Applebaum, B.
, Damgård, I., Ishai, Y.
, Nielsen, M. & Zichron, L. (2017).
Secure Arithmetic Computation with Constant Computational Overhead. In H. Shacham & J. Katz (Eds.),
Advances in Cryptology – CRYPTO 2017 - 37th Annual International Cryptology Conference, Proceedings (Vol. 10401, pp. 223-254). Springer VS.
https://doi.org/10.1007/978-3-319-63688-7_8
Chillotti, I., Orsini, E.
, Scholl, P., Smart, N. P. & Leeuwen, B. V. (2022).
Scooby: Improved Multi-party Homomorphic Secret Sharing Based on FHE. In C. Galdi & S. Jarecki (Eds.),
Security and Cryptography for Networks - 13th International Conference, SCN 2022, Proceedings (pp. 540-563). Springer.
https://doi.org/10.1007/978-3-031-14791-3_24
Damgård, I. B., Krøigaard, M., Ishai, Y.
, Nielsen, J. B. & Smith, A. (2008).
Scalable Multiparty Computation with Nearly Optimal Work and Resilience.
Lecture Notes in Computer Science,
5157, 241-261.
https://doi.org/10.1007/978-3-540-85174-5_14
Chakraborty, S., Ganesh, C.
, Pancholi, M. R. & Sarkar, P. (2021).
Reverse Firewalls for Adaptively Secure MPC without Setup. In M. Tibouchi & H. Wang (Eds.),
Advances in Cryptology – ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings, Part 2: 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6–10, 2021, Proceedings, Part II (pp. 335-364). Springer.
https://doi.org/10.1007/978-3-030-92075-3_12
Haagh, H., Ji, Y., Li, C.
, Orlandi, C. & Song, Y. (2017).
Revealing Encryption for Partial Ordering. In M. O’Neill (Ed.),
Cryptography and Coding - 16th IMA International Conference, IMACC 2017, Proceedings (pp. 3-22). Springer VS.
https://doi.org/10.1007/978-3-319-71045-7_1
Cascudo, I., Damgård, I., Farràs, O.
& Ranellucci, S. (2017).
Resource-Efficient OT Combiners with Active Security. In Y. Kalai & L. Reyzin (Eds.),
Theory of Cryptography - 15th International Conference, TCC 2017, Proceedings (Vol. 10678, pp. 461-486). Springer VS.
https://doi.org/10.1007/978-3-319-70503-3_15
Canetti, R., Krawczyk, H.
& Nielsen, J. B. (2003).
Relaxing Chosen-Ciphertext Security. In D. Boneh (Ed.),
Advances in Cryptology - CRYPTO 2003: 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003. Proceedings (pp. 565-582). Springer.
https://doi.org/10.1007/978-3-540-45146-4_33
Cascudo, I.
, Damgård, I., David, B. M., Döttling, N. & Nielsen, J. B. (2016).
Rate-1, linear time and additively homomorphic UC commitments. In M. Robshaw & J. Katz (Eds.),
Advances in Cryptology - 36th Annual International Cryptology Conference, CRYPTO 2016, Proceedings (Vol. 9816, pp. 179-207). Springer VS.
https://doi.org/10.1007/978-3-662-53015-3_7
Baena, J., Cabarcas, D.
, Escudero, D. E., Khathuria, K. & Verbel, J. (2018).
Rank Analysis of Cubic Multivariate Cryptosystems. In T. Lange & R. Steinwandt (Eds.),
Post-Quantum Cryptography - 9th International Conference, PQCrypto 2018, Proceedings (Vol. 10786, pp. 355-374). Springer VS.
https://doi.org/10.1007/978-3-319-79063-3_17
Gentry, C., Halevi, S.
, Magri, B., Nielsen, J. B. & Yakoubov, S. (2021).
Random-Index PIR and Applications. In K. Nissim & B. Waters (Eds.),
Theory of Cryptography : 19th International Conference, TCC 2021, Proceedings (pp. 32-61). Springer.
https://doi.org/10.1007/978-3-030-90456-2_2
Scafuro, A.
, Siniscalchi, L. & Visconti, I. (2021).
Publicly Verifiable Zero Knowledge from (Collapsing) Blockchains. In J. A. Garay (Ed.),
Public-Key Cryptography – PKC 2021: 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10–13, 2021, Proceedings, Part II (pp. 469-498). Springer Science and Business Media Deutschland GmbH.
https://doi.org/10.1007/978-3-030-75248-4_17
Baum, C., Damgård, I. B. & Orlandi, C. (2014).
Publicly Auditable Secure Multi-Party Computation. In M. Abdalla & R. D. Prisco (Eds.),
Security and Cryptography for Networks: 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings (pp. 175-196 ). Springer VS.
https://doi.org/10.1007/978-3-319-10879-7_11
Erkin, Z., Franz, M., Guajardo, J., Katzenbeisser, S., Lagendijk, I.
& Toft, T. (2009).
Privacy-Preserving Face Recognition.
Lecture Notes in Computer Science, 235-253.
https://doi.org/10.1007/978-3-642-03168-7_14