Ganesh, C.
, Magri, B. & Venturi, D. (2020).
Cryptographic reverse firewalls for interactive proof systems. In A. Czumaj, A. Dawar & E. Merelli (Eds.),
47th International Colloquium on Automata, Languages, and Programming, ICALP 2020 (pp. 55:1-55:16). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing.
https://doi.org/10.4230/LIPIcs.ICALP.2020.55
Aranha, D. F., Hall-Andersen, M. N., Nitulescu, A., Pagnin, E. & Yakoubov, S. (2022).
Count Me In! Extendability for Threshold Ring Signatures. In G. Hanaoka, J. Shikata & Y. Watanabe (Eds.),
Public-Key Cryptography – PKC 2022 : 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings, Part II (pp. 379-406). Springer.
https://doi.org/10.1007/978-3-030-97131-1_13
Boyle, E., Couteau, G., Gilboa, N., Ishai, Y., Kohl, L., Resch, N.
& Scholl, P. (2022).
Correlated Pseudorandomness from Expand-Accumulate Codes. In Y. Dodis & T. Shrimpton (Eds.),
Advances in Cryptology – CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Proceedings (pp. 603-633). Springer.
https://doi.org/10.1007/978-3-031-15979-4_21
Boyle, E., Couteau, G., Gilboa, N., Ishai, Y., Kohl, L.
& Scholl, P. (2020).
Correlated Pseudorandom Functions from Variable-Density LPN. In S. Irani (Ed.),
Proceedings - 2020 IEEE 61st Annual Symposium on Foundations of Computer Science, FOCS 2020 (pp. 1069-1080). Article 9317926 IEEE.
https://doi.org/10.1109/FOCS46700.2020.00103
Faust, S., Mukherjee, P., Nielsen, J. B. & Venturi, D. (2014).
Continuous Non-malleable Codes. In Y. Lindell (Ed.),
Theory of Cryptography: 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings (pp. 465-488). Springer.
https://doi.org/10.1007/978-3-642-54242-8_20
Damgård, I., Kazana, T.
, Obremski, M., Raj, V. & Siniscalchi, L. (2018).
Continuous NMC Secure Against Permutations and Overwrites, with Applications to CCA Secure Commitments. In A. Beimel & S. Dziembowski (Eds.),
Theory of Cryptography - 16th International Conference, TCC 2018, Proceedings (Vol. 11240, pp. 225-254). Springer VS.
https://doi.org/10.1007/978-3-030-03810-6_9
Faonio, A.
, Nielsen, J. B., Simkin, M. & Venturi, D. (2018).
Continuously Non-malleable Codes with Split-State Refresh. In B. Preneel & F. Vercauteren (Eds.),
Applied Cryptography and Network Security - 16th International Conference, ACNS 2018, Proceedings (Vol. 10892, pp. 121-139). Springer VS.
https://doi.org/10.1007/978-3-319-93387-0_7
Damgård, I., Damgård, K., Nielsen, K.
, Nordholt, P. S. & Toft, T. (2017).
Confidential benchmarking based on multiparty computation. In J. Grossklags & B. Preneel (Eds.),
Financial Cryptography and Data Security - 20th International Conference, FC 2016, Revised Selected Papers (Vol. 9603 LNCS, pp. 169-187). Springer VS.
https://doi.org/10.1007/978-3-662-54970-4_10
Hazay, C., Orsini, E.
, Scholl, P. & Soria-Vazquez, E. (2018).
Concretely Efficient Large-Scale MPC with Active Security (or, TinyKeys for TinyOT). In T. Peyrin & S. Galbraith (Eds.),
Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings (Vol. 11274, pp. 86-117). Springer VS.
https://doi.org/10.1007/978-3-030-03332-3_4
Haagh, H., Karbyshev, A., Oechsner, S., Spitters, B. & Strub, P. (2018).
Computer-Aided Proofs for Multiparty Computation with Active Security. In
Proceedings - IEEE 31st Computer Security Foundations Symposium, CSF 2018 (Vol. 2018, pp. 119-131). Article 8429300 IEEE.
https://doi.org/10.1109/CSF.2018.00016
Damgård, I., Luo, J.
, Oechsner, S., Scholl, P. & Simkin, M. (2018).
Compact Zero-Knowledge Proofs of Small Hamming Weight. In M. Abdalla & R. Dahab (Eds.),
Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings (Vol. 10770, pp. 530-560). Springer VS.
https://doi.org/10.1007/978-3-319-76581-5_18
Damgård, I. B., David, B. M., Giacomelli, I. & Nielsen, J. B. (2014).
Compact VSS and Efficient Homomorphic UC Commitments. In P. Sarkar & T. Iwata (Eds.),
Advances in Cryptology – ASIACRYPT 2014: 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part II (pp. 213-232 ). Springer VS.
https://doi.org/10.1007/978-3-662-45608-8_12
Dalskov, A. P. K., Lee, E.
& Soria Vazquez, E. (2020).
Circuit Amortization Friendly Encodings and their Application to Statistically Secure Multiparty Computation. In S. Moriai & H. Wang (Eds.),
Advances in Cryptology – ASIACRYPT 2020: 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings (Vol. III). Springer.