Boyle, E., Couteau, G., Gilboa, N., Ishai, Y., Kohl, L., Resch, N.
& Scholl, P. (2022).
Correlated Pseudorandomness from Expand-Accumulate Codes. In Y. Dodis & T. Shrimpton (Eds.),
Advances in Cryptology – CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Proceedings (pp. 603-633). Springer.
https://doi.org/10.1007/978-3-031-15979-4_21
Aranha, D. F., Hall-Andersen, M. N., Nitulescu, A., Pagnin, E. & Yakoubov, S. (2022).
Count Me In! Extendability for Threshold Ring Signatures. In G. Hanaoka, J. Shikata & Y. Watanabe (Eds.),
Public-Key Cryptography – PKC 2022 : 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings, Part II (pp. 379-406). Springer.
https://doi.org/10.1007/978-3-030-97131-1_13
Aranha, D. F., Bennedsen, E., Campanelli, M., Ganesh, C., Orlandi, C. & Takahashi, A. (2022).
ECLIPSE: Enhanced Compiling method for Pedersen-committed zkSNARK Engines. In G. Hanaoka, J. Shikata & Y. Watanabe (Eds.),
Public-Key Cryptography – PKC 2022 : 25th IACR International Conference on Practice and Theory of Public-Key Cryptography (pp. 584-614). Springer.
https://doi.org/10.1007/978-3-030-97121-2_21
Baum, C., Escudero, D., Pedrouzo-Ulloa, A.
, Scholl, P. & Troncoso-Pastoriza, J. R. (2022).
Efficient protocols for oblivious linear function evaluation from ring-LWE.
Journal of Computer Security,
30(1), 39-78.
https://doi.org/10.3233/JCS-200116
Davi Resende, A. C., Railsback, D., Dowsley, R., Nascimento, A. C. A.
& Aranha, D. F. (2022).
Fast Privacy-Preserving Text Classification based on Secure Multiparty Computation.
IEEE Transactions on Information Forensics and Security,
17, 428-442.
https://doi.org/10.1109/TIFS.2022.3144007
Damgård, I., Jakobsen, T. P.
, Nielsen, J. B., Pagter, J. I. & Østergaard, M. B. (2022).
Fast threshold ECDSA with honest majority.
Journal of Computer Security,
30(1), 167-196.
https://doi.org/10.3233/JCS-200112
Ubys, L., Vancea, V. N.
, Kulik, T., Larsen, P. G., Boudjadar, J. & Aranha, D. F. (2022).
Formal Model In-The-Loop for Secure Industrial Control Networks. In
Formal Aspects of Component Software - 18th International Conference, FACS 2022, Proceedings (pp. 74-89). Springer.
https://doi.org/10.1007/978-3-031-20872-0_5
Orlandi, C., Ravi, D. & Scholl, P. (2022).
On the Bottleneck Complexity of MPC with Correlated Randomness. In G. Hanaoka, J. Shikata & Y. Watanabe (Eds.),
Public-Key Cryptography – PKC 2022: 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8–11, 2022, Proceedings, Part I (pp. 194-220). Springer.
https://doi.org/10.1007/978-3-030-97121-2_8
Aggarwal, D.
, Obremski, M., Ribeiro, J.
, Simkin, M. & Siniscalchi, L. (2022).
Privacy Amplification with Tamperable Memory via Non-Malleable Two-Source Extractors.
IEEE Transactions on Information Theory,
68(8), 5475-5495.
https://doi.org/10.1109/TIT.2022.3167404
Chillotti, I., Orsini, E.
, Scholl, P., Smart, N. P. & Leeuwen, B. V. (2022).
Scooby: Improved Multi-party Homomorphic Secret Sharing Based on FHE. In C. Galdi & S. Jarecki (Eds.),
Security and Cryptography for Networks - 13th International Conference, SCN 2022, Proceedings (pp. 540-563). Springer.
https://doi.org/10.1007/978-3-031-14791-3_24
Brian, G.
, Faonio, A., Obremski, M., Ribeiro, J.
, Simkin, M., Skorski, M.
& Venturi, D. (2022).
The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free.
IEEE Transactions on Information Theory,
68(12), 8197-8227.
https://doi.org/10.1109/TIT.2022.3193848
Attema, T., Cascudo, I., Cramer, R.
, Damgård, I. & Escudero, D. (2022).
Vector Commitments over Rings and Compressed Σ -Protocols. In E. Kiltz & V. Vaikuntanathan (Eds.),
Theory of Cryptography - 20th International Conference, TCC 2022, Proceedings (Vol. Part 1, pp. 173-202). Springer.
https://doi.org/10.1007/978-3-031-22318-1_7
Ganesh, C.
, Orlandi, C., Tschudi, D. & Zohar, A. (2022).
Virtual ASICs: Generalized Proof-of-Stake Mining in Cryptocurrencies. In J. Garcia-Alfaro, J. L. Muñoz-Tapia, G. Navarro-Arribas & M. Soriano (Eds.),
Data Privacy Management, Cryptocurrencies and Blockchain Technology : ESORICS 2021 International Workshops, DPM 2021 and CBT 2021 (pp. 173-191). Springer.
https://doi.org/10.1007/978-3-030-93944-1_12
Damgård, I., Ganesh, C., Khoshakhlagh, H., Orlandi, C. & Siniscalchi, L. (2021).
Balancing Privacy and Accountability in Blockchain Identity Management. In K. G. Paterson (Ed.),
Topics in Cryptology-CT-RSA 2021 - Cryptographers’ Track at the RSA Conference, Proceedings (pp. 552-576). Springer.
https://doi.org/10.1007/978-3-030-75539-3_23
Baum, C., de Saint Guilhem, C. D., Kales, D., Orsini, E.
, Scholl, P. & Zaverucha, G. (2021).
Banquet: Short and Fast Signatures from AES. In J. A. Garay (Ed.),
Public-Key Cryptography – PKC 2021: 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10–13, 2021, Proceedings, Part I (pp. 266-297). Springer.
https://doi.org/10.1007/978-3-030-75245-3_11