Pagnin, E., Gunnarsson, G., Talebi, P.
, Orlandi, C. & Sabelfeld, A. (2019).
TOPPool: Time-aware Optimized Privacy-Preserving Ridesharing.
Proceedings on Privacy Enhancing Technologies,
2019(4), 93-111.
https://doi.org/10.2478/popets-2019-0060
Oliveira, L. B.
, Aranha, D. F., Morais, E., Daguano, F., Lopez, J. & Dahab, R. (2007).
TinyTate: Computing the Tate Pairing in Resource-Constrained Sensor Nodes. In
Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007)(NCA) (pp. 318-323). IEEE.
https://doi.org/10.1109/NCA.2007.48
Oliveira, L. B.
, Aranha, D. F., Gouvea, C. P. L., Scott, M., Camara, D. F., Lopez, J. & Dahab, R. (2010).
TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks.
Computer Communications,
34(3), 485-493.
https://doi.org/10.1016/j.comcom.2010.05.013
Hazay, C., Orsini, E.
, Scholl, P. & Soria-Vazquez, E. (2018).
TinyKeys: A New Approach to Efficient Multi-Party Computation. In H. Shacham & A. Boldyreva (Eds.),
Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings (Vol. 10993, pp. 3-33). Springer VS.
https://doi.org/10.1007/978-3-319-96878-0_1
Damgård, I., Nielsen, J. B., Nielsen, M. & Ranellucci, S. (2017).
The tinytable protocol for 2-party secure computation, or: Gate-scrambling revisited. In J. Katz & H. Shacham (Eds.),
Advances in Cryptology – CRYPTO 2017 - 37th Annual International Cryptology Conference, Proceedings (Vol. 10401, pp. 167-187). Springer VS.
https://doi.org/10.1007/978-3-319-63688-7_6
Troi, A., Jørgensen, B. N., Larsen, E. M., Blaabjerg, F.
, Mikkelsen, G. L., Slente, H. P.
, Madsen, H., Østergaard, J.
, Entwistle, J. M., Nordentoft, N. C., Meibom, P.
, Jacobsen, R. H., Thorvildsen, S. & Jørgensen, U. (2013).
The smart grid research network: Road map for smart grid research, development and demonstration up to 2020.
http://orbit.dtu.dk/fedora/objects/orbit:120708/datastreams/file_593c582c-5f51-4d45-adb4-290c796ad776/content
Nayara Ortiz, J., Ricardo de Araujo, R.
, Aranha, D. F., Rodrigues Costa, S. I. & Dahab, R. (2021).
The Ring-LWE Problem in Lattice-based Cryptography: The Case of Twisted Embeddings.
Entropy,
23(9), Article 1108.
https://doi.org/10.3390/e23091108
Aranha, D. F., Barbosa, P. Y. S., Cardoso, T. N. C., Araújo, C. L. & Matias, P. (2019).
The return of software vulnerabilities in the Brazilian voting machine.
Computers & Security,
86, 335-349. Advance online publication.
https://doi.org/10.1016/j.cose.2019.06.009
Brian, G.
, Faonio, A., Obremski, M., Ribeiro, J.
, Simkin, M., Skorski, M.
& Venturi, D. (2022).
The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free.
IEEE Transactions on Information Theory,
68(12), 8197-8227.
https://doi.org/10.1109/TIT.2022.3193848
Jensen, C. (Ed.), Lind Olsen, E. (Ed.)
, Mikkelsen, G. L., Syberg , L.
, Nielsen, L. L., Hansen, M. A. E., Hjortlund, M.
, Madsen, O. L., Høngaard Andersen, P. & Duvold, T. (2018).
The future market for cybersecurity in Denmark.
Oliveira, L. B., Quintao Pereira, F. M., Misoczki, R.
, Aranha, D. F., Borges, F. & Liu, J. (2017).
