Boyle, E., Couteau, G., Gilboa, N., Ishai, Y., Kohl, L.
& Scholl, P. (2020).
Efficient pseudorandom correlation generators from ring-lpn. In D. Micciancio & T. Ristenpart (Eds.),
Advances in Cryptology - CRYPTO 2020 (pp. 387-416). Springer. Lecture Notes in Computer Science Vol. 12171
https://doi.org/10.1007/978-3-030-56880-1_14
Tzavelis, N., Giannakopoulos, I., Johansen, R. Q., Doka, K., Koziris, N.
& Karras, P. (2020).
Fair Procedures for Fair Stable Marriage Outcomes. In
Proceedings of the AAAI Conference on Artificial Intelligence (Vol. 34, no. 5, pp. 7269-7276). AAAI Press.
https://doi.org/10.1609/aaai.v34i05.6218
Barthe, G., Blazy, S., Grégoire, B., Hutin, R., Laporte, V., Pichardie, D.
& Trieu, A. (2020).
Formal Verification of a Constant-Time Preserving C Compiler.
Proceedings of the ACM on Programming Languages,
4(POPL), [7].
https://doi.org/10.1145/3371075
Zhang, K., Zhou, J., Tao, D.
, Karras, P., Li, Q.
& Xiong, H. (2020).
Geodemographic Influence Maximization. In
KDD '20: Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining (pp. 2764-2774). Association for Computing Machinery.
https://doi.org/10.1145/3394486.3403327
Campanelli, M., Fiore, D., Greco, N., Kolonelos, D. & Nizzardo, L. (2020).
Incrementally Aggregatable Vector Commitments and Applications to Verifiable Decentralized Storage. In S. Moriai & H. Wang (Eds.),
Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings (pp. 3-35). Springer. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 12492 LNCS
https://doi.org/10.1007/978-3-030-64834-3_1
Abel, A., Cockx, J., Devriese, D.
, Timany, A. & Wadler, P. (2020).
Leibniz equality is isomorphic to Martin-Löf identity, parametrically.
Journal of Functional Programming,
30, [e17].
https://doi.org/10.1017/S0956796820000155
Deuber, D., Döttling, N.
, Magri, B., Malavolta, G. & Thyagarajan, S. A. K. (2020).
Minting Mechanism for Proof of Stake Blockchains. In M. Conti, J. Zhou, E. Casalicchio & A. Spognardi (Eds.),
Applied Cryptography and Network Security (pp. 315-334). Springer. Lecture Notes in Computer Science Vol. 12146
https://doi.org/10.1007/978-3-030-57808-4_16
Birkedal, L., Clouston, R., Mannaa, B., Ejlers Møgelberg, R., Pitts, A. M.
& Spitters, B. (2020).
Modal dependent type theory and dependent right adjoints.
Mathematical Structures in Computer Science,
30(2), 118-138.
https://doi.org/10.1017/S0960129519000197