Aggarwal, D.
, Damgård, I., Nielsen, J. B., Obremski, M., Purwanto, E., Ribeiro, J.
& Simkin, M. (2019).
Stronger leakage-resilient and non-malleable secret sharing schemes for general access structures. In A. Boldyreva & D. Micciancio (Eds.),
Advances in Cryptology – CRYPTO 2019 : 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings (Vol. II, pp. 510-539). Springer.
https://doi.org/10.1007/978-3-030-26951-7_18
Ghosh, S. & Simkin, M. (2019).
The Communication Complexity of Threshold Private Set Intersection. In A. Boldyreva & D. Micciancio (Eds.),
Advances in Cryptology – CRYPTO 2019: 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings (Vol. II, pp. 3-29). Springer.
https://doi.org/10.1007/978-3-030-26951-7_1
Aranha, D. F., Barbosa, P. Y. S., Cardoso, T. N. C., Araújo, C. L. & Matias, P. (2019).
The return of software vulnerabilities in the Brazilian voting machine.
Computers & Security,
86, 335-349.
https://doi.org/10.1016/j.cose.2019.06.009
Pagnin, E., Gunnarsson, G., Talebi, P.
, Orlandi, C. & Sabelfeld, A. (2019).
TOPPool: Time-aware Optimized Privacy-Preserving Ridesharing.
Proceedings on Privacy Enhancing Technologies,
2019(4), 93-111.
https://doi.org/10.2478/popets-2019-0060
Damgård, I., Luo, J.
, Oechsner, S., Scholl, P. & Simkin, M. (2018).
Compact Zero-Knowledge Proofs of Small Hamming Weight. In M. Abdalla & R. Dahab (Eds.),
Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings (Vol. 10770, pp. 530-560). Springer VS.
https://doi.org/10.1007/978-3-319-76581-5_18
Haagh, H., Karbyshev, A., Oechsner, S., Spitters, B. & Strub, P. (2018).
Computer-Aided Proofs for Multiparty Computation with Active Security. In
Proceedings - IEEE 31st Computer Security Foundations Symposium, CSF 2018 (Vol. 2018, pp. 119-131). Article 8429300 IEEE.
https://doi.org/10.1109/CSF.2018.00016
Hazay, C., Orsini, E.
, Scholl, P. & Soria-Vazquez, E. (2018).
Concretely Efficient Large-Scale MPC with Active Security (or, TinyKeys for TinyOT). In T. Peyrin & S. Galbraith (Eds.),
Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings (Vol. 11274, pp. 86-117). Springer VS.
https://doi.org/10.1007/978-3-030-03332-3_4
Faonio, A.
, Nielsen, J. B., Simkin, M. & Venturi, D. (2018).
Continuously Non-malleable Codes with Split-State Refresh. In B. Preneel & F. Vercauteren (Eds.),
Applied Cryptography and Network Security - 16th International Conference, ACNS 2018, Proceedings (Vol. 10892, pp. 121-139). Springer VS.
https://doi.org/10.1007/978-3-319-93387-0_7
Damgård, I., Kazana, T.
, Obremski, M., Raj, V. & Siniscalchi, L. (2018).
Continuous NMC Secure Against Permutations and Overwrites, with Applications to CCA Secure Commitments. In A. Beimel & S. Dziembowski (Eds.),
Theory of Cryptography - 16th International Conference, TCC 2018, Proceedings (Vol. 11240, pp. 225-254). Springer VS.
https://doi.org/10.1007/978-3-030-03810-6_9
Fleischhacker, N., Krupp, J., Malavolta, G., Schneider, J., Schröder, D.
& Simkin, M. (2018).
Efficient unlinkable sanitizable signatures from signatures with re-randomizable keys.
IET Information Security,
12(3), 166-183.
https://doi.org/10.1049/iet-ifs.2017.0041
Davi Resende, A. C.
& Aranha, D. F. (2018).
Faster Unbalanced Private Set Intersection. In S. Meiklejohn & K. Sako (Eds.),
Financial Cryptography and Data Security - 22nd International Conference, FC 2018, Revised Selected Papers: 22nd International Conference, FC 2018, Nieuwpoort, Curaçao, February 26 – March 2, 2018, Revised Selected Papers (1 ed., pp. 203-221). Springer.
https://doi.org/10.1007/978-3-662-58387-6
Velasquez, K., Perez Abreu, D., Assis, M. R. M., Senna, C.
, Aranha, D. F., Bittencourt, L. F., Laranjeiro, N., Curado, M., Vieira, M., Monteiro, E. & Madeira, E. (2018).
Fog orchestration for the Internet of Everything: state-of-the-art and research challenges.
Journal of Internet Services and Applications,
9(14), Article 14.
https://doi.org/10.1186/s13174-018-0086-3
Baum, C., Damgård, I., Lyubashevsky, V.
, Oechsner, S. & Peikert, C. (2018).
