BibTeX records: Ivan Damgård

download as .bib file

@article{DBLP:journals/corr/abs-2403-14023,
  author       = {Carsten Baum and
                  Jens Berlips and
                  Walther Chen and
                  Hongrui Cui and
                  Ivan Damg{\aa}rd and
                  Jiangbin Dong and
                  Kevin M. Esvelt and
                  Mingyu Gao and
                  Dana Gretton and
                  Leonard Foner and
                  Martin Kysel and
                  Kaiyi Zhang and
                  Juanru Li and
                  Xiang Li and
                  Omer Paneth and
                  Ronald L. Rivest and
                  Francesca Sage{-}Ling and
                  Adi Shamir and
                  Yue Shen and
                  Meicen Sun and
                  Vinod Vaikuntanathan and
                  Lynn Van Hauwe and
                  Theia Vogel and
                  Benjamin Weinstein{-}Raun and
                  Yun Wang and
                  Daniel Wichs and
                  Stephen Wooster and
                  Andrew C. Yao and
                  Yu Yu and
                  Haoling Zhang},
  title        = {A system capable of verifiably and privately screening global {DNA}
                  synthesis},
  journal      = {CoRR},
  volume       = {abs/2403.14023},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.14023},
  doi          = {10.48550/ARXIV.2403.14023},
  eprinttype    = {arXiv},
  eprint       = {2403.14023},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-14023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BurkhardtDFGO23,
  author       = {Jakob Burkhardt and
                  Ivan Damg{\aa}rd and
                  Tore Kasper Frederiksen and
                  Satrajit Ghosh and
                  Claudio Orlandi},
  editor       = {Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Cas Cremers and
                  Engin Kirda},
  title        = {Improved Distributed {RSA} Key Generation Using the Miller-Rabin Test},
  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November
                  26-30, 2023},
  pages        = {2501--2515},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576915.3623163},
  doi          = {10.1145/3576915.3623163},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BurkhardtDFGO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/citc/Damgard0P23,
  author       = {Ivan Damg{\aa}rd and
                  Daniel Escudero and
                  Antigoni Polychroniadou},
  editor       = {Kai{-}Min Chung},
  title        = {Phoenix: Secure Computation in an Unstable Network with Dropouts and
                  Comebacks},
  booktitle    = {4th Conference on Information-Theoretic Cryptography, {ITC} 2023,
                  June 6-8, 2023, Aarhus University, Aarhus, Denmark},
  series       = {LIPIcs},
  volume       = {267},
  pages        = {7:1--7:21},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2023},
  url          = {https://doi.org/10.4230/LIPIcs.ITC.2023.7},
  doi          = {10.4230/LIPICS.ITC.2023.7},
  timestamp    = {Tue, 25 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/citc/Damgard0P23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/citc/DamgardRTY23,
  author       = {Ivan Damg{\aa}rd and
                  Divya Ravi and
                  Daniel Tschudi and
                  Sophia Yakoubov},
  editor       = {Kai{-}Min Chung},
  title        = {Secure Communication in Dynamic Incomplete Networks},
  booktitle    = {4th Conference on Information-Theoretic Cryptography, {ITC} 2023,
                  June 6-8, 2023, Aarhus University, Aarhus, Denmark},
  series       = {LIPIcs},
  volume       = {267},
  pages        = {13:1--13:21},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2023},
  url          = {https://doi.org/10.4230/LIPIcs.ITC.2023.13},
  doi          = {10.4230/LIPICS.ITC.2023.13},
  timestamp    = {Tue, 25 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/citc/DamgardRTY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BraunDO23,
  author       = {Lennart Braun and
                  Ivan Damg{\aa}rd and
                  Claudio Orlandi},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Secure Multiparty Computation from Threshold Encryption Based on Class
                  Groups},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14081},
  pages        = {613--645},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38557-5\_20},
  doi          = {10.1007/978-3-031-38557-5\_20},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BraunDO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DamgardRSY23,
  author       = {Ivan Damg{\aa}rd and
                  Divya Ravi and
                  Luisa Siniscalchi and
                  Sophia Yakoubov},
  editor       = {Carmit Hazay and
                  Martijn Stam},
  title        = {Minimizing Setup in Broadcast-Optimal Two Round {MPC}},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Lyon, France, April 23-27, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14005},
  pages        = {129--158},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-30617-4\_5},
  doi          = {10.1007/978-3-031-30617-4\_5},
  timestamp    = {Thu, 20 Apr 2023 11:35:01 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DamgardRSY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latincrypt/DamgardRSY23,
  author       = {Ivan Damg{\aa}rd and
                  Divya Ravi and
                  Luisa Siniscalchi and
                  Sophia Yakoubov},
  editor       = {Abdelrahaman Aly and
                  Mehdi Tibouchi},
  title        = {Broadcast-Optimal Two Round {MPC} with Asynchronous Peer-to-Peer Channels},
  booktitle    = {Progress in Cryptology - {LATINCRYPT} 2023 - 8th International Conference
                  on Cryptology and Information Security in Latin America, {LATINCRYPT}
                  2023, Quito, Ecuador, October 3-6, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14168},
  pages        = {87--106},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-44469-2\_5},
  doi          = {10.1007/978-3-031-44469-2\_5},
  timestamp    = {Fri, 06 Oct 2023 18:13:29 +0200},
  biburl       = {https://dblp.org/rec/conf/latincrypt/DamgardRSY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/CiampiDRSXY23,
  author       = {Michele Ciampi and
                  Ivan Damg{\aa}rd and
                  Divya Ravi and
                  Luisa Siniscalchi and
                  Yu Xia and
                  Sophia Yakoubov},
  editor       = {Guy N. Rothblum and
                  Hoeteck Wee},
  title        = {Broadcast-Optimal Four-Round {MPC} in the Plain Model},
  booktitle    = {Theory of Cryptography - 21st International Conference, {TCC} 2023,
                  Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14370},
  pages        = {3--32},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-48618-0\_1},
  doi          = {10.1007/978-3-031-48618-0\_1},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/CiampiDRSXY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-04564,
  author       = {Ivan Damg{\aa}rd and
                  Hannah Keller and
                  Boel Nelson and
                  Claudio Orlandi and
                  Rasmus Pagh},
  title        = {Differentially Private Selection from Secure Distributed Computing},
  journal      = {CoRR},
  volume       = {abs/2306.04564},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.04564},
  doi          = {10.48550/ARXIV.2306.04564},
  eprinttype    = {arXiv},
  eprint       = {2306.04564},
  timestamp    = {Tue, 13 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-04564.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardRTY23,
  author       = {Ivan Damg{\aa}rd and
                  Divya Ravi and
                  Daniel Tschudi and
                  Sophia Yakoubov},
  title        = {Secure Communication in Dynamic Incomplete Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {529},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/529},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardRTY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BurkhardtDFGO23,
  author       = {Jakob Burkhardt and
                  Ivan Damg{\aa}rd and
                  Tore Kasper Frederiksen and
                  Satrajit Ghosh and
                  Claudio Orlandi},
  title        = {Improved Distributed {RSA} Key Generation Using the Miller-Rabin Test},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {644},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/644},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BurkhardtDFGO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardKNOP23,
  author       = {Ivan Damg{\aa}rd and
                  Hannah Keller and
                  Boel Nelson and
                  Claudio Orlandi and
                  Rasmus Pagh},
  title        = {Differentially Private Selection from Secure Distributed Computing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {894},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/894},
  timestamp    = {Mon, 03 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardKNOP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardRSY23,
  author       = {Ivan Damg{\aa}rd and
                  Divya Ravi and
                  Luisa Siniscalchi and
                  Sophia Yakoubov},
  title        = {Broadcast-Optimal Two Round {MPC} with Asynchronous Peer-to-Peer Channels},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1187},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1187},
  timestamp    = {Fri, 08 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardRSY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CiampiDRSXY23,
  author       = {Michele Ciampi and
                  Ivan Damg{\aa}rd and
                  Divya Ravi and
                  Luisa Siniscalchi and
                  Yu Xia and
                  Sophia Yakoubov},
  title        = {Broadcast-Optimal Four-Round {MPC} in the Plain Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1739},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1739},
  timestamp    = {Fri, 29 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/CiampiDRSXY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/DamgardJNPO22,
  author       = {Ivan Damg{\aa}rd and
                  Thomas P. Jakobsen and
                  Jesper Buus Nielsen and
                  Jakob Illeborg Pagter and
                  Michael B{\ae}ksvang {\O}stergaard},
  title        = {Fast threshold {ECDSA} with honest majority},
  journal      = {J. Comput. Secur.},
  volume       = {30},
  number       = {1},
  pages        = {167--196},
  year         = {2022},
  url          = {https://doi.org/10.3233/JCS-200112},
  doi          = {10.3233/JCS-200112},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/DamgardJNPO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/DamgardOTT22,
  author       = {Ivan Damg{\aa}rd and
                  Claudio Orlandi and
                  Akira Takahashi and
                  Mehdi Tibouchi},
  title        = {Two-Round n-out-of-n and Multi-Signatures and Trapdoor Commitment
                  from Lattices},
  journal      = {J. Cryptol.},
  volume       = {35},
  number       = {2},
  pages        = {14},
  year         = {2022},
  url          = {https://doi.org/10.1007/s00145-022-09425-3},
  doi          = {10.1007/S00145-022-09425-3},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/DamgardOTT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AbramDOS22,
  author       = {Damiano Abram and
                  Ivan Damg{\aa}rd and
                  Claudio Orlandi and
                  Peter Scholl},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {An Algebraic Framework for Silent Preprocessing with Trustless Setup
                  and Active Security},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13510},
  pages        = {421--452},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15985-5\_15},
  doi          = {10.1007/978-3-031-15985-5\_15},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AbramDOS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/BoschiniDO22,
  author       = {Cecilia Boschini and
                  Ivan Damg{\aa}rd and
                  Claudio Orlandi},
  editor       = {Clemente Galdi and
                  Stanislaw Jarecki},
  title        = {On Access Control Encryption Without Sanitization},
  booktitle    = {Security and Cryptography for Networks - 13th International Conference,
                  {SCN} 2022, Amalfi, Italy, September 12-14, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13409},
  pages        = {220--243},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-14791-3\_10},
  doi          = {10.1007/978-3-031-14791-3\_10},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/BoschiniDO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/AttemaCCDE22,
  author       = {Thomas Attema and
                  Ignacio Cascudo and
                  Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Daniel Escudero},
  editor       = {Eike Kiltz and
                  Vinod Vaikuntanathan},
  title        = {Vector Commitments over Rings and Compressed {\textdollar}{\textbackslash}varSigma
                  {\textdollar}-Protocols},
  booktitle    = {Theory of Cryptography - 20th International Conference, {TCC} 2022,
                  Chicago, IL, USA, November 7-10, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13747},
  pages        = {173--202},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22318-1\_7},
  doi          = {10.1007/978-3-031-22318-1\_7},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/AttemaCCDE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AttemaCCDE22,
  author       = {Thomas Attema and
                  Ignacio Cascudo and
                  Ronald Cramer and
                  Ivan Bjerre Damg{\aa}rd and
                  Daniel Escudero},
  title        = {Vector Commitments over Rings and Compressed {\(\Sigma\)}-Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {181},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/181},
  timestamp    = {Tue, 22 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AttemaCCDE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardRSY22,
  author       = {Ivan Damg{\aa}rd and
                  Divya Ravi and
                  Luisa Siniscalchi and
                  Sophia Yakoubov},
  title        = {Minimizing Setup in Broadcast-Optimal Two Round {MPC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {293},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/293},
  timestamp    = {Tue, 22 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardRSY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbramDOS22,
  author       = {Damiano Abram and
                  Ivan Damg{\aa}rd and
                  Claudio Orlandi and
                  Peter Scholl},
  title        = {An Algebraic Framework for Silent Preprocessing with Trustless Setup
                  and Active Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {363},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/363},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbramDOS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoschiniDO22,
  author       = {Cecilia Boschini and
                  Ivan Damg{\aa}rd and
                  Claudio Orlandi},
  title        = {On Access Control Encryption without Sanitization},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {854},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/854},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoschiniDO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BraunDO22,
  author       = {Lennart Braun and
                  Ivan Damg{\aa}rd and
                  Claudio Orlandi},
  title        = {Secure Multiparty Computation from Threshold Encryption based on Class
                  Groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1437},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1437},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BraunDO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AbspoelCEDX21,
  author       = {Mark Abspoel and
                  Ronald Cramer and
                  Daniel Escudero and
                  Ivan Damg{\aa}rd and
                  Chaoping Xing},
  editor       = {Mehdi Tibouchi and
                  Huaxiong Wang},
  title        = {Improved Single-Round Secure Multiplication Using Regenerating Codes},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 6-10, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13091},
  pages        = {222--244},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92075-3\_8},
  doi          = {10.1007/978-3-030-92075-3\_8},
  timestamp    = {Fri, 03 Dec 2021 17:36:49 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/AbspoelCEDX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/citc/Damgard0S21,
  author       = {Ivan Bjerre Damg{\aa}rd and
                  Boyang Li and
                  Nikolaj Ignatieff Schwartzbach},
  editor       = {Stefano Tessaro},
  title        = {More Communication Lower Bounds for Information-Theoretic {MPC}},
  booktitle    = {2nd Conference on Information-Theoretic Cryptography, {ITC} 2021,
                  July 23-26, 2021, Virtual Conference},
  series       = {LIPIcs},
  volume       = {199},
  pages        = {2:1--2:18},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2021},
  url          = {https://doi.org/10.4230/LIPIcs.ITC.2021.2},
  doi          = {10.4230/LIPICS.ITC.2021.2},
  timestamp    = {Thu, 16 Sep 2021 15:58:53 +0200},
  biburl       = {https://dblp.org/rec/conf/citc/Damgard0S21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/citc/DamgardLY21,
  author       = {Ivan Bjerre Damg{\aa}rd and
                  Kasper Green Larsen and
                  Sophia Yakoubov},
  editor       = {Stefano Tessaro},
  title        = {Broadcast Secret-Sharing, Bounds and Applications},
  booktitle    = {2nd Conference on Information-Theoretic Cryptography, {ITC} 2021,
                  July 23-26, 2021, Virtual Conference},
  series       = {LIPIcs},
  volume       = {199},
  pages        = {10:1--10:20},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2021},
  url          = {https://doi.org/10.4230/LIPIcs.ITC.2021.10},
  doi          = {10.4230/LIPICS.ITC.2021.10},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/citc/DamgardLY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DamgardMRSY21,
  author       = {Ivan Damg{\aa}rd and
                  Bernardo Magri and
                  Divya Ravi and
                  Luisa Siniscalchi and
                  Sophia Yakoubov},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Broadcast-Optimal Two Round {MPC} with an Honest Majority},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12826},
  pages        = {155--184},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84245-1\_6},
  doi          = {10.1007/978-3-030-84245-1\_6},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/DamgardMRSY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/AbramDST21,
  author       = {Damiano Abram and
                  Ivan Damg{\aa}rd and
                  Peter Scholl and
                  Sven Trieflinger},
  editor       = {Kenneth G. Paterson},
  title        = {Oblivious {TLS} via Multi-party Computation},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2021 - Cryptographers' Track at the
                  {RSA} Conference 2021, Virtual Event, May 17-20, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12704},
  pages        = {51--74},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75539-3\_3},
  doi          = {10.1007/978-3-030-75539-3\_3},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/AbramDST21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/DamgardGKOS21,
  author       = {Ivan Damg{\aa}rd and
                  Chaya Ganesh and
                  Hamidreza Khoshakhlagh and
                  Claudio Orlandi and
                  Luisa Siniscalchi},
  editor       = {Kenneth G. Paterson},
  title        = {Balancing Privacy and Accountability in Blockchain Identity Management},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2021 - Cryptographers' Track at the
                  {RSA} Conference 2021, Virtual Event, May 17-20, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12704},
  pages        = {552--576},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75539-3\_23},
  doi          = {10.1007/978-3-030-75539-3\_23},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/DamgardGKOS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DamgardO0T21,
  author       = {Ivan Damg{\aa}rd and
                  Claudio Orlandi and
                  Akira Takahashi and
                  Mehdi Tibouchi},
  editor       = {Juan A. Garay},
  title        = {Two-Round n-out-of-n and Multi-signatures and Trapdoor Commitment
                  from Lattices},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12710},
  pages        = {99--130},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75245-3\_5},
  doi          = {10.1007/978-3-030-75245-3\_5},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DamgardO0T21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DamgardER21,
  author       = {Ivan Damg{\aa}rd and
                  Daniel Escudero and
                  Divya Ravi},
  editor       = {Kobbi Nissim and
                  Brent Waters},
  title        = {Information-Theoretically Secure {MPC} Against Mixed Dynamic Adversaries},
  booktitle    = {Theory of Cryptography - 19th International Conference, {TCC} 2021,
                  Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13042},
  pages        = {591--622},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90459-3\_20},
  doi          = {10.1007/978-3-030-90459-3\_20},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/DamgardER21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbspoelC0DX21,
  author       = {Mark Abspoel and
                  Ronald Cramer and
                  Daniel Escudero and
                  Ivan Damg{\aa}rd and
                  Chaoping Xing},
  title        = {Improved single-round secure multiplication using regenerating codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {253},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/253},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbspoelC0DX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardLS21,
  author       = {Ivan Damg{\aa}rd and
                  Boyang Li and
                  Nikolaj I. Schwartzbach},
  title        = {More Communication Lower Bounds for Information-Theoretic {MPC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {278},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/278},
  timestamp    = {Sun, 27 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardLS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbramDST21,
  author       = {Damiano Abram and
                  Ivan Damg{\aa}rd and
                  Peter Scholl and
                  Sven Trieflinger},
  title        = {Oblivious {TLS} via Multi-Party Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {318},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/318},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbramDST21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardER21,
  author       = {Ivan Damg{\aa}rd and
                  Daniel Escudero and
                  Divya Ravi},
  title        = {Information-Theoretically Secure {MPC} against Mixed Dynamic Adversaries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1163},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1163},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardER21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Damgard21x,
  author       = {Ivan Damg{\aa}rd and
                  Daniel Escudero and
                  Antigoni Polychroniadou},
  title        = {Phoenix: Secure Computation in an Unstable Network with Dropouts and
                  Comebacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1376},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1376},
  timestamp    = {Fri, 12 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/Damgard21x.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AbspoelCD0RX020,
  author       = {Mark Abspoel and
                  Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Daniel Escudero and
                  Matthieu Rambaud and
                  Chaoping Xing and
                  Chen Yuan},
  editor       = {Shiho Moriai and
                  Huaxiong Wang},
  title        = {Asymptotically Good Multiplicative {LSSS} over Galois Rings and Applications
                  to {MPC} over {\textdollar}{\textbackslash}mathbb \{Z\}/p{\^{}}k{\textbackslash}mathbb
                  \{Z\} {\textdollar}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12493},
  pages        = {151--180},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64840-4\_6},
  doi          = {10.1007/978-3-030-64840-4\_6},
  timestamp    = {Thu, 10 Dec 2020 10:11:44 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/AbspoelCD0RX020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DamgardO020,
  author       = {Ivan Damg{\aa}rd and
                  Claudio Orlandi and
                  Mark Simkin},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Black-Box Transformations from Passive to Covert Security with Public
                  Verifiability},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12171},
  pages        = {647--676},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56880-1\_23},
  doi          = {10.1007/978-3-030-56880-1\_23},
  timestamp    = {Thu, 13 Aug 2020 16:42:10 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DamgardO020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/DamgardJNPO20,
  author       = {Ivan Damg{\aa}rd and
                  Thomas Pelle Jakobsen and
                  Jesper Buus Nielsen and
                  Jakob Illeborg Pagter and
                  Michael B{\ae}ksvang {\O}sterg{\aa}rd},
  editor       = {Clemente Galdi and
                  Vladimir Kolesnikov},
  title        = {Fast Threshold {ECDSA} with Honest Majority},
  booktitle    = {Security and Cryptography for Networks - 12th International Conference,
                  {SCN} 2020, Amalfi, Italy, September 14-16, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12238},
