Hall-Andersen, M. N. & Schwartzbach, N. I. (2021).
Game Theory on the Blockchain: A Model for Games with Smart Contracts. In I. Caragiannis & K. A. Hansen (Eds.),
Algorithmic Game Theory - 14th International Symposium, SAGT 2021, Proceedings: 14th International Symposium, SAGT 2021, Aarhus, Denmark, September 21–24, 2021Proceedings (pp. 156-170). Springer.
https://doi.org/10.1007/978-3-030-85947-3_11
Braun, L., Huppert, M., Khayata, N., Schneider, T. & Tkachenko, O. (2023).
FUSE - Flexible File Format and Intermediate Representation for Secure Multi-Party Computation. In J. Liu, Y. Xiang, S. Nepal & G. Tsudik (Eds.),
ASIA CCS 2023 - Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security (pp. 649-663). Association for Computing Machinery.
https://doi.org/10.1145/3579856.3590340
Ishai, Y., Patra, A., Patranabis, S.
, Ravi, D. & Srinivasan, A. (2022).
Fully-Secure MPC with Minimal Trust. In
Theory of Cryptography - 20th International Conference, TCC 2022, Proceedings (pp. 470–501). Springer.
https://doi.org/10.1007/978-3-031-22365-5_17
Ubys, L., Vancea, V. N.
, Kulik, T., Larsen, P. G., Boudjadar, J. & Aranha, D. F. (2022).
Formal Model In-The-Loop for Secure Industrial Control Networks. In
Formal Aspects of Component Software - 18th International Conference, FACS 2022, Proceedings (pp. 74-89). Springer.
https://doi.org/10.1007/978-3-031-20872-0_5
Velasquez, K., Perez Abreu, D., Assis, M. R. M., Senna, C.
, Aranha, D. F., Bittencourt, L. F., Laranjeiro, N., Curado, M., Vieira, M., Monteiro, E. & Madeira, E. (2018).
Fog orchestration for the Internet of Everything: state-of-the-art and research challenges.
Journal of Internet Services and Applications,
9(14), Article 14.
https://doi.org/10.1186/s13174-018-0086-3
Damgård, I., Jakobsen, T. P.
, Nielsen, J. B., Pagter, J. I. & Østergaard, M. B. (2022).
Fast threshold ECDSA with honest majority.
Journal of Computer Security,
30(1), 167-196.
https://doi.org/10.3233/JCS-200112
Davi Resende, A. C., Railsback, D., Dowsley, R., Nascimento, A. C. A.
& Aranha, D. F. (2022).
Fast Privacy-Preserving Text Classification based on Secure Multiparty Computation.
IEEE Transactions on Information Forensics and Security,
17, 428-442.
https://doi.org/10.1109/TIFS.2022.3144007
Davi Resende, A. C.
& Aranha, D. F. (2018).
Faster Unbalanced Private Set Intersection. In S. Meiklejohn & K. Sako (Eds.),
Financial Cryptography and Data Security - 22nd International Conference, FC 2018, Revised Selected Papers: 22nd International Conference, FC 2018, Nieuwpoort, Curaçao, February 26 – March 2, 2018, Revised Selected Papers (1 ed., pp. 203-221). Springer.
https://doi.org/10.1007/978-3-662-58387-6
Frederiksen, T. K., Jakobsen, T. P. & Nielsen, J. B. (2014).
Faster Maliciously Secure Two-Party Computation Using the GPU. In M. Abdalla & R. D. Prisco (Eds.),
Security and Cryptography for Networks: 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings (pp. 358-379 ). Springer.
https://doi.org/10.1007/978-3-319-10879-7_21
Segal, S., Adi, Y., Pinkas, B.
, Baum, C., Ganesh, C. & Keshet, J. (2021).
Fairness in the Eyes of the Data: Certifying Machine-Learning Models. In
AIES 2021 - Proceedings of the 2021 AAAI/ACM Conference on AI, Ethics, and Society (pp. 926-935). Association for Computing Machinery.
https://doi.org/10.1145/3461702.3462554
Nielsen, P. M.
, Schori, C., Sørensen, J. L., Salvail, L., Damgård, I. B. & Polzik, E. S. (2001).
Experimental quantum key distribution with proven security against realistic attacks.
Journal of Modern Optics,
48, 1921-1942.
Hansen, K. M., Antolin Rafael, P., Camara, J., Carro, S., Metha, G., Rosengren, P.
, Pagter, J. I. & Pedersen, M. Ø. (2005).
eu-DOMAIN D3.1 + D4.1 Software Architecture Specification.
Boyle, E., Couteau, G., Gilboa, N., Ishai, Y., Kohl, L.
& Scholl, P. (2020).
Efficient pseudorandom correlation generators from ring-lpn. In D. Micciancio & T. Ristenpart (Eds.),
Advances in Cryptology - CRYPTO 2020 (pp. 387-416). Springer.
https://doi.org/10.1007/978-3-030-56880-1_14