Pagnin, E., Gunnarsson, G., Talebi, P.
, Orlandi, C. & Sabelfeld, A. (2019).
TOPPool: Time-aware Optimized Privacy-Preserving Ridesharing.
Proceedings on Privacy Enhancing Technologies,
2019(4), 93-111.
https://doi.org/10.2478/popets-2019-0060
Oliveira, L. B.
, Aranha, D. F., Morais, E., Daguano, F., Lopez, J. & Dahab, R. (2007).
TinyTate: Computing the Tate Pairing in Resource-Constrained Sensor Nodes. In
Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007)(NCA) (pp. 318-323). IEEE.
https://doi.org/10.1109/NCA.2007.48
Oliveira, L. B.
, Aranha, D. F., Gouvea, C. P. L., Scott, M., Camara, D. F., Lopez, J. & Dahab, R. (2010).
TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks.
Computer Communications,
34(3), 485-493.
https://doi.org/10.1016/j.comcom.2010.05.013
Hazay, C., Orsini, E.
, Scholl, P. & Soria-Vazquez, E. (2018).
TinyKeys: A New Approach to Efficient Multi-Party Computation. In H. Shacham & A. Boldyreva (Eds.),
Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings (Vol. 10993, pp. 3-33). Springer VS.
https://doi.org/10.1007/978-3-319-96878-0_1
Damgård, I., Nielsen, J. B., Nielsen, M. & Ranellucci, S. (2017).
The tinytable protocol for 2-party secure computation, or: Gate-scrambling revisited. In J. Katz & H. Shacham (Eds.),
Advances in Cryptology – CRYPTO 2017 - 37th Annual International Cryptology Conference, Proceedings (Vol. 10401, pp. 167-187). Springer VS.
https://doi.org/10.1007/978-3-319-63688-7_6
Troi, A., Jørgensen, B. N., Larsen, E. M., Blaabjerg, F.
, Mikkelsen, G. L., Slente, H. P.
, Madsen, H., Østergaard, J., Entwistle, J. M., Nordentoft, N. C., Meibom, P.
, Jacobsen, R. H., Thorvildsen, S. & Jørgensen, U. (2013).
The smart grid research network: Road map for smart grid research, development and demonstration up to 2020.
http://orbit.dtu.dk/fedora/objects/orbit:120708/datastreams/file_593c582c-5f51-4d45-adb4-290c796ad776/content
Nayara Ortiz, J., Ricardo de Araujo, R.
, Aranha, D. F., Rodrigues Costa, S. I. & Dahab, R. (2021).
The Ring-LWE Problem in Lattice-based Cryptography: The Case of Twisted Embeddings.
Entropy,
23(9), Article 1108.
https://doi.org/10.3390/e23091108
Aranha, D. F., Barbosa, P. Y. S., Cardoso, T. N. C., Araújo, C. L. & Matias, P. (2019).
The return of software vulnerabilities in the Brazilian voting machine.
Computers & Security,
86, 335-349.
https://doi.org/10.1016/j.cose.2019.06.009
Haselwarter, P. G., Hvass, B. S., Hansen, L. L., Winterhalter, T., Hriţcu, C.
& Spitters, B. (2024).
The Last Yard: Foundational End-to-End Verification of High-Speed Cryptography. In A. Timany, D. Traytel, B. Pientka & S. Blazy (Eds.),
CPP 2024: Proceedings of the 13th ACM SIGPLAN International Conference on Certified Programs and Proofs (pp. 30-44). Association for Computing Machinery.
https://doi.org/10.1145/3636501.3636961
Jensen, C. (Ed.), Lind Olsen, E. (Ed.)
, Mikkelsen, G. L., Syberg , L.
, Nielsen, L. L., Hansen, M. A. E., Hjortlund, M.
, Madsen, O. L., Høngaard Andersen, P. & Duvold, T. (2018).
The future market for cybersecurity in Denmark.
Oliveira, L. B., Quintao Pereira, F. M., Misoczki, R.
, Aranha, D. F., Borges, F. & Liu, J. (2017).
The Computer for the 21st Century: Security & Privacy Challenges After 25 Years. In
2017 26th International Conference on Computer Communications and Networks, ICCCN 2017 Article 8038394 IEEE.
https://doi.org/10.1109/ICCCN.2017.8038394
Oliveira, L. B., Pereira, F. M. Q., Misoczki, R.
, Aranha, D. F., Borges, F., Nogueira, M., Wangham, M., Wu, M. & Liu, J. (2018).
The computer for the 21st century: present security & privacy challenges.