  pages        = {382--400},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-57990-6\_19},
  doi          = {10.1007/978-3-030-57990-6\_19},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scn/DamgardJNPO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DamgardHMNOY20,
  author       = {Ivan Damg{\aa}rd and
                  Helene Haagh and
                  Rebekah Mercer and
                  Anca Nitulescu and
                  Claudio Orlandi and
                  Sophia Yakoubov},
  editor       = {Rafael Pass and
                  Krzysztof Pietrzak},
  title        = {Stronger Security and Constructions of Multi-designated Verifier Signatures},
  booktitle    = {Theory of Cryptography - 18th International Conference, {TCC} 2020,
                  Durham, NC, USA, November 16-19, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12551},
  pages        = {229--260},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64378-2\_9},
  doi          = {10.1007/978-3-030-64378-2\_9},
  timestamp    = {Tue, 15 Dec 2020 12:01:12 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/DamgardHMNOY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardS20,
  author       = {Ivan Damg{\aa}rd and
                  Nikolaj I. Schwartzbach},
  title        = {Communication Lower Bounds for Perfect Maliciously Secure {MPC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {251},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/251},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardJNPO20,
  author       = {Ivan Damg{\aa}rd and
                  Thomas Pelle Jakobsen and
                  Jesper Buus Nielsen and
                  Jakob Illeborg Pagter and
                  Michael B{\ae}ksvang {\O}sterg{\aa}rd},
  title        = {Fast Threshold {ECDSA} with Honest Majority},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {501},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/501},
  timestamp    = {Wed, 27 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardJNPO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardY20,
  author       = {Ivan Damg{\aa}rd and
                  Sophia Yakoubov},
  title        = {Bounds on Ad Hoc Threshold Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {618},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/618},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardOS20,
  author       = {Ivan Damg{\aa}rd and
                  Claudio Orlandi and
                  Mark Simkin},
  title        = {Black-Box Transformations from Passive to Covert Security with Public
                  Verifiability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {916},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/916},
  timestamp    = {Mon, 27 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardOS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardOTT20,
  author       = {Ivan Damg{\aa}rd and
                  Claudio Orlandi and
                  Akira Takahashi and
                  Mehdi Tibouchi},
  title        = {Two-round n-out-of-n and Multi-Signatures and Trapdoor Commitment
                  from Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1110},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1110},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardOTT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardMSY20,
  author       = {Ivan Damg{\aa}rd and
                  Bernardo Magri and
                  Luisa Siniscalchi and
                  Sophia Yakoubov},
  title        = {Broadcast-Optimal Two Round {MPC} with an Honest Majority},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1254},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1254},
  timestamp    = {Fri, 30 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardMSY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbspoelCDERXY20,
  author       = {Mark Abspoel and
                  Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Daniel Escudero and
                  Matthieu Rambaud and
                  Chaoping Xing and
                  Chen Yuan},
  title        = {Asymptotically Good Multiplicative {LSSS} over Galois Rings and Applications
                  to {MPC} over Z/p{\^{}}k {Z}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1256},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1256},
  timestamp    = {Fri, 30 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AbspoelCDERXY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardGKOS20,
  author       = {Ivan Damg{\aa}rd and
                  Chaya Ganesh and
                  Hamidreza Khoshakhlagh and
                  Claudio Orlandi and
                  Luisa Siniscalchi},
  title        = {Balancing Privacy and Accountability in Blockchain Transactions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1511},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1511},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardGKOS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/CascudoDDDDG19,
  author       = {Ignacio Cascudo and
                  Ivan Damg{\aa}rd and
                  Bernardo David and
                  Nico D{\"{o}}ttling and
                  Rafael Dowsley and
                  Irene Giacomelli},
  editor       = {Steven D. Galbraith and
                  Shiho Moriai},
  title        = {Efficient {UC} Commitment Extension with Homomorphism for Free (and
                  Applications)},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kobe, Japan, December 8-12, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11922},
  pages        = {606--635},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34621-8\_22},
  doi          = {10.1007/978-3-030-34621-8\_22},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/CascudoDDDDG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DamgardLN19,
  author       = {Ivan Damg{\aa}rd and
                  Kasper Green Larsen and
                  Jesper Buus Nielsen},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Communication Lower Bounds for Statistically Secure MPC, With or Without
                  Preprocessing},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11693},
  pages        = {61--84},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26951-7\_3},
  doi          = {10.1007/978-3-030-26951-7\_3},
  timestamp    = {Fri, 09 Aug 2019 14:22:41 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DamgardLN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DamgardGO19,
  author       = {Ivan Damg{\aa}rd and
                  Chaya Ganesh and
                  Claudio Orlandi},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Proofs of Replicated Storage Without Timing Assumptions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11692},
  pages        = {355--380},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26948-7\_13},
  doi          = {10.1007/978-3-030-26948-7\_13},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DamgardGO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AggarwalDNOPRS19,
  author       = {Divesh Aggarwal and
                  Ivan Damg{\aa}rd and
                  Jesper Buus Nielsen and
                  Maciej Obremski and
                  Erick Purwanto and
                  Jo{\~{a}}o Ribeiro and
                  Mark Simkin},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Stronger Leakage-Resilient and Non-Malleable Secret Sharing Schemes
                  for General Access Structures},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11693},
  pages        = {510--539},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26951-7\_18},
  doi          = {10.1007/978-3-030-26951-7\_18},
  timestamp    = {Sat, 18 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/AggarwalDNOPRS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/DamgardH0O19,
  author       = {Ivan Damg{\aa}rd and
                  Helene Haagh and
                  Michael Nielsen and
                  Claudio Orlandi},
  editor       = {Martin Albrecht},
  title        = {Commodity-Based 2PC for Arithmetic Circuits},
  booktitle    = {Cryptography and Coding - 17th {IMA} International Conference, {IMACC}
                  2019, Oxford, UK, December 16-18, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11929},
  pages        = {154--177},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-35199-1\_8},
  doi          = {10.1007/978-3-030-35199-1\_8},
  timestamp    = {Fri, 15 Dec 2023 20:21:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/DamgardH0O19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Damgard0FKSV19,
  author       = {Ivan Damg{\aa}rd and
                  Daniel Escudero and
                  Tore Kasper Frederiksen and
                  Marcel Keller and
                  Peter Scholl and
                  Nikolaj Volgushev},
  title        = {New Primitives for Actively-Secure {MPC} over Rings with Applications
                  to Private Machine Learning},
  booktitle    = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco,
                  CA, USA, May 19-23, 2019},
  pages        = {1102--1120},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SP.2019.00078},
  doi          = {10.1109/SP.2019.00078},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/Damgard0FKSV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/AbspoelCD0Y19,
  author       = {Mark Abspoel and
                  Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Daniel Escudero and
                  Chen Yuan},
  editor       = {Dennis Hofheinz and
                  Alon Rosen},
  title        = {Efficient Information-Theoretic Secure Multiparty Computation over
                  Z/p\({}^{\mbox{k}}\)Z via Galois Rings},
  booktitle    = {Theory of Cryptography - 17th International Conference, {TCC} 2019,
                  Nuremberg, Germany, December 1-5, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11891},
  pages        = {471--501},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-36030-6\_19},
  doi          = {10.1007/978-3-030-36030-6\_19},
  timestamp    = {Sat, 25 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/AbspoelCD0Y19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardLN19,
  author       = {Ivan Damg{\aa}rd and
                  Kasper Green Larsen and
                  Jesper Buus Nielsen},
  title        = {Communication Lower Bounds for Statistically Secure MPC, with or without
                  Preprocessing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {220},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/220},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardLN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Damgard0FKSV19,
  author       = {Ivan Damg{\aa}rd and
                  Daniel Escudero and
                  Tore Kasper Frederiksen and
                  Marcel Keller and
                  Peter Scholl and
                  Nikolaj Volgushev},
  title        = {New Primitives for Actively-Secure {MPC} over Rings with Applications
                  to Private Machine Learning},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {599},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/599},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Damgard0FKSV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardHNO19,
  author       = {Ivan Damg{\aa}rd and
                  Helene Haagh and
                  Michael Nielsen and
                  Claudio Orlandi},
  title        = {Commodity-Based 2PC for Arithmetic Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {705},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/705},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardHNO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbspoelCDEY19,
  author       = {Mark Abspoel and
                  Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Daniel Escudero and
                  Chen Yuan},
  title        = {Efficient Information-Theoretic Secure Multiparty Computation over
                  {\(\mathbb{Z}\)}/p\({}^{\mbox{k}}\) {\(\mathbb{Z}\)} via Galois Rings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {872},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/872},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbspoelCDEY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardHMNOY19,
  author       = {Ivan Damg{\aa}rd and
                  Helene Haagh and
                  Rebekah Mercer and
                  Anca Nitulescu and
                  Claudio Orlandi and
                  Sophia Yakoubov},
  title        = {Stronger Notions and Constructions for Multi-Designated Verifier Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1153},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1153},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardHMNOY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CramerDESX18,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Daniel Escudero and
                  Peter Scholl and
                  Chaoping Xing},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {SPD{\(\mathbb{Z}\)}\({}_{\mbox{2\({}^{\mbox{k}}\)}}\): Efficient {MPC}
                  mod 2\({}^{\mbox{k}}\) for Dishonest Majority},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10992},
  pages        = {769--798},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96881-0\_26},
  doi          = {10.1007/978-3-319-96881-0\_26},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CramerDESX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DamgardOS18,
  author       = {Ivan Damg{\aa}rd and
                  Claudio Orlandi and
                  Mark Simkin},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Yet Another Compiler for Active Security or: Efficient {MPC} Over
                  Arbitrary Rings},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10992},
  pages        = {799--829},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96881-0\_27},
  doi          = {10.1007/978-3-319-96881-0\_27},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DamgardOS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DamgardLOSS18,
  author       = {Ivan Damg{\aa}rd and
                  Ji Luo and
                  Sabine Oechsner and
                  Peter Scholl and
                  Mark Simkin},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {Compact Zero-Knowledge Proofs of Small Hamming Weight},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10770},
  pages        = {530--560},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76581-5\_18},
  doi          = {10.1007/978-3-319-76581-5\_18},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DamgardLOSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/BaumDLOP18,
  author       = {Carsten Baum and
                  Ivan Damg{\aa}rd and
                  Vadim Lyubashevsky and
                  Sabine Oechsner and
                  Chris Peikert},
  editor       = {Dario Catalano and
                  Roberto De Prisco},
  title        = {More Efficient Commitments from Structured Lattice Assumptions},
  booktitle    = {Security and Cryptography for Networks - 11th International Conference,
                  {SCN} 2018, Amalfi, Italy, September 5-7, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11035},
  pages        = {368--385},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-98113-0\_20},
  doi          = {10.1007/978-3-319-98113-0\_20},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/BaumDLOP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DamgardKORS18,
  author       = {Ivan Damg{\aa}rd and
                  Tomasz Kazana and
                  Maciej Obremski and
                  Varun Raj and
                  Luisa Siniscalchi},
  editor       = {Amos Beimel and
                  Stefan Dziembowski},
  title        = {Continuous {NMC} Secure Against Permutations and Overwrites, with
                  Applications to {CCA} Secure Commitments},
  booktitle    = {Theory of Cryptography - 16th International Conference, {TCC} 2018,
                  Panaji, India, November 11-14, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11240},
  pages        = {225--254},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03810-6\_9},
  doi          = {10.1007/978-3-030-03810-6\_9},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/DamgardKORS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerDESX18,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Daniel Escudero and
                  Peter Scholl and
                  Chaoping Xing},
  title        = {SPD{\(\mathbb{Z}\)}\({}_{\mbox{2\({}^{\mbox{k}}\)}}\): Efficient {MPC}
                  mod 2\({}^{\mbox{k}}\) for Dishonest Majority},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {482},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/482},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerDESX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardKORS18,
  author       = {Ivan Damg{\aa}rd and
                  Tomasz Kazana and
                  Maciej Obremski and
                  Varun Raj and
                  Luisa Siniscalchi},
  title        = {Continuous {NMC} Secure Against Permutations and Overwrites, with
                  Applications to {CCA} Secure Commitments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {596},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/596},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardKORS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardGO18,
  author       = {Ivan Damg{\aa}rd and
                  Chaya Ganesh and
                  Claudio Orlandi},
  title        = {Proofs of Replicated Storage Without Timing Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {654},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/654},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardGO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CascudoDDDDG18,
  author       = {Ignacio Cascudo and
                  Ivan Damg{\aa}rd and
                  Bernardo David and
                  Nico D{\"{o}}ttling and
                  Rafael Dowsley and
                  Irene Giacomelli},
  title        = {Efficient {UC} Commitment Extension with Homomorphism for Free (and
                  Applications)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {983},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/983},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CascudoDDDDG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AggarwalDNOPRS18,
  author       = {Divesh Aggarwal and
                  Ivan Damg{\aa}rd and
                  Jesper Buus Nielsen and
                  Maciej Obremski and
                  Erick Purwanto and
                  Jo{\~{a}}o Ribeiro and
                  Mark Simkin},
  title        = {Stronger Leakage-Resilient and Non-Malleable Secret-Sharing Schemes
                  for General Access Structures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1147},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1147},
  timestamp    = {Sat, 18 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AggarwalDNOPRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/DamgardFMV17,
  author       = {Ivan Damg{\aa}rd and
                  Sebastian Faust and
                  Pratyay Mukherjee and
                  Daniele Venturi},
  title        = {Bounded Tamper Resilience: How to Go Beyond the Algebraic Barrier},
  journal      = {J. Cryptol.},
  volume       = {30},
  number       = {1},
  pages        = {152--190},
  year         = {2017},
  url          = {https://doi.org/10.1007/s00145-015-9218-0},
  doi          = {10.1007/S00145-015-9218-0},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joc/DamgardFMV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DamgardN0R17,
  author       = {Ivan Damg{\aa}rd and
                  Jesper Buus Nielsen and
                  Michael Nielsen and
                  Samuel Ranellucci},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {The TinyTable Protocol for 2-Party Secure Computation, or: Gate-Scrambling
                  Revisited},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10401},
  pages        = {167--187},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63688-7\_6},
  doi          = {10.1007/978-3-319-63688-7\_6},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DamgardN0R17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ApplebaumDI0Z17,
  author       = {Benny Applebaum and
                  Ivan Damg{\aa}rd and
                  Yuval Ishai and
                  Michael Nielsen and
                  Lior Zichron},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Secure Arithmetic Computation with Constant Computational Overhead},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10401},
  pages        = {223--254},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63688-7\_8},
  doi          = {10.1007/978-3-319-63688-7\_8},
  timestamp    = {Mon, 14 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ApplebaumDI0Z17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CramerDXY17,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Chaoping Xing and
                  Chen Yuan},
  editor       = {Jean{-}S{\'{e}}bastien Coron and
                  Jesper Buus Nielsen},
  title        = {Amortized Complexity of Zero-Knowledge Proofs Revisited: Achieving
                  Linear Soundness Slack},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Paris, France, April 30 - May 4, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10210},
  pages        = {479--500},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-56620-7\_17},
  doi          = {10.1007/978-3-319-56620-7\_17},
  timestamp    = {Sat, 25 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CramerDXY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/CramerDDGX17,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Nico D{\"{o}}ttling and
                  Irene Giacomelli and
                  Chaoping Xing},
  editor       = {Junji Shikata},
  title        = {Linear-Time Non-Malleable Codes in the Bit-Wise Independent Tampering
                  Model},
  booktitle    = {Information Theoretic Security - 10th International Conference, {ICITS}
                  2017, Hong Kong, China, November 29 - December 2, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10681},
  pages        = {1--25},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72089-0\_1},
  doi          = {10.1007/978-3-319-72089-0\_1},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/CramerDDGX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/CascudoDFR17,
  author       = {Ignacio Cascudo and
                  Ivan Damg{\aa}rd and
                  Oriol Farr{\`{a}}s and
                  Samuel Ranellucci},
  editor       = {Yael Kalai and
                  Leonid Reyzin},
  title        = {Resource-Efficient {OT} Combiners with Active Security},
  booktitle    = {Theory of Cryptography - 15th International Conference, {TCC} 2017,
                  Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10678},
  pages        = {461--486},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70503-3\_15},
  doi          = {10.1007/978-3-319-70503-3\_15},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/CascudoDFR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CascudoDFR17,
  author       = {Ignacio Cascudo and
                  Ivan Damg{\aa}rd and
                  Oriol Farr{\`{a}}s and
                  Samuel Ranellucci},
  title        = {Resource-efficient {OT} combiners with active security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {545},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/545},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CascudoDFR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ApplebaumDINZ17,
  author       = {Benny Applebaum and
                  Ivan Damg{\aa}rd and
                  Yuval Ishai and
                  Michael Nielsen and
                  Lior Zichron},
  title        = {Secure Arithmetic Computation with Constant Computational Overhead},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {617},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/617},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ApplebaumDINZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardOS17,
  author       = {Ivan Damg{\aa}rd and
                  Claudio Orlandi and
                  Mark Simkin},
  title        = {Yet Another Compiler for Active Security or: Efficient {MPC} Over
                  Arbitrary Rings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {908},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/908},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardOS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardLOSS17,
  author       = {Ivan Damg{\aa}rd and
                  Ji Luo and
                  Sabine Oechsner and
                  Peter Scholl and
                  Mark Simkin},
  title        = {Compact Zero-Knowledge Proofs of Small Hamming Weight},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1041},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1041},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardLOSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/AtenieseDDV16,
  author       = {Giuseppe Ateniese and
                  {\"{O}}zg{\"{u}}r Dagdelen and
                  Ivan Damg{\aa}rd and
                  Daniele Venturi},
  title        = {Entangled cloud storage},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {62},
  pages        = {104--118},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.future.2016.01.008},
  doi          = {10.1016/J.FUTURE.2016.01.008},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/AtenieseDDV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BaumDTZ16,
  author       = {Carsten Baum and
                  Ivan Damg{\aa}rd and
                  Tomas Toft and
                  Rasmus Winther Zakarias},
  editor       = {Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  Steve A. Schneider},
  title        = {Better Preprocessing for Secure Multiparty Computation},
  booktitle    = {Applied Cryptography and Network Security - 14th International Conference,
                  {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9696},
  pages        = {327--345},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39555-5\_18},
  doi          = {10.1007/978-3-319-39555-5\_18},
