Cramer, R.
, Damgård, I. B., Dziembowski, S., Hirt, M. & Rabin, T. (1999).
Efficient Multiparty Computations Secure Against an Adaptive Adversary. In J. Stern (Ed.),
Advances in Cryptology - EUROCRYPT '99: International Conference on the Theory and Application of Cryptographic Techniques Prague, Czech Republic, May 2-6, 1999 Proceedings (pp. 311-326). Springer.
https://doi.org/10.1007/3-540-48910-X_22
Cramer, R.
, Damgård, I. B. & MacKenzie, P. (2000).
Efficient Zero-Knowledge Proofs of Knowledge without Intractability Assumptions. In H. Imai & Y. Zheng (Eds.),
Public Key Cryptography: Third International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000. Proceedings (pp. 354-373). Springer.
https://doi.org/10.1007/978-3-540-46588-1_24
Cramer, R.
, Damgård, I. B., Kiltz, E.
, Zakarias, S. N. H. & Zottarel, A. (2012).
DDH-Like Assumptions Based on Extension Rings.
Lecture Notes in Computer Science,
7293, 644-661 .
https://doi.org/10.1007/978-3-642-30057-8_38
Cramer, R.
, Damgård, I. B., Döttling, N. M., Fehr, S. & Spini, G. (2015).
Linear secret sharing schemes from error correcting codes and universal hash functions. In E. Oswald & M. F. Fischlin (Eds.),
Advances in Cryptology - EUROCRYPT 2015: 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II (pp. 313-336). Springer VS.
https://doi.org/10.1007/978-3-662-46803-6_11
Cramer, R.
, Damgård, I., Döttling, N., Giacomelli, I. & Xing, C. (2017).
Linear-Time Non-Malleable Codes in the Bit-Wise Independent Tampering Model. In J. Shikata (Ed.),
Information Theoretic Security - 10th International Conference, ICITS 2017, Proceedings (Vol. 10681, pp. 1-25). Springer VS.
https://doi.org/10.1007/978-3-319-72089-0_1
Cramer, R.
, Damgård, I., Escudero, D., Scholl, P. & Xing, C. (2018).
SPDΖ2k: Efficient MPC mod 2k for Dishonest Majority. In H. Shacham & A. Boldyreva (Eds.),
Advances in Cryptology - CRYPTO 2018 (Vol. 10992, pp. 769-798). Springer VS.
https://doi.org/10.1007/978-3-319-96881-0_26
Coron, J.-S.
& Nielsen, J. B. (Eds.) (2017).
Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part I. In J.-S. Coron & J. Buus Nielsen (Eds.),
Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part I (Vol. 10210). Springer VS.
https://doi.org/10.1007/978-3-319-56620-7
Coron, J.-S.
& Nielsen, J. B. (Eds.) (2017).
Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part II. In J.-S. Coron & J. Buus Nielsen (Eds.),
Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part II (Vol. 10211). Springer VS.
https://doi.org/10.1007/978-3-319-56614-6
Coron, J.-S.
& Nielsen, J. B. (Eds.) (2017).
Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part III. In J.-S. Coron & J. Buus Nielsen (Eds.),
Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part III (Vol. 10212). Springer VS.
https://doi.org/10.1007/978-3-319-56617-7
Cohen, G.
, Damgård, I. B., Ishai, Y.
, Kölker, J., Miltersen, P. B., Raz, R. & Rothblum, R. (2013).
Efficient Multiparty Protocols via Log-Depth Threshold Formulae Contact Add Comment RSS-Feed.
Electronic Colloquium on Computational Complexity, (TR13-107).
http://eccc.hpi-web.de/report/2013/107/
Cohen, G.
, Damgård, I. B., Ishai, Y.
, Kölker, J., Miltersen, P. B., Raz, R. & Rothblum, R. D. (2013).
