Faust, S., Mukherjee, P., Nielsen, J. B. & Venturi, D. (2014).
Continuous Non-malleable Codes. In Y. Lindell (Ed.),
Theory of Cryptography: 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings (pp. 465-488). Springer.
https://doi.org/10.1007/978-3-642-54242-8_20
Damgård, I., Kazana, T.
, Obremski, M., Raj, V. & Siniscalchi, L. (2018).
Continuous NMC Secure Against Permutations and Overwrites, with Applications to CCA Secure Commitments. In A. Beimel & S. Dziembowski (Eds.),
Theory of Cryptography - 16th International Conference, TCC 2018, Proceedings (Vol. 11240, pp. 225-254). Springer VS.
https://doi.org/10.1007/978-3-030-03810-6_9
Faonio, A.
, Nielsen, J. B., Simkin, M. & Venturi, D. (2018).
Continuously Non-malleable Codes with Split-State Refresh. In B. Preneel & F. Vercauteren (Eds.),
Applied Cryptography and Network Security - 16th International Conference, ACNS 2018, Proceedings (Vol. 10892, pp. 121-139). Springer VS.
https://doi.org/10.1007/978-3-319-93387-0_7
Damgård, I., Damgård, K., Nielsen, K.
, Nordholt, P. S. & Toft, T. (2017).
Confidential benchmarking based on multiparty computation. In J. Grossklags & B. Preneel (Eds.),
Financial Cryptography and Data Security - 20th International Conference, FC 2016, Revised Selected Papers (Vol. 9603 LNCS, pp. 169-187). Springer VS.
https://doi.org/10.1007/978-3-662-54970-4_10
Hazay, C., Orsini, E.
, Scholl, P. & Soria-Vazquez, E. (2018).
Concretely Efficient Large-Scale MPC with Active Security (or, TinyKeys for TinyOT). In T. Peyrin & S. Galbraith (Eds.),
Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings (Vol. 11274, pp. 86-117). Springer VS.
https://doi.org/10.1007/978-3-030-03332-3_4
Haagh, H., Karbyshev, A., Oechsner, S., Spitters, B. & Strub, P. (2018).
Computer-Aided Proofs for Multiparty Computation with Active Security. In
Proceedings - IEEE 31st Computer Security Foundations Symposium, CSF 2018 (Vol. 2018, pp. 119-131). Article 8429300 IEEE.
https://doi.org/10.1109/CSF.2018.00016
Damgård, I., Luo, J.
, Oechsner, S., Scholl, P. & Simkin, M. (2018).
Compact Zero-Knowledge Proofs of Small Hamming Weight. In M. Abdalla & R. Dahab (Eds.),
Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings (Vol. 10770, pp. 530-560). Springer VS.
https://doi.org/10.1007/978-3-319-76581-5_18
Damgård, I. B., David, B. M., Giacomelli, I. & Nielsen, J. B. (2014).
Compact VSS and Efficient Homomorphic UC Commitments. In P. Sarkar & T. Iwata (Eds.),
Advances in Cryptology – ASIACRYPT 2014: 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part II (pp. 213-232 ). Springer VS.
https://doi.org/10.1007/978-3-662-45608-8_12
Dalskov, A. P. K., Lee, E.
& Soria Vazquez, E. (2020).
Circuit Amortization Friendly Encodings and their Application to Statistically Secure Multiparty Computation. In S. Moriai & H. Wang (Eds.),
Advances in Cryptology – ASIACRYPT 2020: 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings (Vol. III). Springer.
Damgård, I., Ravi, D., Siniscalchi, L. & Yakoubov, S. (2023).
Broadcast-Optimal Two Round MPC with Asynchronous Peer-to-Peer Channels. In A. Aly & M. Tibouchi (Eds.),
Progress in Cryptology – LATINCRYPT 2023: 8th International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2023, Quito, Ecuador, October 3–6, 2023, Proceedings (pp. 87-106). Springer.
https://doi.org/10.1007/978-3-031-44469-2_5
Ciampi, M.
, Damgård, I., Ravi, D., Siniscalchi, L., Xia, Y.
& Yakoubov, S. (2023).
Broadcast-Optimal Four-Round MPC in the Plain Model. In G. Rothblum & H. Wee (Eds.),
Theory of Cryptography: 21st International Conference, TCC 2023, Taipei, Taiwan, November 29 – December 2, 2023, Proceedings, Part II (pp. 3-32). Springer.
https://doi.org/10.1007/978-3-031-48618-0_1
Damgård, I. B., Faust, S., Mukherjee, P. & Venturi, D. (2013).
Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier. In K. Sako & P. Sarkar (Eds.),
Advances in Cryptology - ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II (pp. 140-160 ). Springer VS.
https://doi.org/10.1007/978-3-642-42045-0_8
Baum, C., Damgård, I. B., Toft, T. & Zakarias, R. W. (2016).
Better Preprocessing for Secure Multiparty Computation. In M. Manulis, A.-R. Sadeghi & S. Schneider (Eds.),
Applied Cryptography and Network Security - 14th International Conference, ACNS 2016, Proceedings: 14th International Conference on Applied Cryptography and Network Security (Vol. 9696, pp. 327-345). Springer VS.
https://doi.org/10.1007/978-3-319-39555-5_18
Baum, C., de Saint Guilhem, C. D., Kales, D., Orsini, E.
, Scholl, P. & Zaverucha, G. (2021).
Banquet: Short and Fast Signatures from AES. In J. A. Garay (Ed.),
Public-Key Cryptography – PKC 2021: 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10–13, 2021, Proceedings, Part I (pp. 266-297). Springer.
https://doi.org/10.1007/978-3-030-75245-3_11