  timestamp    = {Fri, 07 Aug 2020 17:57:32 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/BaumDTZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/BaiDOX16,
  author       = {Ge Bai and
                  Ivan Damg{\aa}rd and
                  Claudio Orlandi and
                  Yu Xia},
  editor       = {David Pointcheval and
                  Abderrahmane Nitaj and
                  Tajjeeddine Rachidi},
  title        = {Non-Interactive Verifiable Secret Sharing for Monotone Circuits},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2016 - 8th International Conference
                  on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9646},
  pages        = {225--244},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-31517-1\_12},
  doi          = {10.1007/978-3-319-31517-1\_12},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/BaiDOX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/DamgardZ16,
  author       = {Ivan Damg{\aa}rd and
                  Rasmus Winther Zakarias},
  editor       = {David Pointcheval and
                  Abderrahmane Nitaj and
                  Tajjeeddine Rachidi},
  title        = {Fast Oblivious {AES} {A} Dedicated Application of the MiniMac Protocol},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2016 - 8th International Conference
                  on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9646},
  pages        = {245--264},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-31517-1\_13},
  doi          = {10.1007/978-3-319-31517-1\_13},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/DamgardZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CascudoDDDN16,
  author       = {Ignacio Cascudo and
                  Ivan Damg{\aa}rd and
                  Bernardo David and
                  Nico D{\"{o}}ttling and
                  Jesper Buus Nielsen},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Rate-1, Linear Time and Additively Homomorphic {UC} Commitments},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9816},
  pages        = {179--207},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53015-3\_7},
  doi          = {10.1007/978-3-662-53015-3\_7},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CascudoDDDN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DamgardNPR16,
  author       = {Ivan Damg{\aa}rd and
                  Jesper Buus Nielsen and
                  Antigoni Polychroniadou and
                  Michael A. Raskin},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {On the Communication Required for Unconditionally Secure Multiplication},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9815},
  pages        = {459--488},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53008-5\_16},
  doi          = {10.1007/978-3-662-53008-5\_16},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/DamgardNPR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BaumDLN16,
  author       = {Carsten Baum and
                  Ivan Damg{\aa}rd and
                  Kasper Green Larsen and
                  Michael Nielsen},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {How to Prove Knowledge of Small Secrets},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9816},
  pages        = {478--498},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53015-3\_17},
  doi          = {10.1007/978-3-662-53015-3\_17},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BaumDLN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DamgardNOR16,
  author       = {Ivan Damg{\aa}rd and
                  Jesper Buus Nielsen and
                  Rafail Ostrovsky and
                  Adi Ros{\'{e}}n},
  editor       = {Marc Fischlin and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Unconditionally Secure Computation with Reduced Interaction},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9666},
  pages        = {420--447},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49896-5\_15},
  doi          = {10.1007/978-3-662-49896-5\_15},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DamgardNOR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/DamgardDNNT16,
  author       = {Ivan Damg{\aa}rd and
                  Kasper Damg{\aa}rd and
                  Kurt Nielsen and
                  Peter Sebastian Nordholt and
                  Tomas Toft},
  editor       = {Jens Grossklags and
                  Bart Preneel},
  title        = {Confidential Benchmarking Based on Multiparty Computation},
  booktitle    = {Financial Cryptography and Data Security - 20th International Conference,
                  {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9603},
  pages        = {169--187},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-54970-4\_10},
  doi          = {10.1007/978-3-662-54970-4\_10},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/DamgardDNNT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DamgardPR16,
  author       = {Ivan Damg{\aa}rd and
                  Antigoni Polychroniadou and
                  Vanishree Rao},
  editor       = {Chen{-}Mou Cheng and
                  Kai{-}Min Chung and
                  Giuseppe Persiano and
                  Bo{-}Yin Yang},
  title        = {Adaptively Secure Multi-Party Computation from {LWE} (via Equivocal
                  {FHE)}},
  booktitle    = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
                  March 6-9, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9615},
  pages        = {208--233},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49387-8\_9},
  doi          = {10.1007/978-3-662-49387-8\_9},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DamgardPR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Ben-SassonBDIR16,
  author       = {Eli Ben{-}Sasson and
                  Iddo Bentov and
                  Ivan Damg{\aa}rd and
                  Yuval Ishai and
                  Noga Ron{-}Zewi},
  editor       = {Chen{-}Mou Cheng and
                  Kai{-}Min Chung and
                  Giuseppe Persiano and
                  Bo{-}Yin Yang},
  title        = {On Public Key Encryption from Noisy Codewords},
  booktitle    = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
                  March 6-9, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9615},
  pages        = {417--446},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49387-8\_16},
  doi          = {10.1007/978-3-662-49387-8\_16},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Ben-SassonBDIR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/CascudoDLR16,
  author       = {Ignacio Cascudo and
                  Ivan Damg{\aa}rd and
                  Felipe Lacerda and
                  Samuel Ranellucci},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {Oblivious Transfer from Any Non-trivial Elastic Noisy Channel via
                  Secret Key Agreement},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9985},
  pages        = {204--234},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53641-4\_9},
  doi          = {10.1007/978-3-662-53641-4\_9},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/CascudoDLR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DamgardHO16,
  author       = {Ivan Damg{\aa}rd and
                  Helene Haagh and
                  Claudio Orlandi},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {Access Control Encryption: Enforcing Information Flow with Cryptography},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9986},
  pages        = {547--576},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53644-5\_21},
  doi          = {10.1007/978-3-662-53644-5\_21},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/DamgardHO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/DamgardHO16,
  author       = {Ivan Damg{\aa}rd and
                  Helene Haagh and
                  Claudio Orlandi},
  title        = {Access Control Encryption: Enforcing Information Flow with Cryptography},
  journal      = {CoRR},
  volume       = {abs/1602.03642},
  year         = {2016},
  url          = {http://arxiv.org/abs/1602.03642},
  eprinttype    = {arXiv},
  eprint       = {1602.03642},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/DamgardHO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaumDTZ16,
  author       = {Carsten Baum and
                  Ivan Damg{\aa}rd and
                  Tomas Toft and
                  Rasmus Winther Zakarias},
  title        = {Better Preprocessing for Secure Multiparty Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {48},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/048},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaumDTZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaiDOX16,
  author       = {Ge Bai and
                  Ivan Damg{\aa}rd and
                  Claudio Orlandi and
                  Yu Xia},
  title        = {Non-Interactive Verifiable Secret Sharing For Monotone Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {78},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/078},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaiDOX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardHO16,
  author       = {Ivan Damg{\aa}rd and
                  Helene Haagh and
                  Claudio Orlandi},
  title        = {Access Control Encryption: Enforcing Information Flow with Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {106},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/106},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardHO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardTZ16,
  author       = {Ivan Damg{\aa}rd and
                  Tomas Toft and
                  Rasmus Winther Zakarias},
  title        = {Fast Multiparty Multiplications from shared bits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {109},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/109},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardTZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CascudoDLR16,
  author       = {Ignacio Cascudo and
                  Ivan Damg{\aa}rd and
                  Felipe Lacerda and
                  Samuel Ranellucci},
  title        = {Oblivious Transfer from Any Non-Trivial Elastic Noisy Channels via
                  Secret Key Agreement},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {120},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/120},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CascudoDLR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CascudoDDDN16,
  author       = {Ignacio Cascudo and
                  Ivan Damg{\aa}rd and
                  Bernardo David and
                  Nico D{\"{o}}ttling and
                  Jesper Buus Nielsen},
  title        = {Rate-1, Linear Time and Additively Homomorphic {UC} Commitments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {137},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/137},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CascudoDDDN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerDDGX16,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Nico D{\"{o}}ttling and
                  Irene Giacomelli and
                  Chaoping Xing},
  title        = {Linear-Time Non-Malleable Codes in the Bit-Wise Independent Tampering
                  Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {397},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/397},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerDDGX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaumDLN16,
  author       = {Carsten Baum and
                  Ivan Damg{\aa}rd and
                  Kasper Green Larsen and
                  Michael Nielsen},
  title        = {How to prove knowledge of small secrets},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {538},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/538},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaumDLN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerD16,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd},
  title        = {Amortized Complexity of Zero-Knowledge Proofs Revisited: Achieving
                  Linear Soundness Slack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {681},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/681},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardNNR16,
  author       = {Ivan Damg{\aa}rd and
                  Jesper Buus Nielsen and
                  Michael Nielsen and
                  Samuel Ranellucci},
  title        = {Gate-scrambling Revisited - or: The TinyTable protocol for 2-Party
                  Secure Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {695},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/695},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardNNR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaumDOP16,
  author       = {Carsten Baum and
                  Ivan Damg{\aa}rd and
                  Sabine Oechsner and
                  Chris Peikert},
  title        = {Efficient Commitments and Zero-Knowledge Protocols from Ring-SIS with
                  Applications to Lattice-based Threshold Cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {997},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/997},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaumDOP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/cu/CDN2015,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Jesper Buus Nielsen},
  title        = {Secure Multiparty Computation and Secret Sharing},
  publisher    = {Cambridge University Press},
  year         = {2015},
  url          = {http://www.cambridge.org/de/academic/subjects/computer-science/cryptography-cryptology-and-coding/secure-multiparty-computation-and-secret-sharing?format=HB\&\#38;isbn=9781107043053},
  isbn         = {9781107043053},
  timestamp    = {Sun, 21 Feb 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/cu/CDN2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AtenieseDDV15,
  author       = {Giuseppe Ateniese and
                  {\"{O}}zg{\"{u}}r Dagdelen and
                  Ivan Damg{\aa}rd and
                  Daniele Venturi},
  editor       = {Feng Bao and
                  Steven Miller and
                  Sherman S. M. Chow and
                  Danfeng Yao},
  title        = {Entangled Encodings and Data Entanglement},
  booktitle    = {Proceedings of the 3rd International Workshop on Security in Cloud
                  Computing, SCC@ASIACCS '15, Singapore, Republic of Singapore, April
                  14, 2015},
  pages        = {3--12},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2732516.2732524},
  doi          = {10.1145/2732516.2732524},
  timestamp    = {Thu, 20 Oct 2022 10:45:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/AtenieseDDV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/AndrychowiczDDF15,
  author       = {Marcin Andrychowicz and
                  Ivan Damg{\aa}rd and
                  Stefan Dziembowski and
                  Sebastian Faust and
                  Antigoni Polychroniadou},
  editor       = {Kaisa Nyberg},
  title        = {Efficient Leakage Resilient Circuit Compilers},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2015, The Cryptographer's Track at
                  the {RSA} Conference 2015, San Francisco, CA, USA, April 20-24, 2015.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9048},
  pages        = {311--329},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-16715-2\_17},
  doi          = {10.1007/978-3-319-16715-2\_17},
  timestamp    = {Thu, 14 Oct 2021 10:27:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/AndrychowiczDDF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CramerDDFS15,
  author       = {Ronald Cramer and
                  Ivan Bjerre Damg{\aa}rd and
                  Nico D{\"{o}}ttling and
                  Serge Fehr and
                  Gabriele Spini},
  editor       = {Elisabeth Oswald and
                  Marc Fischlin},
  title        = {Linear Secret Sharing Schemes from Error Correcting Codes and Universal
                  Hash Functions},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9057},
  pages        = {313--336},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46803-6\_11},
  doi          = {10.1007/978-3-662-46803-6\_11},
  timestamp    = {Thu, 14 Oct 2021 09:58:15 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CramerDDFS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/DamgardDN15,
  author       = {Ivan Damg{\aa}rd and
                  Fr{\'{e}}d{\'{e}}ric Dupuis and
                  Jesper Buus Nielsen},
  editor       = {Anja Lehmann and
                  Stefan Wolf},
  title        = {On the Orthogonal Vector Problem and the Feasibility of Unconditionally
                  Secure Leakage-Resilient Computation},
  booktitle    = {Information Theoretic Security - 8th International Conference, {ICITS}
                  2015, Lugano, Switzerland, May 2-5, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9063},
  pages        = {87--104},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-17470-9\_6},
  doi          = {10.1007/978-3-319-17470-9\_6},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/DamgardDN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/DamgardFMV15,
  author       = {Ivan Damg{\aa}rd and
                  Sebastian Faust and
                  Pratyay Mukherjee and
                  Daniele Venturi},
  editor       = {Anja Lehmann and
                  Stefan Wolf},
  title        = {The Chaining Lemma and Its Application},
  booktitle    = {Information Theoretic Security - 8th International Conference, {ICITS}
                  2015, Lugano, Switzerland, May 2-5, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9063},
  pages        = {181--196},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-17470-9\_11},
  doi          = {10.1007/978-3-319-17470-9\_11},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/DamgardFMV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CascudoDDGNT15,
  author       = {Ignacio Cascudo and
                  Ivan Damg{\aa}rd and
                  Bernardo Machado David and
                  Irene Giacomelli and
                  Jesper Buus Nielsen and
                  Roberto Trifiletti},
  editor       = {Jonathan Katz},
  title        = {Additively Homomorphic {UC} Commitments with Optimal Amortized Overhead},
  booktitle    = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
                  USA, March 30 - April 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9020},
  pages        = {495--515},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46447-2\_22},
  doi          = {10.1007/978-3-662-46447-2\_22},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CascudoDDGNT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/Ben-SassonBDIR15,
  author       = {Eli Ben{-}Sasson and
                  Iddo Bentov and
                  Ivan Bjerre Damg{\aa}rd and
                  Yuval Ishai and
                  Noga Ron{-}Zewi},
  title        = {On Public Key Encryption from Noisy Codewords},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR15-094}},
  year         = {2015},
  url          = {https://eccc.weizmann.ac.il/report/2015/094},
  eprinttype    = {ECCC},
  eprint       = {TR15-094},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/Ben-SassonBDIR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerDK15,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Marcel Keller},
  title        = {On the Amortized Complexity of Zero-knowledge Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {446},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/446},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerDK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ben-SassonBDIR15,
  author       = {Eli Ben{-}Sasson and
                  Iddo Bentov and
                  Ivan Damg{\aa}rd and
                  Yuval Ishai and
                  Noga Ron{-}Zewi},
  title        = {On Public Key Encryption from Noisy Codewords},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {572},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/572},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ben-SassonBDIR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardN15,
  author       = {Ivan Damg{\aa}rd and
                  Jesper Buus Nielsen},
  title        = {Unconditionally Secure Computation with Reduced Interaction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {630},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/630},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardZ15,
  author       = {Ivan Damg{\aa}rd and
                  Rasmus Winther Zakarias},
  title        = {Fast Oblivious {AES{\textbackslash}{\textbackslash}A} dedicated application
                  of the MiniMac protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {989},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/989},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardDNNT15,
  author       = {Ivan Damg{\aa}rd and
                  Kasper Damg{\aa}rd and
                  Kurt Nielsen and
                  Peter Sebastian Nordholt and
                  Tomas Toft},
  title        = {Confidential Benchmarking based on Multiparty Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1006},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1006},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardDNNT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerDDFS15,
  author       = {Ronald Cramer and
                  Ivan Bjerre Damg{\aa}rd and
                  Nico D{\"{o}}ttling and
                  Serge Fehr and
                  Gabriele Spini},
  title        = {Linear Secret Sharing Schemes from Error Correcting Codes and Universal
                  Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1089},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1089},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerDDFS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardNP15,
  author       = {Ivan Damg{\aa}rd and
                  Jesper Buus Nielsen and
                  Antigoni Polychroniadou},
  title        = {On the Communication required for Unconditionally Secure Multiplication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1097},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1097},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardNP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/CramerDK14,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Marcel Keller},
  title        = {On the Amortized Complexity of Zero-Knowledge Protocols},
  journal      = {J. Cryptol.},
  volume       = {27},
  number       = {2},
  pages        = {284--316},
  year         = {2014},
  url          = {https://doi.org/10.1007/s00145-013-9145-x},
  doi          = {10.1007/S00145-013-9145-X},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/CramerDK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nc/Damgard0S14,
  author       = {Ivan Damg{\aa}rd and
                  Thomas Brochmann Pedersen and
                  Louis Salvail},
  title        = {How to re-use a one-time pad safely and almost optimally even if {P}
                  = {NP}},
  journal      = {Nat. Comput.},
  volume       = {13},
  number       = {4},
  pages        = {469--486},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11047-014-9454-5},
  doi          = {10.1007/S11047-014-9454-5},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nc/Damgard0S14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/DamgardFSS14,
  author       = {Ivan Damg{\aa}rd and
                  Serge Fehr and
                  Louis Salvail and
                  Christian Schaffner},
  title        = {Secure identification and {QKD} in the bounded-quantum-storage model},
  journal      = {Theor. Comput. Sci.},
  volume       = {560},
  pages        = {12--26},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.tcs.2014.09.014},
  doi          = {10.1016/J.TCS.2014.09.014},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/DamgardFSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DamgardDGN14,
  author       = {Ivan Damg{\aa}rd and
                  Bernardo Machado David and
                  Irene Giacomelli and
                  Jesper Buus Nielsen},
  editor       = {Palash Sarkar and
                  Tetsu Iwata},
  title        = {Compact {VSS} and Efficient Homomorphic {UC} Commitments},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8874},
  pages        = {213--232},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45608-8\_12},
  doi          = {10.1007/978-3-662-45608-8\_12},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/DamgardDGN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DahlD14,
  author       = {Morten Dahl and
                  Ivan Damg{\aa}rd},
  editor       = {Phong Q. Nguyen and
                  Elisabeth Oswald},
  title        = {Universally Composable Symbolic Analysis for Two-Party Protocols Based
                  on Homomorphic Encryption},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Copenhagen, Denmark, May 11-15, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8441},
  pages        = {695--712},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55220-5\_38},
  doi          = {10.1007/978-3-642-55220-5\_38},
  timestamp    = {Thu, 14 Oct 2021 09:58:16 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DahlD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/DamgardMS14,
  author       = {Ivan Damg{\aa}rd and
                  Gert L{\ae}ss{\o}e Mikkelsen and
                  Tue Skeltved},
  editor       = {Jooyoung Lee and
                  Jongsung Kim},
  title        = {On the Security of Distributed Multiprime {RSA}},
  booktitle    = {Information Security and Cryptology - {ICISC} 2014 - 17th International
                  Conference, Seoul, Korea, December 3-5, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8949},
  pages        = {18--33},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-15943-0\_2},
  doi          = {10.1007/978-3-319-15943-0\_2},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/DamgardMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/DamgardN14,
  author       = {Ivan Damg{\aa}rd and
                  Jesper Buus Nielsen},
  editor       = {Sherman S. M. Chow and
                  Joseph K. Liu and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {Adaptive versus Static Security in the {UC} Model},
