Dalskov, A. P. K., Orlandi, C., Keller, M., Shrishak, K. & Shulman, H. (2020).
Securing DNSSEC Keys via Threshold ECDSA from Generic MPC. In L. Chen, S. Schneider, N. Li & K. Liang (Eds.),
European Symposium on Research in Computer Security : Computer Security – ESORICS 2020 (Vol. I, pp. 654-673). Springer. Lecture Notes in Computer Science Vol. 12309
https://doi.org/10.1007/978-3-030-59013-0_32
Fehér, M., Yazdani, N., Aranha, D. F., Lucani Rötter, D. E., Hansen, M. T. & Vester, F. E. (2020).
Side Channel Security of Smart Meter Data Compression Techniques. In
2020 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm): Proceedings IEEE.
https://doi.org/10.1109/SmartGridComm47815.2020.9302931
Damgård, I., Haagh, H., Mercer, R.
, Nitulescu, A., Orlandi, C. & Yakoubov, S. (2020).
Stronger Security and Constructions of Multi-designated Verifier Signatures. In R. Pass & K. Pietrzak (Eds.),
Theory of Cryptography: Proceedings (Vol. II, pp. 229-260). Springer. Lecture Notes in Computer Science Vol. 12551
https://doi.org/10.1007/978-3-030-64378-2_9
Eerikson, H.
, Keller, M., Orlandi, C., Pullonen, P., Puura, J.
& Simkin, M. (2020).
Use your brain! Arithmetic 3PC for any modulus with active security. In Y. T. Kalai, A. D. Smith & D. Wichs (Eds.),
1st Conference on Information-Theoretic Cryptography (ITC 2020) [5] Schloss Dagstuhl--Leibniz-Zentrum für Informatik. Leibniz International Proceedings in Informatics, LIPIcs Vol. 163
https://doi.org/10.4230/LIPIcs.ITC.2020.5
Baum, C., Cozzo, D. & P. Smart, N. (2020).
Using TopGear in Overdrive: A more efficient ZKPoK for SPDZ. In K. G. Paterson & D. Stebila (Eds.),
Selected Areas in Cryptography - SAC 2019: 26th International Conference, Waterloo, ON, Canada, August 12–16, 2019, Revised Selected Papers (pp. 274-302). Springer. Lecture Notes in Computer Science Vol. 11959
https://doi.org/10.1007/978-3-030-38471-5_12
Abspoel, M., Cramer, R.
, Damgård, I. B., Escudero Ospina, D. E. & Yuan, C. (2019).
Efficient Information-Theoretic Secure Multiparty Computation over Z/p^k Z via Galois Rings. In D. Hofheinz & A. Rosen (Eds.),
Theory of Cryptography: Proceedings (Vol. Part 1, pp. 471-501). Springer. Lecture Notes in Computer Science Vol. 11891
https://doi.org/10.1007/978-3-030-36030-6_19
Boyle, E., Couteau, G., Gilboa, N., Ishai, Y., Kohl, L.
& Scholl, P. (2019).
Efficient Pseudorandom Correlation Generators: Silent OT Extension and More. In A. Boldyreva & D. Micciancio (Eds.),
Advances in Cryptology: CRYPTO 2019 (Vol. 11694, pp. 489-518). Springer. Lecture Notes in Computer Science
https://doi.org/10.1007/978-3-030-26954-8_16
Hazay, C., Mikkelsen, G. L., Rabin, T., Toft, T. & Nicolosi, A. A. (2019).
Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting.
Journal of Cryptology,
32(2), 265-323.
https://doi.org/10.1007/s00145-017-9275-7
Boyle, E., Couteau, G., Gilboa, N., Ishai, Y., Kohl, L., Rindal, P.
& Scholl, P. (2019).
Efficient Two-Round OT Extension and Silent Non-Interactive Secure Computation. In L. Cavallaro, J. Kinder, X. Wang & J. Katz (Eds.),
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS 2019, London, UK, November 11-15, 2019 (pp. 291-308). Association for Computing Machinery.
https://doi.org/10.1145/3319535.3354255
Cascudo, I.
, Damgård, I., David, B., Döttling, N., Dowsley, R. & Giacomelli, I. (2019).
Efficient UC Commitment Extension with Homomorphism for Free (and Applications). In S. D. Galbraith & S. Moriai (Eds.),
Advances in Cryptology – ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings (pp. 606-635). Springer. Lecture Notes in Computer Science Vol. 11922
https://doi.org/10.1007/978-3-030-34621-8_22
Damgård, I. B., Escudero Ospina, D. E., Frederiksen, T. K., Keller, M.
, Scholl, P. & Volgushev, N. (2019).
New Primitives for Actively-Secure MPC over Rings with Applications to Private Machine Learning. In
2019 IEEE Symposium on Security and Privacy (SP) IEEE.
https://doi.org/10.1109/SP.2019.00078
Aggarwal, D.
, Damgård, I., Nielsen, J. B., Obremski, M., Purwanto, E., Ribeiro, J.
& Simkin, M. (2019).
Stronger leakage-resilient and non-malleable secret sharing schemes for general access structures. In A. Boldyreva & D. Micciancio (Eds.),
Advances in Cryptology – CRYPTO 2019 : 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings (Vol. II, pp. 510-539). Springer. Lecture Notes in Computer Science Vol. 11693
https://doi.org/10.1007/978-3-030-26951-7_18
Pagnin, E., Gunnarsson, G., Talebi, P.
, Orlandi, C. & Sabelfeld, A. (2019).
TOPPool: Time-aware Optimized Privacy-Preserving Ridesharing.
Proceedings on Privacy Enhancing Technologies,
2019(4), 93-111.
https://doi.org/10.2478/popets-2019-0060
Ghosh, S. & Simkin, M. (2019).
The Communication Complexity of Threshold Private Set Intersection. In A. Boldyreva & D. Micciancio (Eds.),
Advances in Cryptology – CRYPTO 2019: 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings (Vol. II, pp. 3-29). Springer. Lecture Notes in Computer Science Vol. 11693
https://doi.org/10.1007/978-3-030-26951-7_1
Aranha, D. F., Barbosa, P. Y. S., Cardoso, T. N. C., Araújo, C. L. & Matias, P. (2019).
The return of software vulnerabilities in the Brazilian voting machine.
Computers & Security,
86, 335-349.
https://doi.org/10.1016/j.cose.2019.06.009