Abram, D., Beimel, A., Ishai, Y., Kushilevitz, E. & Narayanan, V. (2023).
Cryptography from Planted Graphs: Security with Logarithmic-Size Messages. Paper presented at Theory of Cryptography. TCC 2023, Taipei, Taiwan.
Zhu, Y., Honnet, C., Kang, Y., Zhu, J., Zheng, A. J., Heinz, K., Tang, G., Musk, L.
, Wessely, M. & Mueller, S. (2023).
Demonstration of ChromoCloth: Re-Programmable Multi-Color Textures through Flexible and Portable Light Source. In
UIST 2023 Adjunct - Adjunct Proceedings of the 36th Annual ACM Symposium on User Interface Software and Technology Article 73 Association for Computing Machinery.
https://doi.org/10.1145/3586182.3615811
Green, M.
, Hall-Andersen, M. N., Hennenfent, E., Kaptchuk, G., Perez, B. & Van Laer, G. (2023).
Efficient Proofs of Software Exploitability for Real-world Processors.
Proceedings on Privacy Enhancing Technologies,
2023(1), 627-640.
https://doi.org/10.56553/popets-2023-0036
Boudgoust, K., Jeudy, C., Roux-Langlois, A. & Wen, W. (2023).
Entropic Hardness of Module-LWE from Module-NTRU. In T. Isobe & S. Sarkar (Eds.),
Progress in Cryptology – INDOCRYPT 2022: 23rd International Conference on Cryptology in India, Kolkata, India, December 11–14, 2022, Proceedings (pp. 78-99). Springer.
https://doi.org/10.1007/978-3-031-22912-1_4
Müller, M., Schuster, P.
, Starup, J. L., Ostermann, K. & Brachthäuser, J. I. (2023).
From Capabilities to Regions: Enabling Efficient Compilation of Lexical Effect Handlers.
Proceedings of the ACM on Programming Languages ,
7(OOPSLA2), Article 255.
https://doi.org/10.1145/3622831
Braun, L., Huppert, M., Khayata, N., Schneider, T. & Tkachenko, O. (2023).
FUSE - Flexible File Format and Intermediate Representation for Secure Multi-Party Computation. In J. Liu, Y. Xiang, S. Nepal & G. Tsudik (Eds.),
ASIA CCS 2023 - Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security (pp. 649-663). Association for Computing Machinery.
https://doi.org/10.1145/3579856.3590340
Schäfer, Z., Mathisen, A., Thomsen, T. R., Rossing, P. & Kirketerp-Møller, K. (2023).
Glucagon-like peptide-1 treatment reduces the risk of diabetes-type 2 related amputations: A cohort study in Denmark.
Diabetes Research and Clinical Practice,
202, Article 110799.
https://doi.org/10.1016/j.diabres.2023.110799
Hermanns, J., Skitsas, K., Tsitsulin, A., Munkhoeva, M., Kyster, A., Nielsen, S., Bronstein, A. M.
, Mottin, D. & Karras, P. (2023).
GRASP: Scalable Graph Alignment by Spectral Corresponding Functions.
ACM Transactions on Knowledge Discovery from Data,
17(4), 1-26. Article 50.
https://doi.org/10.1145/3561058
Kohlweiss, M.
, Pancholi, M. R. & Takahashi, A. (2023).
How to Compile Polynomial IOP into Simulation-Extractable SNARKs: A Modular Approach. In G. Rothblum & H. Wee (Eds.),
Theory of Cryptography: Book Subtitle 21st International Conference, TCC 2023, Taipei, Taiwan, November 29–December 2, 2023, Proceedings, Part III (pp. 486–512). Springer.
https://doi.org/10.1007/978-3-031-48621-0_17
Fleischhacker, N.
, Larsen, K. G. & Simkin, M. (2023).
How to Compress Encrypted Data. In C. Hazay & M. Stam (Eds.),
Advances in Cryptology – EUROCRYPT 2023: 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part I (pp. 551-577). Springer.
https://doi.org/10.1007/978-3-031-30545-0_19
Abdrabou, Y., Mecke, L., Rivu, R., Prange, S., Nguyen, Q. D., Voigt, V., Alt, F.
& Pfeuffer, K. (2023).
How Unique do we Move? Understanding the Human Body and Context Factors for User Identification. In M. Stolze, F. Loch, M. Baldauf, F. Alt, C. Schneegass, T. Kosch, T. Hirzle, S. Sadeghian, F. Draxler, K. Bektas, K. Lohan & P. Knierim (Eds.),
Proceedings of Mensch Und Computer 2023 (pp. 127-137). Association for Computing Machinery.
https://doi.org/10.1145/3603555.3603574
Burkhardt, J., Damgård, I., Frederiksen, T. K., Orlandi, C. & Ghosh, S. (2023).
Improved Distributed RSA Key Generation Using the Miller-Rabin Test. In W. Meng, C. D. Jensen, C. Cremers & E. Kirda (Eds.),
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security (pp. 2501-2515). Association for Computing Machinery.
https://doi.org/10.1145/3576915.3623163
Rao, X.
, Georges, A. L., Legoupil, M., Watt, C.
, Pichon-Pharabod, J., Gardner, P.
& Birkedal, L. (2023).
Iris-Wasm: Robust and Modular Verification of WebAssembly Programs.
Proceedings of the ACM on Programming Languages ,
7, Article 151.
https://doi.org/10.1145/3591265