Abram, D., Beimel, A., Ishai, Y., Kushilevitz, E. & Narayanan, V. (2023).
Cryptography from Planted Graphs: Security with Logarithmic-Size Messages. Paper presented at Theory of Cryptography. TCC 2023, Taipei, Taiwan.
Braun, L., Huppert, M., Khayata, N., Schneider, T. & Tkachenko, O. (2023).
FUSE - Flexible File Format and Intermediate Representation for Secure Multi-Party Computation. In J. Liu, Y. Xiang, S. Nepal & G. Tsudik (Eds.),
ASIA CCS 2023 - Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security (pp. 649-663). Association for Computing Machinery.
https://doi.org/10.1145/3579856.3590340
Burkhardt, J., Damgård, I., Frederiksen, T. K., Orlandi, C. & Ghosh, S. (2023).
Improved Distributed RSA Key Generation Using the Miller-Rabin Test. In W. Meng, C. D. Jensen, C. Cremers & E. Kirda (Eds.),
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security (pp. 2501-2515). Association for Computing Machinery.
https://doi.org/10.1145/3576915.3623163
Damgård, I., Ravi, D., Siniscalchi, L. & Yakoubov, S. (2023).
Minimizing Setup in Broadcast-Optimal Two Round MPC. In C. Hazay & M. Stam (Eds.),
Advances in Cryptology – EUROCRYPT 2023: 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23–27, 2023, Proceedings, Part II (pp. 129-158). Springer.
https://doi.org/10.1007/978-3-031-30617-4_5
Boyle, E., Couteau, G., Gilboa, N., Ishai, Y., Kohl, L., Resch, N.
& Scholl, P. (2023).
Oblivious Transfer with Constant Computational Overhead. In C. Hazay & M. Stam (Eds.),
Advances in Cryptology – EUROCRYPT 2023: 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part I (pp. 271-302). Springer.
https://doi.org/10.1007/978-3-031-30545-0_10
Hall-Andersen, M. N. & Nielsen, J. B. (2023).
On Valiant's Conjecture: Impossibility of Incrementally Verifiable Computation from Random Oracles. In C. Hazay & M. Stam (Eds.),
Advances in Cryptology – EUROCRYPT 2023: 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23–27, 2023, Proceedings, Part II (pp. 438-469). Springer.
https://doi.org/10.1007/978-3-031-30617-4_15,
https://doi.org/10.1007/978-3-031-30617-415
Vanegas, H., Cabarcas, D.
& Aranha, D. F. (2023).
Privacy-Preserving Edit Distance Computation Using Secret-Sharing Two-Party Computation. In A. Aly & M. Tibouchi (Eds.),
Progress in Cryptology – LATINCRYPT 2023: 8th International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2023, Quito, Ecuador, October 3–6, 2023, Proceedings (pp. 67-86). Springer.
https://doi.org/10.1007/978-3-031-44469-2_4
Baum, C., Braun, L., Delpech de Saint Guilhem, C., Klooß, M., Orsini, E.
, Roy, L. D. & Scholl, P. (2023).
Publicly Verifiable Zero-Knowledge and Post-Quantum Signatures from VOLE-in-the-Head. In H. Handschuh & A. Lysyanskaya (Eds.),
Advances in Cryptology: CRYPTO 2023 (pp. 581-615). Springer.
https://doi.org/10.1007/978-3-031-38554-4_19
Tozawa, K.
, Morita, H. & Mizuki, T. (2023).
Single-Shuffle Card-Based Protocol with Eight Cards per Gate. In D. Genova & J. Kari (Eds.),
Unconventional Computation and Natural Computation: 20th International Conference, UCNC 2023, Jacksonville, FL, USA, March 13–17, 2023, Proceedings (pp. 171-185). Springer.
https://doi.org/10.1007/978-3-031-34034-5_12
Woodcock, J., Andersen, M. S., Aranha, D. F., Hallerstede, S., Hansen, S. T., Jakobsen, N. K.
, Kulik, T., Larsen, P. G., Macedo, H. D., Martin, C. I. I. & Norrild, V. A. M. (2023).
State of the Art Report: Verified Computation.
https://doi.org/10.48550/arXiv.2308.15191
Campanelli, M., Francati, D. & Orlandi, C. (2023).
