Bøgetoft, P., Lund Christensen, D.
, Damgård, I. B., Geisler, M., Jacobsen, T., Krøigaard, M., Nielsen, J. D., Nielsen, J. B., Nielsen, K.
, Pagter, J. I., Schwartzbach, M. I., Toft, T. & Nielsen, K. (2009).
Secure Multiparty Computation Goes Live.
Lecture Notes in Computer Science,
5628, 325-343.
https://doi.org/10.1007/978-3-642-03549-4_20
Choudhury, A.
, Patra, A., Ashwinkumar, B. V., Srinathan, K. & Pandu Rangan, C. (2011).
Secure message transmission in asynchronous networks.
Journal of Parallel and Distributed Computing,
71(8), 1067-1074.
https://doi.org/10.1016/j.jpdc.2011.03.004
Damgård, I. B., Salvail, L., Schaffner, C. & Fehr, S. (2007).
Secure Identification and QKD in the Bounded-Quantum-Storage Model. In A. Menezes (Ed.),
Advances in Cryptology - CRYPTO 2007: 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007. Proceedings (pp. 342-359). Springer.
https://doi.org/10.1007/978-3-540-74143-5_19
Lipmaa, H.
& Toft, T. (2013).
Secure equality and greater-than tests with sublinear online complexity. In F. V. Fomin , R. Freivalds, M. Kwiatkowska & D. Peleg (Eds.),
Automata, Languages, and Programming: Proceedings, 40th International Colloquium, ICALP 2013, Riga, Latvia, July 8-12, 2013, Part II (pp. 645-656). Springer Publishing Company.
https://doi.org/10.1007/978-3-642-39212-2_56
Pagter, J. I., Toft, T., Damgård, I. B., Bogetoft, P., Nielsen, K. & Jakobsen, T. (2005).
Secure Computing, Economy, and Trust - A Generic Solution for Secure Auctions with Real-World Applications.
B R I C S Report Series, (RS-05-18), 1-35.
Applebaum, B.
, Damgård, I., Ishai, Y.
, Nielsen, M. & Zichron, L. (2017).
Secure Arithmetic Computation with Constant Computational Overhead. In H. Shacham & J. Katz (Eds.),
Advances in Cryptology – CRYPTO 2017 - 37th Annual International Cryptology Conference, Proceedings (Vol. 10401, pp. 223-254). Springer VS.
https://doi.org/10.1007/978-3-319-63688-7_8
Chillotti, I., Orsini, E.
, Scholl, P., Smart, N. P. & Leeuwen, B. V. (2022).
Scooby: Improved Multi-party Homomorphic Secret Sharing Based on FHE. In C. Galdi & S. Jarecki (Eds.),
Security and Cryptography for Networks - 13th International Conference, SCN 2022, Proceedings (pp. 540-563). Springer.
https://doi.org/10.1007/978-3-031-14791-3_24
Damgård, I. B., Krøigaard, M., Ishai, Y.
, Nielsen, J. B. & Smith, A. (2008).
Scalable Multiparty Computation with Nearly Optimal Work and Resilience.
Lecture Notes in Computer Science,
5157, 241-261.
https://doi.org/10.1007/978-3-540-85174-5_14
Chakraborty, S., Ganesh, C.
, Pancholi, M. R. & Sarkar, P. (2021).
Reverse Firewalls for Adaptively Secure MPC without Setup. In M. Tibouchi & H. Wang (Eds.),
Advances in Cryptology – ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings, Part 2: 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6–10, 2021, Proceedings, Part II (pp. 335-364). Springer.
https://doi.org/10.1007/978-3-030-92075-3_12
Haagh, H., Ji, Y., Li, C.
, Orlandi, C. & Song, Y. (2017).
Revealing Encryption for Partial Ordering. In M. O’Neill (Ed.),
Cryptography and Coding - 16th IMA International Conference, IMACC 2017, Proceedings (pp. 3-22). Springer VS.
https://doi.org/10.1007/978-3-319-71045-7_1
Cascudo, I., Damgård, I., Farràs, O.
& Ranellucci, S. (2017).
Resource-Efficient OT Combiners with Active Security. In Y. Kalai & L. Reyzin (Eds.),
Theory of Cryptography - 15th International Conference, TCC 2017, Proceedings (Vol. 10678, pp. 461-486). Springer VS.
https://doi.org/10.1007/978-3-319-70503-3_15
Canetti, R., Krawczyk, H.
& Nielsen, J. B. (2003).
Relaxing Chosen-Ciphertext Security. In D. Boneh (Ed.),
Advances in Cryptology - CRYPTO 2003: 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003. Proceedings (pp. 565-582). Springer.
https://doi.org/10.1007/978-3-540-45146-4_33
Francati, D., Friolo, D., Maitra, M., Malavolta, G., Rahimi, A.
& Venturi, D. (2023).
Registered (Inner-Product) Functional Encryption. In J. Guo & R. Steinfeld (Eds.),
Advances in Cryptology – ASIACRYPT 2023: 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4–8, 2023, Proceedings, Part V (pp. 98-133). Springer.
https://doi.org/10.1007/978-981-99-8733-7_4
Cascudo, I.
, Damgård, I., David, B. M., Döttling, N. & Nielsen, J. B. (2016).
Rate-1, linear time and additively homomorphic UC commitments. In M. Robshaw & J. Katz (Eds.),
Advances in Cryptology - 36th Annual International Cryptology Conference, CRYPTO 2016, Proceedings (Vol. 9816, pp. 179-207). Springer VS.
https://doi.org/10.1007/978-3-662-53015-3_7
Baena, J., Cabarcas, D.
, Escudero, D. E., Khathuria, K. & Verbel, J. (2018).
Rank Analysis of Cubic Multivariate Cryptosystems. In T. Lange & R. Steinwandt (Eds.),
Post-Quantum Cryptography - 9th International Conference, PQCrypto 2018, Proceedings (Vol. 10786, pp. 355-374). Springer VS.
https://doi.org/10.1007/978-3-319-79063-3_17
Gentry, C., Halevi, S.
, Magri, B., Nielsen, J. B. & Yakoubov, S. (2021).
Random-Index PIR and Applications. In K. Nissim & B. Waters (Eds.),
Theory of Cryptography : 19th International Conference, TCC 2021, Proceedings (pp. 32-61). Springer.
https://doi.org/10.1007/978-3-030-90456-2_2