Damgård, I., Luo, J.
, Oechsner, S., Scholl, P. & Simkin, M. (2018).
Compact Zero-Knowledge Proofs of Small Hamming Weight. In M. Abdalla & R. Dahab (Eds.),
Public-Key Cryptography - PKC 2018 (Vol. 10770, pp. 530-560). Springer VS. Lecture Notes in Computer Science (LNCS) No. 10770
https://doi.org/10.1007/978-3-319-76581-5_18
Damgård, I., Kazana, T.
, Obremski, M., Raj, V. & Siniscalchi, L. (2018).
Continuous NMC Secure Against Permutations and Overwrites, with Applications to CCA Secure Commitments. In A. Beimel & S. Dziembowski (Eds.),
Theory of Cryptography (Vol. 11240, pp. 225-254). Springer VS. Lecture Notes in Computer Science (LNCS) No. 11240
https://doi.org/10.1007/978-3-030-03810-6_9
Fleischhacker, N., Krupp, J., Malavolta, G., Schneider, J., Schröder, D.
& Simkin, M. (2018).
Efficient unlinkable sanitizable signatures from signatures with re-randomizable keys.
IET Information Security,
12(3), 166-183.
https://doi.org/10.1049/iet-ifs.2017.0041
Velasquez, K., Perez Abreu, D., Assis, M. R. M., Senna, C.
, Aranha, D. F., Bittencourt, L. F., Laranjeiro, N., Curado, M., Vieira, M., Monteiro, E. & Madeira, E. (2018).
Fog orchestration for the Internet of Everything: state-of-the-art and research challenges.
Journal of Internet Services and Applications,
9(14).
https://doi.org/10.1186/s13174-018-0086-3
Baum, C., Damgård, I., Lyubashevsky, V.
, Oechsner, S. & Peikert, C. (2018).
More Efficient Commitments from Structured Lattice Assumptions. In D. Catalano & R. De Prisco (Eds.),
Security and Cryptography for Networks (Vol. 11035, pp. 368-385). Springer VS. Lecture Notes in Computer Science (LNCS) No. 11035
https://doi.org/10.1007/978-3-319-98113-0_20
Matias, P., Y. S. Barbosa, P., N. C. Cardoso, T., Mariano, D.
& Aranha, D. F. (2018).
NIZKCTF: A Non-Interactive Zero-Knowledge Capture the Flag Platform.
IEEE Security & Privacy,
16(6), 42-51.
https://doi.org/10.1109/MSEC.2018.2875324
Baena, J., Cabarcas, D.
, Escudero, D. E., Khathuria, K. & Verbel, J. (2018).
Rank Analysis of Cubic Multivariate Cryptosystems. In T. Lange & R. Steinwandt (Eds.),
Post-Quantum Cryptography (Vol. 10786, pp. 355-374). Springer VS. Lecture Notes in Computer Science (LNCS) No. 10786
https://doi.org/10.1007/978-3-319-79063-3_17
Cramer, R.
, Damgård, I., Escudero, D., Scholl, P. & Xing, C. (2018).
SPDΖ2k: Efficient MPC mod 2k for Dishonest Majority. In H. Shacham & A. Boldyreva (Eds.),
Advances in Cryptology - CRYPTO 2018 (Vol. 10992, pp. 769-798). Springer VS. Lecture Notes in Computer Science (LNCS) No. 10992
https://doi.org/10.1007/978-3-319-96881-0_26
Baum, C., Lyubashevsky, V., Groth, J., Bootle, J., Cerulli, A. & del Pino, R. (2018).
Sub-Linear Lattice-Based Zero-Knowledge Arguments for Arithmetic Circuits. In
CRYPTO 2018: Advances in Cryptology https://doi.org/10.1007/978-3-319-96881-0_23
Oliveira, L. B., Pereira, F. M. Q., Misoczki, R.
, Aranha, D. F., Borges, F., Nogueira, M., Wangham, M., Wu, M. & Liu, J. (2018).
The computer for the 21st century: present security & privacy challenges.
Journal of Internet Services and Applications,
9(24).
https://doi.org/10.1186/s13174-018-0095-2
Jensen, C. (Ed.), Lind Olsen, E. (Ed.)
, Mikkelsen, G. L., Syberg , L.
, Nielsen, L. L., Hansen, M. A. E., Hjortlund, M.
, Madsen, O. L., Høngaard Andersen, P. & Duvold, T. (2018).
The future market for cybersecurity in Denmark.
Baum, C., Lin, H.