  booktitle    = {Provable Security - 8th International Conference, ProvSec 2014, Hong
                  Kong, China, October 9-10, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8782},
  pages        = {10--28},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12475-9\_2},
  doi          = {10.1007/978-3-319-12475-9\_2},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/DamgardN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/BaumDO14,
  author       = {Carsten Baum and
                  Ivan Damg{\aa}rd and
                  Claudio Orlandi},
  editor       = {Michel Abdalla and
                  Roberto De Prisco},
  title        = {Publicly Auditable Secure Multi-Party Computation},
  booktitle    = {Security and Cryptography for Networks - 9th International Conference,
                  {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8642},
  pages        = {175--196},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10879-7\_11},
  doi          = {10.1007/978-3-319-10879-7\_11},
  timestamp    = {Thu, 23 Jun 2022 19:58:57 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/BaumDO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/DamgardLT14,
  author       = {Ivan Damg{\aa}rd and
                  Rasmus Lauritsen and
                  Tomas Toft},
  editor       = {Michel Abdalla and
                  Roberto De Prisco},
  title        = {An Empirical Study and Some Improvements of the MiniMac Protocol for
                  Secure Computation},
  booktitle    = {Security and Cryptography for Networks - 9th International Conference,
                  {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8642},
  pages        = {398--415},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10879-7\_23},
  doi          = {10.1007/978-3-319-10879-7\_23},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/DamgardLT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardN14,
  author       = {Ivan Damg{\aa}rd and
                  Jesper Buus Nielsen},
  title        = {An Efficient Pseudo-Random Generator with Applications to Public-Key
                  Encryption and Constant-Round Multiparty Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {24},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/024},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaumDO14,
  author       = {Carsten Baum and
                  Ivan Damg{\aa}rd and
                  Claudio Orlandi},
  title        = {Publicly Auditable Secure Multi-Party Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {75},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/075},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaumDO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardDN14,
  author       = {Ivan Damg{\aa}rd and
                  Fr{\'{e}}d{\'{e}}ric Dupuis and
                  Jesper Buus Nielsen},
  title        = {On The Orthogonal Vector Problem and The Feasibility of Unconditionally
                  Secure Leakage Resilient Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {282},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/282},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardDN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardLT14,
  author       = {Ivan Damg{\aa}rd and
                  Rasmus Lauritsen and
                  Tomas Toft},
  title        = {An Empirical Study and some Improvements of the MiniMac Protocol for
                  Secure Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {289},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/289},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardLT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardDGN14,
  author       = {Ivan Damg{\aa}rd and
                  Bernardo David and
                  Irene Giacomelli and
                  Jesper Buus Nielsen},
  title        = {Compact {VSS} and Efficient Homomorphic {UC} Commitments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {370},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/370},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardDGN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardPZ14,
  author       = {Ivan Damg{\aa}rd and
                  Sunoo Park},
  title        = {Towards Optimally Efficient Secret-Key Authentication from {PRG}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {426},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/426},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardPZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardN14a,
  author       = {Ivan Damg{\aa}rd and
                  Jesper Buus Nielsen},
  title        = {Adaptive versus Static Security in the {UC} Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {601},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/601},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardN14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CascudoDR14,
  author       = {Ignacio Cascudo and
                  Ivan Damg{\aa}rd and
                  Samuel Ranellucci},
  title        = {Server-Aided Two-Party Computation with Simultaneous Corruption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {809},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/809},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CascudoDR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CascudoDDGNT14,
  author       = {Ignacio Cascudo and
                  Ivan Damg{\aa}rd and
                  Bernardo David and
                  Irene Giacomelli and
                  Jesper Buus Nielsen and
                  Roberto Trifiletti},
  title        = {Additively Homomorphic {UC} commitments with Optimal Amortized Overhead},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {829},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/829},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CascudoDDGNT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgaardPR14,
  author       = {Ivan Damg{\aa}rd and
                  Antigoni Polychroniadou and
                  Vanishree Rao},
  title        = {Adaptively Secure {UC} Constant Round Multi-Party Computation Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {830},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/830},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgaardPR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardFMV14,
  author       = {Ivan Damg{\aa}rd and
                  Sebastian Faust and
                  Pratyay Mukherjee and
                  Daniele Venturi},
  title        = {The Chaining Lemma and its application},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {979},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/979},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardFMV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DamgardS13,
  author       = {Ivan Damg{\aa}rd and
                  Alessandra Scafuro},
  editor       = {Kazue Sako and
                  Palash Sarkar},
  title        = {Unconditionally Secure and Universally Composable Commitments from
                  Physical Assumptions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Bengaluru, India, December 1-5, 2013, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8270},
  pages        = {100--119},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-42045-0\_6},
  doi          = {10.1007/978-3-642-42045-0\_6},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/DamgardS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DamgardFMV13,
  author       = {Ivan Damg{\aa}rd and
                  Sebastian Faust and
                  Pratyay Mukherjee and
                  Daniele Venturi},
  editor       = {Kazue Sako and
                  Palash Sarkar},
  title        = {Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Bengaluru, India, December 1-5, 2013, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8270},
  pages        = {140--160},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-42045-0\_8},
  doi          = {10.1007/978-3-642-42045-0\_8},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/DamgardFMV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CohenDIKMRR13,
  author       = {Gil Cohen and
                  Ivan Bjerre Damg{\aa}rd and
                  Yuval Ishai and
                  Jonas K{\"{o}}lker and
                  Peter Bro Miltersen and
                  Ran Raz and
                  Ron D. Rothblum},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Efficient Multiparty Protocols via Log-Depth Threshold Formulae -
                  (Extended Abstract)},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8043},
  pages        = {185--202},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40084-1\_11},
  doi          = {10.1007/978-3-642-40084-1\_11},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CohenDIKMRR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/DamgardKLPSS13,
  author       = {Ivan Damg{\aa}rd and
                  Marcel Keller and
                  Enrique Larraia and
                  Valerio Pastro and
                  Peter Scholl and
                  Nigel P. Smart},
  editor       = {Jason Crampton and
                  Sushil Jajodia and
                  Keith Mayes},
  title        = {Practical Covertly Secure {MPC} for Dishonest Majority - Or: Breaking
                  the {SPDZ} Limits},
  booktitle    = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research
                  in Computer Security, Egham, UK, September 9-13, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8134},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40203-6\_1},
  doi          = {10.1007/978-3-642-40203-6\_1},
  timestamp    = {Wed, 25 Sep 2019 18:03:15 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/DamgardKLPSS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/DamgardFNS13,
  author       = {Ivan Damg{\aa}rd and
                  Jakob Funder and
                  Jesper Buus Nielsen and
                  Louis Salvail},
  editor       = {Carles Padr{\'{o}}},
  title        = {Superposition Attacks on Cryptographic Protocols},
  booktitle    = {Information Theoretic Security - 7th International Conference, {ICITS}
                  2013, Singapore, November 28-30, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8317},
  pages        = {142--161},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-04268-8\_9},
  doi          = {10.1007/978-3-319-04268-8\_9},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/DamgardFNS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/DamgardJNP13,
  author       = {Ivan Damg{\aa}rd and
                  Thomas P. Jakobsen and
                  Jesper Buus Nielsen and
                  Jakob Illeborg Pagter},
  editor       = {Martijn Stam},
  title        = {Secure Key Management in the Cloud},
  booktitle    = {Cryptography and Coding - 14th {IMA} International Conference, {IMACC}
                  2013, Oxford, UK, December 17-19, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8308},
  pages        = {270--289},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-45239-0\_16},
  doi          = {10.1007/978-3-642-45239-0\_16},
  timestamp    = {Wed, 18 Mar 2020 16:00:57 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/DamgardJNP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DamgardZ13,
  author       = {Ivan Damg{\aa}rd and
                  Sarah Zakarias},
  editor       = {Amit Sahai},
  title        = {Constant-Overhead Secure Computation of Boolean Circuits using Preprocessing},
  booktitle    = {Theory of Cryptography - 10th Theory of Cryptography Conference, {TCC}
                  2013, Tokyo, Japan, March 3-6, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7785},
  pages        = {621--641},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36594-2\_35},
  doi          = {10.1007/978-3-642-36594-2\_35},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/DamgardZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/CohenDIKMRR13,
  author       = {Gil Cohen and
                  Ivan Bjerre Damg{\aa}rd and
                  Yuval Ishai and
                  Jonas K{\"{o}}lker and
                  Peter Bro Miltersen and
                  Ran Raz and
                  Ron Rothblum},
  title        = {Efficient Multiparty Protocols via Log-Depth Threshold Formulae},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR13-107}},
  year         = {2013},
  url          = {https://eccc.weizmann.ac.il/report/2013/107},
  eprinttype    = {ECCC},
  eprint       = {TR13-107},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/CohenDIKMRR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardS13,
  author       = {Ivan Damg{\aa}rd and
                  Alessandra Scafuro},
  title        = {Unconditionally Secure and Universally Composable Commitments from
                  Physical Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {108},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/108},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DahlD13,
  author       = {Morten Dahl and
                  Ivan Damg{\aa}rd},
  title        = {Universally Composable Symbolic Analysis for Two-Party Protocols based
                  on Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {296},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/296},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DahlD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CohenDIKMRR13,
  author       = {Gil Cohen and
                  Ivan Bjerre Damg{\aa}rd and
                  Yuval Ishai and
                  Jonas K{\"{o}}lker and
                  Peter Bro Miltersen and
                  Ran Raz and
                  Ron D. Rothblum},
  title        = {Efficient Multiparty Protocols via Log-Depth Threshold Formulae},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {480},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/480},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CohenDIKMRR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardJNP13,
  author       = {Ivan Damg{\aa}rd and
                  Thomas P. Jakobsen and
                  Jesper Buus Nielsen and
                  Jakob Illeborg Pagter},
  title        = {Secure Key Management in the Cloud},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {629},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/629},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardJNP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardFMV13a,
  author       = {Ivan Damg{\aa}rd and
                  Sebastian Faust and
                  Pratyay Mukherjee and
                  Daniele Venturi},
  title        = {Bounded Tamper Resilience: How to go beyond the Algebraic Barrier},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {677},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/677},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardFMV13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DamgardPSZ12,
  author       = {Ivan Damg{\aa}rd and
                  Valerio Pastro and
                  Nigel P. Smart and
                  Sarah Zakarias},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {Multiparty Computation from Somewhat Homomorphic Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {643--662},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_38},
  doi          = {10.1007/978-3-642-32009-5\_38},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DamgardPSZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/DamgardKT12,
  author       = {Ivan Damg{\aa}rd and
                  Jonas K{\"{o}}lker and
                  Tomas Toft},
  editor       = {Orr Dunkelman},
  title        = {Secure Computation, I/O-Efficient Algorithms and Distributed Signatures},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2012 - The Cryptographers' Track at
                  the {RSA} Conference 2012, San Francisco, CA, USA, February 27 - March
                  2, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7178},
  pages        = {278--295},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-27954-6\_18},
  doi          = {10.1007/978-3-642-27954-6\_18},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/DamgardKT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/CramerDP12,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Valerio Pastro},
  editor       = {Adam D. Smith},
  title        = {On the Amortized Complexity of Zero Knowledge Protocols for Multiplicative
                  Relations},
  booktitle    = {Information Theoretic Security - 6th International Conference, {ICITS}
                  2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7412},
  pages        = {62--79},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32284-6\_4},
  doi          = {10.1007/978-3-642-32284-6\_4},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/CramerDP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CramerDKZZ12,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Eike Kiltz and
                  Sarah Zakarias and
                  Angela Zottarel},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {DDH-Like Assumptions Based on Extension Rings},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {644--661},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_38},
  doi          = {10.1007/978-3-642-30057-8\_38},
  timestamp    = {Mon, 16 Nov 2020 15:55:52 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/CramerDKZZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/DamgardL12,
  author       = {Ivan Damg{\aa}rd and
                  Adriana L{\'{o}}pez{-}Alt},
  editor       = {Ivan Visconti and
                  Roberto De Prisco},
  title        = {Zero-Knowledge Proofs with Low Amortized Communication from Lattice
                  Assumptions},
  booktitle    = {Security and Cryptography for Networks - 8th International Conference,
                  {SCN} 2012, Amalfi, Italy, September 5-7, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7485},
  pages        = {38--56},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32928-9\_3},
  doi          = {10.1007/978-3-642-32928-9\_3},
  timestamp    = {Thu, 23 Jun 2022 19:58:57 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/DamgardL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/DamgardKLMS12,
  author       = {Ivan Damg{\aa}rd and
                  Marcel Keller and
                  Enrique Larraia and
                  Christian Miles and
                  Nigel P. Smart},
  editor       = {Ivan Visconti and
                  Roberto De Prisco},
  title        = {Implementing {AES} via an Actively/Covertly Secure Dishonest-Majority
                  {MPC} Protocol},
  booktitle    = {Security and Cryptography for Networks - 8th International Conference,
                  {SCN} 2012, Amalfi, Italy, September 5-7, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7485},
  pages        = {241--263},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32928-9\_14},
  doi          = {10.1007/978-3-642-32928-9\_14},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/DamgardKLMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DamgardFH12,
  author       = {Ivan Damg{\aa}rd and
                  Sebastian Faust and
                  Carmit Hazay},
  editor       = {Ronald Cramer},
  title        = {Secure Two-Party Computation with Low Communication},
  booktitle    = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC}
                  2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7194},
  pages        = {54--74},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28914-9\_4},
  doi          = {10.1007/978-3-642-28914-9\_4},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/DamgardFH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardKLMS12,
  author       = {Ivan Damg{\aa}rd and
                  Marcel Keller and
                  Enrique Larraia and
                  Christian Miles and
                  Nigel P. Smart},
  title        = {Implementing {AES} via an Actively/Covertly Secure Dishonest-Majority
                  {MPC} Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {262},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/262},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardKLMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardL12,
  author       = {Ivan Damg{\aa}rd and
                  Adriana L{\'{o}}pez{-}Alt},
  title        = {Zero-Knowledge Proofs with Low Amortized Communication from Lattice
                  Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {364},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/364},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseDDV12,
  author       = {Giuseppe Ateniese and
                  {\"{O}}zg{\"{u}}r Dagdelen and
                  Ivan Damg{\aa}rd and
                  Daniele Venturi},
  title        = {Entangled Cloud Storage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {511},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/511},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtenieseDDV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardZ12,
  author       = {Ivan Damg{\aa}rd and
                  Sarah Zakarias},
  title        = {Constant-Overhead Secure Computation for Boolean Circuits in the Preprocessing
                  Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {512},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/512},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardKM12,
  author       = {Ivan Bjerre Damg{\aa}rd and
                  Jonas K{\"{o}}lker and
                  Peter Bro Miltersen},
  title        = {Secret Sharing and Secure Computing from Monotone Formulae},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {536},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/536},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardKM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardKLPSS12,
  author       = {Ivan Damg{\aa}rd and
                  Marcel Keller and
                  Enrique Larraia and
                  Valerio Pastro and
                  Peter Scholl and
                  Nigel P. Smart},
  title        = {Practical Covertly Secure {MPC} for Dishonest Majority - or: Breaking
                  the {SPDZ} Limits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {642},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/642},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardKLPSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardP12,
  author       = {Ivan Damg{\aa}rd and
                  Sunoo Park},
  title        = {Is Public-Key Encryption Based on {LPN} Practical?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {699},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/699},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BendlinDOZ11,
  author       = {Rikke Bendlin and
                  Ivan Damg{\aa}rd and
                  Claudio Orlandi and
                  Sarah Zakarias},
  editor       = {Kenneth G. Paterson},
  title        = {Semi-homomorphic Encryption and Multiparty Computation},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tallinn, Estonia, May 15-19, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6632},
  pages        = {169--188},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20465-4\_11},
  doi          = {10.1007/978-3-642-20465-4\_11},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BendlinDOZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Damgard11,
  author       = {Ivan Damg{\aa}rd},
  editor       = {Serge Fehr},
  title        = {Quantum Communication Attacks on Classical Cryptographic Protocols
                  - (Invited Talk)},
  booktitle    = {Information Theoretic Security - 5th International Conference, {ICITS}
                  2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6673},
  pages        = {181},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20728-0\_16},
  doi          = {10.1007/978-3-642-20728-0\_16},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/Damgard11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DamgardMN11,
  author       = {Ivan Damg{\aa}rd and
                  Sigurd Meldgaard and
                  Jesper Buus Nielsen},
  editor       = {Yuval Ishai},
  title        = {Perfectly Secure Oblivious {RAM} without Random Oracles},
  booktitle    = {Theory of Cryptography - 8th Theory of Cryptography Conference, {TCC}
                  2011, Providence, RI, USA, March 28-30, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6597},
  pages        = {144--163},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19571-6\_10},
  doi          = {10.1007/978-3-642-19571-6\_10},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/DamgardMN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1108-6313,
  author       = {Ivan Damg{\aa}rd and
                  Jakob Funder and
                  Jesper Buus Nielsen and
                  Louis Salvail},
  title        = {Superposition Attacks on Cryptographic Protocols},
  journal      = {CoRR},
  volume       = {abs/1108.6313},
  year         = {2011},
  url          = {http://arxiv.org/abs/1108.6313},
  eprinttype    = {arXiv},
  eprint       = {1108.6313},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1108-6313.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerDKZZ11,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Eike Kiltz and
                  Sarah Zakarias and
                  Angela Zottarel},
  title        = {DDH-like Assumptions Based on Extension Rings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {280},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/280},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerDKZZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerDP11,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Valerio Pastro},
  title        = {On the Amortized Complexity of Zero Knowledge Protocols for Multiplicative
                  Relations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {301},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/301},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerDP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardFNS11,
  author       = {Ivan Damg{\aa}rd and
                  Jakob Funder and
                  Jesper Buus Nielsen and
                  Louis Salvail},
