Baum, C., Damgård, I. B., Larsen, K. G. & Nielsen, M. (2016).
How to prove knowledge of small secrets. In J. Katz & M. Robshaw (Eds.),
Advances in Cryptology - 36th Annual International Cryptology Conference, CRYPTO 2016, Proceedings: CRYPTO 2016: Advances in Cryptology – CRYPTO 2016 (Vol. 9816, pp. 478-498). Springer VS.
https://doi.org/10.1007/978-3-662-53015-3_17
Kohlweiss, M.
, Pancholi, M. R. & Takahashi, A. (2023).
How to Compile Polynomial IOP into Simulation-Extractable SNARKs: A Modular Approach. In G. Rothblum & H. Wee (Eds.),
Theory of Cryptography: Book Subtitle 21st International Conference, TCC 2023, Taipei, Taiwan, November 29–December 2, 2023, Proceedings, Part III (pp. 486–512). Springer.
https://doi.org/10.1007/978-3-031-48621-0_17
Damgård, I. B., Goldreich, O., Okamoto, T. & Wigderson, A. (1995).
Honest Verifier vs Dishonest Verifier in Public Coin Zero-Knowledge Proofs. In D. Coppersmith (Ed.),
Advances in Cryptology - CRYPT0' 95: 15th Annual International Cryptology Conference Santa Barbara, California, USA, August 27-31, 1995 Proceedings (pp. 325-338). Springer.
https://doi.org/10.1007/3-540-44750-4_26
Burra, S. S., Larraia, E.
, Nielsen, J. B., Nordholt, P. S.
, Orlandi, C., Orsini, E., Scholl, P. & Smart, N. P. (2015).
High Performance Multi-Party Computation for Binary Circuits Based on Oblivious Transfer.
http://eprint.iacr.org/2015/472
Burra, S. S., Larraia, E.
, Nielsen, J. B., Nordholt, P. S.
, Orlandi, C., Orsini, E.
, Scholl, P. & Smart, N. P. (2021).
High-Performance Multi-party Computation for Binary Circuits Based on Oblivious Transfer.
Journal of Cryptology,
34(3), Article 34.
https://doi.org/10.1007/s00145-021-09403-1
Lindell, Y., Nissim, K.
& Orlandi, C. (2013).
Hiding the Input-Size in Secure Two-Party Computation. In K. Sako & P. Sarkar (Eds.),
Advances in Cryptology - ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II (Vol. 8197, pp. 421-440). Springer VS.
https://doi.org/10.1007/978-3-642-41019-2_6
Aranha, D. F., Fouque, P.-A., Gerard, B., Kammerer, J.-G., Tibouchi, M. & Zapalowicz, J.-C. (2014).
GLV/GLS Decomposition, Power Analysis, and Attacks on ECDSA Signatures with Single-Bit Nonce Bias. In P. Sarkar & T. Iwata (Eds.),
Advances in Cryptology – ASIACRYPT 2014 (pp. 262-281). Springer.
https://doi.org/10.1007/978-3-662-45611-8_14
Hall-Andersen, M. N. & Schwartzbach, N. I. (2021).
Game Theory on the Blockchain: A Model for Games with Smart Contracts. In I. Caragiannis & K. A. Hansen (Eds.),
Algorithmic Game Theory - 14th International Symposium, SAGT 2021, Proceedings: 14th International Symposium, SAGT 2021, Aarhus, Denmark, September 21–24, 2021Proceedings (pp. 156-170). Springer.
https://doi.org/10.1007/978-3-030-85947-3_11
Braun, L., Huppert, M., Khayata, N., Schneider, T. & Tkachenko, O. (2023).
FUSE - Flexible File Format and Intermediate Representation for Secure Multi-Party Computation. In J. Liu, Y. Xiang, S. Nepal & G. Tsudik (Eds.),
ASIA CCS 2023 - Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security (pp. 649-663). Association for Computing Machinery.
https://doi.org/10.1145/3579856.3590340
Ishai, Y., Patra, A., Patranabis, S.
, Ravi, D. & Srinivasan, A. (2022).
Fully-Secure MPC with Minimal Trust. In
Theory of Cryptography - 20th International Conference, TCC 2022, Proceedings (pp. 470–501). Springer.
https://doi.org/10.1007/978-3-031-22365-5_17
Ubys, L., Vancea, V. N., Kulik, T.
, Larsen, P. G., Boudjadar, J. & Aranha, D. F. (2022).
Formal Model In-The-Loop for Secure Industrial Control Networks. In
Formal Aspects of Component Software - 18th International Conference, FACS 2022, Proceedings (pp. 74-89). Springer.
https://doi.org/10.1007/978-3-031-20872-0_5
Velasquez, K., Perez Abreu, D., Assis, M. R. M., Senna, C.
, Aranha, D. F., Bittencourt, L. F., Laranjeiro, N., Curado, M., Vieira, M., Monteiro, E. & Madeira, E. (2018).
Fog orchestration for the Internet of Everything: state-of-the-art and research challenges.
Journal of Internet Services and Applications,
9(14), Article 14.
https://doi.org/10.1186/s13174-018-0086-3
Damgård, I., Jakobsen, T. P.
, Nielsen, J. B., Pagter, J. I. & Østergaard, M. B. (2022).
Fast threshold ECDSA with honest majority.
Journal of Computer Security,
30(1), 167-196.
https://doi.org/10.3233/JCS-200112
Davi Resende, A. C., Railsback, D., Dowsley, R., Nascimento, A. C. A.
& Aranha, D. F. (2022).
Fast Privacy-Preserving Text Classification based on Secure Multiparty Computation.
IEEE Transactions on Information Forensics and Security,
17, 428-442.
https://doi.org/10.1109/TIFS.2022.3144007
Davi Resende, A. C.
& Aranha, D. F. (2018).
Faster Unbalanced Private Set Intersection. In S. Meiklejohn & K. Sako (Eds.),
Financial Cryptography and Data Security - 22nd International Conference, FC 2018, Revised Selected Papers: 22nd International Conference, FC 2018, Nieuwpoort, Curaçao, February 26 – March 2, 2018, Revised Selected Papers (1 ed., pp. 203-221). Springer.
https://doi.org/10.1007/978-3-662-58387-6