Efficient multiparty protocols via log-depth threshold formulae. In R. Canetti & J. A. Garay (Eds.),
Advances in Cryptology – CRYPTO 2013: 33rd Annual Conference. Proceedings, Part II (pp. 185-202). Springer VS.
https://doi.org/10.1007/978-3-642-40084-1_11
Ciampi, M.
, Siniscalchi, L. & Waldner, H. (2021).
Multi-Client Functional Encryption for Separable Functions. In J. A. Garay (Ed.),
Public-Key Cryptography – PKC 2021: 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10–13, 2021, Proceedings, Part I (pp. 724-753). Springer.
https://doi.org/10.1007/978-3-030-75245-3_26
Ciampi, M.
, Damgård, I., Ravi, D., Siniscalchi, L., Xia, Y.
& Yakoubov, S. (2023).
Broadcast-Optimal Four-Round MPC in the Plain Model. In G. Rothblum & H. Wee (Eds.),
Theory of Cryptography: 21st International Conference, TCC 2023, Taipei, Taiwan, November 29 – December 2, 2023, Proceedings, Part II (pp. 3-32). Springer.
https://doi.org/10.1007/978-3-031-48618-0_1
Choudhury, A.
, Patra, A., Ashwinkumar, B. V., Srinathan, K. & Pandu Rangan, C. (2011).
Secure message transmission in asynchronous networks.
Journal of Parallel and Distributed Computing,
71(8), 1067-1074.
https://doi.org/10.1016/j.jpdc.2011.03.004
Chillotti, I., Orsini, E.
, Scholl, P., Smart, N. P. & Leeuwen, B. V. (2022).
Scooby: Improved Multi-party Homomorphic Secret Sharing Based on FHE. In C. Galdi & S. Jarecki (Eds.),
Security and Cryptography for Networks - 13th International Conference, SCN 2022, Proceedings (pp. 540-563). Springer.
https://doi.org/10.1007/978-3-031-14791-3_24
Chase, M., Derler, D., Goldfeder, S.
, Orlandi, C., Ramacher, S., Rechberger, C., Slamanig, D. & Zaverucha, G. (2017).
Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives. In
CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (pp. 1825-1842). Association for Computing Machinery.
https://doi.org/10.1145/3133956.3133997
Chakraborty, S., Ganesh, C.
, Pancholi, M. R. & Sarkar, P. (2021).
Reverse Firewalls for Adaptively Secure MPC without Setup. In M. Tibouchi & H. Wang (Eds.),
Advances in Cryptology – ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings, Part 2: 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6–10, 2021, Proceedings, Part II (pp. 335-364). Springer.
https://doi.org/10.1007/978-3-030-92075-3_12
Cascudo Pueyo, I., Damgård, I. B., David, B. M., Giacomelli, I., Nielsen, J. B. & Trifiletti, R. (2015).
Additively Homomorphic UC commitments with Optimal Amortized Overhead. In J. Katz (Ed.),
Public-Key Cryptography, PKC 2015: 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30-April 1, 2015, Proceedings (pp. 495–515). Springer.
https://doi.org/10.1007/978-3-662-46447-2_22
Cascudo, I.
, Damgård, I., David, B. M., Döttling, N. & Nielsen, J. B. (2016).
Rate-1, linear time and additively homomorphic UC commitments. In M. Robshaw & J. Katz (Eds.),
Advances in Cryptology - 36th Annual International Cryptology Conference, CRYPTO 2016, Proceedings (Vol. 9816, pp. 179-207). Springer VS.
https://doi.org/10.1007/978-3-662-53015-3_7
Cascudo, I., Damgård, I., Farràs, O.
& Ranellucci, S. (2017).
Resource-Efficient OT Combiners with Active Security. In Y. Kalai & L. Reyzin (Eds.),
Theory of Cryptography - 15th International Conference, TCC 2017, Proceedings (Vol. 10678, pp. 461-486). Springer VS.
https://doi.org/10.1007/978-3-319-70503-3_15