Structure-Preserving Compilers from New Notions of Obfuscations. In A. Boldyreva & V. Kolesnikov (Eds.),
Public-Key Cryptography – PKC 2023: 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7–10, 2023, Proceedings, Part II (pp. 663-693). Springer.
https://doi.org/10.1007/978-3-031-31371-4_23
Canetti, R.
, Kolby, S., Ravi, D., Soria Vazquez, E.
& Yakoubov, S. (2023).
Taming Adaptivity in YOSO Protocols: The Modular Way. In G. Rothblum & H. Wee (Eds.),
Theory of Cryptography: 21st International Conference, TCC 2023, Taipei, Taiwan, November 29 – December 2, 2023, Proceedings, Part II (Vol. 2, pp. 33-62). Springer.
https://doi.org/10.1007/978-3-031-48618-0_2
Kondi, Y., Orlandi, C. & Roy, L. (2023).
Two-Round Stateless Deterministic Two-Party Schnorr Signatures from Pseudorandom Correlation Functions. In H. Handschuh & A. Lysyanskaya (Eds.),
Advances in Cryptology – CRYPTO 2023: 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023, Proceedings, Part I (pp. 646-677). Springer.
https://doi.org/10.1007/978-3-031-38557-5_21
Ganesh, C.
, Kondi, Y. M., Orlandi, C., Pancholi, M. R., Takahashi, A. & Tschudi, D. (2023).
Witness-Succinct Universally-Composable SNARKs. In C. Hazay & M. Stam (Eds.),
Advances in Cryptology – EUROCRYPT 2023: 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23–27, 2023, Proceedings, Part II (pp. 315–346). Springer.
https://doi.org/10.1007/978-3-031-30617-4_11
Braun, L., Delpech de Saint Guilhem, C., Jadoul, R., Orsini, E., Smart, N. P. & Tanguy, T. (2023).
ZK-for-Z2K: MPC-in-the-Head Zero-Knowledge Proofs for Z2k. In E. A. Quaglia (Ed.),
Cryptography and Coding - 19th IMA International Conference, IMACC 2023, London, UK, December 12-14, 2023, Proceedings (Vol. 14421, pp. 137-157). Springer, Cham.
https://doi.org/10.1007/978-3-031-47818-58
Boyle, E., Couteau, G., Gilboa, N., Ishai, Y., Kohl, L., Resch, N.
& Scholl, P. (2022).
Correlated Pseudorandomness from Expand-Accumulate Codes. In Y. Dodis & T. Shrimpton (Eds.),
Advances in Cryptology – CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Proceedings (pp. 603-633). Springer.
https://doi.org/10.1007/978-3-031-15979-4_21
Aranha, D. F., Hall-Andersen, M. N., Nitulescu, A., Pagnin, E. & Yakoubov, S. (2022).
Count Me In! Extendability for Threshold Ring Signatures. In G. Hanaoka, J. Shikata & Y. Watanabe (Eds.),
Public-Key Cryptography – PKC 2022 : 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings, Part II (pp. 379-406). Springer.
https://doi.org/10.1007/978-3-030-97131-1_13
Aranha, D. F., Bennedsen, E., Campanelli, M., Ganesh, C., Orlandi, C. & Takahashi, A. (2022).
ECLIPSE: Enhanced Compiling method for Pedersen-committed zkSNARK Engines. In G. Hanaoka, J. Shikata & Y. Watanabe (Eds.),
Public-Key Cryptography – PKC 2022 : 25th IACR International Conference on Practice and Theory of Public-Key Cryptography (pp. 584-614). Springer.
https://doi.org/10.1007/978-3-030-97121-2_21
Baum, C., Escudero, D., Pedrouzo-Ulloa, A.
, Scholl, P. & Troncoso-Pastoriza, J. R. (2022).
Efficient protocols for oblivious linear function evaluation from ring-LWE.
Journal of Computer Security,
30(1), 39-78.
https://doi.org/10.3233/JCS-200116
Davi Resende, A. C., Railsback, D., Dowsley, R., Nascimento, A. C. A.
& Aranha, D. F. (2022).
Fast Privacy-Preserving Text Classification based on Secure Multiparty Computation.
IEEE Transactions on Information Forensics and Security,
17, 428-442.
https://doi.org/10.1109/TIFS.2022.3144007
Damgård, I., Jakobsen, T. P.
, Nielsen, J. B., Pagter, J. I. & Østergaard, M. B. (2022).
Fast threshold ECDSA with honest majority.
Journal of Computer Security,
30(1), 167-196.
https://doi.org/10.3233/JCS-200112