& Oechsner, S. (2018).
Towards Practical Lattice-Based One-Time Linkable Ring Signatures. In D. Naccache, S. Xu, S. Qing, P. Samarati, G. Blanc, R. Lu, Z. Zhang & A. Meddahi (Eds.),
Information and Communications Security: ICICS 2018 (Vol. 11149, pp. 303-322). Springer VS. Lecture Notes in Computer Science (LNCS) No. 11149
https://doi.org/10.1007/978-3-030-01950-1_18
Faz-Hernandez, A., Fujii, H.
, Aranha, D. F. & Lopez, J. (2017).
A Secure and Efficient Implementation of the Quotient Digital Signature Algorithm (qDSA). In S. S. Ali, J-L. Danger & T. Eisenbarth (Eds.),
Security, Privacy, and Applied Cryptography Engineering: 7th International Conference, SPACE 2017, Goa, India, December 13-17, 2017, Proceedings (pp. 170-189). Springer. Lecture Notes in Computer Science Vol. 10662 Security and Cryptology Vol. 10662
https://doi.org/10.1007/978-3-319-71501-8_10
Fuchsbauer, G., Gay, R., Kowalczyk, L.
& Orlandi, C. (2017).
Access Control Encryption for Equality, Comparison, and More. In S. Fehr (Ed.),
Public-Key Cryptography – PKC 2017 - 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings: 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part II (Vol. 10175, pp. 88-118). Springer VS. Lecture Notes in Computer Science Vol. 10175
https://doi.org/10.1007/978-3-662-54388-7_4
Coron, J-S.
& Nielsen, J. B. (Eds.) (2017).
Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part I. In J-S. Coron & J. Buus Nielsen (Eds.),
Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part I (Vol. 10210). Springer VS. Lecture Notes in Computer Science Vol. 10210
https://doi.org/10.1007/978-3-319-56620-7
Coron, J-S.
& Nielsen, J. B. (Eds.) (2017).
Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part II. In J-S. Coron & J. Buus Nielsen (Eds.),
Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part II (Vol. 10211). Springer VS. Lecture Notes in Computer Science Vol. 10211
https://doi.org/10.1007/978-3-319-56614-6
Coron, J-S.
& Nielsen, J. B. (Eds.) (2017).
Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part III. In J-S. Coron & J. Buus Nielsen (Eds.),
Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part III (Vol. 10212). Springer VS. Lecture Notes in Computer Science Vol. 10212
https://doi.org/10.1007/978-3-319-56617-7
Damgård, I., Damgård, K., Nielsen, K.
, Nordholt, P. S. & Toft, T. (2017).
Confidential benchmarking based on multiparty computation. In J. Grossklags & B. Preneel (Eds.),
Financial Cryptography and Data Security - 20th International Conference, FC 2016, Revised Selected Papers (Vol. 9603 LNCS, pp. 169-187). Springer VS. Lecture Notes in Computer Science Vol. 9603
https://doi.org/10.1007/978-3-662-54970-4_10
Aranha, D. F., Azarderakhsh, R. & Karabina, K. (2017).
Efficient Software Implementation of Laddering Algorithms Over Binary Elliptic Curves. In S. S. Ali, J-L. Danger & T. Eisenbarth (Eds.),
Security, Privacy, and Applied Cryptography Engineering: 7th International Conference, SPACE 2017, Goa, India, December 13-17, 2017, Proceedings (pp. 74-92). Springer. Lecture Notes in Computer Science Vol. 10662 Security and Cryptology Vol. 10662
https://doi.org/10.1007/978-3-319-71501-8_5
Cramer, R.
, Damgård, I., Döttling, N., Giacomelli, I. & Xing, C. (2017).
Linear-Time Non-Malleable Codes in the Bit-Wise Independent Tampering Model. In J. Shikata (Ed.),
Information Theoretic Security - 10th International Conference, ICITS 2017, Proceedings (Vol. 10681, pp. 1-25). Springer VS. Lecture Notes in Computer Science Vol. 10681
https://doi.org/10.1007/978-3-319-72089-0_1
Ghosh, S., Nielsen, J. B. & Nilges, T. (2017).
Maliciously Secure Oblivious Linear Function Evaluation with Constant Overhead. In T. Takagi & T. Peyrin (Eds.),
Advances in Cryptology -- ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I (Vol. 10624, pp. 629-659). Springer VS. Lecture Notes in Computer Science Vol. 10624
https://doi.org/10.1007/978-3-319-70694-8_22