More Efficient Commitments from Structured Lattice Assumptions. In D. Catalano & R. De Prisco (Eds.),
Security and Cryptography for Networks - 11th International Conference, SCN 2018, Proceedings (Vol. 11035, pp. 368-385). Springer VS.
https://doi.org/10.1007/978-3-319-98113-0_20
Matias, P., Y. S. Barbosa, P., N. C. Cardoso, T., Mariano, D.
& Aranha, D. F. (2018).
NIZKCTF: A Non-Interactive Zero-Knowledge Capture the Flag Platform.
IEEE Security & Privacy,
16(6), 42-51. Article 8636460.
https://doi.org/10.1109/MSEC.2018.2875324
Baena, J., Cabarcas, D.
, Escudero, D. E., Khathuria, K. & Verbel, J. (2018).
Rank Analysis of Cubic Multivariate Cryptosystems. In T. Lange & R. Steinwandt (Eds.),
Post-Quantum Cryptography - 9th International Conference, PQCrypto 2018, Proceedings (Vol. 10786, pp. 355-374). Springer VS.
https://doi.org/10.1007/978-3-319-79063-3_17
Cramer, R.
, Damgård, I., Escudero, D., Scholl, P. & Xing, C. (2018).
SPDΖ2k: Efficient MPC mod 2k for Dishonest Majority. In H. Shacham & A. Boldyreva (Eds.),
Advances in Cryptology - CRYPTO 2018 (Vol. 10992, pp. 769-798). Springer VS.
https://doi.org/10.1007/978-3-319-96881-0_26
Baum, C., Lyubashevsky, V., Groth, J., Bootle, J., Cerulli, A. & del Pino, R. (2018).
Sub-Linear Lattice-Based Zero-Knowledge Arguments for Arithmetic Circuits. In
Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings (pp. 669-699)
https://doi.org/10.1007/978-3-319-96881-0_23
Oliveira, L. B., Pereira, F. M. Q., Misoczki, R.
, Aranha, D. F., Borges, F., Nogueira, M., Wangham, M., Wu, M. & Liu, J. (2018).
The computer for the 21st century: present security & privacy challenges.
Journal of Internet Services and Applications,
9(24), Article 24.
https://doi.org/10.1186/s13174-018-0095-2
Jensen, C. (Ed.), Lind Olsen, E. (Ed.)
, Mikkelsen, G. L., Syberg , L.
, Nielsen, L. L., Hansen, M. A. E., Hjortlund, M.
, Madsen, O. L., Høngaard Andersen, P. & Duvold, T. (2018).
The future market for cybersecurity in Denmark.
Hazay, C., Orsini, E.
, Scholl, P. & Soria-Vazquez, E. (2018).
TinyKeys: A New Approach to Efficient Multi-Party Computation. In H. Shacham & A. Boldyreva (Eds.),
Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings (Vol. 10993, pp. 3-33). Springer VS.
https://doi.org/10.1007/978-3-319-96878-0_1
Baum, C., Lin, H.
& Oechsner, S. (2018).
Towards Practical Lattice-Based One-Time Linkable Ring Signatures. In D. Naccache, S. Xu, S. Qing, P. Samarati, G. Blanc, R. Lu, Z. Zhang & A. Meddahi (Eds.),
Information and Communications Security - 20th International Conference, ICICS 2018, Proceedings: ICICS 2018 (Vol. 11149, pp. 303-322). Springer VS.
https://doi.org/10.1007/978-3-030-01950-1_18
Fuchsbauer, G., Gay, R., Kowalczyk, L.
& Orlandi, C. (2017).
Access Control Encryption for Equality, Comparison, and More. In S. Fehr (Ed.),
Public-Key Cryptography – PKC 2017 - 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings: 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part II (Vol. 10175, pp. 88-118). Springer VS.
https://doi.org/10.1007/978-3-662-54388-7_4
Coron, J.-S.
& Nielsen, J. B. (Eds.) (2017).
Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part I. In J.-S. Coron & J. Buus Nielsen (Eds.),
Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part I (Vol. 10210). Springer VS.
https://doi.org/10.1007/978-3-319-56620-7
Coron, J.-S.
& Nielsen, J. B. (Eds.) (2017).
Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part II. In J.-S. Coron & J. Buus Nielsen (Eds.),
Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part II (Vol. 10211). Springer VS.
https://doi.org/10.1007/978-3-319-56614-6
Coron, J.-S.
& Nielsen, J. B. (Eds.) (2017).
Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part III. In J.-S. Coron & J. Buus Nielsen (Eds.),
Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part III (Vol. 10212). Springer VS.
https://doi.org/10.1007/978-3-319-56617-7
Faz-Hernandez, A., Fujii, H.
, Aranha, D. F. & Lopez, J. (2017).
A Secure and Efficient Implementation of the Quotient Digital Signature Algorithm (qDSA). In S. S. Ali, J.-L. Danger & T. Eisenbarth (Eds.),
Security, Privacy, and Applied Cryptography Engineering - 7th International Conference, SPACE 2017, Proceedings: 7th International Conference, SPACE 2017, Goa, India, December 13-17, 2017, Proceedings (pp. 170-189). Springer.
https://doi.org/10.1007/978-3-319-71501-8_10