Journal of Internet Services and Applications,
9(24), Article 24.
https://doi.org/10.1186/s13174-018-0095-2
Damgård, I. B., Faust, S., Mukherjee, P. & Venturi, D. (2015).
The Chaining Lemma and its application. In A. Lehmann & S. Wolf (Eds.),
Information Theoretic Security: 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings (pp. 181-196). Springer VS.
https://doi.org/10.1007/978-3-319-17470-9_11
Damgård, I. B., Funder, J.
, Nielsen, J. B. & Salvail, L. (2014).
Superposition attacks on cryptographic protocols. In C. Padró (Ed.),
Information Theoretic Security: 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings (pp. 142-161). Springer.
https://doi.org/10.1007/978-3-319-04268-8_9
Nielsen, J. B. (Ed.), Alwen, J., Cachin, C., Pereira, O., Sadeghi, A.-R., Schoenmakers, B., Shelat, A. & Visconti, I. (2007).
Summary Report on Rational Cryptographic Protocols. ECRYPT - European Network of Excellence in Cryptology.
Campanelli, M.
& Khoshakhlagh, H. (2021).
Succinct Publicly-Certifiable Proofs: Or, Can a Blockchain Verify a Designated-Verifier Proof? In A. Adhikari, R. Küsters & B. Preneel (Eds.),
Progress in Cryptology – INDOCRYPT 2021 - 22nd International Conference on Cryptology in India, 2021, Proceedings: 22nd International Conference on Cryptology in India, Jaipur, India, December 12-15, 2021, Proceedings (pp. 607-631). Springer.
https://doi.org/10.1007/978-3-030-92518-5_27
Baum, C., Lyubashevsky, V., Groth, J., Bootle, J., Cerulli, A. & del Pino, R. (2018).
Sub-Linear Lattice-Based Zero-Knowledge Arguments for Arithmetic Circuits. In
Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings (pp. 669-699)
https://doi.org/10.1007/978-3-319-96881-0_23
Riedel, C., Michael, G. G., Orgel, C.
, Baum, C., van der Bogert, C. H. & Hiesinger, H. (2021).
Studying the Global Spatial Randomness of Impact Craters on Mercury, Venus, and the Moon With Geodesic Neighborhood Relationships.
Journal of Geophysical Research: Planets,
126(3), Article e2020JE006693.
https://doi.org/10.1029/2020JE006693
Campanelli, M.
, Francati, D. & Orlandi, C. (2023).
Structure-Preserving Compilers from New Notions of Obfuscations. In A. Boldyreva & V. Kolesnikov (Eds.),
Public-Key Cryptography – PKC 2023: 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7–10, 2023, Proceedings, Part II (pp. 663-693). Springer.
https://doi.org/10.1007/978-3-031-31371-4_23
Damgård, I., Haagh, H., Mercer, R., Nitulescu, A.
, Orlandi, C. & Yakoubov, S. (2020).
Stronger Security and Constructions of Multi-designated Verifier Signatures. In R. Pass & K. Pietrzak (Eds.),
Theory of Cryptography - 18th International Conference, TCC 2020, Proceedings: Proceedings (Vol. II, pp. 229-260). Springer.
https://doi.org/10.1007/978-3-030-64378-2_9
Aggarwal, D.
, Damgård, I., Nielsen, J. B., Obremski, M., Purwanto, E., Ribeiro, J. & Simkin, M. (2019).
Stronger leakage-resilient and non-malleable secret sharing schemes for general access structures. In A. Boldyreva & D. Micciancio (Eds.),
Advances in Cryptology – CRYPTO 2019 : 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings (Vol. II, pp. 510-539). Springer.
https://doi.org/10.1007/978-3-030-26951-7_18
Orlandi, C., Ostrovsky, R., Rao, V., Sahai, A. & Visconti, I. (2014).
Statistical Concurrent Non-malleable Zero Knowledge. In Y. Lindell (Ed.),
Theory of Cryptography: 11th Theory of Cryptography Conference, TCC 2014, 2014. Proceedings (pp. 167-191). Springer Publishing Company.
https://doi.org/10.1007/978-3-642-54242-8_8
Woodcock, J., Andersen, M. S.
, Aranha, D. F., Hallerstede, S., Hansen, S. T., Jakobsen, N. K., Kulik, T.
, Larsen, P. G., Macedo, H. D., Martin, C. I. I. & Norrild, V. A. M. (2023).
State of the Art Report: Verified Computation.
https://doi.org/10.48550/arXiv.2308.15191