_id,doi,title
11476,10.1007/978-3-031-07085-3_28,CoCoA: Concurrent continuous group key agreement
9466,10.1007/978-3-030-75245-3_3,The convergence of slide-type reductions
10035,10.15479/at:ista:10035,On the adaptive security of graph-based games
10041,10.1007/978-3-030-84245-1_17,"Limits on the Adaptive Security of Yao’s Garbling"
10044,,"On treewidth, separators and Yao's garbling"
10049,10.1109/sp40001.2021.00035,"Keep the dirt: tainted TreeKEM, adaptively and actively secure continuous group key agreement"
10407,10.1007/978-3-030-90453-1_14,Trojan-resilience without cryptography
10408,10.1007/978-3-030-90456-2_8,Grafting key trees: Efficient key management for overlapping groups
10409,10.1007/978-3-030-90453-1_17,"On treewidth, separators and Yao’s garbling"
10410,10.1007/978-3-030-90453-1_19,The cost of adaptivity in security games on graphs
10609,10.1007/978-3-030-92075-3_12,Reverse firewalls for adaptively secure MPC without setup
9826,10.1007/978-3-030-75539-3_17,Inverse-Sybil attacks in automated contact tracing
9969,10.23919/IFIPNetworking52078.2021.9472205,LightPIR: Privacy-preserving route discovery for payment channel networks
7896,10.15479/AT:ISTA:7896,On the average-case hardness of total search problems
7966,10.1007/978-3-030-45727-3_16,"Everybody’s a target: Scalability in public-key encryption"
8322,10.1007/978-3-030-56880-1_26,"Reverse firewalls for actively secure MPCs"
8339,10.1007/978-3-030-45374-9_21,Improved discrete Gaussian and subgaussian analysis for lattice cryptography
8987,10.1007/978-3-030-65277-7_1,Delayed authentication: Preventing replay and relay attacks in private contact tracing
6677,10.1145/3313276.3316400,Finding a Nash equilibrium is no easier than breaking Fiat-Shamir
6726,10.1007/978-3-030-23696-0_9,Sampling the integers with low relative error
