B. S. Reis, T.
, Aranha, D. F. & Lopez, J. (2017).
PRESENT Runs Fast: Efficient and Secure Implementation in Software. In W. Fischer & N. Homma (Eds.),
Cryptographic Hardware and Embedded Systems – CHES 2017: 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings (pp. 644-664). Springer. Lecture Notes in Computer Science Vol. 10529 Security and Cryptology Vol. 10529
https://doi.org/10.1007/978-3-319-66787-4_31
Chase, M., Derler, D., Goldfeder, S.
, Orlandi, C., Ramacher, S., Rechberger, C., Slamanig, D. & Zaverucha, G. (2017).
Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives. In
CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (pp. 1825-1842). Association for Computing Machinery. CCS '17
https://doi.org/10.1145/3133956.3133997
Hallgren, P. A.
, Orlandi, C. & Sabelfeld, A. (2017).
PrivatePool: Privacy-Preserving Ridesharing. In
30th IEEE Computer Security Foundations Symposium, CSF 2017, Santa Barbara, CA, USA, August 21-25, 2017 (pp. 276-291). IEEE Press.
https://doi.org/10.1109/CSF.2017.24
Cascudo, I., Damgård, I., Farràs, O.
& Ranellucci, S. (2017).
Resource-Efficient OT Combiners with Active Security. In Y. Kalai & L. Reyzin (Eds.),
Theory of Cryptography - 15th International Conference, TCC 2017, Proceedings (Vol. 10678, pp. 461-486). Springer VS. Lecture Notes in Computer Science Vol. 10678
https://doi.org/10.1007/978-3-319-70503-3_15
Haagh, H., Ji, Y., Li, C.
, Orlandi, C. & Song, Y. (2017).
Revealing Encryption for Partial Ordering. In M. O’Neill (Ed.),
Cryptography and Coding - 16th IMA International Conference, IMACC 2017, Proceedings (pp. 3-22). Springer VS. Lecture Notes in Computer Science Vol. 10655
https://doi.org/10.1007/978-3-319-71045-7_1
Applebaum, B.
, Damgård, I., Ishai, Y.
, Nielsen, M. & Zichron, L. (2017).
Secure Arithmetic Computation with Constant Computational Overhead. In H. Shacham & J. Katz (Eds.),
Advances in Cryptology – CRYPTO 2017 - 37th Annual International Cryptology Conference, Proceedings (Vol. 10401, pp. 223-254). Springer VS. Lecture Notes in Computer Science Vol. 10401
https://doi.org/10.1007/978-3-319-63688-7_8
Oliveira, L. B., Quintao Pereira, F. M., Misoczki, R.
, Aranha, D. F., Borges, F. & Liu, J. (2017).
The Computer for the 21st Century: Security & Privacy Challenges After 25 Years. In
2017 26th International Conference on Computer Communication and Networks (ICCCN) IEEE.
https://doi.org/10.1109/ICCCN.2017.8038394
Damgård, I., Nielsen, J. B., Nielsen, M. & Ranellucci, S. (2017).
The tinytable protocol for 2-party secure computation, or: Gate-scrambling revisited. In J. Katz & H. Shacham (Eds.),
Advances in Cryptology – CRYPTO 2017 - 37th Annual International Cryptology Conference, Proceedings (Vol. 10401, pp. 167-187). Springer VS. Lecture Notes in Computer Science Vol. 10401
https://doi.org/10.1007/978-3-319-63688-7_6
Maia Neto, A. L., Souza, A. L. F., Cunha, I., Nogueira, M., Oliveira Nunes, I., Cotta, L., Gentille, N., Loureido, A. A. F.
, Aranha, D. F., Kupwade Patil, H. & Oliveira, L. B. (2016).
AoT: Authentication and Access Control for the Entire IoT Device Life-Cycle. In
Proceeding SenSys '16 Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems CD-ROM (pp. 1-15). ACM.
https://doi.org/10.1145/2994551.2994555
Nielsen, J. B. & Orlandi, C. (2016).
Cross and Clean: Amortized Garbled Circuits with Constant Overhead. In M. Hirt & A. Smith (Eds.),
Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part I (Vol. 9985, pp. 582-603). Springer VS. Lecture Notes in Computer Science (LNCS) Vol. 9985
https://doi.org/10.1007/978-3-662-53641-4_22
Bai, G.
, Damgård, I., Orlandi, C. & Xia, Y. (2016).
Non-Interactive Verifiable Secret Sharing for Monotone Circuits. In D. Pointcheval, A. Nitaj & T. Rachidi (Eds.),
Progress in Cryptology - AFRICACRYPT 2016 - 8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedings (Vol. 9646, pp. 225-244). Springer VS. Lecture Notes in Computer Science (LNCS) Vol. 9646
https://doi.org/10.1007/978-3-319-31517-1_12
Ben-Sasson, E., Ben-Tov, I.
, Damgård, I., Ishai, Y. & Ron-Zewi, N. (2016).
On public key encryption from noisy codewords. In
Public-Key Cryptography – PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings (Vol. 9615, pp. 417-446). Springer VS. Lecture Notes in Computer Science Vol. 9615
https://doi.org/10.1007/978-3-662-49387-8_16
Polychroniadou, A., Damgård, I. B., Garg, S., Mukherjee, P.
, Nielsen, J. B. & Pandey, O. (2016).
On the Communication and Round Complexity of Secure Computation. Institut for Datalogi, Aarhus Universitet.
http://cs.au.dk/fileadmin/user_upload/IvanFest_AP.pdf
Cascudo, I.
, Damgård, I., David, B. M., Döttling, N. & Nielsen, J. B. (2016).
Rate-1, linear time and additively homomorphic UC commitments. In M. Robshaw & J. Katz (Eds.),
Advances in Cryptology - 36th Annual International Cryptology Conference, CRYPTO 2016, Proceedings (Vol. 9816, pp. 179-207). Springer VS. Lecture Notes in Computer Science Vol. 9816
https://doi.org/10.1007/978-3-662-53015-3_7
Faust, S., Hazay, C.
, Nielsen, J. B., Nordholt, P. S. & Zottarel, A. (2016).
Signature Schemes Secure Against Hard-to-Invert Leakage.
Journal of Cryptology,
29(2), 422-455.
https://doi.org/10.1007/s00145-015-9197-1
Aranha, D. F., J. Dominguez Perez, L., Mrabet, A. & Swchabe, P. (2016).
Software Implementation. In N. El Mrabet & M. Joye (Eds.),
Guide to Pairing-Based Cryptography Chapman & Hall/CRC.
Faust, S.
, Mukherjee, P., Nielsen, J. B. & Venturi, D. (2015).
A Tamper and Leakage Resilient von Neumann Architecture. In J. Katz (Ed.),
Public-Key Cryptography, PKC 2015: 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 -- April 1, 2015, Proceedings (pp. 579-603). Springer VS. Lecture Notes in Computer Science Vol. 9020
https://doi.org/10.1007/978-3-662-46447-2_26
Cascudo Pueyo, I., Damgård, I. B., David, B. M., Giacomelli, I., Nielsen, J. B. & Trifiletti, R. (2015).
Additively Homomorphic UC commitments with Optimal Amortized Overhead. In J. Katz (Ed.),
Public-Key Cryptography, PKC 2015: 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30-April 1, 2015, Proceedings (pp. 495–515). Springer. Lecture Notes in Computer Science Vol. 9020
https://doi.org/10.1007/978-3-662-46447-2_22