Damgård, I. B., Faust, S., Mukherjee, P. & Venturi, D. (2013).
Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier. In K. Sako & P. Sarkar (Eds.),
Advances in Cryptology - ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II (pp. 140-160 ). Springer VS.
https://doi.org/10.1007/978-3-642-42045-0_8
Baum, C., Damgård, I. B., Toft, T. & Zakarias, R. W. (2016).
Better Preprocessing for Secure Multiparty Computation. In M. Manulis, A-R. Sadeghi & S. Schneider (Eds.),
Applied Cryptography and Network Security - 14th International Conference, ACNS 2016, Proceedings: 14th International Conference on Applied Cryptography and Network Security (Vol. 9696, pp. 327-345). Springer VS.
https://doi.org/10.1007/978-3-319-39555-5_18
Baum, C., de Saint Guilhem, C. D., Kales, D., Orsini, E.
, Scholl, P. & Zaverucha, G. (2021).
Banquet: Short and Fast Signatures from AES. In J. A. Garay (Ed.),
Public-Key Cryptography – PKC 2021: 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10–13, 2021, Proceedings, Part I (pp. 266-297). Springer.
https://doi.org/10.1007/978-3-030-75245-3_11
Damgård, I., Ganesh, C., Khoshakhlagh, H., Orlandi, C. & Siniscalchi, L. (2021).
Balancing Privacy and Accountability in Blockchain Identity Management. In K. G. Paterson (Ed.),
Topics in Cryptology-CT-RSA 2021 - Cryptographers’ Track at the RSA Conference, Proceedings (pp. 552-576). Springer.
https://doi.org/10.1007/978-3-030-75539-3_23
Damgård, I. B. (Ed.), Aceto, L., Goldberg, L. A., Halldórsson, M. M., Ingólfsdóttir, A. & Walukiewicz, I. (2008).
Automata, Languages and Programming: 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part I. Springer. Lecture Notes in Computer Science Vol. 5125
https://doi.org/10.1007/978-3-540-70575-8
Aceto, L.
, Damgård, I. B., Goldberg, L. A., Halldórsson, M. M., Ingólfsdóttir, A. & Walukiewicz, I. (2008).
Automata, Languages and Programming: 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II. Springer. Lecture Notes in Computer Science Vol. 5126
https://doi.org/10.1007/978-3-540-70583-3
Damgård, I. B., Salvail, L., Fehr, S., Schaffner, C. & Renner, R. (2007).
A Tight High-Order Entropic Quantum Uncertainty Relation with Applications. In A. Menezes (Ed.),
Advances in Cryptology - CRYPTO 2007: 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007. Proceedings (pp. 360-378). Springer.
https://doi.org/10.1007/978-3-540-74143-5_20
Faust, S.
, Mukherjee, P., Nielsen, J. B. & Venturi, D. (2015).
A Tamper and Leakage Resilient von Neumann Architecture. In J. Katz (Ed.),
Public-Key Cryptography, PKC 2015: 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 -- April 1, 2015, Proceedings (pp. 579-603). Springer VS.
https://doi.org/10.1007/978-3-662-46447-2_26
Abspoel, M., Cramer, R.
, Damgård, I., Escudero, D., Rambaud, M., Xing, C. & Yuan, C. (2020).
Asymptotically Good Multiplicative LSSS over Galois Rings and Applications to MPC over Z/pkZ. In S. Moriai & H. Wang (Eds.),
Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, 2020, Proceedings (Vol. III, pp. 151-180). Springer.
https://doi.org/10.1007/978-3-030-64840-4_6
Faz-Hernandez, A., Fujii, H.
, Aranha, D. F. & Lopez, J. (2017).
A Secure and Efficient Implementation of the Quotient Digital Signature Algorithm (qDSA). In S. S. Ali, J-L. Danger & T. Eisenbarth (Eds.),
Security, Privacy, and Applied Cryptography Engineering - 7th International Conference, SPACE 2017, Proceedings: 7th International Conference, SPACE 2017, Goa, India, December 13-17, 2017, Proceedings (pp. 170-189). Springer.
https://doi.org/10.1007/978-3-319-71501-8_10
Damgård, I. B., Salvail, L. & Pedersen, T. B. (2005).
A Quantum Cipher with Near Optimal Key-Recycling. In V. Shoup (Ed.),
Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005. Proceedings (pp. 494-510). Springer.
https://doi.org/10.1007/11535218_30
Damgård, I. B., Toft, T., Pagter, J. I., Jakobsen, T., Bogetoft, P. & Nielsen, K. (2006).
A Practical Implementation of Secure Auctions Based on Multiparty Integer Computation. In G. Di Crescenzo & A. Rubin (Eds.),
Financial Cryptography and Data Security: 10th International Conference, FC 2006 Anguilla, British West Indies, February 27-March 2, 2006 Revised Selected Papers (pp. 142-147). Springer.
https://doi.org/10.1007/11889663_10
Maia Neto, A. L., Souza, A. L. F., Cunha, I., Nogueira, M., Oliveira Nunes, I., Cotta, L., Gentille, N., Loureido, A. A. F.
, Aranha, D. F., Kupwade Patil, H. & Oliveira, L. B. (2016).
AoT: Authentication and Access Control for the Entire IoT Device Life-Cycle. In
Proceedings of the 14th ACM Conference on Embedded Networked Sensor Systems, SenSys 2016 (pp. 1-15). ACM.
https://doi.org/10.1145/2994551.2994555
Hansen, K. M., Larsen, S. B., Pagter, J. I., Pedersen, M. Ø. & Thomsen, J. (2004).
An Evaluation of an OSGi-based Residential Pervasive Computing Platform. In N. Guimarães & P. Isaías (Eds.),
Proceedings of the IADIS Applied Computing Conference (pp. 246-253). International Association for Development, IADIS.
http://www.iadis.net/dl/Search_list_open.asp?code=602
Damgård, I. B., Lauritsen, R. & Toft, T. (2014).
An Empirical Study and some Improvements of the MiniMac Protocol for Secure Computation. In M. Abdalla & R. D. Prisco (Eds.),
Security and Cryptography for Networks: 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings (pp. 398-415 ). Springer.
https://doi.org/10.1007/978-3-319-10879-7_23
Abspoel, M., Dalskov, A.
, Escudero Ospina, D. E. & Nof, A. (2021).
An Efficient Passive-to-Active Compiler for Honest-Majority MPC over Rings. In K. Sako & N. O. Tippenhauer (Eds.),
Applied Cryptography and Network Security - 19th International Conference, ACNS 2021, Proceedings: 19th International Conference, ACNS 2021, Kamakura, Japan, June 21–24, 2021, Proceedings (Vol. II, pp. 122-154). Springer.
https://doi.org/10.1007/978-3-030-78375-4_6