  title        = {Superposition Attacks on Cryptographic Protocols\}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {421},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/421},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardFNS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardFH11,
  author       = {Ivan Damg{\aa}rd and
                  Sebastian Faust and
                  Carmit Hazay},
  title        = {Secure Two-Party Computation with Low Communication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {508},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/508},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardFH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardPSZ11,
  author       = {Ivan Damg{\aa}rd and
                  Valerio Pastro and
                  Nigel P. Smart and
                  Sarah Zakarias},
  title        = {Multiparty Computation from Somewhat Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {535},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/535},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardPSZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/DamgardJN10,
  author       = {Ivan Damg{\aa}rd and
                  Mads Jurik and
                  Jesper Buus Nielsen},
  title        = {A generalization of Paillier's public-key system with applications
                  to electronic voting},
  journal      = {Int. J. Inf. Sec.},
  volume       = {9},
  number       = {6},
  pages        = {371--385},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10207-010-0119-9},
  doi          = {10.1007/S10207-010-0119-9},
  timestamp    = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/DamgardJN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DamgardO10,
  author       = {Ivan Damg{\aa}rd and
                  Claudio Orlandi},
  editor       = {Tal Rabin},
  title        = {Multiparty Computation for Dishonest Majority: From Passive to Active
                  Security at Low Cost},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {558--576},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7\_30},
  doi          = {10.1007/978-3-642-14623-7\_30},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DamgardO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DamgardIK10,
  author       = {Ivan Damg{\aa}rd and
                  Yuval Ishai and
                  Mikkel Kr{\o}igaard},
  editor       = {Henri Gilbert},
  title        = {Perfectly Secure Multiparty Computation and the Computational Overhead
                  of Cryptography},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Monaco / French Riviera, May 30 - June 3, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6110},
  pages        = {445--465},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13190-5\_23},
  doi          = {10.1007/978-3-642-13190-5\_23},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DamgardIK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/DamgardK10,
  author       = {Ivan Damg{\aa}rd and
                  Marcel Keller},
  editor       = {Radu Sion},
  title        = {Secure Multiparty {AES}},
  booktitle    = {Financial Cryptography and Data Security, 14th International Conference,
                  {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6052},
  pages        = {367--374},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14577-3\_31},
  doi          = {10.1007/978-3-642-14577-3\_31},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/DamgardK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DamgardNO10,
  author       = {Ivan Damg{\aa}rd and
                  Jesper Buus Nielsen and
                  Claudio Orlandi},
  editor       = {Daniele Micciancio},
  title        = {On the Necessary and Sufficient Assumptions for {UC} Computation},
  booktitle    = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
                  2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5978},
  pages        = {109--127},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11799-2\_8},
  doi          = {10.1007/978-3-642-11799-2\_8},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/DamgardNO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DamgardGN10,
  author       = {Ivan Damg{\aa}rd and
                  Martin Geisler and
                  Jesper Buus Nielsen},
  editor       = {Daniele Micciancio},
  title        = {From Passive to Covert Security at Low Cost},
  booktitle    = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
                  2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5978},
  pages        = {128--145},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11799-2\_9},
  doi          = {10.1007/978-3-642-11799-2\_9},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/DamgardGN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DamgardM10,
  author       = {Ivan Damg{\aa}rd and
                  Gert L{\ae}ss{\o}e Mikkelsen},
  editor       = {Daniele Micciancio},
  title        = {Efficient, Robust and Constant-Round Distributed {RSA} Key Generation},
  booktitle    = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
                  2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5978},
  pages        = {183--200},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11799-2\_12},
  doi          = {10.1007/978-3-642-11799-2\_12},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/DamgardM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BendlinD10,
  author       = {Rikke Bendlin and
                  Ivan Damg{\aa}rd},
  editor       = {Daniele Micciancio},
  title        = {Threshold Decryption and Zero-Knowledge Proofs for Lattice-Based Cryptosystems},
  booktitle    = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
                  2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5978},
  pages        = {201--218},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11799-2\_13},
  doi          = {10.1007/978-3-642-11799-2\_13},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/BendlinD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardIK10,
  author       = {Ivan Damg{\aa}rd and
                  Yuval Ishai and
                  Mikkel Kr{\o}igaard},
  title        = {Perfectly Secure Multiparty Computation and the Computational Overhead
                  of Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {106},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/106},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardIK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardMN10,
  author       = {Ivan Damg{\aa}rd and
                  Sigurd Meldgaard and
                  Jesper Buus Nielsen},
  title        = {Perfectly Secure Oblivious {RAM} Without Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {108},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/108},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardMN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardO10,
  author       = {Ivan Damg{\aa}rd and
                  Claudio Orlandi},
  title        = {Multiparty Computation for Dishonest Majority: from Passive to Active
                  Security at Low Cost},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {318},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/318},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BendlinDOZ10,
  author       = {Rikke Bendlin and
                  Ivan Damg{\aa}rd and
                  Claudio Orlandi and
                  Sarah Zakarias},
  title        = {Semi-Homomorphic Encryption and Multiparty Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {514},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/514},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BendlinDOZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/DamgardGK09,
  author       = {Ivan Damg{\aa}rd and
                  Martin Geisler and
                  Mikkel Kr{\o}igaard},
  title        = {A correction to 'efficient and secure comparison for on-line auctions'},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {1},
  number       = {4},
  pages        = {323--324},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJACT.2009.028031},
  doi          = {10.1504/IJACT.2009.028031},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/DamgardGK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DamgardL09,
  author       = {Ivan Damg{\aa}rd and
                  Carolin Lunemann},
  editor       = {Mitsuru Matsui},
  title        = {Quantum-Secure Coin-Flipping and Applications},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {52--69},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_4},
  doi          = {10.1007/978-3-642-10366-7\_4},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/DamgardL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CramerD09,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd},
  editor       = {Shai Halevi},
  title        = {On the Amortized Complexity of Zero-Knowledge Protocols},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {177--191},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_11},
  doi          = {10.1007/978-3-642-03356-8\_11},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CramerD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DamgardFLSS09,
  author       = {Ivan Damg{\aa}rd and
                  Serge Fehr and
                  Carolin Lunemann and
                  Louis Salvail and
                  Christian Schaffner},
  editor       = {Shai Halevi},
  title        = {Improving the Security of Quantum Protocols via Commit-and-Open},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {408--427},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_24},
  doi          = {10.1007/978-3-642-03356-8\_24},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DamgardFLSS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/BogetoftCDGJKNNNPST09,
  author       = {Peter Bogetoft and
                  Dan Lund Christensen and
                  Ivan Damg{\aa}rd and
                  Martin Geisler and
                  Thomas P. Jakobsen and
                  Mikkel Kr{\o}igaard and
                  Janus Dam Nielsen and
                  Jesper Buus Nielsen and
                  Kurt Nielsen and
                  Jakob Pagter and
                  Michael I. Schwartzbach and
                  Tomas Toft},
  editor       = {Roger Dingledine and
                  Philippe Golle},
  title        = {Secure Multiparty Computation Goes Live},
  booktitle    = {Financial Cryptography and Data Security, 13th International Conference,
                  {FC} 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5628},
  pages        = {325--343},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03549-4\_20},
  doi          = {10.1007/978-3-642-03549-4\_20},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/BogetoftCDGJKNNNPST09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/BangerterBBDPPS09,
  author       = {Endre Bangerter and
                  Manuel Barbosa and
                  Daniel J. Bernstein and
                  Ivan Damg{\aa}rd and
                  Daniel Page and
                  Jakob Illeborg Pagter and
                  Ahmad{-}Reza Sadeghi and
                  Sampo Sovio},
  editor       = {Norbert Pohlmann and
                  Helmut Reimer and
                  Wolfgang Schneider},
  title        = {Using Compilers to Enhance Cryptographic Product Development},
  booktitle    = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2009 Conference, The Hague,
                  The Netherlands, October 6-8, 2009},
  pages        = {291--301},
  publisher    = {Vieweg+Teubner},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-8348-9363-5\_29},
  doi          = {10.1007/978-3-8348-9363-5\_29},
  timestamp    = {Wed, 10 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isse/BangerterBBDPPS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DamgardGKN09,
  author       = {Ivan Damg{\aa}rd and
                  Martin Geisler and
                  Mikkel Kr{\o}igaard and
                  Jesper Buus Nielsen},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {Asynchronous Multiparty Computation: Theory and Implementation},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {160--179},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_10},
  doi          = {10.1007/978-3-642-00468-1\_10},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DamgardGKN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DamgardM09,
  author       = {Ivan Damg{\aa}rd and
                  Gert L{\ae}ss{\o}e Mikkelsen},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {On the Theory and Practice of Personal Digital Signatures},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {277--296},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_16},
  doi          = {10.1007/978-3-642-00468-1\_16},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DamgardM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DamgardNW09,
  author       = {Ivan Damg{\aa}rd and
                  Jesper Buus Nielsen and
                  Daniel Wichs},
  editor       = {Omer Reingold},
  title        = {Universally Composable Multiparty Computation with Partially Isolated
                  Parties},
  booktitle    = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
                  2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5444},
  pages        = {315--331},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00457-5\_19},
  doi          = {10.1007/978-3-642-00457-5\_19},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/DamgardNW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardM09,
  author       = {Ivan Damg{\aa}rd and
                  Gert L{\ae}ss{\o}e Mikkelsen},
  title        = {On the Theory and Practice of Personal Digital Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {171},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/171},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardNO09,
  author       = {Ivan Damg{\aa}rd and
                  Jesper Buus Nielsen and
                  Claudio Orlandi},
  title        = {On the Necessary and Sufficient Assumptions for {UC} Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {247},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/247},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardNO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BendlinD09,
  author       = {Rikke Bendlin and
                  Ivan Damg{\aa}rd},
  title        = {Threshold Decryption and Zero-Knowledge Proofs for Lattice-Based Cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {391},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/391},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BendlinD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardGN09,
  author       = {Ivan Damg{\aa}rd and
                  Martin Geisler and
                  Jesper Buus Nielsen},
  title        = {From Passive to Covert Security at Low Cost},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {592},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/592},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardGN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardK09,
  author       = {Ivan Damg{\aa}rd and
                  Marcel Keller},
  title        = {Secure Multiparty {AES} (full paper)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {614},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/614},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/DamgardGK08,
  author       = {Ivan Damg{\aa}rd and
                  Martin Geisler and
                  Mikkel Kr{\o}igaard},
  title        = {Homomorphic encryption and secure comparison},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {1},
  number       = {1},
  pages        = {22--31},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJACT.2008.017048},
  doi          = {10.1504/IJACT.2008.017048},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/DamgardGK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/DamgardFSS08,
  author       = {Ivan Damg{\aa}rd and
                  Serge Fehr and
                  Louis Salvail and
                  Christian Schaffner},
  title        = {Cryptography in the Bounded-Quantum-Storage Model},
  journal      = {{SIAM} J. Comput.},
  volume       = {37},
  number       = {6},
  pages        = {1865--1890},
  year         = {2008},
  url          = {https://doi.org/10.1137/060651343},
  doi          = {10.1137/060651343},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/DamgardFSS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/DamgardKT08,
  author       = {Ivan Damg{\aa}rd and
                  Lars R. Knudsen and
                  S{\o}ren S. Thomsen},
  editor       = {Steven M. Bellovin and
                  Rosario Gennaro and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Dakota- Hashing from a Combination of Modular Arithmetic and Symmetric
                  Cryptography},
  booktitle    = {Applied Cryptography and Network Security, 6th International Conference,
                  {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5037},
  pages        = {144--155},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68914-0\_9},
  doi          = {10.1007/978-3-540-68914-0\_9},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/DamgardKT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DamgardIKNS08,
  author       = {Ivan Damg{\aa}rd and
                  Yuval Ishai and
                  Mikkel Kr{\o}igaard and
                  Jesper Buus Nielsen and
                  Adam D. Smith},
  editor       = {David A. Wagner},
  title        = {Scalable Multiparty Computation with Nearly Optimal Work and Resilience},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2008, 28th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5157},
  pages        = {241--261},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85174-5\_14},
  doi          = {10.1007/978-3-540-85174-5\_14},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DamgardIKNS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/DamgardHKT08,
  author       = {Ivan Damg{\aa}rd and
                  Dennis Hofheinz and
                  Eike Kiltz and
                  Rune Thorbek},
  editor       = {Tal Malkin},
  title        = {Public-Key Encryption with Non-interactive Opening},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2008, The Cryptographers' Track at
                  the {RSA} Conference 2008, San Francisco, CA, USA, April 8-11, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4964},
  pages        = {239--255},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79263-5\_15},
  doi          = {10.1007/978-3-540-79263-5\_15},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/DamgardHKT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/DamgardP08,
  author       = {Ivan Damg{\aa}rd and
                  Michael {\O}stergaard Pedersen},
  editor       = {Tal Malkin},
  title        = {{RFID} Security: Tradeoffs between Security and Efficiency},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2008, The Cryptographers' Track at
                  the {RSA} Conference 2008, San Francisco, CA, USA, April 8-11, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4964},
  pages        = {318--332},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79263-5\_20},
  doi          = {10.1007/978-3-540-79263-5\_20},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/DamgardP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DamgardNW08,
  author       = {Ivan Damg{\aa}rd and
                  Jesper Buus Nielsen and
                  Daniel Wichs},
  editor       = {Nigel P. Smart},
  title        = {Isolated Proofs of Knowledge and Isolated Zero Knowledge},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2008, 27th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Istanbul, Turkey, April 13-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4965},
  pages        = {509--526},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78967-3\_29},
  doi          = {10.1007/978-3-540-78967-3\_29},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DamgardNW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/DamgardNO08,
  author       = {Ivan Damg{\aa}rd and
                  Jesper Buus Nielsen and
                  Claudio Orlandi},
  editor       = {Pil Joong Lee and
                  Jung Hee Cheon},
  title        = {Essentially Optimal Universally Composable Oblivious Transfer},
  booktitle    = {Information Security and Cryptology - {ICISC} 2008, 11th International
                  Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5461},
  pages        = {318--335},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-00730-9\_20},
  doi          = {10.1007/978-3-642-00730-9\_20},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/DamgardNO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icalp/2008-1,
  editor       = {Luca Aceto and
                  Ivan Damg{\aa}rd and
                  Leslie Ann Goldberg and
                  Magn{\'{u}}s M. Halld{\'{o}}rsson and
                  Anna Ing{\'{o}}lfsd{\'{o}}ttir and
                  Igor Walukiewicz},
  title        = {Automata, Languages and Programming, 35th International Colloquium,
                  {ICALP} 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part
                  {I:} Tack {A:} Algorithms, Automata, Complexity, and Games},
  series       = {Lecture Notes in Computer Science},
  volume       = {5125},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70575-8},
  doi          = {10.1007/978-3-540-70575-8},
  isbn         = {978-3-540-70574-1},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icalp/2008-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icalp/2008-2,
  editor       = {Luca Aceto and
                  Ivan Damg{\aa}rd and
                  Leslie Ann Goldberg and
                  Magn{\'{u}}s M. Halld{\'{o}}rsson and
                  Anna Ing{\'{o}}lfsd{\'{o}}ttir and
                  Igor Walukiewicz},
  title        = {Automata, Languages and Programming, 35th International Colloquium,
                  {ICALP} 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part
                  {II} - Track {B:} Logic, Semantics, and Theory of Programming {\&}
                  Track {C:} Security and Cryptography Foundations},
  series       = {Lecture Notes in Computer Science},
  volume       = {5126},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70583-3},
  doi          = {10.1007/978-3-540-70583-3},
  isbn         = {978-3-540-70582-6},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icalp/2008-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ercim/DamgardT08,
  author       = {Ivan Damg{\aa}rd and
                  Tomas Toft},
  title        = {Trading Sugar Beet Quotas - Secure Multiparty Computation in Practice},
  journal      = {{ERCIM} News},
  volume       = {2008},
  number       = {73},
  year         = {2008},
  url          = {http://ercim-news.ercim.eu/trading-sugar-beet-quotas-secure-multiparty-computation-in-practice},
  timestamp    = {Wed, 22 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ercim/DamgardT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BogetoftCDGJKNNNPST08,
  author       = {Peter Bogetoft and
                  Dan Lund Christensen and
                  Ivan Damg{\aa}rd and
                  Martin Geisler and
                  Thomas P. Jakobsen and
                  Mikkel Kr{\o}igaard and
                  Janus Dam Nielsen and
                  Jesper Buus Nielsen and
                  Kurt Nielsen and
                  Jakob Pagter and
                  Michael I. Schwartzbach and
                  Tomas Toft},
  title        = {Multiparty Computation Goes Live},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {68},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/068},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BogetoftCDGJKNNNPST08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardNO08,
  author       = {Ivan Damg{\aa}rd and
                  Jesper Buus Nielsen and
                  Claudio Orlandi},
  title        = {Essentially Optimal Universally Composable Oblivious Transfer},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {220},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/220},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardNO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardT08,
  author       = {Ivan Damg{\aa}rd and
                  Rune Thorbek},
  title        = {Efficient Conversion of Secret-shared Values Between Different Fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {221},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/221},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardGK08,
  author       = {Ivan Damg{\aa}rd and
                  Martin Geisler and
                  Mikkel Kr{\o}igaard},
  title        = {A correction to "Efficient and Secure Comparison for On-Line
                  Auctions"},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {321},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/321},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardGK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardGKN08,
  author       = {Ivan Damg{\aa}rd and
                  Martin Geisler and
                  Mikkel Kr{\o}igaard and
                  Jesper Buus Nielsen},
  title        = {Asynchronous Multiparty Computation: Theory and Implementation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {415},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/415},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardGKN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardT08a,
  author       = {Ivan Damg{\aa}rd and
                  Nikos Triandopoulos},
  title        = {Supporting Non-membership Proofs with Bilinear-map Accumulators},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {538},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/538},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardT08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/DamgardGK07,
  author       = {Ivan Damg{\aa}rd and
                  Martin Geisler and
                  Mikkel Kr{\o}igaard},
  editor       = {Josef Pieprzyk and
                  Hossein Ghodosi and
                  Ed Dawson},
  title        = {Efficient and Secure Comparison for On-Line Auctions},
  booktitle    = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
