David, B. M., Dowsley, R., van der Graaf, J., Marques, D., Nascimento, A. C. A. & Pinto, A. (2015).
Unconditionally Secure, Universally Composable Privacy Preserving Linear Algebra.
I E E E Transactions on Information Forensics and Security,
11(1), 59 - 73 .
https://doi.org/10.1109/TIFS.2015.2476783
Damgård, I. B., Nielsen, J. B., Toft, T., Kiltz, E.
& Fitzi, M. (2006).
Unconditionally Secure Constant-Rounds Multi-party Computation for Equality, Comparison, Bits and Exponentiation. In S. Halevi & T. Rabin (Eds.),
Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006. Proceedings (pp. 285-304). Springer.
https://doi.org/10.1007/11681878_15
Draganov, A. A., Weber, P., Jørgensen, R. S. M., Beer, A., Plant, C.
& Assent, I. (2025).
Ultrametric Cluster Hierarchies: I Want ‘em All!.
https://neurips.cc/media/PosterPDFs/NeurIPS%202025/119173.png?t=1762960797.979475
Hansen, K. M. & Yndigegn, C. (1999).
Typed links in Webvise. Computer programme
Danvy, O. (1996).
Type-Directed Partial Evaluation. In
Conference Record of POPL'96: The 23rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, Papers Presented at the Symposium (pp. 242-257). Association for Computing Machinery.
Kondi, Y., Orlandi, C. & Roy, L. (2023).
Two-Round Stateless Deterministic Two-Party Schnorr Signatures from Pseudorandom Correlation Functions. In H. Handschuh & A. Lysyanskaya (Eds.),
Advances in Cryptology – CRYPTO 2023: 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023, Proceedings, Part I (pp. 646-677). Springer.
https://doi.org/10.1007/978-3-031-38557-5_21
Damgård, I. B., Orlandi, C., Takahashi, A. & Tibouchi, M. (2021).
Two-round n-out-of-n and Multi-Signatures and Trapdoor Commitment from Lattices. In J. A. Garay (Ed.),
Public-Key Cryptography – PKC 2021 - 24th IACR International Conference on Practice and Theory of Public Key Cryptography, 2021, Proceedings: 24rd IACR International Conference on Practice and Theory of Public-Key Cryptography, proceedings part 1 (pp. 99-130). Springer.
https://doi.org/10.1007/978-3-030-75245-3_5
Garg, S.
& Polychroniadou, A. (2015).
Two-round adaptively secure MPC from indistinguishability obfuscation. In Y. Dodis & J. Buus Nielsen (Eds.),
Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II (pp. 614-637). Springer VS.
https://doi.org/10.1007/978-3-662-46497-7_24
Brodal, G. S., Davoodi, P., Lewenstein, M., Raman, R. & Rao, S. S. (2012).
Two Dimensional Range Minimum Queries and Fibonacci Lattices.
Lecture Notes in Computer Science,
7501, 217-228 .
https://doi.org/10.1007/978-3-642-33090-2_20
Stølting Brodal, G., Davoodi, P., Lewenstein, M., Raman, R.
& Satti, S. R. (2016).
Two dimensional range minimum queries and Fibonacci lattices.
Theoretical Computer Science,
638, 33-43.
https://doi.org/10.1016/j.tcs.2016.02.016