The Computer for the 21st Century: Security & Privacy Challenges After 25 Years. In
2017 26th International Conference on Computer Communications and Networks, ICCCN 2017 Article 8038394 IEEE.
https://doi.org/10.1109/ICCCN.2017.8038394
Oliveira, L. B., Pereira, F. M. Q., Misoczki, R.
, Aranha, D. F., Borges, F., Nogueira, M., Wangham, M., Wu, M. & Liu, J. (2018).
The computer for the 21st century: present security & privacy challenges.
Journal of Internet Services and Applications,
9(24), Article 24.
https://doi.org/10.1186/s13174-018-0095-2
Ghosh, S. & Simkin, M. (2019).
The Communication Complexity of Threshold Private Set Intersection. In A. Boldyreva & D. Micciancio (Eds.),
Advances in Cryptology – CRYPTO 2019: 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings (Vol. II, pp. 3-29). Springer.
https://doi.org/10.1007/978-3-030-26951-7_1
Damgård, I. B., Faust, S., Mukherjee, P. & Venturi, D. (2015).
The Chaining Lemma and its application. In A. Lehmann & S. Wolf (Eds.),
Information Theoretic Security: 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings (pp. 181-196). Springer VS.
https://doi.org/10.1007/978-3-319-17470-9_11
Damgård, I. B., Funder, J., Nielsen, J. B. & Salvail, L. (2014).
Superposition attacks on cryptographic protocols. In C. Padró (Ed.),
Information Theoretic Security: 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings (pp. 142-161). Springer.
https://doi.org/10.1007/978-3-319-04268-8_9
Nielsen, J. B. (Ed.), Alwen, J., Cachin, C., Pereira, O., Sadeghi, A-R., Schoenmakers, B., Shelat, A. & Visconti, I. (2007).
Summary Report on Rational Cryptographic Protocols. ECRYPT - European Network of Excellence in Cryptology.
Campanelli, M. & Khoshakhlagh, H. (2021).
Succinct Publicly-Certifiable Proofs: Or, Can a Blockchain Verify a Designated-Verifier Proof? In A. Adhikari, R. Küsters & B. Preneel (Eds.),
Progress in Cryptology – INDOCRYPT 2021 - 22nd International Conference on Cryptology in India, 2021, Proceedings: 22nd International Conference on Cryptology in India, Jaipur, India, December 12-15, 2021, Proceedings (pp. 607-631). Springer.
https://doi.org/10.1007/978-3-030-92518-5_27
Baum, C., Lyubashevsky, V., Groth, J., Bootle, J., Cerulli, A. & del Pino, R. (2018).
Sub-Linear Lattice-Based Zero-Knowledge Arguments for Arithmetic Circuits. In
Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings (pp. 669-699)
https://doi.org/10.1007/978-3-319-96881-0_23
Riedel, C., Michael, G. G., Orgel, C.
, Baum, C., van der Bogert, C. H. & Hiesinger, H. (2021).
Studying the Global Spatial Randomness of Impact Craters on Mercury, Venus, and the Moon With Geodesic Neighborhood Relationships.
Journal of Geophysical Research: Planets,
126(3), Article e2020JE006693.
https://doi.org/10.1029/2020JE006693
Damgård, I., Haagh, H., Mercer, R.
, Nitulescu, A., Orlandi, C. & Yakoubov, S. (2020).
Stronger Security and Constructions of Multi-designated Verifier Signatures. In R. Pass & K. Pietrzak (Eds.),
Theory of Cryptography - 18th International Conference, TCC 2020, Proceedings: Proceedings (Vol. II, pp. 229-260). Springer.
https://doi.org/10.1007/978-3-030-64378-2_9
Aggarwal, D.
, Damgård, I., Nielsen, J. B., Obremski, M., Purwanto, E., Ribeiro, J.
& Simkin, M. (2019).
Stronger leakage-resilient and non-malleable secret sharing schemes for general access structures. In A. Boldyreva & D. Micciancio (Eds.),
Advances in Cryptology – CRYPTO 2019 : 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings (Vol. II, pp. 510-539). Springer.
https://doi.org/10.1007/978-3-030-26951-7_18