                  2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4586},
  pages        = {416--430},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73458-1\_30},
  doi          = {10.1007/978-3-540-73458-1\_30},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/DamgardGK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DamgardDFN07,
  author       = {Ivan Damg{\aa}rd and
                  Yvo Desmedt and
                  Matthias Fitzi and
                  Jesper Buus Nielsen},
  editor       = {Kaoru Kurosawa},
  title        = {Secure Protocols with Asymmetric Trust},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2007, 13th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kuching, Malaysia, December 2-6, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4833},
  pages        = {357--375},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76900-2\_22},
  doi          = {10.1007/978-3-540-76900-2\_22},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/DamgardDFN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DamgardFSS07,
  author       = {Ivan Damg{\aa}rd and
                  Serge Fehr and
                  Louis Salvail and
                  Christian Schaffner},
  editor       = {Alfred Menezes},
  title        = {Secure Identification and {QKD} in the Bounded-Quantum-Storage Model},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2007, 27th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4622},
  pages        = {342--359},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74143-5\_19},
  doi          = {10.1007/978-3-540-74143-5\_19},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DamgardFSS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DamgardFRSS07,
  author       = {Ivan Damg{\aa}rd and
                  Serge Fehr and
                  Renato Renner and
                  Louis Salvail and
                  Christian Schaffner},
  editor       = {Alfred Menezes},
  title        = {A Tight High-Order Entropic Quantum Uncertainty Relation with Applications},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2007, 27th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4622},
  pages        = {360--378},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74143-5\_20},
  doi          = {10.1007/978-3-540-74143-5\_20},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DamgardFRSS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DamgardN07,
  author       = {Ivan Damg{\aa}rd and
                  Jesper Buus Nielsen},
  editor       = {Alfred Menezes},
  title        = {Scalable and Unconditionally Secure Multiparty Computation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2007, 27th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4622},
  pages        = {572--590},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74143-5\_32},
  doi          = {10.1007/978-3-540-74143-5\_32},
  timestamp    = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/DamgardN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CramerDH07,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Robbert de Haan},
  editor       = {Moni Naor},
  title        = {Atomic Secure Multi-party Multiplication with Low Communication},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2007, 26th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Barcelona, Spain, May 20-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4515},
  pages        = {329--346},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72540-4\_19},
  doi          = {10.1007/978-3-540-72540-4\_19},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CramerDH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DamgardT07,
  author       = {Ivan Damg{\aa}rd and
                  Rune Thorbek},
  editor       = {Moni Naor},
  title        = {Non-interactive Proofs for Integer Multiplication},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2007, 26th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Barcelona, Spain, May 20-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4515},
  pages        = {412--429},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72540-4\_24},
  doi          = {10.1007/978-3-540-72540-4\_24},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DamgardT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/Damgard07,
  author       = {Ivan Damg{\aa}rd},
  editor       = {Lars Arge and
                  Christian Cachin and
                  Tomasz Jurdzinski and
                  Andrzej Tarlecki},
  title        = {A "proof-reading" of Some Issues in Cryptography},
  booktitle    = {Automata, Languages and Programming, 34th International Colloquium,
                  {ICALP} 2007, Wroclaw, Poland, July 9-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4596},
  pages        = {2--11},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73420-8\_2},
  doi          = {10.1007/978-3-540-73420-8\_2},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/Damgard07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardT07,
  author       = {Ivan Damg{\aa}rd and
                  Rune Thorbek},
  title        = {Non-Interactive Proofs for Integer Multiplication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {86},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/086},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardFSS07,
  author       = {Ivan Damg{\aa}rd and
                  Serge Fehr and
                  Louis Salvail and
                  Christian Schaffner},
  title        = {Secure Identification and {QKD} in the Bounded-Quantum-Storage Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {327},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/327},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardFSS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardFRSS07,
  author       = {Ivan Damg{\aa}rd and
                  Serge Fehr and
                  Renato Renner and
                  Louis Salvail and
                  Christian Schaffner},
  title        = {A Tight High-Order Entropic Quantum Uncertainty Relation With Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {328},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/328},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardFRSS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardNW07,
  author       = {Ivan Damg{\aa}rd and
                  Jesper Buus Nielsen and
                  Daniel Wichs},
  title        = {Isolated Proofs of Knowledge and Isolated Zero Knowledge},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {331},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/331},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardNW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardNW07a,
  author       = {Ivan Damg{\aa}rd and
                  Jesper Buus Nielsen and
                  Daniel Wichs},
  title        = {Universally Composable Multiparty Computation with Partially Isolated
                  Parties},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {332},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/332},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardNW07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/DamgardF06,
  author       = {Ivan Damg{\aa}rd and
                  Gudmund Skovbjerg Frandsen},
  title        = {An Extended Quadratic Frobenius Primality Test with Average- and Worst-Case
                  Error Estimate},
  journal      = {J. Cryptol.},
  volume       = {19},
  number       = {4},
  pages        = {489--520},
  year         = {2006},
  url          = {https://doi.org/10.1007/s00145-006-0332-x},
  doi          = {10.1007/S00145-006-0332-X},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/DamgardF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DamgardFSS06,
  author       = {Ivan Damg{\aa}rd and
                  Serge Fehr and
                  Louis Salvail and
                  Christian Schaffner},
  editor       = {Cynthia Dwork},
  title        = {Oblivious Transfer and Linear Functions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2006, 26th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 20-24,
                  2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4117},
  pages        = {427--444},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11818175\_26},
  doi          = {10.1007/11818175\_26},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DamgardFSS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DamgardI06,
  author       = {Ivan Damg{\aa}rd and
                  Yuval Ishai},
  editor       = {Cynthia Dwork},
  title        = {Scalable Secure Multiparty Computation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2006, 26th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 20-24,
                  2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4117},
  pages        = {501--520},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11818175\_30},
  doi          = {10.1007/11818175\_30},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DamgardI06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DamgardDP06,
  author       = {Ivan Damg{\aa}rd and
                  Kasper Dupont and
                  Michael {\O}stergaard Pedersen},
  editor       = {Serge Vaudenay},
  title        = {Unclonable Group Identification},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4004},
  pages        = {555--572},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11761679\_33},
  doi          = {10.1007/11761679\_33},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DamgardDP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AlmansaDN06,
  author       = {Jes{\'{u}}s F. Almansa and
                  Ivan Damg{\aa}rd and
                  Jesper Buus Nielsen},
  editor       = {Serge Vaudenay},
  title        = {Simplified Threshold {RSA} with Adaptive and Proactive Security},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4004},
  pages        = {593--611},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11761679\_35},
  doi          = {10.1007/11761679\_35},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/AlmansaDN06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/BogetoftDJNPT06,
  author       = {Peter Bogetoft and
                  Ivan Damg{\aa}rd and
                  Thomas P. Jakobsen and
                  Kurt Nielsen and
                  Jakob Pagter and
                  Tomas Toft},
  editor       = {Giovanni Di Crescenzo and
                  Aviel D. Rubin},
  title        = {A Practical Implementation of Secure Auctions Based on Multiparty
                  Integer Computation},
  booktitle    = {Financial Cryptography and Data Security, 10th International Conference,
                  {FC} 2006, Anguilla, British West Indies, February 27-March 2, 2006,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4107},
  pages        = {142--147},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11889663\_10},
  doi          = {10.1007/11889663\_10},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/BogetoftDJNPT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DamgardT06,
  author       = {Ivan Damg{\aa}rd and
                  Rune Thorbek},
  editor       = {Moti Yung and
                  Yevgeniy Dodis and
                  Aggelos Kiayias and
                  Tal Malkin},
  title        = {Linear Integer Secret Sharing and Distributed Exponentiation},
  booktitle    = {Public Key Cryptography - {PKC} 2006, 9th International Conference
                  on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
                  April 24-26, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3958},
  pages        = {75--90},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11745853\_6},
  doi          = {10.1007/11745853\_6},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DamgardT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/Damgard06,
  author       = {Ivan Damg{\aa}rd},
  editor       = {Roberto De Prisco and
                  Moti Yung},
  title        = {Theory and Practice of Multiparty Computation},
  booktitle    = {Security and Cryptography for Networks, 5th International Conference,
                  {SCN} 2006, Maiori, Italy, September 6-8, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4116},
  pages        = {360--364},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11832072\_25},
  doi          = {10.1007/11832072\_25},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/Damgard06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DamgardFN06,
  author       = {Ivan Damg{\aa}rd and
                  Nelly Fazio and
                  Antonio Nicolosi},
  editor       = {Shai Halevi and
                  Tal Rabin},
  title        = {Non-interactive Zero-Knowledge from Homomorphic Encryption},
  booktitle    = {Theory of Cryptography, Third Theory of Cryptography Conference, {TCC}
                  2006, New York, NY, USA, March 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3876},
  pages        = {41--59},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11681878\_3},
  doi          = {10.1007/11681878\_3},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/DamgardFN06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DamgardFKNT06,
  author       = {Ivan Damg{\aa}rd and
                  Matthias Fitzi and
                  Eike Kiltz and
                  Jesper Buus Nielsen and
                  Tomas Toft},
  editor       = {Shai Halevi and
                  Tal Rabin},
  title        = {Unconditionally Secure Constant-Rounds Multi-party Computation for
                  Equality, Comparison, Bits and Exponentiation},
  booktitle    = {Theory of Cryptography, Third Theory of Cryptography Conference, {TCC}
                  2006, New York, NY, USA, March 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3876},
  pages        = {285--304},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11681878\_15},
  doi          = {10.1007/11681878\_15},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/DamgardFKNT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-quant-ph-0612014,
  author       = {Ivan Damg{\aa}rd and
                  Serge Fehr and
                  Renato Renner and
                  Louis Salvail and
                  Christian Schaffner},
  title        = {A Tight High-Order Entropic Quantum Uncertainty Relation With Applications},
  journal      = {CoRR},
  volume       = {abs/quant-ph/0612014},
  year         = {2006},
  url          = {http://arxiv.org/abs/quant-ph/0612014},
  eprinttype    = {arXiv},
  eprint       = {quant-ph/0612014},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-quant-ph-0612014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardT06,
  author       = {Ivan Damg{\aa}rd and
                  Rune Thorbek},
  title        = {Linear Integer Secret Sharing and Distributed Exponentiation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {44},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/044},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardO06,
  author       = {Ivan Damg{\aa}rd and
                  Michael {\O}stergaard Pedersen},
  title        = {{RFID} Security: Tradeoffs between Security and Efficiency},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {234},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/234},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0018105,
  author       = {Dario Catalano and
                  Ronald Cramer and
                  Ivan Bjerre Damg{\aa}rd and
                  Giovanni Di Crescenzo and
                  David Pointcheval},
  title        = {Contemporary cryptology},
  series       = {Advanced courses in mathematics : {CRM} Barcelona},
  publisher    = {Birkh{\"{a}}user},
  year         = {2005},
  isbn         = {978-3-7643-7294-1},
  timestamp    = {Fri, 12 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/0018105.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsc/DamgardF05,
  author       = {Ivan Damg{\aa}rd and
                  Gudmund Skovbjerg Frandsen},
  title        = {Efficient algorithms for the gcd and cubic residuosity in the ring
                  of Eisenstein integers},
  journal      = {J. Symb. Comput.},
  volume       = {39},
  number       = {6},
  pages        = {643--652},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.jsc.2004.02.006},
  doi          = {10.1016/J.JSC.2004.02.006},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsc/DamgardF05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DamgardI05,
  author       = {Ivan Damg{\aa}rd and
                  Yuval Ishai},
  editor       = {Victor Shoup},
  title        = {Constant-Round Multiparty Computation Using a Black-Box Pseudorandom
                  Generator},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 14-18,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3621},
  pages        = {378--394},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11535218\_23},
  doi          = {10.1007/11535218\_23},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DamgardI05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DamgardPS05,
  author       = {Ivan Damg{\aa}rd and
                  Thomas Brochmann Pedersen and
                  Louis Salvail},
  editor       = {Victor Shoup},
  title        = {A Quantum Cipher with Near Optimal Key-Recycling},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 14-18,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3621},
  pages        = {494--510},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11535218\_30},
  doi          = {10.1007/11535218\_30},
  timestamp    = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/DamgardPS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/DamgardFSS05,
  author       = {Ivan Damg{\aa}rd and
                  Serge Fehr and
                  Louis Salvail and
                  Christian Schaffner},
  title        = {Cryptography In the Bounded Quantum-Storage Model},
  booktitle    = {46th Annual {IEEE} Symposium on Foundations of Computer Science {(FOCS}
                  2005), 23-25 October 2005, Pittsburgh, PA, USA, Proceedings},
  pages        = {449--458},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/SFCS.2005.30},
  doi          = {10.1109/SFCS.2005.30},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/DamgardFSS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/DamgardFSS05,
  author       = {Ivan Bjerre Damg{\aa}rd and
                  Serge Fehr and
                  Louis Salvail and
                  Christian Schaffner},
  title        = {Cryptography in the bounded quantum-storage model},
  booktitle    = {{IEEE} Information Theory Workshop on Theory and Practice in Information-Theoretic
                  Security, {ICITS} 2005, Awaji Island, Japan, October 16-19, 2005},
  pages        = {24--27},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/ITWTPI.2005.1543950},
  doi          = {10.1109/ITWTPI.2005.1543950},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/DamgardFSS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DamgardD05,
  author       = {Ivan Damg{\aa}rd and
                  Kasper Dupont},
  editor       = {Serge Vaudenay},
  title        = {Efficient Threshold {RSA} Signatures with General Moduli and No Extra
                  Assumptions},
  booktitle    = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on
                  Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland,
                  January 23-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3386},
  pages        = {346--361},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30580-4\_24},
  doi          = {10.1007/978-3-540-30580-4\_24},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DamgardD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/CramerDI05,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Yuval Ishai},
  editor       = {Joe Kilian},
  title        = {Share Conversion, Pseudorandom Secret-Sharing and Applications to
                  Secure Computation},
  booktitle    = {Theory of Cryptography, Second Theory of Cryptography Conference,
                  {TCC} 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3378},
  pages        = {342--362},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30576-7\_19},
  doi          = {10.1007/978-3-540-30576-7\_19},
  timestamp    = {Sun, 02 Jun 2019 21:21:22 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/CramerDI05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-quant-ph-0508222,
  author       = {Ivan Damg{\aa}rd and
                  Serge Fehr and
                  Louis Salvail and
                  Christian Schaffner},
  title        = {Cryptography In the Bounded Quantum-Storage Model},
  journal      = {CoRR},
  volume       = {abs/quant-ph/0508222},
  year         = {2005},
  url          = {http://arxiv.org/abs/quant-ph/0508222},
  eprinttype    = {arXiv},
  eprint       = {quant-ph/0508222},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-quant-ph-0508222.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardFNT05,
  author       = {Ivan Damg{\aa}rd and
                  Matthias Fitzi and
                  Jesper Buus Nielsen and
                  Tomas Toft},
  title        = {How to Split a Shared Secret into Shared Bits in Constant-Round},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {140},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/140},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardFNT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardDP05,
  author       = {Ivan Damg{\aa}rd and
                  Kasper Dupont and
                  Michael {\O}stergaard Pedersen},
  title        = {Unclonable Group Identification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {170},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/170},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardDP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardI05,
  author       = {Ivan Damg{\aa}rd and
                  Yuval Ishai},
  title        = {Constant-Round Multiparty Computation Using a Black-Box Pseudorandom
                  Generator},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {262},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/262},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardI05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardFSS05,
  author       = {Ivan Damg{\aa}rd and
                  Serge Fehr and
                  Louis Salvail and
                  Christian Schaffner},
  title        = {Cryptography In the Bounded Quantum-Storage Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {291},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/291},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardFSS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardD05,
  author       = {Ivan Damg{\aa}rd and
                  Kasper Dupont},
  title        = {Universally Composable Disk Encryption Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {333},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/333},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgaardFSS05,
  author       = {Ivan Damg{\aa}rd and
                  Serge Fehr and
                  Louis Salvail and
                  Christian Schaffner},
  title        = {Oblivious Transfer and Linear Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {349},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/349},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgaardFSS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/CanettiDDIM04,
  author       = {Ran Canetti and
                  Ivan Damg{\aa}rd and
                  Stefan Dziembowski and
                  Yuval Ishai and
                  Tal Malkin},
  title        = {Adaptive versus Non-Adaptive Security of Multi-Party Protocols},
  journal      = {J. Cryptol.},
  volume       = {17},
  number       = {3},
  pages        = {153--207},
  year         = {2004},
  url          = {https://doi.org/10.1007/s00145-004-0135-x},
  doi          = {10.1007/S00145-004-0135-X},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/CanettiDDIM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DamgardFS04,
  author       = {Ivan Damg{\aa}rd and
                  Serge Fehr and
                  Louis Salvail},
  editor       = {Matthew K. Franklin},
  title        = {Zero-Knowledge Proofs and String Commitments Withstanding Quantum
                  Attacks},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2004, 24th Annual International
                  CryptologyConference, Santa Barbara, California, USA, August 15-19,
                  2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3152},
  pages        = {254--272},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28628-8\_16},
  doi          = {10.1007/978-3-540-28628-8\_16},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DamgardFS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DamgardPS04,
  author       = {Ivan Damg{\aa}rd and
                  Thomas Pedersen and
                  Louis Salvail},
  editor       = {Christian Cachin and
                  Jan Camenisch},
  title        = {On the Key-Uncertainty of Quantum Ciphers and the Computational Security
                  of One-Way Quantum Transmission},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Interlaken,
                  Switzerland, May 2-6, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3027},
  pages        = {91--108},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24676-3\_6},
  doi          = {10.1007/978-3-540-24676-3\_6},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DamgardPS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/CramerD04,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd},
  editor       = {Moni Naor},
  title        = {Secret-Key Zero-Knowlegde and Non-interactive Verifiable Exponentiation},
  booktitle    = {Theory of Cryptography, First Theory of Cryptography Conference, {TCC}
                  2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2951},
  pages        = {223--237},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24638-1\_13},
  doi          = {10.1007/978-3-540-24638-1\_13},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/CramerD04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DamgardFMS04,
  author       = {Ivan Damg{\aa}rd and
                  Serge Fehr and
                  Kirill Morozov and
