference Santa Barbara, California, USA, August 27-31, 1995 Proceedings (pp. 325-338). Springer.
https://doi.org/10.1007/3-540-44750-4_26
Burra, S. S., Larraia, E.
, Nielsen, J. B., Nordholt, P. S., Orlandi, C., Orsini, E., Scholl, P. & Smart, N. P. (2015).
High Performance Multi-Party Computation for Binary Circuits Based on Oblivious Transfer.
http://eprint.iacr.org/2015/472
Burra, S. S., Larraia, E.
, Nielsen, J. B., Nordholt, P. S.
, Orlandi, C., Orsini, E.
, Scholl, P. & Smart, N. P. (2021).
High-Performance Multi-party Computation for Binary Circuits Based on Oblivious Transfer.
Journal of Cryptology,
34(3), Article 34.
https://doi.org/10.1007/s00145-021-09403-1
Lindell, Y., Nissim, K.
& Orlandi, C. (2013).
Hiding the Input-Size in Secure Two-Party Computation. In K. Sako & P. Sarkar (Eds.),
Advances in Cryptology - ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II (Vol. 8197, pp. 421-440). Springer VS.
https://doi.org/10.1007/978-3-642-41019-2_6
Aranha, D. F., Fouque, P.-A., Gerard, B., Kammerer, J.-G., Tibouchi, M. & Zapalowicz, J.-C. (2014).
GLV/GLS Decomposition, Power Analysis, and Attacks on ECDSA Signatures with Single-Bit Nonce Bias. In P. Sarkar & T. Iwata (Eds.),
Advances in Cryptology – ASIACRYPT 2014 (pp. 262-281). Springer.
https://doi.org/10.1007/978-3-662-45611-8_14
van Baarsen, A. N. & Pu, S. (2026).
Fuzzy Private Set Intersection from VOLE. In G. Hanaoka & B.-Y. Yang (Eds.),
Advances in Cryptology – ASIACRYPT 2025 : 31st International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, VIC, Australia, December 8–12, 2025, Proceedings, Part V (pp. 327-360)
https://doi.org/10.1007/978-981-95-5116-3_11
Braun, L., Huppert, M., Khayata, N., Schneider, T. & Tkachenko, O. (2023).
FUSE - Flexible File Format and Intermediate Representation for Secure Multi-Party Computation. In J. Liu, Y. Xiang, S. Nepal & G. Tsudik (Eds.),
ASIA CCS 2023 - Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security (pp. 649-663). Association for Computing Machinery.
https://doi.org/10.1145/3579856.3590340