Meiklejohn, S.
& Orlandi, C. (2015).
Privacy-enhancing overlays in bitcoin. In M. Brenner , N. Christin , B. Johnson & K. Rohloff (Eds.),
Financial Cryptography and Data Security : FC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers (Vol. 8976, pp. 127-141). Springer.
https://doi.org/10.1007/978-3-662-48051-9_10
Matias, P., Y. S. Barbosa, P., N. C. Cardoso, T., Mariano, D.
& Aranha, D. F. (2018).
NIZKCTF: A Non-Interactive Zero-Knowledge Capture the Flag Platform.
IEEE Security & Privacy,
16(6), 42-51. Article 8636460.
https://doi.org/10.1109/MSEC.2018.2875324
Maia Neto, A. L., Souza, A. L. F., Cunha, I., Nogueira, M., Oliveira Nunes, I., Cotta, L., Gentille, N., Loureido, A. A. F.
, Aranha, D. F., Kupwade Patil, H. & Oliveira, L. B. (2016).
AoT: Authentication and Access Control for the Entire IoT Device Life-Cycle. In
Proceedings of the 14th ACM Conference on Embedded Networked Sensor Systems, SenSys 2016 (pp. 1-15). ACM.
https://doi.org/10.1145/2994551.2994555
Lipmaa, H.
& Toft, T. (2013).
Secure equality and greater-than tests with sublinear online complexity. In F. V. Fomin , R. Freivalds, M. Kwiatkowska & D. Peleg (Eds.),
Automata, Languages, and Programming: Proceedings, 40th International Colloquium, ICALP 2013, Riga, Latvia, July 8-12, 2013, Part II (pp. 645-656). Springer Publishing Company.
https://doi.org/10.1007/978-3-642-39212-2_56
Lindell, Y., Nissim, K.
& Orlandi, C. (2013).
Hiding the Input-Size in Secure Two-Party Computation. In K. Sako & P. Sarkar (Eds.),
Advances in Cryptology - ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II (Vol. 8197, pp. 421-440). Springer VS.
https://doi.org/10.1007/978-3-642-41019-2_6
Kamp, S. H., Magri, B., Matt, C.
, Nielsen, J. B., Thomsen, S. E. & Tschudi, D. (2021).
Weight-Based Nakamoto-Style Blockchains. In P. Longa & C. Ràfols (Eds.),
Progress in Cryptology – LATINCRYPT 2021: 7th International Conference on Cryptology and Information Security in Latin America Bogotá, Colombia, October 6–8, 2021, Proceedings (pp. 299-319). Springer International Publishing.
https://doi.org/10.1007/978-3-030-88238-9_15
Jensen, C. (Ed.), Lind Olsen, E. (Ed.)
, Mikkelsen, G. L., Syberg , L.
, Nielsen, L. L., Hansen, M. A. E., Hjortlund, M.
, Madsen, O. L., Høngaard Andersen, P. & Duvold, T. (2018).
The future market for cybersecurity in Denmark.
Ishai, Y., Patra, A., Patranabis, S.
, Ravi, D. & Srinivasan, A. (2022).
Fully-Secure MPC with Minimal Trust. In
Theory of Cryptography - 20th International Conference, TCC 2022, Proceedings (pp. 470–501). Springer.
https://doi.org/10.1007/978-3-031-22365-5_17