                  Louis Salvail},
  editor       = {Moni Naor},
  title        = {Unfair Noisy Channels and Oblivious Transfer},
  booktitle    = {Theory of Cryptography, First Theory of Cryptography Conference, {TCC}
                  2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2951},
  pages        = {355--373},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24638-1\_20},
  doi          = {10.1007/978-3-540-24638-1\_20},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/DamgardFMS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardPS04,
  author       = {Ivan Damg{\aa}rd and
                  Thomas Pedersen and
                  Louis Salvail},
  title        = {On the Key-Uncertainty of Quantum Ciphers and the Computational Security
                  of One-way Quantum Transmission},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {162},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/162},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardPS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/DamgardJ03,
  author       = {Ivan Damg{\aa}rd and
                  Mads Jurik},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {A Length-Flexible Threshold Cryptosystem with Applications},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {350--364},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_30},
  doi          = {10.1007/3-540-45067-X\_30},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/DamgardJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DamgardN03,
  author       = {Ivan Damg{\aa}rd and
                  Jesper Buus Nielsen},
  editor       = {Dan Boneh},
  title        = {Universally Composable Efficient Multiparty Computation from Threshold
                  Homomorphic Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2003, 23rd Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 17-21,
                  2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2729},
  pages        = {247--264},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45146-4\_15},
  doi          = {10.1007/978-3-540-45146-4\_15},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DamgardN03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fct/DamgardF03,
  author       = {Ivan Damg{\aa}rd and
                  Gudmund Skovbjerg Frandsen},
  editor       = {Andrzej Lingas and
                  Bengt J. Nilsson},
  title        = {Efficient Algorithms for {GCD} and Cubic Residuosity in the Ring of
                  Eisenstein Integers},
  booktitle    = {Fundamentals of Computation Theory, 14th International Symposium,
                  {FCT} 2003, Malm{\"{o}}, Sweden, August 12-15, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2751},
  pages        = {109--117},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45077-1\_11},
  doi          = {10.1007/978-3-540-45077-1\_11},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/fct/DamgardF03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fct/DamgardF03a,
  author       = {Ivan Damg{\aa}rd and
                  Gudmund Skovbjerg Frandsen},
  editor       = {Andrzej Lingas and
                  Bengt J. Nilsson},
  title        = {An Extended Quadratic Frobenius Primality Test with Average and Worst
                  Case Error Estimates},
  booktitle    = {Fundamentals of Computation Theory, 14th International Symposium,
                  {FCT} 2003, Malm{\"{o}}, Sweden, August 12-15, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2751},
  pages        = {118--131},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45077-1\_12},
  doi          = {10.1007/978-3-540-45077-1\_12},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fct/DamgardF03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/DamgardG03,
  author       = {Ivan Damg{\aa}rd and
                  Jens Groth},
  editor       = {Lawrence L. Larmore and
                  Michel X. Goemans},
  title        = {Non-interactive and reusable non-malleable commitment schemes},
  booktitle    = {Proceedings of the 35th Annual {ACM} Symposium on Theory of Computing,
                  June 9-11, 2003, San Diego, CA, {USA}},
  pages        = {426--437},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/780542.780605},
  doi          = {10.1145/780542.780605},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/DamgardG03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/DamgardGS03,
  author       = {Ivan Damg{\aa}rd and
                  Jens Groth and
                  Gorm Salomonsen},
  editor       = {Dimitris Gritzalis},
  title        = {The Theory and Implementation of an Electronic Voting System},
  booktitle    = {Secure Electronic Voting},
  series       = {Advances in Information Security},
  volume       = {7},
  pages        = {77--98},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-1-4615-0239-5\_6},
  doi          = {10.1007/978-1-4615-0239-5\_6},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/DamgardGS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardG03,
  author       = {Ivan Damg{\aa}rd and
                  Jens Groth},
  title        = {Non-interactive and Reusable Non-malleable Commitment Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {80},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/080},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardG03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DamgardF02,
  author       = {Ivan Damg{\aa}rd and
                  Eiichiro Fujisaki},
  editor       = {Yuliang Zheng},
  title        = {A Statistically-Hiding Integer Commitment Scheme Based on Groups with
                  Hidden Order},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2002, 8th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Queenstown, New Zealand, December 1-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2501},
  pages        = {125--142},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36178-2\_8},
  doi          = {10.1007/3-540-36178-2\_8},
  timestamp    = {Tue, 30 Nov 2021 15:21:24 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/DamgardF02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DamgardN02,
  author       = {Ivan Damg{\aa}rd and
                  Jesper Buus Nielsen},
  editor       = {Moti Yung},
  title        = {Expanding Pseudorandom Functions; or: From Known-Plaintext Security
                  to Chosen-Plaintext Security},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2002, 22nd Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 18-22,
                  2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2442},
  pages        = {449--464},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45708-9\_29},
  doi          = {10.1007/3-540-45708-9\_29},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DamgardN02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DamgardN02a,
  author       = {Ivan Damg{\aa}rd and
                  Jesper Buus Nielsen},
  editor       = {Moti Yung},
  title        = {Perfect Hiding and Perfect Binding Universally Composable Commitment
                  Schemes with Constant Expansion Factor},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2002, 22nd Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 18-22,
                  2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2442},
  pages        = {581--596},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45708-9\_37},
  doi          = {10.1007/3-540-45708-9\_37},
  timestamp    = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/DamgardN02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DamgardK02,
  author       = {Ivan Damg{\aa}rd and
                  Maciej Koprowski},
  editor       = {Lars R. Knudsen},
  title        = {Generic Lower Bounds for Root Extraction and Signature Schemes in
                  General Groups},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2002, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Amsterdam,
                  The Netherlands, April 28 - May 2, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2332},
  pages        = {256--271},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-46035-7\_17},
  doi          = {10.1007/3-540-46035-7\_17},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DamgardK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DamgardJ02,
  author       = {Ivan Damg{\aa}rd and
                  Mads Jurik},
  editor       = {David Naccache and
                  Pascal Paillier},
  title        = {Client/Server Tradeoffs for Online Elections},
  booktitle    = {Public Key Cryptography, 5th International Workshop on Practice and
                  Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February
                  12-14, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2274},
  pages        = {125--140},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45664-3\_9},
  doi          = {10.1007/3-540-45664-3\_9},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DamgardJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardK02,
  author       = {Ivan Damg{\aa}rd and
                  Maciej Koprowski},
  title        = {Generic Lower Bounds for Root Extraction and Signature Schemes in
                  General Groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {13},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/013},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CramerD01,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd},
  editor       = {Joe Kilian},
  title        = {Secure Distributed Linear Algebra in a Constant Number of Rounds},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2001, 21st Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 19-23,
                  2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2139},
  pages        = {119--136},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44647-8\_7},
  doi          = {10.1007/3-540-44647-8\_7},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CramerD01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CramerDF01,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Serge Fehr},
  editor       = {Joe Kilian},
  title        = {On the Cost of Reconstructing a Secret, or {VSS} with Optimal Reconstruction
                  Phase},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2001, 21st Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 19-23,
                  2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2139},
  pages        = {503--523},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44647-8\_30},
  doi          = {10.1007/3-540-44647-8\_30},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CramerDF01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DamgardK01,
  author       = {Ivan Damg{\aa}rd and
                  Maciej Koprowski},
  editor       = {Birgit Pfitzmann},
  title        = {Practical Threshold {RSA} Signatures without a Trusted Dealer},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2001, International Conference
                  on the Theory and Application of Cryptographic Techniques, Innsbruck,
                  Austria, May 6-10, 2001, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {2045},
  pages        = {152--165},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44987-6\_10},
  doi          = {10.1007/3-540-44987-6\_10},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DamgardK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CanettiDDIM01,
  author       = {Ran Canetti and
                  Ivan Damg{\aa}rd and
                  Stefan Dziembowski and
                  Yuval Ishai and
                  Tal Malkin},
  editor       = {Birgit Pfitzmann},
  title        = {On Adaptive vs. Non-adaptive Security of Multiparty Protocols},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2001, International Conference
                  on the Theory and Application of Cryptographic Techniques, Innsbruck,
                  Austria, May 6-10, 2001, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {2045},
  pages        = {262--279},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44987-6\_17},
  doi          = {10.1007/3-540-44987-6\_17},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CanettiDDIM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CramerDN01,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Jesper Buus Nielsen},
  editor       = {Birgit Pfitzmann},
  title        = {Multiparty Computation from Threshold Homomorphic Encryption},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2001, International Conference
                  on the Theory and Application of Cryptographic Techniques, Innsbruck,
                  Austria, May 6-10, 2001, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {2045},
  pages        = {280--299},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44987-6\_18},
  doi          = {10.1007/3-540-44987-6\_18},
  timestamp    = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CramerDN01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DamgardJ01,
  author       = {Ivan Damg{\aa}rd and
                  Mads Jurik},
  editor       = {Kwangjo Kim},
  title        = {A Generalisation, a Simplification and Some Applications of Paillier's
                  Probabilistic Public-Key System},
  booktitle    = {Public Key Cryptography, 4th International Workshop on Practice and
                  Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea,
                  February 13-15, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1992},
  pages        = {119--136},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44586-2\_9},
  doi          = {10.1007/3-540-44586-2\_9},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DamgardJ01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiDDIM01,
  author       = {Ran Canetti and
                  Ivan Damg{\aa}rd and
                  Stefan Dziembowski and
                  Yuval Ishai and
                  Tal Malkin},
  title        = {On adaptive vs. non-adaptive security of multiparty protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {17},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/017},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiDDIM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardF01,
  author       = {Ivan Damg{\aa}rd and
                  Eiichiro Fujisaki},
  title        = {An Integer Commitment Scheme based on Groups with Hidden Order},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {64},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/064},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardF01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardN01,
  author       = {Ivan Damg{\aa}rd and
                  Jesper Buus Nielsen},
  title        = {Perfect Hiding and Perfect Binding Universally Composable Commitment
                  Schemes with Constant Expansion Factor},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {91},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/091},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardN01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgadF01,
  author       = {Ivan Damg{\aa}rd and
                  Gudmund Skovbjerg Frandsen},
  title        = {An Extended Quadratic Frobenius Primality Test with Average Case Error
                  Estimates},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {102},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/102},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgadF01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BoyarDP00,
  author       = {Joan Boyar and
                  Ivan Damg{\aa}rd and
                  Ren{\'{e}} Peralta},
  title        = {Short Non-Interactive Cryptographic Proofs},
  journal      = {J. Cryptol.},
  volume       = {13},
  number       = {4},
  pages        = {449--472},
  year         = {2000},
  url          = {https://doi.org/10.1007/s001450010011},
  doi          = {10.1007/S001450010011},
  timestamp    = {Fri, 03 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joc/BoyarDP00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/CamenischD00,
  author       = {Jan Camenisch and
                  Ivan Damg{\aa}rd},
  editor       = {Tatsuaki Okamoto},
  title        = {Verifiable Encryption, Group Encryption, and Their Applications to
                  Separable Group Signatures and Signature Sharing Schemes},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kyoto, Japan, December 3-7, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1976},
  pages        = {331--345},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44448-3\_25},
  doi          = {10.1007/3-540-44448-3\_25},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/CamenischD00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DamgardN00,
  author       = {Ivan Damg{\aa}rd and
                  Jesper Buus Nielsen},
  editor       = {Mihir Bellare},
  title        = {Improved Non-committing Encryption Schemes Based on a General Complexity
                  Assumption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 20-24,
                  2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1880},
  pages        = {432--450},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44598-6\_27},
  doi          = {10.1007/3-540-44598-6\_27},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DamgardN00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CramerDM00,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Ueli M. Maurer},
  editor       = {Bart Preneel},
  title        = {General Secure Multi-party Computation from any Linear Secret-Sharing
                  Scheme},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2000, International Conference
                  on the Theory and Application of Cryptographic Techniques, Bruges,
                  Belgium, May 14-18, 2000, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1807},
  pages        = {316--334},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-45539-6\_22},
  doi          = {10.1007/3-540-45539-6\_22},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CramerDM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Damgard00,
  author       = {Ivan Damg{\aa}rd},
  editor       = {Bart Preneel},
  title        = {Efficient Concurrent Zero-Knowledge in the Auxiliary String Model},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2000, International Conference
                  on the Theory and Application of Cryptographic Techniques, Bruges,
                  Belgium, May 14-18, 2000, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1807},
  pages        = {418--430},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-45539-6\_30},
  doi          = {10.1007/3-540-45539-6\_30},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Damgard00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CramerDM00,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Philip D. MacKenzie},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Efficient Zero-Knowledge Proofs of Knowledge Without Intractability
                  Assumptions},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {354--373},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_24},
  doi          = {10.1007/978-3-540-46588-1\_24},
  timestamp    = {Tue, 30 Nov 2021 15:21:24 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/CramerDM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/CramerDD00,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Stefan Dziembowski},
  editor       = {F. Frances Yao and
                  Eugene M. Luks},
  title        = {On the complexity of verifiable secret sharing and multiparty computation},
  booktitle    = {Proceedings of the Thirty-Second Annual {ACM} Symposium on Theory
                  of Computing, May 21-23, 2000, Portland, OR, {USA}},
  pages        = {325--334},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/335305.335343},
  doi          = {10.1145/335305.335343},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stoc/CramerDD00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardJ00,
  author       = {Ivan Damg{\aa}rd and
                  Mads Jurik},
  title        = {Efficient Protocols based on Probabilistic Encryption using Composite
                  Degree Residue Classes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {8},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/008},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardJ00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerDM00,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Ueli Maurer},
  title        = {General Secure Multi-Party Computation from any Linear Secret Sharing
                  Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {37},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/037},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerDM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerDD00,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Stefan Dziembowski},
  title        = {On the Complexity of Verifiable Secret Sharing and Multi-Party Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {38},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/038},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerDD00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerDM00a,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Philip D. MacKenzie},
  title        = {Efficient Zero-Knowledge Proofs of Knowledge Without Intractability
                  Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {45},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/045},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerDM00a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerDN00,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Jesper Buus Nielsen},
  title        = {Multiparty Computation from Threshold Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {55},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/055},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerDN00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DamgardKS99,
  author       = {Ivan Damg{\aa}rd and
                  Joe Kilian and
                  Louis Salvail},
  editor       = {Jacques Stern},
  title        = {On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment
                  on Weakened Security Assumptions},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '99, International Conference
                  on the Theory and Application of Cryptographic Techniques, Prague,
                  Czech Republic, May 2-6, 1999, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1592},
  pages        = {56--73},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48910-X\_5},
  doi          = {10.1007/3-540-48910-X\_5},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DamgardKS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CramerDDHR99,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Stefan Dziembowski and
                  Martin Hirt and
                  Tal Rabin},
  editor       = {Jacques Stern},
  title        = {Efficient Multiparty Computations Secure Against an Adaptive Adversary},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '99, International Conference
                  on the Theory and Application of Cryptographic Techniques, Prague,
                  Czech Republic, May 2-6, 1999, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1592},
  pages        = {311--326},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48910-X\_22},
  doi          = {10.1007/3-540-48910-X\_22},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CramerDDHR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ac/1998security,
  editor       = {Ivan Damg{\aa}rd},
  title        = {Lectures on Data Security, Modern Cryptology in Theory and Practice,
                  Summer School, Aarhus, Denmark, July 1998},
  series       = {Lecture Notes in Computer Science},
  volume       = {1561},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48969-X},
  doi          = {10.1007/3-540-48969-X},
  isbn         = {3-540-65757-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ac/1998security.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Damgard99,
  author       = {Ivan Damg{\aa}rd},
  title        = {An error in the mixed adversary protocol by Fitzi, Hirt and Maurer},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {3},
  year         = {1999},
  url          = {http://eprint.iacr.org/1999/003},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Damgard99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischD99,
  author       = {Jan Camenisch and
                  Ivan Damg{\aa}rd},
  title        = {Verifiable Encryption and Applications to Group Signatures and Signature
                  Sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {8},
  year         = {1999},
  url          = {http://eprint.iacr.org/1999/008},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CamenischD99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Damgard99a,
  author       = {Ivan Damg{\aa}rd},
  title        = {Concurrent Zero-Knowledge is Easy in Practice},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {14},
  year         = {1999},
  url          = {http://eprint.iacr.org/1999/014},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Damgard99a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BrandtDLP98,
  author       = {J{\o}rgen Brandt and
                  Ivan Damg{\aa}rd and
                  Peter Landrock and
                  Torben P. Pedersen},
  title        = {Zero-Knowledge Authentication Scheme with Secret Key Exchange},
  journal      = {J. Cryptol.},
  volume       = {11},
  number       = {3},
  pages        = {147--159},
  year         = {1998},
  url          = {https://doi.org/10.1007/s001459900041},
  doi          = {10.1007/S001459900041},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BrandtDLP98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/DamgardK98,
  author       = {Ivan Damg{\aa}rd and
                  Lars R. Knudsen},
  title        = {Two-Key Triple Encryption},
  journal      = {J. Cryptol.},
  volume       = {11},
  number       = {3},
  pages        = {209--218},
  year         = {1998},
  url          = {https://doi.org/10.1007/s001459900044},
  doi          = {10.1007/S001459900044},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/DamgardK98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/DamgardPP98,
  author       = {Ivan Damg{\aa}rd and
                  Torben P. Pedersen and
                  Birgit Pfitzmann},
  title        = {Statistical Secrecy and Multibit Commitments},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {44},
  number       = {3},
  pages        = {1143--1151},
  year         = {1998},
  url          = {https://doi.org/10.1109/18.669255},
  doi          = {10.1109/18.669255},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/DamgardPP98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ac/Damgard98,
  author       = {Ivan Damg{\aa}rd},
  editor       = {Ivan Damg{\aa}rd},
  title        = {Commitment Schemes and Zero-Knowledge Protocols},
  booktitle    = {Lectures on Data Security, Modern Cryptology in Theory and Practice,
                  Summer School, Aarhus, Denmark, July 1998},
  series       = {Lecture Notes in Computer Science},
  volume       = {1561},
  pages        = {63--86},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-48969-X\_3},
  doi          = {10.1007/3-540-48969-X\_3},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ac/Damgard98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CramerD98,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd},
  editor       = {Hugo Krawczyk},
  title        = {Zero-Knowledge Proofs for Finite Field Arithmetic; or: Can Zero-Knowledge
                  be for Free?},
  booktitle    = {Advances in Cryptology - {CRYPTO} '98, 18th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1462},
  pages        = {424--441},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0055745},
  doi          = {10.1007/BFB0055745},
  timestamp    = {Tue, 01 Jun 2021 15:21:29 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CramerD98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/DamgardP98,
  author       = {Ivan Damg{\aa}rd and
                  Birgit Pfitzmann},
  editor       = {Kim Guldstrand Larsen and
                  Sven Skyum and
                  Glynn Winskel},
  title        = {Sequential Iteration of Interactive Arguments and an Efficient Zero-Knowledge
                  Argument for {NP}},
  booktitle    = {Automata, Languages and Programming, 25th International Colloquium,
                  ICALP'98, Aalborg, Denmark, July 13-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1443},
  pages        = {772--783},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0055101},
  doi          = {10.1007/BFB0055101},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/DamgardP98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/DamgardPP97,
  author       = {Ivan Damg{\aa}rd and
                  Torben P. Pedersen and
                  Birgit Pfitzmann},
  title        = {On the Existence of Statistically Hiding Bit Commitment Schemes and
                  Fail-Stop Signatures},
  journal      = {J. Cryptol.},
  volume       = {10},
  number       = {3},
  pages        = {163--194},
  year         = {1997},
  url          = {https://doi.org/10.1007/s001459900026},
  doi          = {10.1007/S001459900026},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/DamgardPP97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CramerD97,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd},
  editor       = {Walter Fumy},
  title        = {Fast and Secure Immunization Against Adaptive Man-in-the-Middle Impersonation},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '97, International Conference
                  on the Theory and Application of Cryptographic Techniques, Konstanz,
                  Germany, May 11-15, 1997, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1233},
  pages        = {75--87},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/3-540-69053-0\_7},
  doi          = {10.1007/3-540-69053-0\_7},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CramerD97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/CramerD97,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd},
  editor       = {Frank Thomson Leighton and
                  Peter W. Shor},
  title        = {Linear Zero-Knowledge - {A} Note on Efficient Zero-Knowledge Proofs
                  and Arguments},
  booktitle    = {Proceedings of the Twenty-Ninth Annual {ACM} Symposium on the Theory
                  of Computing, El Paso, Texas, USA, May 4-6, 1997},
  pages        = {436--445},
  publisher    = {{ACM}},
  year         = {1997},
  url          = {https://doi.org/10.1145/258533.258635},
  doi          = {10.1145/258533.258635},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/CramerD97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CramesD96,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd},
  editor       = {Neal Koblitz},
  title        = {New Generation of Secure and Practical RSA-Based Signatures},
  booktitle    = {Advances in Cryptology - {CRYPTO} '96, 16th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1109},
  pages        = {173--185},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-68697-5\_14},
  doi          = {10.1007/3-540-68697-5\_14},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CramesD96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DamgardP96,
  author       = {Ivan Damg{\aa}rd and
                  Torben P. Pedersen},
  editor       = {Ueli M. Maurer},
  title        = {New Convertible Undeniable Signature Schemes},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '96, International Conference
                  on the Theory and Application of Cryptographic Techniques, Saragossa,
                  Spain, May 12-16, 1996, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1070},
  pages        = {372--386},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-68339-9\_32},
  doi          = {10.1007/3-540-68339-9\_32},
  timestamp    = {Fri, 25 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DamgardP96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/CramerDP96,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Torben P. Pedersen},
  editor       = {T. Mark A. Lomas},
  title        = {Efficient and Provable Security Amplifications},
  booktitle    = {Security Protocols, International Workshop, Cambridge, United Kingdom,
                  April 10-12, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1189},
  pages        = {101--109},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-62494-5\_9},
  doi          = {10.1007/3-540-62494-5\_9},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/CramerDP96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerD96,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd},
  title        = {On Monotone Function Closure of Statistical Zero-Knowledge},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {3},
  year         = {1996},
  url          = {http://eprint.iacr.org/1996/003},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerD96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerD96a,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd},
  title        = {Linear Zero-Knowledge - {A} note on Efficient Zero-Knowledge Proofs
                  and Arguments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {4},
  year         = {1996},
  url          = {http://eprint.iacr.org/1996/004},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerD96a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Damgard95,
  author       = {Ivan Damg{\aa}rd},
  title        = {Practical and Provably Secure Release of a Secret and Exchange of
                  Signatures},
  journal      = {J. Cryptol.},
  volume       = {8},
  number       = {4},
  pages        = {201--222},
  year         = {1995},
  url          = {https://doi.org/10.1007/BF00191356},
  doi          = {10.1007/BF00191356},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Damgard95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cpa/DamgardK95,
  author       = {Ivan Damg{\aa}rd and
                  Lars R. Knudsen},
  editor       = {Ed Dawson and
                  Jovan Dj. Golic},
  title        = {Multiple Encryption with Minimum Key},
  booktitle    = {Cryptography: Policy and Algorithms, International Conference, Brisbane,
                  Queensland, Australia, July 3-5, 1995, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1029},
  pages        = {156--164},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/BFb0032355},
  doi          = {10.1007/BFB0032355},
  timestamp    = {Sat, 19 Oct 2019 20:36:44 +0200},
  biburl       = {https://dblp.org/rec/conf/cpa/DamgardK95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CramerD95,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd},
  editor       = {Don Coppersmith},
  title        = {Secure Signature Schemes based on Interactive Protocols},
  booktitle    = {Advances in Cryptology - {CRYPTO} '95, 15th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {963},
  pages        = {297--310},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/3-540-44750-4\_24},
  doi          = {10.1007/3-540-44750-4\_24},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CramerD95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DamgardGOW95,
  author       = {Ivan Damg{\aa}rd and
                  Oded Goldreich and
                  Tatsuaki Okamoto and
                  Avi Wigderson},
  editor       = {Don Coppersmith},
  title        = {Honest Verifier vs Dishonest Verifier in Public Coin Zero-Knowledge
                  Proofs},
  booktitle    = {Advances in Cryptology - {CRYPTO} '95, 15th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {963},
  pages        = {325--338},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/3-540-44750-4\_26},
  doi          = {10.1007/3-540-44750-4\_26},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/DamgardGOW95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CramerDS94,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Berry Schoenmakers},
  editor       = {Yvo Desmedt},
  title        = {Proofs of Partial Knowledge and Simplified Design of Witness Hiding
                  Protocols},
  booktitle    = {Advances in Cryptology - {CRYPTO} '94, 14th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {839},
  pages        = {174--187},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-48658-5\_19},
  doi          = {10.1007/3-540-48658-5\_19},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CramerDS94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/ChenDP94,
  author       = {Lidong Chen and
                  Ivan Damg{\aa}rd and
                  Torben P. Pedersen},
  editor       = {Alfredo De Santis},
  title        = {Parallel Divertibility of Proofs of Knowledge (Extended Abstract)},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '94, Workshop on the Theory and
                  Application of Cryptographic Techniques, Perugia, Italy, May 9-12,
                  1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {950},
  pages        = {140--155},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/BFb0053431},
  doi          = {10.1007/BFB0053431},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/ChenDP94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Damgard93,
  author       = {Ivan Damg{\aa}rd},
  editor       = {Douglas R. Stinson},
  title        = {Interactive Hashing can Simplify Zero-Knowledge Protocol Design Without
                  Computational Assumptions (Extended Abstract)},
  booktitle    = {Advances in Cryptology - {CRYPTO} '93, 13th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {773},
  pages        = {100--109},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-48329-2\_9},
  doi          = {10.1007/3-540-48329-2\_9},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Damgard93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DamgardPP93,
  author       = {Ivan Damg{\aa}rd and
                  Torben P. Pedersen and
                  Birgit Pfitzmann},
  editor       = {Douglas R. Stinson},
  title        = {On the Existence of Statistically Hiding Bit Commitment Schemes and
                  Fail-Stop Signatures},
  booktitle    = {Advances in Cryptology - {CRYPTO} '93, 13th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {773},
  pages        = {250--265},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-48329-2\_22},
  doi          = {10.1007/3-540-48329-2\_22},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DamgardPP93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Damgard93,
  author       = {Ivan Damg{\aa}rd},
  editor       = {Tor Helleseth},
  title        = {Practical and Provably Secure Release of a Secret and Exchange of
                  Signatures},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27,
                  1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {765},
  pages        = {200--217},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-48285-7\_17},
  doi          = {10.1007/3-540-48285-7\_17},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Damgard93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DamgardK93,
  author       = {Ivan Damg{\aa}rd and
                  Lars R. Knudsen},
  editor       = {Tor Helleseth},
  title        = {The Breaking of the {AR} Hash Function},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27,
                  1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {765},
  pages        = {286--292},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-48285-7\_25},
  doi          = {10.1007/3-540-48285-7\_25},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DamgardK93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BrandtD92,
  author       = {J{\o}rgen Brandt and
                  Ivan Damg{\aa}rd},
  editor       = {Ernest F. Brickell},
  title        = {On Generation of Probable Primes By Incremental Search},
  booktitle    = {Advances in Cryptology - {CRYPTO} '92, 12th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {740},
  pages        = {358--370},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/3-540-48071-4\_26},
  doi          = {10.1007/3-540-48071-4\_26},
  timestamp    = {Tue, 01 Jun 2021 15:21:29 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BrandtD92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Damgard92,
  author       = {Ivan Damg{\aa}rd},
  editor       = {Rainer A. Rueppel},
  title        = {Non-Interactive Circuit Based Proofs and Non-Interactive Perfect Zero-knowledge
                  with Proprocessing},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '92, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Balatonf{\"{u}}red,
                  Hungary, May 24-28, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {658},
  pages        = {341--355},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/3-540-47555-9\_28},
  doi          = {10.1007/3-540-47555-9\_28},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Damgard92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/ChenD92,
  author       = {Lidong Chen and
                  Ivan Damg{\aa}rd},
  editor       = {Rainer A. Rueppel},
  title        = {Security Bounds for Parallel Versions of Identification Protocols
                  (Extended Abstract)},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '92, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Balatonf{\"{u}}red,
                  Hungary, May 24-28, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {658},
  pages        = {461--466},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/3-540-47555-9\_40},
  doi          = {10.1007/3-540-47555-9\_40},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/ChenD92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BrandtDL91,
  author       = {J{\o}rgen Brandt and
                  Ivan Damg{\aa}rd and
                  Peter Landrock},
  editor       = {Hideki Imai and
                  Ronald L. Rivest and
                  Tsutomu Matsumoto},
  title        = {Speeding up Prime Number Generation},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '91, International Conference
                  on the Theory and Applications of Cryptology, Fujiyoshida, Japan,
                  November 11-14, 1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {739},
  pages        = {440--449},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-57332-1\_37},
  doi          = {10.1007/3-540-57332-1\_37},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BrandtDL91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Damgard91,
  author       = {Ivan Damg{\aa}rd},
  editor       = {Joan Feigenbaum},
  title        = {Towards Practical Public Key Systems Secure Against Chosen Ciphertext
                  Attacks},
  booktitle    = {Advances in Cryptology - {CRYPTO} '91, 11th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {576},
  pages        = {445--456},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-46766-1\_36},
  doi          = {10.1007/3-540-46766-1\_36},
  timestamp    = {Fri, 17 Jul 2020 16:12:45 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Damgard91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/90,
  editor       = {Ivan Damg{\aa}rd},
  title        = {Advances in Cryptology - {EUROCRYPT} '90, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Aarhus, Denmark, May 21-24,
                  1990, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {473},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-46877-3},
  doi          = {10.1007/3-540-46877-3},
  isbn         = {3-540-53587-X},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BoyarCDP90,
  author       = {Joan Boyar and
                  David Chaum and
                  Ivan Damg{\aa}rd and
                  Torben P. Pedersen},
  editor       = {Alfred Menezes and
                  Scott A. Vanstone},
  title        = {Convertible Undeniable Signatures},
  booktitle    = {Advances in Cryptology - {CRYPTO} '90, 10th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {537},
  pages        = {189--205},
  publisher    = {Springer},
  year         = {1990},
  url          = {https://doi.org/10.1007/3-540-38424-3\_14},
  doi          = {10.1007/3-540-38424-3\_14},
  timestamp    = {Fri, 17 Jul 2020 16:12:45 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BoyarCDP90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Damgard89,
  author       = {Ivan Damg{\aa}rd},
  editor       = {Gilles Brassard},
  title        = {On the Existence of Bit Commitment Schemes and Zero-Knowledge Proofs},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {17--27},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_3},
  doi          = {10.1007/0-387-34805-0\_3},
  timestamp    = {Tue, 01 Jun 2021 15:21:29 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Damgard89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Damgard89a,
  author       = {Ivan Damg{\aa}rd},
  editor       = {Gilles Brassard},
  title        = {A Design Principle for Hash Functions},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {416--427},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_39},
  doi          = {10.1007/0-387-34805-0\_39},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/Damgard89a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Damgard88,
  author       = {Ivan Damg{\aa}rd},
  editor       = {Shafi Goldwasser},
  title        = {On the Randomness of Legendre and Jacobi Sequences},
  booktitle    = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {403},
  pages        = {163--172},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/0-387-34799-2\_13},
  doi          = {10.1007/0-387-34799-2\_13},
  timestamp    = {Fri, 17 Jul 2020 16:12:45 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Damgard88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Damgard88a,
  author       = {Ivan Damg{\aa}rd},
  editor       = {Shafi Goldwasser},
  title        = {Payment Systems and Credential Mechanisms with Provable Security Against
                  Abuse by Individuals},
  booktitle    = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {403},
  pages        = {328--335},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/0-387-34799-2\_26},
  doi          = {10.1007/0-387-34799-2\_26},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Damgard88a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BrassardD88,
  author       = {Gilles Brassard and
                  Ivan Damg{\aa}rd},
  editor       = {Shafi Goldwasser},
  title        = {"Practical IP" {\textless}= {MA}},
  booktitle    = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {403},
  pages        = {580--582},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/0-387-34799-2\_42},
  doi          = {10.1007/0-387-34799-2\_42},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BrassardD88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BrandtDLP88,
  author       = {J{\o}rgen Brandt and
                  Ivan Damg{\aa}rd and
                  Peter Landrock and
                  Torben P. Pedersen},
  editor       = {Shafi Goldwasser},
  title        = {Zero-Knowledge Authentication Scheme with Secret Key Exchange (Extended
                  Abstract)},
  booktitle    = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {403},
  pages        = {583--588},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/0-387-34799-2\_43},
  doi          = {10.1007/0-387-34799-2\_43},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BrandtDLP88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BrandtDL88,
  author       = {J{\o}rgen Brandt and
                  Ivan Damg{\aa}rd and
                  Peter Landrock},
  editor       = {Christoph G. G{\"{u}}nther},
  title        = {Anonymous and Verifiable Registration in Databases},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '88, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Davos, Switzerland, May
                  25-27, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {330},
  pages        = {167--176},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/3-540-45961-8\_14},
  doi          = {10.1007/3-540-45961-8\_14},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BrandtDL88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/ChaumCD88,
  author       = {David Chaum and
                  Claude Cr{\'{e}}peau and
                  Ivan Damg{\aa}rd},
  editor       = {Janos Simon},
  title        = {Multiparty Unconditionally Secure Protocols (Extended Abstract)},
  booktitle    = {Proceedings of the 20th Annual {ACM} Symposium on Theory of Computing,
                  May 2-4, 1988, Chicago, Illinois, {USA}},
  pages        = {11--19},
  publisher    = {{ACM}},
  year         = {1988},
  url          = {https://doi.org/10.1145/62212.62214},
  doi          = {10.1145/62212.62214},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/ChaumCD88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/Damgard87,
  author       = {Ivan Damg{\aa}rd},
  title        = {Concatenated group codes and their exponents},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {33},
  number       = {6},
  pages        = {849--854},
  year         = {1987},
  url          = {https://doi.org/10.1109/TIT.1987.1057375},
  doi          = {10.1109/TIT.1987.1057375},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/Damgard87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChaumDG87,
  author       = {David Chaum and
                  Ivan Damg{\aa}rd and
                  Jeroen van de Graaf},
  editor       = {Carl Pomerance},
  title        = {Multiparty Computations Ensuring Privacy of Each Party's Input and
                  Correctness of the Result},
  booktitle    = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory
                  and Applications of Cryptographic Techniques, Santa Barbara, California,
                  USA, August 16-20, 1987, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {293},
  pages        = {87--119},
  publisher    = {Springer},
  year         = {1987},
  url          = {https://doi.org/10.1007/3-540-48184-2\_7},
  doi          = {10.1007/3-540-48184-2\_7},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChaumDG87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BrickellCDG87,
  author       = {Ernest F. Brickell and
                  David Chaum and
                  Ivan Damg{\aa}rd and
                  Jeroen van de Graaf},
  editor       = {Carl Pomerance},
  title        = {Gradual and Verifiable Release of a Secret},
  booktitle    = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory
                  and Applications of Cryptographic Techniques, Santa Barbara, California,
                  USA, August 16-20, 1987, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {293},
  pages        = {156--166},
  publisher    = {Springer},
  year         = {1987},
  url          = {https://doi.org/10.1007/3-540-48184-2\_11},
  doi          = {10.1007/3-540-48184-2\_11},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BrickellCDG87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChaumCD87,
  author       = {David Chaum and
                  Claude Cr{\'{e}}peau and
                  Ivan Damg{\aa}rd},
  editor       = {Carl Pomerance},
  title        = {Multiparty Unconditionally Secure Protocols (Abstract)},
  booktitle    = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory
                  and Applications of Cryptographic Techniques, Santa Barbara, California,
                  USA, August 16-20, 1987, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {293},
  pages        = {462},
  publisher    = {Springer},
  year         = {1987},
  url          = {https://doi.org/10.1007/3-540-48184-2\_43},
  doi          = {10.1007/3-540-48184-2\_43},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChaumCD87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Damgard87,
  author       = {Ivan Damg{\aa}rd},
  editor       = {David Chaum and
                  Wyn L. Price},
  title        = {Collision Free Hash Functions and Public Key Signature Schemes},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '87, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Amsterdam, The Netherlands,
                  April 13-15, 1987, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {304},
  pages        = {203--216},
  publisher    = {Springer},
  year         = {1987},
  url          = {https://doi.org/10.1007/3-540-39118-5\_19},
  doi          = {10.1007/3-540-39118-5\_19},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Damgard87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics