Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Ivan Damgård
@article{DBLP:journals/corr/abs-2403-14023, author = {Carsten Baum and Jens Berlips and Walther Chen and Hongrui Cui and Ivan Damg{\aa}rd and Jiangbin Dong and Kevin M. Esvelt and Mingyu Gao and Dana Gretton and Leonard Foner and Martin Kysel and Kaiyi Zhang and Juanru Li and Xiang Li and Omer Paneth and Ronald L. Rivest and Francesca Sage{-}Ling and Adi Shamir and Yue Shen and Meicen Sun and Vinod Vaikuntanathan and Lynn Van Hauwe and Theia Vogel and Benjamin Weinstein{-}Raun and Yun Wang and Daniel Wichs and Stephen Wooster and Andrew C. Yao and Yu Yu and Haoling Zhang}, title = {A system capable of verifiably and privately screening global {DNA} synthesis}, journal = {CoRR}, volume = {abs/2403.14023}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.14023}, doi = {10.48550/ARXIV.2403.14023}, eprinttype = {arXiv}, eprint = {2403.14023}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-14023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BurkhardtDFGO23, author = {Jakob Burkhardt and Ivan Damg{\aa}rd and Tore Kasper Frederiksen and Satrajit Ghosh and Claudio Orlandi}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {Improved Distributed {RSA} Key Generation Using the Miller-Rabin Test}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {2501--2515}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3623163}, doi = {10.1145/3576915.3623163}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BurkhardtDFGO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/citc/Damgard0P23, author = {Ivan Damg{\aa}rd and Daniel Escudero and Antigoni Polychroniadou}, editor = {Kai{-}Min Chung}, title = {Phoenix: Secure Computation in an Unstable Network with Dropouts and Comebacks}, booktitle = {4th Conference on Information-Theoretic Cryptography, {ITC} 2023, June 6-8, 2023, Aarhus University, Aarhus, Denmark}, series = {LIPIcs}, volume = {267}, pages = {7:1--7:21}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2023}, url = {https://doi.org/10.4230/LIPIcs.ITC.2023.7}, doi = {10.4230/LIPICS.ITC.2023.7}, timestamp = {Tue, 25 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/citc/Damgard0P23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/citc/DamgardRTY23, author = {Ivan Damg{\aa}rd and Divya Ravi and Daniel Tschudi and Sophia Yakoubov}, editor = {Kai{-}Min Chung}, title = {Secure Communication in Dynamic Incomplete Networks}, booktitle = {4th Conference on Information-Theoretic Cryptography, {ITC} 2023, June 6-8, 2023, Aarhus University, Aarhus, Denmark}, series = {LIPIcs}, volume = {267}, pages = {13:1--13:21}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2023}, url = {https://doi.org/10.4230/LIPIcs.ITC.2023.13}, doi = {10.4230/LIPICS.ITC.2023.13}, timestamp = {Tue, 25 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/citc/DamgardRTY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BraunDO23, author = {Lennart Braun and Ivan Damg{\aa}rd and Claudio Orlandi}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Secure Multiparty Computation from Threshold Encryption Based on Class Groups}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14081}, pages = {613--645}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38557-5\_20}, doi = {10.1007/978-3-031-38557-5\_20}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BraunDO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DamgardRSY23, author = {Ivan Damg{\aa}rd and Divya Ravi and Luisa Siniscalchi and Sophia Yakoubov}, editor = {Carmit Hazay and Martijn Stam}, title = {Minimizing Setup in Broadcast-Optimal Two Round {MPC}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14005}, pages = {129--158}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30617-4\_5}, doi = {10.1007/978-3-031-30617-4\_5}, timestamp = {Thu, 20 Apr 2023 11:35:01 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DamgardRSY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latincrypt/DamgardRSY23, author = {Ivan Damg{\aa}rd and Divya Ravi and Luisa Siniscalchi and Sophia Yakoubov}, editor = {Abdelrahaman Aly and Mehdi Tibouchi}, title = {Broadcast-Optimal Two Round {MPC} with Asynchronous Peer-to-Peer Channels}, booktitle = {Progress in Cryptology - {LATINCRYPT} 2023 - 8th International Conference on Cryptology and Information Security in Latin America, {LATINCRYPT} 2023, Quito, Ecuador, October 3-6, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14168}, pages = {87--106}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-44469-2\_5}, doi = {10.1007/978-3-031-44469-2\_5}, timestamp = {Fri, 06 Oct 2023 18:13:29 +0200}, biburl = {https://dblp.org/rec/conf/latincrypt/DamgardRSY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/CiampiDRSXY23, author = {Michele Ciampi and Ivan Damg{\aa}rd and Divya Ravi and Luisa Siniscalchi and Yu Xia and Sophia Yakoubov}, editor = {Guy N. Rothblum and Hoeteck Wee}, title = {Broadcast-Optimal Four-Round {MPC} in the Plain Model}, booktitle = {Theory of Cryptography - 21st International Conference, {TCC} 2023, Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14370}, pages = {3--32}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-48618-0\_1}, doi = {10.1007/978-3-031-48618-0\_1}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/CiampiDRSXY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-04564, author = {Ivan Damg{\aa}rd and Hannah Keller and Boel Nelson and Claudio Orlandi and Rasmus Pagh}, title = {Differentially Private Selection from Secure Distributed Computing}, journal = {CoRR}, volume = {abs/2306.04564}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.04564}, doi = {10.48550/ARXIV.2306.04564}, eprinttype = {arXiv}, eprint = {2306.04564}, timestamp = {Tue, 13 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-04564.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardRTY23, author = {Ivan Damg{\aa}rd and Divya Ravi and Daniel Tschudi and Sophia Yakoubov}, title = {Secure Communication in Dynamic Incomplete Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {529}, year = {2023}, url = {https://eprint.iacr.org/2023/529}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardRTY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BurkhardtDFGO23, author = {Jakob Burkhardt and Ivan Damg{\aa}rd and Tore Kasper Frederiksen and Satrajit Ghosh and Claudio Orlandi}, title = {Improved Distributed {RSA} Key Generation Using the Miller-Rabin Test}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {644}, year = {2023}, url = {https://eprint.iacr.org/2023/644}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BurkhardtDFGO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardKNOP23, author = {Ivan Damg{\aa}rd and Hannah Keller and Boel Nelson and Claudio Orlandi and Rasmus Pagh}, title = {Differentially Private Selection from Secure Distributed Computing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {894}, year = {2023}, url = {https://eprint.iacr.org/2023/894}, timestamp = {Mon, 03 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardKNOP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardRSY23, author = {Ivan Damg{\aa}rd and Divya Ravi and Luisa Siniscalchi and Sophia Yakoubov}, title = {Broadcast-Optimal Two Round {MPC} with Asynchronous Peer-to-Peer Channels}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1187}, year = {2023}, url = {https://eprint.iacr.org/2023/1187}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardRSY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CiampiDRSXY23, author = {Michele Ciampi and Ivan Damg{\aa}rd and Divya Ravi and Luisa Siniscalchi and Yu Xia and Sophia Yakoubov}, title = {Broadcast-Optimal Four-Round {MPC} in the Plain Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1739}, year = {2023}, url = {https://eprint.iacr.org/2023/1739}, timestamp = {Fri, 29 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/CiampiDRSXY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/DamgardJNPO22, author = {Ivan Damg{\aa}rd and Thomas P. Jakobsen and Jesper Buus Nielsen and Jakob Illeborg Pagter and Michael B{\ae}ksvang {\O}stergaard}, title = {Fast threshold {ECDSA} with honest majority}, journal = {J. Comput. Secur.}, volume = {30}, number = {1}, pages = {167--196}, year = {2022}, url = {https://doi.org/10.3233/JCS-200112}, doi = {10.3233/JCS-200112}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/DamgardJNPO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/DamgardOTT22, author = {Ivan Damg{\aa}rd and Claudio Orlandi and Akira Takahashi and Mehdi Tibouchi}, title = {Two-Round n-out-of-n and Multi-Signatures and Trapdoor Commitment from Lattices}, journal = {J. Cryptol.}, volume = {35}, number = {2}, pages = {14}, year = {2022}, url = {https://doi.org/10.1007/s00145-022-09425-3}, doi = {10.1007/S00145-022-09425-3}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/DamgardOTT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AbramDOS22, author = {Damiano Abram and Ivan Damg{\aa}rd and Claudio Orlandi and Peter Scholl}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {An Algebraic Framework for Silent Preprocessing with Trustless Setup and Active Security}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {13510}, pages = {421--452}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15985-5\_15}, doi = {10.1007/978-3-031-15985-5\_15}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AbramDOS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/BoschiniDO22, author = {Cecilia Boschini and Ivan Damg{\aa}rd and Claudio Orlandi}, editor = {Clemente Galdi and Stanislaw Jarecki}, title = {On Access Control Encryption Without Sanitization}, booktitle = {Security and Cryptography for Networks - 13th International Conference, {SCN} 2022, Amalfi, Italy, September 12-14, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13409}, pages = {220--243}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-14791-3\_10}, doi = {10.1007/978-3-031-14791-3\_10}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/BoschiniDO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/AttemaCCDE22, author = {Thomas Attema and Ignacio Cascudo and Ronald Cramer and Ivan Damg{\aa}rd and Daniel Escudero}, editor = {Eike Kiltz and Vinod Vaikuntanathan}, title = {Vector Commitments over Rings and Compressed {\textdollar}{\textbackslash}varSigma {\textdollar}-Protocols}, booktitle = {Theory of Cryptography - 20th International Conference, {TCC} 2022, Chicago, IL, USA, November 7-10, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13747}, pages = {173--202}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22318-1\_7}, doi = {10.1007/978-3-031-22318-1\_7}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/AttemaCCDE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AttemaCCDE22, author = {Thomas Attema and Ignacio Cascudo and Ronald Cramer and Ivan Bjerre Damg{\aa}rd and Daniel Escudero}, title = {Vector Commitments over Rings and Compressed {\(\Sigma\)}-Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {181}, year = {2022}, url = {https://eprint.iacr.org/2022/181}, timestamp = {Tue, 22 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AttemaCCDE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardRSY22, author = {Ivan Damg{\aa}rd and Divya Ravi and Luisa Siniscalchi and Sophia Yakoubov}, title = {Minimizing Setup in Broadcast-Optimal Two Round {MPC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {293}, year = {2022}, url = {https://eprint.iacr.org/2022/293}, timestamp = {Tue, 22 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DamgardRSY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbramDOS22, author = {Damiano Abram and Ivan Damg{\aa}rd and Claudio Orlandi and Peter Scholl}, title = {An Algebraic Framework for Silent Preprocessing with Trustless Setup and Active Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {363}, year = {2022}, url = {https://eprint.iacr.org/2022/363}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbramDOS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoschiniDO22, author = {Cecilia Boschini and Ivan Damg{\aa}rd and Claudio Orlandi}, title = {On Access Control Encryption without Sanitization}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {854}, year = {2022}, url = {https://eprint.iacr.org/2022/854}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoschiniDO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BraunDO22, author = {Lennart Braun and Ivan Damg{\aa}rd and Claudio Orlandi}, title = {Secure Multiparty Computation from Threshold Encryption based on Class Groups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1437}, year = {2022}, url = {https://eprint.iacr.org/2022/1437}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BraunDO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/AbspoelCEDX21, author = {Mark Abspoel and Ronald Cramer and Daniel Escudero and Ivan Damg{\aa}rd and Chaoping Xing}, editor = {Mehdi Tibouchi and Huaxiong Wang}, title = {Improved Single-Round Secure Multiplication Using Regenerating Codes}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13091}, pages = {222--244}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92075-3\_8}, doi = {10.1007/978-3-030-92075-3\_8}, timestamp = {Fri, 03 Dec 2021 17:36:49 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/AbspoelCEDX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/citc/Damgard0S21, author = {Ivan Bjerre Damg{\aa}rd and Boyang Li and Nikolaj Ignatieff Schwartzbach}, editor = {Stefano Tessaro}, title = {More Communication Lower Bounds for Information-Theoretic {MPC}}, booktitle = {2nd Conference on Information-Theoretic Cryptography, {ITC} 2021, July 23-26, 2021, Virtual Conference}, series = {LIPIcs}, volume = {199}, pages = {2:1--2:18}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2021}, url = {https://doi.org/10.4230/LIPIcs.ITC.2021.2}, doi = {10.4230/LIPICS.ITC.2021.2}, timestamp = {Thu, 16 Sep 2021 15:58:53 +0200}, biburl = {https://dblp.org/rec/conf/citc/Damgard0S21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/citc/DamgardLY21, author = {Ivan Bjerre Damg{\aa}rd and Kasper Green Larsen and Sophia Yakoubov}, editor = {Stefano Tessaro}, title = {Broadcast Secret-Sharing, Bounds and Applications}, booktitle = {2nd Conference on Information-Theoretic Cryptography, {ITC} 2021, July 23-26, 2021, Virtual Conference}, series = {LIPIcs}, volume = {199}, pages = {10:1--10:20}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2021}, url = {https://doi.org/10.4230/LIPIcs.ITC.2021.10}, doi = {10.4230/LIPICS.ITC.2021.10}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/citc/DamgardLY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DamgardMRSY21, author = {Ivan Damg{\aa}rd and Bernardo Magri and Divya Ravi and Luisa Siniscalchi and Sophia Yakoubov}, editor = {Tal Malkin and Chris Peikert}, title = {Broadcast-Optimal Two Round {MPC} with an Honest Majority}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12826}, pages = {155--184}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84245-1\_6}, doi = {10.1007/978-3-030-84245-1\_6}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/DamgardMRSY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/AbramDST21, author = {Damiano Abram and Ivan Damg{\aa}rd and Peter Scholl and Sven Trieflinger}, editor = {Kenneth G. Paterson}, title = {Oblivious {TLS} via Multi-party Computation}, booktitle = {Topics in Cryptology - {CT-RSA} 2021 - Cryptographers' Track at the {RSA} Conference 2021, Virtual Event, May 17-20, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12704}, pages = {51--74}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75539-3\_3}, doi = {10.1007/978-3-030-75539-3\_3}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/AbramDST21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/DamgardGKOS21, author = {Ivan Damg{\aa}rd and Chaya Ganesh and Hamidreza Khoshakhlagh and Claudio Orlandi and Luisa Siniscalchi}, editor = {Kenneth G. Paterson}, title = {Balancing Privacy and Accountability in Blockchain Identity Management}, booktitle = {Topics in Cryptology - {CT-RSA} 2021 - Cryptographers' Track at the {RSA} Conference 2021, Virtual Event, May 17-20, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12704}, pages = {552--576}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75539-3\_23}, doi = {10.1007/978-3-030-75539-3\_23}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/DamgardGKOS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DamgardO0T21, author = {Ivan Damg{\aa}rd and Claudio Orlandi and Akira Takahashi and Mehdi Tibouchi}, editor = {Juan A. Garay}, title = {Two-Round n-out-of-n and Multi-signatures and Trapdoor Commitment from Lattices}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12710}, pages = {99--130}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75245-3\_5}, doi = {10.1007/978-3-030-75245-3\_5}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DamgardO0T21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DamgardER21, author = {Ivan Damg{\aa}rd and Daniel Escudero and Divya Ravi}, editor = {Kobbi Nissim and Brent Waters}, title = {Information-Theoretically Secure {MPC} Against Mixed Dynamic Adversaries}, booktitle = {Theory of Cryptography - 19th International Conference, {TCC} 2021, Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13042}, pages = {591--622}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90459-3\_20}, doi = {10.1007/978-3-030-90459-3\_20}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/DamgardER21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbspoelC0DX21, author = {Mark Abspoel and Ronald Cramer and Daniel Escudero and Ivan Damg{\aa}rd and Chaoping Xing}, title = {Improved single-round secure multiplication using regenerating codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {253}, year = {2021}, url = {https://eprint.iacr.org/2021/253}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbspoelC0DX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardLS21, author = {Ivan Damg{\aa}rd and Boyang Li and Nikolaj I. Schwartzbach}, title = {More Communication Lower Bounds for Information-Theoretic {MPC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {278}, year = {2021}, url = {https://eprint.iacr.org/2021/278}, timestamp = {Sun, 27 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardLS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbramDST21, author = {Damiano Abram and Ivan Damg{\aa}rd and Peter Scholl and Sven Trieflinger}, title = {Oblivious {TLS} via Multi-Party Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {318}, year = {2021}, url = {https://eprint.iacr.org/2021/318}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbramDST21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardER21, author = {Ivan Damg{\aa}rd and Daniel Escudero and Divya Ravi}, title = {Information-Theoretically Secure {MPC} against Mixed Dynamic Adversaries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1163}, year = {2021}, url = {https://eprint.iacr.org/2021/1163}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardER21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Damgard21x, author = {Ivan Damg{\aa}rd and Daniel Escudero and Antigoni Polychroniadou}, title = {Phoenix: Secure Computation in an Unstable Network with Dropouts and Comebacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1376}, year = {2021}, url = {https://eprint.iacr.org/2021/1376}, timestamp = {Fri, 12 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/Damgard21x.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/AbspoelCD0RX020, author = {Mark Abspoel and Ronald Cramer and Ivan Damg{\aa}rd and Daniel Escudero and Matthieu Rambaud and Chaoping Xing and Chen Yuan}, editor = {Shiho Moriai and Huaxiong Wang}, title = {Asymptotically Good Multiplicative {LSSS} over Galois Rings and Applications to {MPC} over {\textdollar}{\textbackslash}mathbb \{Z\}/p{\^{}}k{\textbackslash}mathbb \{Z\} {\textdollar}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12493}, pages = {151--180}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64840-4\_6}, doi = {10.1007/978-3-030-64840-4\_6}, timestamp = {Thu, 10 Dec 2020 10:11:44 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/AbspoelCD0RX020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DamgardO020, author = {Ivan Damg{\aa}rd and Claudio Orlandi and Mark Simkin}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Black-Box Transformations from Passive to Covert Security with Public Verifiability}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12171}, pages = {647--676}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56880-1\_23}, doi = {10.1007/978-3-030-56880-1\_23}, timestamp = {Thu, 13 Aug 2020 16:42:10 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DamgardO020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/DamgardJNPO20, author = {Ivan Damg{\aa}rd and Thomas Pelle Jakobsen and Jesper Buus Nielsen and Jakob Illeborg Pagter and Michael B{\ae}ksvang {\O}sterg{\aa}rd}, editor = {Clemente Galdi and Vladimir Kolesnikov}, title = {Fast Threshold {ECDSA} with Honest Majority}, booktitle = {Security and Cryptography for Networks - 12th International Conference, {SCN} 2020, Amalfi, Italy, September 14-16, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12238}, pages = {382--400}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-57990-6\_19}, doi = {10.1007/978-3-030-57990-6\_19}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scn/DamgardJNPO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DamgardHMNOY20, author = {Ivan Damg{\aa}rd and Helene Haagh and Rebekah Mercer and Anca Nitulescu and Claudio Orlandi and Sophia Yakoubov}, editor = {Rafael Pass and Krzysztof Pietrzak}, title = {Stronger Security and Constructions of Multi-designated Verifier Signatures}, booktitle = {Theory of Cryptography - 18th International Conference, {TCC} 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12551}, pages = {229--260}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64378-2\_9}, doi = {10.1007/978-3-030-64378-2\_9}, timestamp = {Tue, 15 Dec 2020 12:01:12 +0100}, biburl = {https://dblp.org/rec/conf/tcc/DamgardHMNOY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardS20, author = {Ivan Damg{\aa}rd and Nikolaj I. Schwartzbach}, title = {Communication Lower Bounds for Perfect Maliciously Secure {MPC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {251}, year = {2020}, url = {https://eprint.iacr.org/2020/251}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardJNPO20, author = {Ivan Damg{\aa}rd and Thomas Pelle Jakobsen and Jesper Buus Nielsen and Jakob Illeborg Pagter and Michael B{\ae}ksvang {\O}sterg{\aa}rd}, title = {Fast Threshold {ECDSA} with Honest Majority}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {501}, year = {2020}, url = {https://eprint.iacr.org/2020/501}, timestamp = {Wed, 27 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardJNPO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardY20, author = {Ivan Damg{\aa}rd and Sophia Yakoubov}, title = {Bounds on Ad Hoc Threshold Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {618}, year = {2020}, url = {https://eprint.iacr.org/2020/618}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardOS20, author = {Ivan Damg{\aa}rd and Claudio Orlandi and Mark Simkin}, title = {Black-Box Transformations from Passive to Covert Security with Public Verifiability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {916}, year = {2020}, url = {https://eprint.iacr.org/2020/916}, timestamp = {Mon, 27 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardOS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardOTT20, author = {Ivan Damg{\aa}rd and Claudio Orlandi and Akira Takahashi and Mehdi Tibouchi}, title = {Two-round n-out-of-n and Multi-Signatures and Trapdoor Commitment from Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1110}, year = {2020}, url = {https://eprint.iacr.org/2020/1110}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardOTT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardMSY20, author = {Ivan Damg{\aa}rd and Bernardo Magri and Luisa Siniscalchi and Sophia Yakoubov}, title = {Broadcast-Optimal Two Round {MPC} with an Honest Majority}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1254}, year = {2020}, url = {https://eprint.iacr.org/2020/1254}, timestamp = {Fri, 30 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DamgardMSY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbspoelCDERXY20, author = {Mark Abspoel and Ronald Cramer and Ivan Damg{\aa}rd and Daniel Escudero and Matthieu Rambaud and Chaoping Xing and Chen Yuan}, title = {Asymptotically Good Multiplicative {LSSS} over Galois Rings and Applications to {MPC} over Z/p{\^{}}k {Z}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1256}, year = {2020}, url = {https://eprint.iacr.org/2020/1256}, timestamp = {Fri, 30 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AbspoelCDERXY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardGKOS20, author = {Ivan Damg{\aa}rd and Chaya Ganesh and Hamidreza Khoshakhlagh and Claudio Orlandi and Luisa Siniscalchi}, title = {Balancing Privacy and Accountability in Blockchain Transactions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1511}, year = {2020}, url = {https://eprint.iacr.org/2020/1511}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DamgardGKOS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/CascudoDDDDG19, author = {Ignacio Cascudo and Ivan Damg{\aa}rd and Bernardo David and Nico D{\"{o}}ttling and Rafael Dowsley and Irene Giacomelli}, editor = {Steven D. Galbraith and Shiho Moriai}, title = {Efficient {UC} Commitment Extension with Homomorphism for Free (and Applications)}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11922}, pages = {606--635}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34621-8\_22}, doi = {10.1007/978-3-030-34621-8\_22}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/CascudoDDDDG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DamgardLN19, author = {Ivan Damg{\aa}rd and Kasper Green Larsen and Jesper Buus Nielsen}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Communication Lower Bounds for Statistically Secure MPC, With or Without Preprocessing}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11693}, pages = {61--84}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26951-7\_3}, doi = {10.1007/978-3-030-26951-7\_3}, timestamp = {Fri, 09 Aug 2019 14:22:41 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DamgardLN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DamgardGO19, author = {Ivan Damg{\aa}rd and Chaya Ganesh and Claudio Orlandi}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Proofs of Replicated Storage Without Timing Assumptions}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11692}, pages = {355--380}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26948-7\_13}, doi = {10.1007/978-3-030-26948-7\_13}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DamgardGO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AggarwalDNOPRS19, author = {Divesh Aggarwal and Ivan Damg{\aa}rd and Jesper Buus Nielsen and Maciej Obremski and Erick Purwanto and Jo{\~{a}}o Ribeiro and Mark Simkin}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Stronger Leakage-Resilient and Non-Malleable Secret Sharing Schemes for General Access Structures}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11693}, pages = {510--539}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26951-7\_18}, doi = {10.1007/978-3-030-26951-7\_18}, timestamp = {Sat, 18 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/AggarwalDNOPRS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/DamgardH0O19, author = {Ivan Damg{\aa}rd and Helene Haagh and Michael Nielsen and Claudio Orlandi}, editor = {Martin Albrecht}, title = {Commodity-Based 2PC for Arithmetic Circuits}, booktitle = {Cryptography and Coding - 17th {IMA} International Conference, {IMACC} 2019, Oxford, UK, December 16-18, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11929}, pages = {154--177}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-35199-1\_8}, doi = {10.1007/978-3-030-35199-1\_8}, timestamp = {Fri, 15 Dec 2023 20:21:14 +0100}, biburl = {https://dblp.org/rec/conf/ima/DamgardH0O19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Damgard0FKSV19, author = {Ivan Damg{\aa}rd and Daniel Escudero and Tore Kasper Frederiksen and Marcel Keller and Peter Scholl and Nikolaj Volgushev}, title = {New Primitives for Actively-Secure {MPC} over Rings with Applications to Private Machine Learning}, booktitle = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco, CA, USA, May 19-23, 2019}, pages = {1102--1120}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SP.2019.00078}, doi = {10.1109/SP.2019.00078}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/Damgard0FKSV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/AbspoelCD0Y19, author = {Mark Abspoel and Ronald Cramer and Ivan Damg{\aa}rd and Daniel Escudero and Chen Yuan}, editor = {Dennis Hofheinz and Alon Rosen}, title = {Efficient Information-Theoretic Secure Multiparty Computation over Z/p\({}^{\mbox{k}}\)Z via Galois Rings}, booktitle = {Theory of Cryptography - 17th International Conference, {TCC} 2019, Nuremberg, Germany, December 1-5, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11891}, pages = {471--501}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-36030-6\_19}, doi = {10.1007/978-3-030-36030-6\_19}, timestamp = {Sat, 25 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/AbspoelCD0Y19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardLN19, author = {Ivan Damg{\aa}rd and Kasper Green Larsen and Jesper Buus Nielsen}, title = {Communication Lower Bounds for Statistically Secure MPC, with or without Preprocessing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {220}, year = {2019}, url = {https://eprint.iacr.org/2019/220}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardLN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Damgard0FKSV19, author = {Ivan Damg{\aa}rd and Daniel Escudero and Tore Kasper Frederiksen and Marcel Keller and Peter Scholl and Nikolaj Volgushev}, title = {New Primitives for Actively-Secure {MPC} over Rings with Applications to Private Machine Learning}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {599}, year = {2019}, url = {https://eprint.iacr.org/2019/599}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Damgard0FKSV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardHNO19, author = {Ivan Damg{\aa}rd and Helene Haagh and Michael Nielsen and Claudio Orlandi}, title = {Commodity-Based 2PC for Arithmetic Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {705}, year = {2019}, url = {https://eprint.iacr.org/2019/705}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardHNO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbspoelCDEY19, author = {Mark Abspoel and Ronald Cramer and Ivan Damg{\aa}rd and Daniel Escudero and Chen Yuan}, title = {Efficient Information-Theoretic Secure Multiparty Computation over {\(\mathbb{Z}\)}/p\({}^{\mbox{k}}\) {\(\mathbb{Z}\)} via Galois Rings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {872}, year = {2019}, url = {https://eprint.iacr.org/2019/872}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbspoelCDEY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardHMNOY19, author = {Ivan Damg{\aa}rd and Helene Haagh and Rebekah Mercer and Anca Nitulescu and Claudio Orlandi and Sophia Yakoubov}, title = {Stronger Notions and Constructions for Multi-Designated Verifier Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1153}, year = {2019}, url = {https://eprint.iacr.org/2019/1153}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardHMNOY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CramerDESX18, author = {Ronald Cramer and Ivan Damg{\aa}rd and Daniel Escudero and Peter Scholl and Chaoping Xing}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {SPD{\(\mathbb{Z}\)}\({}_{\mbox{2\({}^{\mbox{k}}\)}}\): Efficient {MPC} mod 2\({}^{\mbox{k}}\) for Dishonest Majority}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10992}, pages = {769--798}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96881-0\_26}, doi = {10.1007/978-3-319-96881-0\_26}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CramerDESX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DamgardOS18, author = {Ivan Damg{\aa}rd and Claudio Orlandi and Mark Simkin}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Yet Another Compiler for Active Security or: Efficient {MPC} Over Arbitrary Rings}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10992}, pages = {799--829}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96881-0\_27}, doi = {10.1007/978-3-319-96881-0\_27}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DamgardOS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DamgardLOSS18, author = {Ivan Damg{\aa}rd and Ji Luo and Sabine Oechsner and Peter Scholl and Mark Simkin}, editor = {Michel Abdalla and Ricardo Dahab}, title = {Compact Zero-Knowledge Proofs of Small Hamming Weight}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10770}, pages = {530--560}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76581-5\_18}, doi = {10.1007/978-3-319-76581-5\_18}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DamgardLOSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/BaumDLOP18, author = {Carsten Baum and Ivan Damg{\aa}rd and Vadim Lyubashevsky and Sabine Oechsner and Chris Peikert}, editor = {Dario Catalano and Roberto De Prisco}, title = {More Efficient Commitments from Structured Lattice Assumptions}, booktitle = {Security and Cryptography for Networks - 11th International Conference, {SCN} 2018, Amalfi, Italy, September 5-7, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11035}, pages = {368--385}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98113-0\_20}, doi = {10.1007/978-3-319-98113-0\_20}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/BaumDLOP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DamgardKORS18, author = {Ivan Damg{\aa}rd and Tomasz Kazana and Maciej Obremski and Varun Raj and Luisa Siniscalchi}, editor = {Amos Beimel and Stefan Dziembowski}, title = {Continuous {NMC} Secure Against Permutations and Overwrites, with Applications to {CCA} Secure Commitments}, booktitle = {Theory of Cryptography - 16th International Conference, {TCC} 2018, Panaji, India, November 11-14, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11240}, pages = {225--254}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03810-6\_9}, doi = {10.1007/978-3-030-03810-6\_9}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/DamgardKORS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerDESX18, author = {Ronald Cramer and Ivan Damg{\aa}rd and Daniel Escudero and Peter Scholl and Chaoping Xing}, title = {SPD{\(\mathbb{Z}\)}\({}_{\mbox{2\({}^{\mbox{k}}\)}}\): Efficient {MPC} mod 2\({}^{\mbox{k}}\) for Dishonest Majority}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {482}, year = {2018}, url = {https://eprint.iacr.org/2018/482}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerDESX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardKORS18, author = {Ivan Damg{\aa}rd and Tomasz Kazana and Maciej Obremski and Varun Raj and Luisa Siniscalchi}, title = {Continuous {NMC} Secure Against Permutations and Overwrites, with Applications to {CCA} Secure Commitments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {596}, year = {2018}, url = {https://eprint.iacr.org/2018/596}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardKORS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardGO18, author = {Ivan Damg{\aa}rd and Chaya Ganesh and Claudio Orlandi}, title = {Proofs of Replicated Storage Without Timing Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {654}, year = {2018}, url = {https://eprint.iacr.org/2018/654}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardGO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CascudoDDDDG18, author = {Ignacio Cascudo and Ivan Damg{\aa}rd and Bernardo David and Nico D{\"{o}}ttling and Rafael Dowsley and Irene Giacomelli}, title = {Efficient {UC} Commitment Extension with Homomorphism for Free (and Applications)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {983}, year = {2018}, url = {https://eprint.iacr.org/2018/983}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CascudoDDDDG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AggarwalDNOPRS18, author = {Divesh Aggarwal and Ivan Damg{\aa}rd and Jesper Buus Nielsen and Maciej Obremski and Erick Purwanto and Jo{\~{a}}o Ribeiro and Mark Simkin}, title = {Stronger Leakage-Resilient and Non-Malleable Secret-Sharing Schemes for General Access Structures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1147}, year = {2018}, url = {https://eprint.iacr.org/2018/1147}, timestamp = {Sat, 18 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AggarwalDNOPRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/DamgardFMV17, author = {Ivan Damg{\aa}rd and Sebastian Faust and Pratyay Mukherjee and Daniele Venturi}, title = {Bounded Tamper Resilience: How to Go Beyond the Algebraic Barrier}, journal = {J. Cryptol.}, volume = {30}, number = {1}, pages = {152--190}, year = {2017}, url = {https://doi.org/10.1007/s00145-015-9218-0}, doi = {10.1007/S00145-015-9218-0}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joc/DamgardFMV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DamgardN0R17, author = {Ivan Damg{\aa}rd and Jesper Buus Nielsen and Michael Nielsen and Samuel Ranellucci}, editor = {Jonathan Katz and Hovav Shacham}, title = {The TinyTable Protocol for 2-Party Secure Computation, or: Gate-Scrambling Revisited}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10401}, pages = {167--187}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63688-7\_6}, doi = {10.1007/978-3-319-63688-7\_6}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DamgardN0R17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ApplebaumDI0Z17, author = {Benny Applebaum and Ivan Damg{\aa}rd and Yuval Ishai and Michael Nielsen and Lior Zichron}, editor = {Jonathan Katz and Hovav Shacham}, title = {Secure Arithmetic Computation with Constant Computational Overhead}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10401}, pages = {223--254}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63688-7\_8}, doi = {10.1007/978-3-319-63688-7\_8}, timestamp = {Mon, 14 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ApplebaumDI0Z17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CramerDXY17, author = {Ronald Cramer and Ivan Damg{\aa}rd and Chaoping Xing and Chen Yuan}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Amortized Complexity of Zero-Knowledge Proofs Revisited: Achieving Linear Soundness Slack}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10210}, pages = {479--500}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56620-7\_17}, doi = {10.1007/978-3-319-56620-7\_17}, timestamp = {Sat, 25 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/CramerDXY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/CramerDDGX17, author = {Ronald Cramer and Ivan Damg{\aa}rd and Nico D{\"{o}}ttling and Irene Giacomelli and Chaoping Xing}, editor = {Junji Shikata}, title = {Linear-Time Non-Malleable Codes in the Bit-Wise Independent Tampering Model}, booktitle = {Information Theoretic Security - 10th International Conference, {ICITS} 2017, Hong Kong, China, November 29 - December 2, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10681}, pages = {1--25}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72089-0\_1}, doi = {10.1007/978-3-319-72089-0\_1}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/icits/CramerDDGX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/CascudoDFR17, author = {Ignacio Cascudo and Ivan Damg{\aa}rd and Oriol Farr{\`{a}}s and Samuel Ranellucci}, editor = {Yael Kalai and Leonid Reyzin}, title = {Resource-Efficient {OT} Combiners with Active Security}, booktitle = {Theory of Cryptography - 15th International Conference, {TCC} 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10678}, pages = {461--486}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70503-3\_15}, doi = {10.1007/978-3-319-70503-3\_15}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/CascudoDFR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CascudoDFR17, author = {Ignacio Cascudo and Ivan Damg{\aa}rd and Oriol Farr{\`{a}}s and Samuel Ranellucci}, title = {Resource-efficient {OT} combiners with active security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {545}, year = {2017}, url = {http://eprint.iacr.org/2017/545}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CascudoDFR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ApplebaumDINZ17, author = {Benny Applebaum and Ivan Damg{\aa}rd and Yuval Ishai and Michael Nielsen and Lior Zichron}, title = {Secure Arithmetic Computation with Constant Computational Overhead}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {617}, year = {2017}, url = {http://eprint.iacr.org/2017/617}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ApplebaumDINZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardOS17, author = {Ivan Damg{\aa}rd and Claudio Orlandi and Mark Simkin}, title = {Yet Another Compiler for Active Security or: Efficient {MPC} Over Arbitrary Rings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {908}, year = {2017}, url = {http://eprint.iacr.org/2017/908}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardOS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardLOSS17, author = {Ivan Damg{\aa}rd and Ji Luo and Sabine Oechsner and Peter Scholl and Mark Simkin}, title = {Compact Zero-Knowledge Proofs of Small Hamming Weight}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1041}, year = {2017}, url = {http://eprint.iacr.org/2017/1041}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardLOSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/AtenieseDDV16, author = {Giuseppe Ateniese and {\"{O}}zg{\"{u}}r Dagdelen and Ivan Damg{\aa}rd and Daniele Venturi}, title = {Entangled cloud storage}, journal = {Future Gener. Comput. Syst.}, volume = {62}, pages = {104--118}, year = {2016}, url = {https://doi.org/10.1016/j.future.2016.01.008}, doi = {10.1016/J.FUTURE.2016.01.008}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/AtenieseDDV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/BaumDTZ16, author = {Carsten Baum and Ivan Damg{\aa}rd and Tomas Toft and Rasmus Winther Zakarias}, editor = {Mark Manulis and Ahmad{-}Reza Sadeghi and Steve A. Schneider}, title = {Better Preprocessing for Secure Multiparty Computation}, booktitle = {Applied Cryptography and Network Security - 14th International Conference, {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9696}, pages = {327--345}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39555-5\_18}, doi = {10.1007/978-3-319-39555-5\_18}, timestamp = {Fri, 07 Aug 2020 17:57:32 +0200}, biburl = {https://dblp.org/rec/conf/acns/BaumDTZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/BaiDOX16, author = {Ge Bai and Ivan Damg{\aa}rd and Claudio Orlandi and Yu Xia}, editor = {David Pointcheval and Abderrahmane Nitaj and Tajjeeddine Rachidi}, title = {Non-Interactive Verifiable Secret Sharing for Monotone Circuits}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2016 - 8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9646}, pages = {225--244}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-31517-1\_12}, doi = {10.1007/978-3-319-31517-1\_12}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/BaiDOX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/DamgardZ16, author = {Ivan Damg{\aa}rd and Rasmus Winther Zakarias}, editor = {David Pointcheval and Abderrahmane Nitaj and Tajjeeddine Rachidi}, title = {Fast Oblivious {AES} {A} Dedicated Application of the MiniMac Protocol}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2016 - 8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9646}, pages = {245--264}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-31517-1\_13}, doi = {10.1007/978-3-319-31517-1\_13}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/DamgardZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CascudoDDDN16, author = {Ignacio Cascudo and Ivan Damg{\aa}rd and Bernardo David and Nico D{\"{o}}ttling and Jesper Buus Nielsen}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Rate-1, Linear Time and Additively Homomorphic {UC} Commitments}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {9816}, pages = {179--207}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53015-3\_7}, doi = {10.1007/978-3-662-53015-3\_7}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CascudoDDDN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DamgardNPR16, author = {Ivan Damg{\aa}rd and Jesper Buus Nielsen and Antigoni Polychroniadou and Michael A. Raskin}, editor = {Matthew Robshaw and Jonathan Katz}, title = {On the Communication Required for Unconditionally Secure Multiplication}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9815}, pages = {459--488}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53008-5\_16}, doi = {10.1007/978-3-662-53008-5\_16}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/DamgardNPR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BaumDLN16, author = {Carsten Baum and Ivan Damg{\aa}rd and Kasper Green Larsen and Michael Nielsen}, editor = {Matthew Robshaw and Jonathan Katz}, title = {How to Prove Knowledge of Small Secrets}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {9816}, pages = {478--498}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53015-3\_17}, doi = {10.1007/978-3-662-53015-3\_17}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BaumDLN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DamgardNOR16, author = {Ivan Damg{\aa}rd and Jesper Buus Nielsen and Rafail Ostrovsky and Adi Ros{\'{e}}n}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Unconditionally Secure Computation with Reduced Interaction}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9666}, pages = {420--447}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49896-5\_15}, doi = {10.1007/978-3-662-49896-5\_15}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DamgardNOR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/DamgardDNNT16, author = {Ivan Damg{\aa}rd and Kasper Damg{\aa}rd and Kurt Nielsen and Peter Sebastian Nordholt and Tomas Toft}, editor = {Jens Grossklags and Bart Preneel}, title = {Confidential Benchmarking Based on Multiparty Computation}, booktitle = {Financial Cryptography and Data Security - 20th International Conference, {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9603}, pages = {169--187}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-54970-4\_10}, doi = {10.1007/978-3-662-54970-4\_10}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/DamgardDNNT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DamgardPR16, author = {Ivan Damg{\aa}rd and Antigoni Polychroniadou and Vanishree Rao}, editor = {Chen{-}Mou Cheng and Kai{-}Min Chung and Giuseppe Persiano and Bo{-}Yin Yang}, title = {Adaptively Secure Multi-Party Computation from {LWE} (via Equivocal {FHE)}}, booktitle = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9615}, pages = {208--233}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49387-8\_9}, doi = {10.1007/978-3-662-49387-8\_9}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DamgardPR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Ben-SassonBDIR16, author = {Eli Ben{-}Sasson and Iddo Bentov and Ivan Damg{\aa}rd and Yuval Ishai and Noga Ron{-}Zewi}, editor = {Chen{-}Mou Cheng and Kai{-}Min Chung and Giuseppe Persiano and Bo{-}Yin Yang}, title = {On Public Key Encryption from Noisy Codewords}, booktitle = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9615}, pages = {417--446}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49387-8\_16}, doi = {10.1007/978-3-662-49387-8\_16}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Ben-SassonBDIR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/CascudoDLR16, author = {Ignacio Cascudo and Ivan Damg{\aa}rd and Felipe Lacerda and Samuel Ranellucci}, editor = {Martin Hirt and Adam D. Smith}, title = {Oblivious Transfer from Any Non-trivial Elastic Noisy Channel via Secret Key Agreement}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9985}, pages = {204--234}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53641-4\_9}, doi = {10.1007/978-3-662-53641-4\_9}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/CascudoDLR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DamgardHO16, author = {Ivan Damg{\aa}rd and Helene Haagh and Claudio Orlandi}, editor = {Martin Hirt and Adam D. Smith}, title = {Access Control Encryption: Enforcing Information Flow with Cryptography}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9986}, pages = {547--576}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53644-5\_21}, doi = {10.1007/978-3-662-53644-5\_21}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/DamgardHO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/DamgardHO16, author = {Ivan Damg{\aa}rd and Helene Haagh and Claudio Orlandi}, title = {Access Control Encryption: Enforcing Information Flow with Cryptography}, journal = {CoRR}, volume = {abs/1602.03642}, year = {2016}, url = {http://arxiv.org/abs/1602.03642}, eprinttype = {arXiv}, eprint = {1602.03642}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/DamgardHO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaumDTZ16, author = {Carsten Baum and Ivan Damg{\aa}rd and Tomas Toft and Rasmus Winther Zakarias}, title = {Better Preprocessing for Secure Multiparty Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {48}, year = {2016}, url = {http://eprint.iacr.org/2016/048}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaumDTZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaiDOX16, author = {Ge Bai and Ivan Damg{\aa}rd and Claudio Orlandi and Yu Xia}, title = {Non-Interactive Verifiable Secret Sharing For Monotone Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {78}, year = {2016}, url = {http://eprint.iacr.org/2016/078}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaiDOX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardHO16, author = {Ivan Damg{\aa}rd and Helene Haagh and Claudio Orlandi}, title = {Access Control Encryption: Enforcing Information Flow with Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {106}, year = {2016}, url = {http://eprint.iacr.org/2016/106}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardHO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardTZ16, author = {Ivan Damg{\aa}rd and Tomas Toft and Rasmus Winther Zakarias}, title = {Fast Multiparty Multiplications from shared bits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {109}, year = {2016}, url = {http://eprint.iacr.org/2016/109}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardTZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CascudoDLR16, author = {Ignacio Cascudo and Ivan Damg{\aa}rd and Felipe Lacerda and Samuel Ranellucci}, title = {Oblivious Transfer from Any Non-Trivial Elastic Noisy Channels via Secret Key Agreement}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {120}, year = {2016}, url = {http://eprint.iacr.org/2016/120}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CascudoDLR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CascudoDDDN16, author = {Ignacio Cascudo and Ivan Damg{\aa}rd and Bernardo David and Nico D{\"{o}}ttling and Jesper Buus Nielsen}, title = {Rate-1, Linear Time and Additively Homomorphic {UC} Commitments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {137}, year = {2016}, url = {http://eprint.iacr.org/2016/137}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CascudoDDDN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerDDGX16, author = {Ronald Cramer and Ivan Damg{\aa}rd and Nico D{\"{o}}ttling and Irene Giacomelli and Chaoping Xing}, title = {Linear-Time Non-Malleable Codes in the Bit-Wise Independent Tampering Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {397}, year = {2016}, url = {http://eprint.iacr.org/2016/397}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerDDGX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaumDLN16, author = {Carsten Baum and Ivan Damg{\aa}rd and Kasper Green Larsen and Michael Nielsen}, title = {How to prove knowledge of small secrets}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {538}, year = {2016}, url = {http://eprint.iacr.org/2016/538}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaumDLN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerD16, author = {Ronald Cramer and Ivan Damg{\aa}rd}, title = {Amortized Complexity of Zero-Knowledge Proofs Revisited: Achieving Linear Soundness Slack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {681}, year = {2016}, url = {http://eprint.iacr.org/2016/681}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardNNR16, author = {Ivan Damg{\aa}rd and Jesper Buus Nielsen and Michael Nielsen and Samuel Ranellucci}, title = {Gate-scrambling Revisited - or: The TinyTable protocol for 2-Party Secure Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {695}, year = {2016}, url = {http://eprint.iacr.org/2016/695}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardNNR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaumDOP16, author = {Carsten Baum and Ivan Damg{\aa}rd and Sabine Oechsner and Chris Peikert}, title = {Efficient Commitments and Zero-Knowledge Protocols from Ring-SIS with Applications to Lattice-based Threshold Cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {997}, year = {2016}, url = {http://eprint.iacr.org/2016/997}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaumDOP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/cu/CDN2015, author = {Ronald Cramer and Ivan Damg{\aa}rd and Jesper Buus Nielsen}, title = {Secure Multiparty Computation and Secret Sharing}, publisher = {Cambridge University Press}, year = {2015}, url = {http://www.cambridge.org/de/academic/subjects/computer-science/cryptography-cryptology-and-coding/secure-multiparty-computation-and-secret-sharing?format=HB\&\#38;isbn=9781107043053}, isbn = {9781107043053}, timestamp = {Sun, 21 Feb 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/cu/CDN2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AtenieseDDV15, author = {Giuseppe Ateniese and {\"{O}}zg{\"{u}}r Dagdelen and Ivan Damg{\aa}rd and Daniele Venturi}, editor = {Feng Bao and Steven Miller and Sherman S. M. Chow and Danfeng Yao}, title = {Entangled Encodings and Data Entanglement}, booktitle = {Proceedings of the 3rd International Workshop on Security in Cloud Computing, SCC@ASIACCS '15, Singapore, Republic of Singapore, April 14, 2015}, pages = {3--12}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2732516.2732524}, doi = {10.1145/2732516.2732524}, timestamp = {Thu, 20 Oct 2022 10:45:07 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AtenieseDDV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/AndrychowiczDDF15, author = {Marcin Andrychowicz and Ivan Damg{\aa}rd and Stefan Dziembowski and Sebastian Faust and Antigoni Polychroniadou}, editor = {Kaisa Nyberg}, title = {Efficient Leakage Resilient Circuit Compilers}, booktitle = {Topics in Cryptology - {CT-RSA} 2015, The Cryptographer's Track at the {RSA} Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9048}, pages = {311--329}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-16715-2\_17}, doi = {10.1007/978-3-319-16715-2\_17}, timestamp = {Thu, 14 Oct 2021 10:27:48 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/AndrychowiczDDF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CramerDDFS15, author = {Ronald Cramer and Ivan Bjerre Damg{\aa}rd and Nico D{\"{o}}ttling and Serge Fehr and Gabriele Spini}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9057}, pages = {313--336}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46803-6\_11}, doi = {10.1007/978-3-662-46803-6\_11}, timestamp = {Thu, 14 Oct 2021 09:58:15 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CramerDDFS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/DamgardDN15, author = {Ivan Damg{\aa}rd and Fr{\'{e}}d{\'{e}}ric Dupuis and Jesper Buus Nielsen}, editor = {Anja Lehmann and Stefan Wolf}, title = {On the Orthogonal Vector Problem and the Feasibility of Unconditionally Secure Leakage-Resilient Computation}, booktitle = {Information Theoretic Security - 8th International Conference, {ICITS} 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9063}, pages = {87--104}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-17470-9\_6}, doi = {10.1007/978-3-319-17470-9\_6}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/icits/DamgardDN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/DamgardFMV15, author = {Ivan Damg{\aa}rd and Sebastian Faust and Pratyay Mukherjee and Daniele Venturi}, editor = {Anja Lehmann and Stefan Wolf}, title = {The Chaining Lemma and Its Application}, booktitle = {Information Theoretic Security - 8th International Conference, {ICITS} 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9063}, pages = {181--196}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-17470-9\_11}, doi = {10.1007/978-3-319-17470-9\_11}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/DamgardFMV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CascudoDDGNT15, author = {Ignacio Cascudo and Ivan Damg{\aa}rd and Bernardo Machado David and Irene Giacomelli and Jesper Buus Nielsen and Roberto Trifiletti}, editor = {Jonathan Katz}, title = {Additively Homomorphic {UC} Commitments with Optimal Amortized Overhead}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {495--515}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_22}, doi = {10.1007/978-3-662-46447-2\_22}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CascudoDDGNT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/Ben-SassonBDIR15, author = {Eli Ben{-}Sasson and Iddo Bentov and Ivan Bjerre Damg{\aa}rd and Yuval Ishai and Noga Ron{-}Zewi}, title = {On Public Key Encryption from Noisy Codewords}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR15-094}}, year = {2015}, url = {https://eccc.weizmann.ac.il/report/2015/094}, eprinttype = {ECCC}, eprint = {TR15-094}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/Ben-SassonBDIR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerDK15, author = {Ronald Cramer and Ivan Damg{\aa}rd and Marcel Keller}, title = {On the Amortized Complexity of Zero-knowledge Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {446}, year = {2015}, url = {http://eprint.iacr.org/2015/446}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerDK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ben-SassonBDIR15, author = {Eli Ben{-}Sasson and Iddo Bentov and Ivan Damg{\aa}rd and Yuval Ishai and Noga Ron{-}Zewi}, title = {On Public Key Encryption from Noisy Codewords}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {572}, year = {2015}, url = {http://eprint.iacr.org/2015/572}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ben-SassonBDIR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardN15, author = {Ivan Damg{\aa}rd and Jesper Buus Nielsen}, title = {Unconditionally Secure Computation with Reduced Interaction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {630}, year = {2015}, url = {http://eprint.iacr.org/2015/630}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardZ15, author = {Ivan Damg{\aa}rd and Rasmus Winther Zakarias}, title = {Fast Oblivious {AES{\textbackslash}{\textbackslash}A} dedicated application of the MiniMac protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {989}, year = {2015}, url = {http://eprint.iacr.org/2015/989}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardDNNT15, author = {Ivan Damg{\aa}rd and Kasper Damg{\aa}rd and Kurt Nielsen and Peter Sebastian Nordholt and Tomas Toft}, title = {Confidential Benchmarking based on Multiparty Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1006}, year = {2015}, url = {http://eprint.iacr.org/2015/1006}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardDNNT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerDDFS15, author = {Ronald Cramer and Ivan Bjerre Damg{\aa}rd and Nico D{\"{o}}ttling and Serge Fehr and Gabriele Spini}, title = {Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1089}, year = {2015}, url = {http://eprint.iacr.org/2015/1089}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerDDFS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardNP15, author = {Ivan Damg{\aa}rd and Jesper Buus Nielsen and Antigoni Polychroniadou}, title = {On the Communication required for Unconditionally Secure Multiplication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1097}, year = {2015}, url = {http://eprint.iacr.org/2015/1097}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardNP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/CramerDK14, author = {Ronald Cramer and Ivan Damg{\aa}rd and Marcel Keller}, title = {On the Amortized Complexity of Zero-Knowledge Protocols}, journal = {J. Cryptol.}, volume = {27}, number = {2}, pages = {284--316}, year = {2014}, url = {https://doi.org/10.1007/s00145-013-9145-x}, doi = {10.1007/S00145-013-9145-X}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/CramerDK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nc/Damgard0S14, author = {Ivan Damg{\aa}rd and Thomas Brochmann Pedersen and Louis Salvail}, title = {How to re-use a one-time pad safely and almost optimally even if {P} = {NP}}, journal = {Nat. Comput.}, volume = {13}, number = {4}, pages = {469--486}, year = {2014}, url = {https://doi.org/10.1007/s11047-014-9454-5}, doi = {10.1007/S11047-014-9454-5}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nc/Damgard0S14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/DamgardFSS14, author = {Ivan Damg{\aa}rd and Serge Fehr and Louis Salvail and Christian Schaffner}, title = {Secure identification and {QKD} in the bounded-quantum-storage model}, journal = {Theor. Comput. Sci.}, volume = {560}, pages = {12--26}, year = {2014}, url = {https://doi.org/10.1016/j.tcs.2014.09.014}, doi = {10.1016/J.TCS.2014.09.014}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/DamgardFSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/DamgardDGN14, author = {Ivan Damg{\aa}rd and Bernardo Machado David and Irene Giacomelli and Jesper Buus Nielsen}, editor = {Palash Sarkar and Tetsu Iwata}, title = {Compact {VSS} and Efficient Homomorphic {UC} Commitments}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8874}, pages = {213--232}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45608-8\_12}, doi = {10.1007/978-3-662-45608-8\_12}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/DamgardDGN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DahlD14, author = {Morten Dahl and Ivan Damg{\aa}rd}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {Universally Composable Symbolic Analysis for Two-Party Protocols Based on Homomorphic Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {695--712}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_38}, doi = {10.1007/978-3-642-55220-5\_38}, timestamp = {Thu, 14 Oct 2021 09:58:16 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DahlD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/DamgardMS14, author = {Ivan Damg{\aa}rd and Gert L{\ae}ss{\o}e Mikkelsen and Tue Skeltved}, editor = {Jooyoung Lee and Jongsung Kim}, title = {On the Security of Distributed Multiprime {RSA}}, booktitle = {Information Security and Cryptology - {ICISC} 2014 - 17th International Conference, Seoul, Korea, December 3-5, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8949}, pages = {18--33}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-15943-0\_2}, doi = {10.1007/978-3-319-15943-0\_2}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/DamgardMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/DamgardN14, author = {Ivan Damg{\aa}rd and Jesper Buus Nielsen}, editor = {Sherman S. M. Chow and Joseph K. Liu and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, title = {Adaptive versus Static Security in the {UC} Model}, booktitle = {Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8782}, pages = {10--28}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12475-9\_2}, doi = {10.1007/978-3-319-12475-9\_2}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/provsec/DamgardN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/BaumDO14, author = {Carsten Baum and Ivan Damg{\aa}rd and Claudio Orlandi}, editor = {Michel Abdalla and Roberto De Prisco}, title = {Publicly Auditable Secure Multi-Party Computation}, booktitle = {Security and Cryptography for Networks - 9th International Conference, {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8642}, pages = {175--196}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10879-7\_11}, doi = {10.1007/978-3-319-10879-7\_11}, timestamp = {Thu, 23 Jun 2022 19:58:57 +0200}, biburl = {https://dblp.org/rec/conf/scn/BaumDO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/DamgardLT14, author = {Ivan Damg{\aa}rd and Rasmus Lauritsen and Tomas Toft}, editor = {Michel Abdalla and Roberto De Prisco}, title = {An Empirical Study and Some Improvements of the MiniMac Protocol for Secure Computation}, booktitle = {Security and Cryptography for Networks - 9th International Conference, {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8642}, pages = {398--415}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10879-7\_23}, doi = {10.1007/978-3-319-10879-7\_23}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/DamgardLT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardN14, author = {Ivan Damg{\aa}rd and Jesper Buus Nielsen}, title = {An Efficient Pseudo-Random Generator with Applications to Public-Key Encryption and Constant-Round Multiparty Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {24}, year = {2014}, url = {http://eprint.iacr.org/2014/024}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaumDO14, author = {Carsten Baum and Ivan Damg{\aa}rd and Claudio Orlandi}, title = {Publicly Auditable Secure Multi-Party Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {75}, year = {2014}, url = {http://eprint.iacr.org/2014/075}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaumDO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardDN14, author = {Ivan Damg{\aa}rd and Fr{\'{e}}d{\'{e}}ric Dupuis and Jesper Buus Nielsen}, title = {On The Orthogonal Vector Problem and The Feasibility of Unconditionally Secure Leakage Resilient Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {282}, year = {2014}, url = {http://eprint.iacr.org/2014/282}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardDN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardLT14, author = {Ivan Damg{\aa}rd and Rasmus Lauritsen and Tomas Toft}, title = {An Empirical Study and some Improvements of the MiniMac Protocol for Secure Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {289}, year = {2014}, url = {http://eprint.iacr.org/2014/289}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardLT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardDGN14, author = {Ivan Damg{\aa}rd and Bernardo David and Irene Giacomelli and Jesper Buus Nielsen}, title = {Compact {VSS} and Efficient Homomorphic {UC} Commitments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {370}, year = {2014}, url = {http://eprint.iacr.org/2014/370}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardDGN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardPZ14, author = {Ivan Damg{\aa}rd and Sunoo Park}, title = {Towards Optimally Efficient Secret-Key Authentication from {PRG}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {426}, year = {2014}, url = {http://eprint.iacr.org/2014/426}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardPZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardN14a, author = {Ivan Damg{\aa}rd and Jesper Buus Nielsen}, title = {Adaptive versus Static Security in the {UC} Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {601}, year = {2014}, url = {http://eprint.iacr.org/2014/601}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardN14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CascudoDR14, author = {Ignacio Cascudo and Ivan Damg{\aa}rd and Samuel Ranellucci}, title = {Server-Aided Two-Party Computation with Simultaneous Corruption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {809}, year = {2014}, url = {http://eprint.iacr.org/2014/809}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CascudoDR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CascudoDDGNT14, author = {Ignacio Cascudo and Ivan Damg{\aa}rd and Bernardo David and Irene Giacomelli and Jesper Buus Nielsen and Roberto Trifiletti}, title = {Additively Homomorphic {UC} commitments with Optimal Amortized Overhead}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {829}, year = {2014}, url = {http://eprint.iacr.org/2014/829}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CascudoDDGNT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgaardPR14, author = {Ivan Damg{\aa}rd and Antigoni Polychroniadou and Vanishree Rao}, title = {Adaptively Secure {UC} Constant Round Multi-Party Computation Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {830}, year = {2014}, url = {http://eprint.iacr.org/2014/830}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgaardPR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardFMV14, author = {Ivan Damg{\aa}rd and Sebastian Faust and Pratyay Mukherjee and Daniele Venturi}, title = {The Chaining Lemma and its application}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {979}, year = {2014}, url = {http://eprint.iacr.org/2014/979}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardFMV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/DamgardS13, author = {Ivan Damg{\aa}rd and Alessandra Scafuro}, editor = {Kazue Sako and Palash Sarkar}, title = {Unconditionally Secure and Universally Composable Commitments from Physical Assumptions}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8270}, pages = {100--119}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-42045-0\_6}, doi = {10.1007/978-3-642-42045-0\_6}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/DamgardS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/DamgardFMV13, author = {Ivan Damg{\aa}rd and Sebastian Faust and Pratyay Mukherjee and Daniele Venturi}, editor = {Kazue Sako and Palash Sarkar}, title = {Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8270}, pages = {140--160}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-42045-0\_8}, doi = {10.1007/978-3-642-42045-0\_8}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/DamgardFMV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CohenDIKMRR13, author = {Gil Cohen and Ivan Bjerre Damg{\aa}rd and Yuval Ishai and Jonas K{\"{o}}lker and Peter Bro Miltersen and Ran Raz and Ron D. Rothblum}, editor = {Ran Canetti and Juan A. Garay}, title = {Efficient Multiparty Protocols via Log-Depth Threshold Formulae - (Extended Abstract)}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8043}, pages = {185--202}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40084-1\_11}, doi = {10.1007/978-3-642-40084-1\_11}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CohenDIKMRR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/DamgardKLPSS13, author = {Ivan Damg{\aa}rd and Marcel Keller and Enrique Larraia and Valerio Pastro and Peter Scholl and Nigel P. Smart}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {Practical Covertly Secure {MPC} for Dishonest Majority - Or: Breaking the {SPDZ} Limits}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {1--18}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_1}, doi = {10.1007/978-3-642-40203-6\_1}, timestamp = {Wed, 25 Sep 2019 18:03:15 +0200}, biburl = {https://dblp.org/rec/conf/esorics/DamgardKLPSS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/DamgardFNS13, author = {Ivan Damg{\aa}rd and Jakob Funder and Jesper Buus Nielsen and Louis Salvail}, editor = {Carles Padr{\'{o}}}, title = {Superposition Attacks on Cryptographic Protocols}, booktitle = {Information Theoretic Security - 7th International Conference, {ICITS} 2013, Singapore, November 28-30, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8317}, pages = {142--161}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-04268-8\_9}, doi = {10.1007/978-3-319-04268-8\_9}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/icits/DamgardFNS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/DamgardJNP13, author = {Ivan Damg{\aa}rd and Thomas P. Jakobsen and Jesper Buus Nielsen and Jakob Illeborg Pagter}, editor = {Martijn Stam}, title = {Secure Key Management in the Cloud}, booktitle = {Cryptography and Coding - 14th {IMA} International Conference, {IMACC} 2013, Oxford, UK, December 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8308}, pages = {270--289}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-45239-0\_16}, doi = {10.1007/978-3-642-45239-0\_16}, timestamp = {Wed, 18 Mar 2020 16:00:57 +0100}, biburl = {https://dblp.org/rec/conf/ima/DamgardJNP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DamgardZ13, author = {Ivan Damg{\aa}rd and Sarah Zakarias}, editor = {Amit Sahai}, title = {Constant-Overhead Secure Computation of Boolean Circuits using Preprocessing}, booktitle = {Theory of Cryptography - 10th Theory of Cryptography Conference, {TCC} 2013, Tokyo, Japan, March 3-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7785}, pages = {621--641}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36594-2\_35}, doi = {10.1007/978-3-642-36594-2\_35}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/DamgardZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/CohenDIKMRR13, author = {Gil Cohen and Ivan Bjerre Damg{\aa}rd and Yuval Ishai and Jonas K{\"{o}}lker and Peter Bro Miltersen and Ran Raz and Ron Rothblum}, title = {Efficient Multiparty Protocols via Log-Depth Threshold Formulae}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR13-107}}, year = {2013}, url = {https://eccc.weizmann.ac.il/report/2013/107}, eprinttype = {ECCC}, eprint = {TR13-107}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/CohenDIKMRR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardS13, author = {Ivan Damg{\aa}rd and Alessandra Scafuro}, title = {Unconditionally Secure and Universally Composable Commitments from Physical Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {108}, year = {2013}, url = {http://eprint.iacr.org/2013/108}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DahlD13, author = {Morten Dahl and Ivan Damg{\aa}rd}, title = {Universally Composable Symbolic Analysis for Two-Party Protocols based on Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {296}, year = {2013}, url = {http://eprint.iacr.org/2013/296}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DahlD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CohenDIKMRR13, author = {Gil Cohen and Ivan Bjerre Damg{\aa}rd and Yuval Ishai and Jonas K{\"{o}}lker and Peter Bro Miltersen and Ran Raz and Ron D. Rothblum}, title = {Efficient Multiparty Protocols via Log-Depth Threshold Formulae}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {480}, year = {2013}, url = {http://eprint.iacr.org/2013/480}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CohenDIKMRR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardJNP13, author = {Ivan Damg{\aa}rd and Thomas P. Jakobsen and Jesper Buus Nielsen and Jakob Illeborg Pagter}, title = {Secure Key Management in the Cloud}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {629}, year = {2013}, url = {http://eprint.iacr.org/2013/629}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardJNP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardFMV13a, author = {Ivan Damg{\aa}rd and Sebastian Faust and Pratyay Mukherjee and Daniele Venturi}, title = {Bounded Tamper Resilience: How to go beyond the Algebraic Barrier}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {677}, year = {2013}, url = {http://eprint.iacr.org/2013/677}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardFMV13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DamgardPSZ12, author = {Ivan Damg{\aa}rd and Valerio Pastro and Nigel P. Smart and Sarah Zakarias}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {Multiparty Computation from Somewhat Homomorphic Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {643--662}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_38}, doi = {10.1007/978-3-642-32009-5\_38}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DamgardPSZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/DamgardKT12, author = {Ivan Damg{\aa}rd and Jonas K{\"{o}}lker and Tomas Toft}, editor = {Orr Dunkelman}, title = {Secure Computation, I/O-Efficient Algorithms and Distributed Signatures}, booktitle = {Topics in Cryptology - {CT-RSA} 2012 - The Cryptographers' Track at the {RSA} Conference 2012, San Francisco, CA, USA, February 27 - March 2, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7178}, pages = {278--295}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-27954-6\_18}, doi = {10.1007/978-3-642-27954-6\_18}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/DamgardKT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/CramerDP12, author = {Ronald Cramer and Ivan Damg{\aa}rd and Valerio Pastro}, editor = {Adam D. Smith}, title = {On the Amortized Complexity of Zero Knowledge Protocols for Multiplicative Relations}, booktitle = {Information Theoretic Security - 6th International Conference, {ICITS} 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7412}, pages = {62--79}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32284-6\_4}, doi = {10.1007/978-3-642-32284-6\_4}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/icits/CramerDP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CramerDKZZ12, author = {Ronald Cramer and Ivan Damg{\aa}rd and Eike Kiltz and Sarah Zakarias and Angela Zottarel}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {DDH-Like Assumptions Based on Extension Rings}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {644--661}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_38}, doi = {10.1007/978-3-642-30057-8\_38}, timestamp = {Mon, 16 Nov 2020 15:55:52 +0100}, biburl = {https://dblp.org/rec/conf/pkc/CramerDKZZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/DamgardL12, author = {Ivan Damg{\aa}rd and Adriana L{\'{o}}pez{-}Alt}, editor = {Ivan Visconti and Roberto De Prisco}, title = {Zero-Knowledge Proofs with Low Amortized Communication from Lattice Assumptions}, booktitle = {Security and Cryptography for Networks - 8th International Conference, {SCN} 2012, Amalfi, Italy, September 5-7, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7485}, pages = {38--56}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32928-9\_3}, doi = {10.1007/978-3-642-32928-9\_3}, timestamp = {Thu, 23 Jun 2022 19:58:57 +0200}, biburl = {https://dblp.org/rec/conf/scn/DamgardL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/DamgardKLMS12, author = {Ivan Damg{\aa}rd and Marcel Keller and Enrique Larraia and Christian Miles and Nigel P. Smart}, editor = {Ivan Visconti and Roberto De Prisco}, title = {Implementing {AES} via an Actively/Covertly Secure Dishonest-Majority {MPC} Protocol}, booktitle = {Security and Cryptography for Networks - 8th International Conference, {SCN} 2012, Amalfi, Italy, September 5-7, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7485}, pages = {241--263}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32928-9\_14}, doi = {10.1007/978-3-642-32928-9\_14}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/DamgardKLMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DamgardFH12, author = {Ivan Damg{\aa}rd and Sebastian Faust and Carmit Hazay}, editor = {Ronald Cramer}, title = {Secure Two-Party Computation with Low Communication}, booktitle = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC} 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7194}, pages = {54--74}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28914-9\_4}, doi = {10.1007/978-3-642-28914-9\_4}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/DamgardFH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardKLMS12, author = {Ivan Damg{\aa}rd and Marcel Keller and Enrique Larraia and Christian Miles and Nigel P. Smart}, title = {Implementing {AES} via an Actively/Covertly Secure Dishonest-Majority {MPC} Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {262}, year = {2012}, url = {http://eprint.iacr.org/2012/262}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardKLMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardL12, author = {Ivan Damg{\aa}rd and Adriana L{\'{o}}pez{-}Alt}, title = {Zero-Knowledge Proofs with Low Amortized Communication from Lattice Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {364}, year = {2012}, url = {http://eprint.iacr.org/2012/364}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtenieseDDV12, author = {Giuseppe Ateniese and {\"{O}}zg{\"{u}}r Dagdelen and Ivan Damg{\aa}rd and Daniele Venturi}, title = {Entangled Cloud Storage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {511}, year = {2012}, url = {http://eprint.iacr.org/2012/511}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AtenieseDDV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardZ12, author = {Ivan Damg{\aa}rd and Sarah Zakarias}, title = {Constant-Overhead Secure Computation for Boolean Circuits in the Preprocessing Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {512}, year = {2012}, url = {http://eprint.iacr.org/2012/512}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardKM12, author = {Ivan Bjerre Damg{\aa}rd and Jonas K{\"{o}}lker and Peter Bro Miltersen}, title = {Secret Sharing and Secure Computing from Monotone Formulae}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {536}, year = {2012}, url = {http://eprint.iacr.org/2012/536}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardKM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardKLPSS12, author = {Ivan Damg{\aa}rd and Marcel Keller and Enrique Larraia and Valerio Pastro and Peter Scholl and Nigel P. Smart}, title = {Practical Covertly Secure {MPC} for Dishonest Majority - or: Breaking the {SPDZ} Limits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {642}, year = {2012}, url = {http://eprint.iacr.org/2012/642}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardKLPSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardP12, author = {Ivan Damg{\aa}rd and Sunoo Park}, title = {Is Public-Key Encryption Based on {LPN} Practical?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {699}, year = {2012}, url = {http://eprint.iacr.org/2012/699}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BendlinDOZ11, author = {Rikke Bendlin and Ivan Damg{\aa}rd and Claudio Orlandi and Sarah Zakarias}, editor = {Kenneth G. Paterson}, title = {Semi-homomorphic Encryption and Multiparty Computation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {169--188}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_11}, doi = {10.1007/978-3-642-20465-4\_11}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BendlinDOZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Damgard11, author = {Ivan Damg{\aa}rd}, editor = {Serge Fehr}, title = {Quantum Communication Attacks on Classical Cryptographic Protocols - (Invited Talk)}, booktitle = {Information Theoretic Security - 5th International Conference, {ICITS} 2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6673}, pages = {181}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20728-0\_16}, doi = {10.1007/978-3-642-20728-0\_16}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/icits/Damgard11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DamgardMN11, author = {Ivan Damg{\aa}rd and Sigurd Meldgaard and Jesper Buus Nielsen}, editor = {Yuval Ishai}, title = {Perfectly Secure Oblivious {RAM} without Random Oracles}, booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, {TCC} 2011, Providence, RI, USA, March 28-30, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6597}, pages = {144--163}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19571-6\_10}, doi = {10.1007/978-3-642-19571-6\_10}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/DamgardMN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1108-6313, author = {Ivan Damg{\aa}rd and Jakob Funder and Jesper Buus Nielsen and Louis Salvail}, title = {Superposition Attacks on Cryptographic Protocols}, journal = {CoRR}, volume = {abs/1108.6313}, year = {2011}, url = {http://arxiv.org/abs/1108.6313}, eprinttype = {arXiv}, eprint = {1108.6313}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1108-6313.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerDKZZ11, author = {Ronald Cramer and Ivan Damg{\aa}rd and Eike Kiltz and Sarah Zakarias and Angela Zottarel}, title = {DDH-like Assumptions Based on Extension Rings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {280}, year = {2011}, url = {http://eprint.iacr.org/2011/280}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerDKZZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerDP11, author = {Ronald Cramer and Ivan Damg{\aa}rd and Valerio Pastro}, title = {On the Amortized Complexity of Zero Knowledge Protocols for Multiplicative Relations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {301}, year = {2011}, url = {http://eprint.iacr.org/2011/301}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerDP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardFNS11, author = {Ivan Damg{\aa}rd and Jakob Funder and Jesper Buus Nielsen and Louis Salvail}, title = {Superposition Attacks on Cryptographic Protocols\}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {421}, year = {2011}, url = {http://eprint.iacr.org/2011/421}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardFNS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardFH11, author = {Ivan Damg{\aa}rd and Sebastian Faust and Carmit Hazay}, title = {Secure Two-Party Computation with Low Communication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {508}, year = {2011}, url = {http://eprint.iacr.org/2011/508}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardFH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardPSZ11, author = {Ivan Damg{\aa}rd and Valerio Pastro and Nigel P. Smart and Sarah Zakarias}, title = {Multiparty Computation from Somewhat Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {535}, year = {2011}, url = {http://eprint.iacr.org/2011/535}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardPSZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/DamgardJN10, author = {Ivan Damg{\aa}rd and Mads Jurik and Jesper Buus Nielsen}, title = {A generalization of Paillier's public-key system with applications to electronic voting}, journal = {Int. J. Inf. Sec.}, volume = {9}, number = {6}, pages = {371--385}, year = {2010}, url = {https://doi.org/10.1007/s10207-010-0119-9}, doi = {10.1007/S10207-010-0119-9}, timestamp = {Mon, 06 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/DamgardJN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DamgardO10, author = {Ivan Damg{\aa}rd and Claudio Orlandi}, editor = {Tal Rabin}, title = {Multiparty Computation for Dishonest Majority: From Passive to Active Security at Low Cost}, booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {558--576}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7\_30}, doi = {10.1007/978-3-642-14623-7\_30}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DamgardO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DamgardIK10, author = {Ivan Damg{\aa}rd and Yuval Ishai and Mikkel Kr{\o}igaard}, editor = {Henri Gilbert}, title = {Perfectly Secure Multiparty Computation and the Computational Overhead of Cryptography}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30 - June 3, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6110}, pages = {445--465}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13190-5\_23}, doi = {10.1007/978-3-642-13190-5\_23}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DamgardIK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/DamgardK10, author = {Ivan Damg{\aa}rd and Marcel Keller}, editor = {Radu Sion}, title = {Secure Multiparty {AES}}, booktitle = {Financial Cryptography and Data Security, 14th International Conference, {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6052}, pages = {367--374}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14577-3\_31}, doi = {10.1007/978-3-642-14577-3\_31}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/DamgardK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DamgardNO10, author = {Ivan Damg{\aa}rd and Jesper Buus Nielsen and Claudio Orlandi}, editor = {Daniele Micciancio}, title = {On the Necessary and Sufficient Assumptions for {UC} Computation}, booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC} 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5978}, pages = {109--127}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11799-2\_8}, doi = {10.1007/978-3-642-11799-2\_8}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/DamgardNO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DamgardGN10, author = {Ivan Damg{\aa}rd and Martin Geisler and Jesper Buus Nielsen}, editor = {Daniele Micciancio}, title = {From Passive to Covert Security at Low Cost}, booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC} 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5978}, pages = {128--145}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11799-2\_9}, doi = {10.1007/978-3-642-11799-2\_9}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/DamgardGN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DamgardM10, author = {Ivan Damg{\aa}rd and Gert L{\ae}ss{\o}e Mikkelsen}, editor = {Daniele Micciancio}, title = {Efficient, Robust and Constant-Round Distributed {RSA} Key Generation}, booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC} 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5978}, pages = {183--200}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11799-2\_12}, doi = {10.1007/978-3-642-11799-2\_12}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/DamgardM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BendlinD10, author = {Rikke Bendlin and Ivan Damg{\aa}rd}, editor = {Daniele Micciancio}, title = {Threshold Decryption and Zero-Knowledge Proofs for Lattice-Based Cryptosystems}, booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC} 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5978}, pages = {201--218}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11799-2\_13}, doi = {10.1007/978-3-642-11799-2\_13}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/BendlinD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardIK10, author = {Ivan Damg{\aa}rd and Yuval Ishai and Mikkel Kr{\o}igaard}, title = {Perfectly Secure Multiparty Computation and the Computational Overhead of Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {106}, year = {2010}, url = {http://eprint.iacr.org/2010/106}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardIK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardMN10, author = {Ivan Damg{\aa}rd and Sigurd Meldgaard and Jesper Buus Nielsen}, title = {Perfectly Secure Oblivious {RAM} Without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {108}, year = {2010}, url = {http://eprint.iacr.org/2010/108}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardMN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardO10, author = {Ivan Damg{\aa}rd and Claudio Orlandi}, title = {Multiparty Computation for Dishonest Majority: from Passive to Active Security at Low Cost}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {318}, year = {2010}, url = {http://eprint.iacr.org/2010/318}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BendlinDOZ10, author = {Rikke Bendlin and Ivan Damg{\aa}rd and Claudio Orlandi and Sarah Zakarias}, title = {Semi-Homomorphic Encryption and Multiparty Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {514}, year = {2010}, url = {http://eprint.iacr.org/2010/514}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BendlinDOZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/DamgardGK09, author = {Ivan Damg{\aa}rd and Martin Geisler and Mikkel Kr{\o}igaard}, title = {A correction to 'efficient and secure comparison for on-line auctions'}, journal = {Int. J. Appl. Cryptogr.}, volume = {1}, number = {4}, pages = {323--324}, year = {2009}, url = {https://doi.org/10.1504/IJACT.2009.028031}, doi = {10.1504/IJACT.2009.028031}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/DamgardGK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/DamgardL09, author = {Ivan Damg{\aa}rd and Carolin Lunemann}, editor = {Mitsuru Matsui}, title = {Quantum-Secure Coin-Flipping and Applications}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5912}, pages = {52--69}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10366-7\_4}, doi = {10.1007/978-3-642-10366-7\_4}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/DamgardL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CramerD09, author = {Ronald Cramer and Ivan Damg{\aa}rd}, editor = {Shai Halevi}, title = {On the Amortized Complexity of Zero-Knowledge Protocols}, booktitle = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5677}, pages = {177--191}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03356-8\_11}, doi = {10.1007/978-3-642-03356-8\_11}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CramerD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DamgardFLSS09, author = {Ivan Damg{\aa}rd and Serge Fehr and Carolin Lunemann and Louis Salvail and Christian Schaffner}, editor = {Shai Halevi}, title = {Improving the Security of Quantum Protocols via Commit-and-Open}, booktitle = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5677}, pages = {408--427}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03356-8\_24}, doi = {10.1007/978-3-642-03356-8\_24}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DamgardFLSS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/BogetoftCDGJKNNNPST09, author = {Peter Bogetoft and Dan Lund Christensen and Ivan Damg{\aa}rd and Martin Geisler and Thomas P. Jakobsen and Mikkel Kr{\o}igaard and Janus Dam Nielsen and Jesper Buus Nielsen and Kurt Nielsen and Jakob Pagter and Michael I. Schwartzbach and Tomas Toft}, editor = {Roger Dingledine and Philippe Golle}, title = {Secure Multiparty Computation Goes Live}, booktitle = {Financial Cryptography and Data Security, 13th International Conference, {FC} 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5628}, pages = {325--343}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03549-4\_20}, doi = {10.1007/978-3-642-03549-4\_20}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/BogetoftCDGJKNNNPST09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/BangerterBBDPPS09, author = {Endre Bangerter and Manuel Barbosa and Daniel J. Bernstein and Ivan Damg{\aa}rd and Daniel Page and Jakob Illeborg Pagter and Ahmad{-}Reza Sadeghi and Sampo Sovio}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {Using Compilers to Enhance Cryptographic Product Development}, booktitle = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2009 Conference, The Hague, The Netherlands, October 6-8, 2009}, pages = {291--301}, publisher = {Vieweg+Teubner}, year = {2009}, url = {https://doi.org/10.1007/978-3-8348-9363-5\_29}, doi = {10.1007/978-3-8348-9363-5\_29}, timestamp = {Wed, 10 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isse/BangerterBBDPPS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DamgardGKN09, author = {Ivan Damg{\aa}rd and Martin Geisler and Mikkel Kr{\o}igaard and Jesper Buus Nielsen}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {Asynchronous Multiparty Computation: Theory and Implementation}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {160--179}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_10}, doi = {10.1007/978-3-642-00468-1\_10}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DamgardGKN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DamgardM09, author = {Ivan Damg{\aa}rd and Gert L{\ae}ss{\o}e Mikkelsen}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {On the Theory and Practice of Personal Digital Signatures}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {277--296}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_16}, doi = {10.1007/978-3-642-00468-1\_16}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DamgardM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DamgardNW09, author = {Ivan Damg{\aa}rd and Jesper Buus Nielsen and Daniel Wichs}, editor = {Omer Reingold}, title = {Universally Composable Multiparty Computation with Partially Isolated Parties}, booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC} 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5444}, pages = {315--331}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00457-5\_19}, doi = {10.1007/978-3-642-00457-5\_19}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/DamgardNW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardM09, author = {Ivan Damg{\aa}rd and Gert L{\ae}ss{\o}e Mikkelsen}, title = {On the Theory and Practice of Personal Digital Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {171}, year = {2009}, url = {http://eprint.iacr.org/2009/171}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardNO09, author = {Ivan Damg{\aa}rd and Jesper Buus Nielsen and Claudio Orlandi}, title = {On the Necessary and Sufficient Assumptions for {UC} Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {247}, year = {2009}, url = {http://eprint.iacr.org/2009/247}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardNO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BendlinD09, author = {Rikke Bendlin and Ivan Damg{\aa}rd}, title = {Threshold Decryption and Zero-Knowledge Proofs for Lattice-Based Cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {391}, year = {2009}, url = {http://eprint.iacr.org/2009/391}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BendlinD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardGN09, author = {Ivan Damg{\aa}rd and Martin Geisler and Jesper Buus Nielsen}, title = {From Passive to Covert Security at Low Cost}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {592}, year = {2009}, url = {http://eprint.iacr.org/2009/592}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardGN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardK09, author = {Ivan Damg{\aa}rd and Marcel Keller}, title = {Secure Multiparty {AES} (full paper)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {614}, year = {2009}, url = {http://eprint.iacr.org/2009/614}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/DamgardGK08, author = {Ivan Damg{\aa}rd and Martin Geisler and Mikkel Kr{\o}igaard}, title = {Homomorphic encryption and secure comparison}, journal = {Int. J. Appl. Cryptogr.}, volume = {1}, number = {1}, pages = {22--31}, year = {2008}, url = {https://doi.org/10.1504/IJACT.2008.017048}, doi = {10.1504/IJACT.2008.017048}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/DamgardGK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/DamgardFSS08, author = {Ivan Damg{\aa}rd and Serge Fehr and Louis Salvail and Christian Schaffner}, title = {Cryptography in the Bounded-Quantum-Storage Model}, journal = {{SIAM} J. Comput.}, volume = {37}, number = {6}, pages = {1865--1890}, year = {2008}, url = {https://doi.org/10.1137/060651343}, doi = {10.1137/060651343}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/DamgardFSS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/DamgardKT08, author = {Ivan Damg{\aa}rd and Lars R. Knudsen and S{\o}ren S. Thomsen}, editor = {Steven M. Bellovin and Rosario Gennaro and Angelos D. Keromytis and Moti Yung}, title = {Dakota- Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography}, booktitle = {Applied Cryptography and Network Security, 6th International Conference, {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5037}, pages = {144--155}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68914-0\_9}, doi = {10.1007/978-3-540-68914-0\_9}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/DamgardKT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DamgardIKNS08, author = {Ivan Damg{\aa}rd and Yuval Ishai and Mikkel Kr{\o}igaard and Jesper Buus Nielsen and Adam D. Smith}, editor = {David A. Wagner}, title = {Scalable Multiparty Computation with Nearly Optimal Work and Resilience}, booktitle = {Advances in Cryptology - {CRYPTO} 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5157}, pages = {241--261}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85174-5\_14}, doi = {10.1007/978-3-540-85174-5\_14}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DamgardIKNS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/DamgardHKT08, author = {Ivan Damg{\aa}rd and Dennis Hofheinz and Eike Kiltz and Rune Thorbek}, editor = {Tal Malkin}, title = {Public-Key Encryption with Non-interactive Opening}, booktitle = {Topics in Cryptology - {CT-RSA} 2008, The Cryptographers' Track at the {RSA} Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4964}, pages = {239--255}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79263-5\_15}, doi = {10.1007/978-3-540-79263-5\_15}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/DamgardHKT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/DamgardP08, author = {Ivan Damg{\aa}rd and Michael {\O}stergaard Pedersen}, editor = {Tal Malkin}, title = {{RFID} Security: Tradeoffs between Security and Efficiency}, booktitle = {Topics in Cryptology - {CT-RSA} 2008, The Cryptographers' Track at the {RSA} Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4964}, pages = {318--332}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79263-5\_20}, doi = {10.1007/978-3-540-79263-5\_20}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/DamgardP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DamgardNW08, author = {Ivan Damg{\aa}rd and Jesper Buus Nielsen and Daniel Wichs}, editor = {Nigel P. Smart}, title = {Isolated Proofs of Knowledge and Isolated Zero Knowledge}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4965}, pages = {509--526}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78967-3\_29}, doi = {10.1007/978-3-540-78967-3\_29}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DamgardNW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/DamgardNO08, author = {Ivan Damg{\aa}rd and Jesper Buus Nielsen and Claudio Orlandi}, editor = {Pil Joong Lee and Jung Hee Cheon}, title = {Essentially Optimal Universally Composable Oblivious Transfer}, booktitle = {Information Security and Cryptology - {ICISC} 2008, 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5461}, pages = {318--335}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-00730-9\_20}, doi = {10.1007/978-3-642-00730-9\_20}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/DamgardNO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icalp/2008-1, editor = {Luca Aceto and Ivan Damg{\aa}rd and Leslie Ann Goldberg and Magn{\'{u}}s M. Halld{\'{o}}rsson and Anna Ing{\'{o}}lfsd{\'{o}}ttir and Igor Walukiewicz}, title = {Automata, Languages and Programming, 35th International Colloquium, {ICALP} 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part {I:} Tack {A:} Algorithms, Automata, Complexity, and Games}, series = {Lecture Notes in Computer Science}, volume = {5125}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70575-8}, doi = {10.1007/978-3-540-70575-8}, isbn = {978-3-540-70574-1}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icalp/2008-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icalp/2008-2, editor = {Luca Aceto and Ivan Damg{\aa}rd and Leslie Ann Goldberg and Magn{\'{u}}s M. Halld{\'{o}}rsson and Anna Ing{\'{o}}lfsd{\'{o}}ttir and Igor Walukiewicz}, title = {Automata, Languages and Programming, 35th International Colloquium, {ICALP} 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part {II} - Track {B:} Logic, Semantics, and Theory of Programming {\&} Track {C:} Security and Cryptography Foundations}, series = {Lecture Notes in Computer Science}, volume = {5126}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70583-3}, doi = {10.1007/978-3-540-70583-3}, isbn = {978-3-540-70582-6}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icalp/2008-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ercim/DamgardT08, author = {Ivan Damg{\aa}rd and Tomas Toft}, title = {Trading Sugar Beet Quotas - Secure Multiparty Computation in Practice}, journal = {{ERCIM} News}, volume = {2008}, number = {73}, year = {2008}, url = {http://ercim-news.ercim.eu/trading-sugar-beet-quotas-secure-multiparty-computation-in-practice}, timestamp = {Wed, 22 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ercim/DamgardT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BogetoftCDGJKNNNPST08, author = {Peter Bogetoft and Dan Lund Christensen and Ivan Damg{\aa}rd and Martin Geisler and Thomas P. Jakobsen and Mikkel Kr{\o}igaard and Janus Dam Nielsen and Jesper Buus Nielsen and Kurt Nielsen and Jakob Pagter and Michael I. Schwartzbach and Tomas Toft}, title = {Multiparty Computation Goes Live}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {68}, year = {2008}, url = {http://eprint.iacr.org/2008/068}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BogetoftCDGJKNNNPST08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardNO08, author = {Ivan Damg{\aa}rd and Jesper Buus Nielsen and Claudio Orlandi}, title = {Essentially Optimal Universally Composable Oblivious Transfer}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {220}, year = {2008}, url = {http://eprint.iacr.org/2008/220}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardNO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardT08, author = {Ivan Damg{\aa}rd and Rune Thorbek}, title = {Efficient Conversion of Secret-shared Values Between Different Fields}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {221}, year = {2008}, url = {http://eprint.iacr.org/2008/221}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardGK08, author = {Ivan Damg{\aa}rd and Martin Geisler and Mikkel Kr{\o}igaard}, title = {A correction to "Efficient and Secure Comparison for On-Line Auctions"}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {321}, year = {2008}, url = {http://eprint.iacr.org/2008/321}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardGK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardGKN08, author = {Ivan Damg{\aa}rd and Martin Geisler and Mikkel Kr{\o}igaard and Jesper Buus Nielsen}, title = {Asynchronous Multiparty Computation: Theory and Implementation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {415}, year = {2008}, url = {http://eprint.iacr.org/2008/415}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardGKN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardT08a, author = {Ivan Damg{\aa}rd and Nikos Triandopoulos}, title = {Supporting Non-membership Proofs with Bilinear-map Accumulators}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {538}, year = {2008}, url = {http://eprint.iacr.org/2008/538}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardT08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/DamgardGK07, author = {Ivan Damg{\aa}rd and Martin Geisler and Mikkel Kr{\o}igaard}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Efficient and Secure Comparison for On-Line Auctions}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {416--430}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_30}, doi = {10.1007/978-3-540-73458-1\_30}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/DamgardGK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/DamgardDFN07, author = {Ivan Damg{\aa}rd and Yvo Desmedt and Matthias Fitzi and Jesper Buus Nielsen}, editor = {Kaoru Kurosawa}, title = {Secure Protocols with Asymmetric Trust}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4833}, pages = {357--375}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76900-2\_22}, doi = {10.1007/978-3-540-76900-2\_22}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/DamgardDFN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DamgardFSS07, author = {Ivan Damg{\aa}rd and Serge Fehr and Louis Salvail and Christian Schaffner}, editor = {Alfred Menezes}, title = {Secure Identification and {QKD} in the Bounded-Quantum-Storage Model}, booktitle = {Advances in Cryptology - {CRYPTO} 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4622}, pages = {342--359}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74143-5\_19}, doi = {10.1007/978-3-540-74143-5\_19}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DamgardFSS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DamgardFRSS07, author = {Ivan Damg{\aa}rd and Serge Fehr and Renato Renner and Louis Salvail and Christian Schaffner}, editor = {Alfred Menezes}, title = {A Tight High-Order Entropic Quantum Uncertainty Relation with Applications}, booktitle = {Advances in Cryptology - {CRYPTO} 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4622}, pages = {360--378}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74143-5\_20}, doi = {10.1007/978-3-540-74143-5\_20}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DamgardFRSS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DamgardN07, author = {Ivan Damg{\aa}rd and Jesper Buus Nielsen}, editor = {Alfred Menezes}, title = {Scalable and Unconditionally Secure Multiparty Computation}, booktitle = {Advances in Cryptology - {CRYPTO} 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4622}, pages = {572--590}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74143-5\_32}, doi = {10.1007/978-3-540-74143-5\_32}, timestamp = {Mon, 06 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/DamgardN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CramerDH07, author = {Ronald Cramer and Ivan Damg{\aa}rd and Robbert de Haan}, editor = {Moni Naor}, title = {Atomic Secure Multi-party Multiplication with Low Communication}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4515}, pages = {329--346}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72540-4\_19}, doi = {10.1007/978-3-540-72540-4\_19}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CramerDH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DamgardT07, author = {Ivan Damg{\aa}rd and Rune Thorbek}, editor = {Moni Naor}, title = {Non-interactive Proofs for Integer Multiplication}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4515}, pages = {412--429}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72540-4\_24}, doi = {10.1007/978-3-540-72540-4\_24}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DamgardT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/Damgard07, author = {Ivan Damg{\aa}rd}, editor = {Lars Arge and Christian Cachin and Tomasz Jurdzinski and Andrzej Tarlecki}, title = {A "proof-reading" of Some Issues in Cryptography}, booktitle = {Automata, Languages and Programming, 34th International Colloquium, {ICALP} 2007, Wroclaw, Poland, July 9-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4596}, pages = {2--11}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73420-8\_2}, doi = {10.1007/978-3-540-73420-8\_2}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/Damgard07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardT07, author = {Ivan Damg{\aa}rd and Rune Thorbek}, title = {Non-Interactive Proofs for Integer Multiplication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {86}, year = {2007}, url = {http://eprint.iacr.org/2007/086}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardFSS07, author = {Ivan Damg{\aa}rd and Serge Fehr and Louis Salvail and Christian Schaffner}, title = {Secure Identification and {QKD} in the Bounded-Quantum-Storage Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {327}, year = {2007}, url = {http://eprint.iacr.org/2007/327}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardFSS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardFRSS07, author = {Ivan Damg{\aa}rd and Serge Fehr and Renato Renner and Louis Salvail and Christian Schaffner}, title = {A Tight High-Order Entropic Quantum Uncertainty Relation With Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {328}, year = {2007}, url = {http://eprint.iacr.org/2007/328}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardFRSS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardNW07, author = {Ivan Damg{\aa}rd and Jesper Buus Nielsen and Daniel Wichs}, title = {Isolated Proofs of Knowledge and Isolated Zero Knowledge}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {331}, year = {2007}, url = {http://eprint.iacr.org/2007/331}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardNW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardNW07a, author = {Ivan Damg{\aa}rd and Jesper Buus Nielsen and Daniel Wichs}, title = {Universally Composable Multiparty Computation with Partially Isolated Parties}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {332}, year = {2007}, url = {http://eprint.iacr.org/2007/332}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardNW07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/DamgardF06, author = {Ivan Damg{\aa}rd and Gudmund Skovbjerg Frandsen}, title = {An Extended Quadratic Frobenius Primality Test with Average- and Worst-Case Error Estimate}, journal = {J. Cryptol.}, volume = {19}, number = {4}, pages = {489--520}, year = {2006}, url = {https://doi.org/10.1007/s00145-006-0332-x}, doi = {10.1007/S00145-006-0332-X}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/DamgardF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DamgardFSS06, author = {Ivan Damg{\aa}rd and Serge Fehr and Louis Salvail and Christian Schaffner}, editor = {Cynthia Dwork}, title = {Oblivious Transfer and Linear Functions}, booktitle = {Advances in Cryptology - {CRYPTO} 2006, 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4117}, pages = {427--444}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11818175\_26}, doi = {10.1007/11818175\_26}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DamgardFSS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DamgardI06, author = {Ivan Damg{\aa}rd and Yuval Ishai}, editor = {Cynthia Dwork}, title = {Scalable Secure Multiparty Computation}, booktitle = {Advances in Cryptology - {CRYPTO} 2006, 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4117}, pages = {501--520}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11818175\_30}, doi = {10.1007/11818175\_30}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DamgardI06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DamgardDP06, author = {Ivan Damg{\aa}rd and Kasper Dupont and Michael {\O}stergaard Pedersen}, editor = {Serge Vaudenay}, title = {Unclonable Group Identification}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4004}, pages = {555--572}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11761679\_33}, doi = {10.1007/11761679\_33}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DamgardDP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AlmansaDN06, author = {Jes{\'{u}}s F. Almansa and Ivan Damg{\aa}rd and Jesper Buus Nielsen}, editor = {Serge Vaudenay}, title = {Simplified Threshold {RSA} with Adaptive and Proactive Security}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4004}, pages = {593--611}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11761679\_35}, doi = {10.1007/11761679\_35}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AlmansaDN06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/BogetoftDJNPT06, author = {Peter Bogetoft and Ivan Damg{\aa}rd and Thomas P. Jakobsen and Kurt Nielsen and Jakob Pagter and Tomas Toft}, editor = {Giovanni Di Crescenzo and Aviel D. Rubin}, title = {A Practical Implementation of Secure Auctions Based on Multiparty Integer Computation}, booktitle = {Financial Cryptography and Data Security, 10th International Conference, {FC} 2006, Anguilla, British West Indies, February 27-March 2, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4107}, pages = {142--147}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11889663\_10}, doi = {10.1007/11889663\_10}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/BogetoftDJNPT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DamgardT06, author = {Ivan Damg{\aa}rd and Rune Thorbek}, editor = {Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal Malkin}, title = {Linear Integer Secret Sharing and Distributed Exponentiation}, booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3958}, pages = {75--90}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11745853\_6}, doi = {10.1007/11745853\_6}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DamgardT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/Damgard06, author = {Ivan Damg{\aa}rd}, editor = {Roberto De Prisco and Moti Yung}, title = {Theory and Practice of Multiparty Computation}, booktitle = {Security and Cryptography for Networks, 5th International Conference, {SCN} 2006, Maiori, Italy, September 6-8, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4116}, pages = {360--364}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11832072\_25}, doi = {10.1007/11832072\_25}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/scn/Damgard06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DamgardFN06, author = {Ivan Damg{\aa}rd and Nelly Fazio and Antonio Nicolosi}, editor = {Shai Halevi and Tal Rabin}, title = {Non-interactive Zero-Knowledge from Homomorphic Encryption}, booktitle = {Theory of Cryptography, Third Theory of Cryptography Conference, {TCC} 2006, New York, NY, USA, March 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3876}, pages = {41--59}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11681878\_3}, doi = {10.1007/11681878\_3}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/DamgardFN06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DamgardFKNT06, author = {Ivan Damg{\aa}rd and Matthias Fitzi and Eike Kiltz and Jesper Buus Nielsen and Tomas Toft}, editor = {Shai Halevi and Tal Rabin}, title = {Unconditionally Secure Constant-Rounds Multi-party Computation for Equality, Comparison, Bits and Exponentiation}, booktitle = {Theory of Cryptography, Third Theory of Cryptography Conference, {TCC} 2006, New York, NY, USA, March 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3876}, pages = {285--304}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11681878\_15}, doi = {10.1007/11681878\_15}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/DamgardFKNT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-quant-ph-0612014, author = {Ivan Damg{\aa}rd and Serge Fehr and Renato Renner and Louis Salvail and Christian Schaffner}, title = {A Tight High-Order Entropic Quantum Uncertainty Relation With Applications}, journal = {CoRR}, volume = {abs/quant-ph/0612014}, year = {2006}, url = {http://arxiv.org/abs/quant-ph/0612014}, eprinttype = {arXiv}, eprint = {quant-ph/0612014}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-quant-ph-0612014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardT06, author = {Ivan Damg{\aa}rd and Rune Thorbek}, title = {Linear Integer Secret Sharing and Distributed Exponentiation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {44}, year = {2006}, url = {http://eprint.iacr.org/2006/044}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardO06, author = {Ivan Damg{\aa}rd and Michael {\O}stergaard Pedersen}, title = {{RFID} Security: Tradeoffs between Security and Efficiency}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {234}, year = {2006}, url = {http://eprint.iacr.org/2006/234}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/daglib/0018105, author = {Dario Catalano and Ronald Cramer and Ivan Bjerre Damg{\aa}rd and Giovanni Di Crescenzo and David Pointcheval}, title = {Contemporary cryptology}, series = {Advanced courses in mathematics : {CRM} Barcelona}, publisher = {Birkh{\"{a}}user}, year = {2005}, isbn = {978-3-7643-7294-1}, timestamp = {Fri, 12 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/daglib/0018105.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsc/DamgardF05, author = {Ivan Damg{\aa}rd and Gudmund Skovbjerg Frandsen}, title = {Efficient algorithms for the gcd and cubic residuosity in the ring of Eisenstein integers}, journal = {J. Symb. Comput.}, volume = {39}, number = {6}, pages = {643--652}, year = {2005}, url = {https://doi.org/10.1016/j.jsc.2004.02.006}, doi = {10.1016/J.JSC.2004.02.006}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsc/DamgardF05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DamgardI05, author = {Ivan Damg{\aa}rd and Yuval Ishai}, editor = {Victor Shoup}, title = {Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator}, booktitle = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3621}, pages = {378--394}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11535218\_23}, doi = {10.1007/11535218\_23}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DamgardI05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DamgardPS05, author = {Ivan Damg{\aa}rd and Thomas Brochmann Pedersen and Louis Salvail}, editor = {Victor Shoup}, title = {A Quantum Cipher with Near Optimal Key-Recycling}, booktitle = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3621}, pages = {494--510}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11535218\_30}, doi = {10.1007/11535218\_30}, timestamp = {Mon, 06 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/DamgardPS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/DamgardFSS05, author = {Ivan Damg{\aa}rd and Serge Fehr and Louis Salvail and Christian Schaffner}, title = {Cryptography In the Bounded Quantum-Storage Model}, booktitle = {46th Annual {IEEE} Symposium on Foundations of Computer Science {(FOCS} 2005), 23-25 October 2005, Pittsburgh, PA, USA, Proceedings}, pages = {449--458}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/SFCS.2005.30}, doi = {10.1109/SFCS.2005.30}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/DamgardFSS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/DamgardFSS05, author = {Ivan Bjerre Damg{\aa}rd and Serge Fehr and Louis Salvail and Christian Schaffner}, title = {Cryptography in the bounded quantum-storage model}, booktitle = {{IEEE} Information Theory Workshop on Theory and Practice in Information-Theoretic Security, {ICITS} 2005, Awaji Island, Japan, October 16-19, 2005}, pages = {24--27}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/ITWTPI.2005.1543950}, doi = {10.1109/ITWTPI.2005.1543950}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icits/DamgardFSS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DamgardD05, author = {Ivan Damg{\aa}rd and Kasper Dupont}, editor = {Serge Vaudenay}, title = {Efficient Threshold {RSA} Signatures with General Moduli and No Extra Assumptions}, booktitle = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3386}, pages = {346--361}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30580-4\_24}, doi = {10.1007/978-3-540-30580-4\_24}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DamgardD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/CramerDI05, author = {Ronald Cramer and Ivan Damg{\aa}rd and Yuval Ishai}, editor = {Joe Kilian}, title = {Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation}, booktitle = {Theory of Cryptography, Second Theory of Cryptography Conference, {TCC} 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3378}, pages = {342--362}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30576-7\_19}, doi = {10.1007/978-3-540-30576-7\_19}, timestamp = {Sun, 02 Jun 2019 21:21:22 +0200}, biburl = {https://dblp.org/rec/conf/tcc/CramerDI05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-quant-ph-0508222, author = {Ivan Damg{\aa}rd and Serge Fehr and Louis Salvail and Christian Schaffner}, title = {Cryptography In the Bounded Quantum-Storage Model}, journal = {CoRR}, volume = {abs/quant-ph/0508222}, year = {2005}, url = {http://arxiv.org/abs/quant-ph/0508222}, eprinttype = {arXiv}, eprint = {quant-ph/0508222}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-quant-ph-0508222.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardFNT05, author = {Ivan Damg{\aa}rd and Matthias Fitzi and Jesper Buus Nielsen and Tomas Toft}, title = {How to Split a Shared Secret into Shared Bits in Constant-Round}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {140}, year = {2005}, url = {http://eprint.iacr.org/2005/140}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardFNT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardDP05, author = {Ivan Damg{\aa}rd and Kasper Dupont and Michael {\O}stergaard Pedersen}, title = {Unclonable Group Identification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {170}, year = {2005}, url = {http://eprint.iacr.org/2005/170}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardDP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardI05, author = {Ivan Damg{\aa}rd and Yuval Ishai}, title = {Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {262}, year = {2005}, url = {http://eprint.iacr.org/2005/262}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardI05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardFSS05, author = {Ivan Damg{\aa}rd and Serge Fehr and Louis Salvail and Christian Schaffner}, title = {Cryptography In the Bounded Quantum-Storage Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {291}, year = {2005}, url = {http://eprint.iacr.org/2005/291}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardFSS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardD05, author = {Ivan Damg{\aa}rd and Kasper Dupont}, title = {Universally Composable Disk Encryption Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {333}, year = {2005}, url = {http://eprint.iacr.org/2005/333}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgaardFSS05, author = {Ivan Damg{\aa}rd and Serge Fehr and Louis Salvail and Christian Schaffner}, title = {Oblivious Transfer and Linear Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {349}, year = {2005}, url = {http://eprint.iacr.org/2005/349}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgaardFSS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/CanettiDDIM04, author = {Ran Canetti and Ivan Damg{\aa}rd and Stefan Dziembowski and Yuval Ishai and Tal Malkin}, title = {Adaptive versus Non-Adaptive Security of Multi-Party Protocols}, journal = {J. Cryptol.}, volume = {17}, number = {3}, pages = {153--207}, year = {2004}, url = {https://doi.org/10.1007/s00145-004-0135-x}, doi = {10.1007/S00145-004-0135-X}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/CanettiDDIM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DamgardFS04, author = {Ivan Damg{\aa}rd and Serge Fehr and Louis Salvail}, editor = {Matthew K. Franklin}, title = {Zero-Knowledge Proofs and String Commitments Withstanding Quantum Attacks}, booktitle = {Advances in Cryptology - {CRYPTO} 2004, 24th Annual International CryptologyConference, Santa Barbara, California, USA, August 15-19, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3152}, pages = {254--272}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28628-8\_16}, doi = {10.1007/978-3-540-28628-8\_16}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DamgardFS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DamgardPS04, author = {Ivan Damg{\aa}rd and Thomas Pedersen and Louis Salvail}, editor = {Christian Cachin and Jan Camenisch}, title = {On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-Way Quantum Transmission}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3027}, pages = {91--108}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24676-3\_6}, doi = {10.1007/978-3-540-24676-3\_6}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DamgardPS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/CramerD04, author = {Ronald Cramer and Ivan Damg{\aa}rd}, editor = {Moni Naor}, title = {Secret-Key Zero-Knowlegde and Non-interactive Verifiable Exponentiation}, booktitle = {Theory of Cryptography, First Theory of Cryptography Conference, {TCC} 2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2951}, pages = {223--237}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24638-1\_13}, doi = {10.1007/978-3-540-24638-1\_13}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/CramerD04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DamgardFMS04, author = {Ivan Damg{\aa}rd and Serge Fehr and Kirill Morozov and Louis Salvail}, editor = {Moni Naor}, title = {Unfair Noisy Channels and Oblivious Transfer}, booktitle = {Theory of Cryptography, First Theory of Cryptography Conference, {TCC} 2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2951}, pages = {355--373}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24638-1\_20}, doi = {10.1007/978-3-540-24638-1\_20}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/DamgardFMS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardPS04, author = {Ivan Damg{\aa}rd and Thomas Pedersen and Louis Salvail}, title = {On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-way Quantum Transmission}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {162}, year = {2004}, url = {http://eprint.iacr.org/2004/162}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardPS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/DamgardJ03, author = {Ivan Damg{\aa}rd and Mads Jurik}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {A Length-Flexible Threshold Cryptosystem with Applications}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {350--364}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_30}, doi = {10.1007/3-540-45067-X\_30}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/DamgardJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DamgardN03, author = {Ivan Damg{\aa}rd and Jesper Buus Nielsen}, editor = {Dan Boneh}, title = {Universally Composable Efficient Multiparty Computation from Threshold Homomorphic Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2729}, pages = {247--264}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45146-4\_15}, doi = {10.1007/978-3-540-45146-4\_15}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DamgardN03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fct/DamgardF03, author = {Ivan Damg{\aa}rd and Gudmund Skovbjerg Frandsen}, editor = {Andrzej Lingas and Bengt J. Nilsson}, title = {Efficient Algorithms for {GCD} and Cubic Residuosity in the Ring of Eisenstein Integers}, booktitle = {Fundamentals of Computation Theory, 14th International Symposium, {FCT} 2003, Malm{\"{o}}, Sweden, August 12-15, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2751}, pages = {109--117}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45077-1\_11}, doi = {10.1007/978-3-540-45077-1\_11}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/fct/DamgardF03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fct/DamgardF03a, author = {Ivan Damg{\aa}rd and Gudmund Skovbjerg Frandsen}, editor = {Andrzej Lingas and Bengt J. Nilsson}, title = {An Extended Quadratic Frobenius Primality Test with Average and Worst Case Error Estimates}, booktitle = {Fundamentals of Computation Theory, 14th International Symposium, {FCT} 2003, Malm{\"{o}}, Sweden, August 12-15, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2751}, pages = {118--131}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45077-1\_12}, doi = {10.1007/978-3-540-45077-1\_12}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fct/DamgardF03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/DamgardG03, author = {Ivan Damg{\aa}rd and Jens Groth}, editor = {Lawrence L. Larmore and Michel X. Goemans}, title = {Non-interactive and reusable non-malleable commitment schemes}, booktitle = {Proceedings of the 35th Annual {ACM} Symposium on Theory of Computing, June 9-11, 2003, San Diego, CA, {USA}}, pages = {426--437}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/780542.780605}, doi = {10.1145/780542.780605}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/DamgardG03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/DamgardGS03, author = {Ivan Damg{\aa}rd and Jens Groth and Gorm Salomonsen}, editor = {Dimitris Gritzalis}, title = {The Theory and Implementation of an Electronic Voting System}, booktitle = {Secure Electronic Voting}, series = {Advances in Information Security}, volume = {7}, pages = {77--98}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-1-4615-0239-5\_6}, doi = {10.1007/978-1-4615-0239-5\_6}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/DamgardGS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardG03, author = {Ivan Damg{\aa}rd and Jens Groth}, title = {Non-interactive and Reusable Non-malleable Commitment Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {80}, year = {2003}, url = {http://eprint.iacr.org/2003/080}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardG03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/DamgardF02, author = {Ivan Damg{\aa}rd and Eiichiro Fujisaki}, editor = {Yuliang Zheng}, title = {A Statistically-Hiding Integer Commitment Scheme Based on Groups with Hidden Order}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2501}, pages = {125--142}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36178-2\_8}, doi = {10.1007/3-540-36178-2\_8}, timestamp = {Tue, 30 Nov 2021 15:21:24 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/DamgardF02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DamgardN02, author = {Ivan Damg{\aa}rd and Jesper Buus Nielsen}, editor = {Moti Yung}, title = {Expanding Pseudorandom Functions; or: From Known-Plaintext Security to Chosen-Plaintext Security}, booktitle = {Advances in Cryptology - {CRYPTO} 2002, 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2442}, pages = {449--464}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45708-9\_29}, doi = {10.1007/3-540-45708-9\_29}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DamgardN02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DamgardN02a, author = {Ivan Damg{\aa}rd and Jesper Buus Nielsen}, editor = {Moti Yung}, title = {Perfect Hiding and Perfect Binding Universally Composable Commitment Schemes with Constant Expansion Factor}, booktitle = {Advances in Cryptology - {CRYPTO} 2002, 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2442}, pages = {581--596}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45708-9\_37}, doi = {10.1007/3-540-45708-9\_37}, timestamp = {Mon, 06 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/DamgardN02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DamgardK02, author = {Ivan Damg{\aa}rd and Maciej Koprowski}, editor = {Lars R. Knudsen}, title = {Generic Lower Bounds for Root Extraction and Signature Schemes in General Groups}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2332}, pages = {256--271}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-46035-7\_17}, doi = {10.1007/3-540-46035-7\_17}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DamgardK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DamgardJ02, author = {Ivan Damg{\aa}rd and Mads Jurik}, editor = {David Naccache and Pascal Paillier}, title = {Client/Server Tradeoffs for Online Elections}, booktitle = {Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February 12-14, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2274}, pages = {125--140}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45664-3\_9}, doi = {10.1007/3-540-45664-3\_9}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DamgardJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardK02, author = {Ivan Damg{\aa}rd and Maciej Koprowski}, title = {Generic Lower Bounds for Root Extraction and Signature Schemes in General Groups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {13}, year = {2002}, url = {http://eprint.iacr.org/2002/013}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CramerD01, author = {Ronald Cramer and Ivan Damg{\aa}rd}, editor = {Joe Kilian}, title = {Secure Distributed Linear Algebra in a Constant Number of Rounds}, booktitle = {Advances in Cryptology - {CRYPTO} 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2139}, pages = {119--136}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44647-8\_7}, doi = {10.1007/3-540-44647-8\_7}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CramerD01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CramerDF01, author = {Ronald Cramer and Ivan Damg{\aa}rd and Serge Fehr}, editor = {Joe Kilian}, title = {On the Cost of Reconstructing a Secret, or {VSS} with Optimal Reconstruction Phase}, booktitle = {Advances in Cryptology - {CRYPTO} 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2139}, pages = {503--523}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44647-8\_30}, doi = {10.1007/3-540-44647-8\_30}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CramerDF01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DamgardK01, author = {Ivan Damg{\aa}rd and Maciej Koprowski}, editor = {Birgit Pfitzmann}, title = {Practical Threshold {RSA} Signatures without a Trusted Dealer}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2001, International Conference on the Theory and Application of Cryptographic Techniques, Innsbruck, Austria, May 6-10, 2001, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {2045}, pages = {152--165}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44987-6\_10}, doi = {10.1007/3-540-44987-6\_10}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DamgardK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CanettiDDIM01, author = {Ran Canetti and Ivan Damg{\aa}rd and Stefan Dziembowski and Yuval Ishai and Tal Malkin}, editor = {Birgit Pfitzmann}, title = {On Adaptive vs. Non-adaptive Security of Multiparty Protocols}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2001, International Conference on the Theory and Application of Cryptographic Techniques, Innsbruck, Austria, May 6-10, 2001, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {2045}, pages = {262--279}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44987-6\_17}, doi = {10.1007/3-540-44987-6\_17}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CanettiDDIM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CramerDN01, author = {Ronald Cramer and Ivan Damg{\aa}rd and Jesper Buus Nielsen}, editor = {Birgit Pfitzmann}, title = {Multiparty Computation from Threshold Homomorphic Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2001, International Conference on the Theory and Application of Cryptographic Techniques, Innsbruck, Austria, May 6-10, 2001, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {2045}, pages = {280--299}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44987-6\_18}, doi = {10.1007/3-540-44987-6\_18}, timestamp = {Mon, 06 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/CramerDN01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DamgardJ01, author = {Ivan Damg{\aa}rd and Mads Jurik}, editor = {Kwangjo Kim}, title = {A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System}, booktitle = {Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1992}, pages = {119--136}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44586-2\_9}, doi = {10.1007/3-540-44586-2\_9}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DamgardJ01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiDDIM01, author = {Ran Canetti and Ivan Damg{\aa}rd and Stefan Dziembowski and Yuval Ishai and Tal Malkin}, title = {On adaptive vs. non-adaptive security of multiparty protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {17}, year = {2001}, url = {http://eprint.iacr.org/2001/017}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiDDIM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardF01, author = {Ivan Damg{\aa}rd and Eiichiro Fujisaki}, title = {An Integer Commitment Scheme based on Groups with Hidden Order}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {64}, year = {2001}, url = {http://eprint.iacr.org/2001/064}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardF01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardN01, author = {Ivan Damg{\aa}rd and Jesper Buus Nielsen}, title = {Perfect Hiding and Perfect Binding Universally Composable Commitment Schemes with Constant Expansion Factor}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {91}, year = {2001}, url = {http://eprint.iacr.org/2001/091}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardN01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgadF01, author = {Ivan Damg{\aa}rd and Gudmund Skovbjerg Frandsen}, title = {An Extended Quadratic Frobenius Primality Test with Average Case Error Estimates}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {102}, year = {2001}, url = {http://eprint.iacr.org/2001/102}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgadF01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BoyarDP00, author = {Joan Boyar and Ivan Damg{\aa}rd and Ren{\'{e}} Peralta}, title = {Short Non-Interactive Cryptographic Proofs}, journal = {J. Cryptol.}, volume = {13}, number = {4}, pages = {449--472}, year = {2000}, url = {https://doi.org/10.1007/s001450010011}, doi = {10.1007/S001450010011}, timestamp = {Fri, 03 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joc/BoyarDP00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/CamenischD00, author = {Jan Camenisch and Ivan Damg{\aa}rd}, editor = {Tatsuaki Okamoto}, title = {Verifiable Encryption, Group Encryption, and Their Applications to Separable Group Signatures and Signature Sharing Schemes}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1976}, pages = {331--345}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44448-3\_25}, doi = {10.1007/3-540-44448-3\_25}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/CamenischD00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DamgardN00, author = {Ivan Damg{\aa}rd and Jesper Buus Nielsen}, editor = {Mihir Bellare}, title = {Improved Non-committing Encryption Schemes Based on a General Complexity Assumption}, booktitle = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1880}, pages = {432--450}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44598-6\_27}, doi = {10.1007/3-540-44598-6\_27}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DamgardN00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CramerDM00, author = {Ronald Cramer and Ivan Damg{\aa}rd and Ueli M. Maurer}, editor = {Bart Preneel}, title = {General Secure Multi-party Computation from any Linear Secret-Sharing Scheme}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2000, International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1807}, pages = {316--334}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-45539-6\_22}, doi = {10.1007/3-540-45539-6\_22}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CramerDM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Damgard00, author = {Ivan Damg{\aa}rd}, editor = {Bart Preneel}, title = {Efficient Concurrent Zero-Knowledge in the Auxiliary String Model}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2000, International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1807}, pages = {418--430}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-45539-6\_30}, doi = {10.1007/3-540-45539-6\_30}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Damgard00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CramerDM00, author = {Ronald Cramer and Ivan Damg{\aa}rd and Philip D. MacKenzie}, editor = {Hideki Imai and Yuliang Zheng}, title = {Efficient Zero-Knowledge Proofs of Knowledge Without Intractability Assumptions}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {354--373}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_24}, doi = {10.1007/978-3-540-46588-1\_24}, timestamp = {Tue, 30 Nov 2021 15:21:24 +0100}, biburl = {https://dblp.org/rec/conf/pkc/CramerDM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/CramerDD00, author = {Ronald Cramer and Ivan Damg{\aa}rd and Stefan Dziembowski}, editor = {F. Frances Yao and Eugene M. Luks}, title = {On the complexity of verifiable secret sharing and multiparty computation}, booktitle = {Proceedings of the Thirty-Second Annual {ACM} Symposium on Theory of Computing, May 21-23, 2000, Portland, OR, {USA}}, pages = {325--334}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/335305.335343}, doi = {10.1145/335305.335343}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stoc/CramerDD00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardJ00, author = {Ivan Damg{\aa}rd and Mads Jurik}, title = {Efficient Protocols based on Probabilistic Encryption using Composite Degree Residue Classes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {8}, year = {2000}, url = {http://eprint.iacr.org/2000/008}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardJ00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerDM00, author = {Ronald Cramer and Ivan Damg{\aa}rd and Ueli Maurer}, title = {General Secure Multi-Party Computation from any Linear Secret Sharing Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {37}, year = {2000}, url = {http://eprint.iacr.org/2000/037}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerDM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerDD00, author = {Ronald Cramer and Ivan Damg{\aa}rd and Stefan Dziembowski}, title = {On the Complexity of Verifiable Secret Sharing and Multi-Party Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {38}, year = {2000}, url = {http://eprint.iacr.org/2000/038}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerDD00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerDM00a, author = {Ronald Cramer and Ivan Damg{\aa}rd and Philip D. MacKenzie}, title = {Efficient Zero-Knowledge Proofs of Knowledge Without Intractability Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {45}, year = {2000}, url = {http://eprint.iacr.org/2000/045}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerDM00a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerDN00, author = {Ronald Cramer and Ivan Damg{\aa}rd and Jesper Buus Nielsen}, title = {Multiparty Computation from Threshold Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {55}, year = {2000}, url = {http://eprint.iacr.org/2000/055}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerDN00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DamgardKS99, author = {Ivan Damg{\aa}rd and Joe Kilian and Louis Salvail}, editor = {Jacques Stern}, title = {On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions}, booktitle = {Advances in Cryptology - {EUROCRYPT} '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1592}, pages = {56--73}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48910-X\_5}, doi = {10.1007/3-540-48910-X\_5}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DamgardKS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CramerDDHR99, author = {Ronald Cramer and Ivan Damg{\aa}rd and Stefan Dziembowski and Martin Hirt and Tal Rabin}, editor = {Jacques Stern}, title = {Efficient Multiparty Computations Secure Against an Adaptive Adversary}, booktitle = {Advances in Cryptology - {EUROCRYPT} '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1592}, pages = {311--326}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48910-X\_22}, doi = {10.1007/3-540-48910-X\_22}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CramerDDHR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ac/1998security, editor = {Ivan Damg{\aa}rd}, title = {Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998}, series = {Lecture Notes in Computer Science}, volume = {1561}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48969-X}, doi = {10.1007/3-540-48969-X}, isbn = {3-540-65757-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ac/1998security.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Damgard99, author = {Ivan Damg{\aa}rd}, title = {An error in the mixed adversary protocol by Fitzi, Hirt and Maurer}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {3}, year = {1999}, url = {http://eprint.iacr.org/1999/003}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Damgard99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CamenischD99, author = {Jan Camenisch and Ivan Damg{\aa}rd}, title = {Verifiable Encryption and Applications to Group Signatures and Signature Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {8}, year = {1999}, url = {http://eprint.iacr.org/1999/008}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CamenischD99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Damgard99a, author = {Ivan Damg{\aa}rd}, title = {Concurrent Zero-Knowledge is Easy in Practice}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {14}, year = {1999}, url = {http://eprint.iacr.org/1999/014}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Damgard99a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BrandtDLP98, author = {J{\o}rgen Brandt and Ivan Damg{\aa}rd and Peter Landrock and Torben P. Pedersen}, title = {Zero-Knowledge Authentication Scheme with Secret Key Exchange}, journal = {J. Cryptol.}, volume = {11}, number = {3}, pages = {147--159}, year = {1998}, url = {https://doi.org/10.1007/s001459900041}, doi = {10.1007/S001459900041}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BrandtDLP98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/DamgardK98, author = {Ivan Damg{\aa}rd and Lars R. Knudsen}, title = {Two-Key Triple Encryption}, journal = {J. Cryptol.}, volume = {11}, number = {3}, pages = {209--218}, year = {1998}, url = {https://doi.org/10.1007/s001459900044}, doi = {10.1007/S001459900044}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/DamgardK98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/DamgardPP98, author = {Ivan Damg{\aa}rd and Torben P. Pedersen and Birgit Pfitzmann}, title = {Statistical Secrecy and Multibit Commitments}, journal = {{IEEE} Trans. Inf. Theory}, volume = {44}, number = {3}, pages = {1143--1151}, year = {1998}, url = {https://doi.org/10.1109/18.669255}, doi = {10.1109/18.669255}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/DamgardPP98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ac/Damgard98, author = {Ivan Damg{\aa}rd}, editor = {Ivan Damg{\aa}rd}, title = {Commitment Schemes and Zero-Knowledge Protocols}, booktitle = {Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998}, series = {Lecture Notes in Computer Science}, volume = {1561}, pages = {63--86}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-48969-X\_3}, doi = {10.1007/3-540-48969-X\_3}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/ac/Damgard98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CramerD98, author = {Ronald Cramer and Ivan Damg{\aa}rd}, editor = {Hugo Krawczyk}, title = {Zero-Knowledge Proofs for Finite Field Arithmetic; or: Can Zero-Knowledge be for Free?}, booktitle = {Advances in Cryptology - {CRYPTO} '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1462}, pages = {424--441}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0055745}, doi = {10.1007/BFB0055745}, timestamp = {Tue, 01 Jun 2021 15:21:29 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CramerD98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/DamgardP98, author = {Ivan Damg{\aa}rd and Birgit Pfitzmann}, editor = {Kim Guldstrand Larsen and Sven Skyum and Glynn Winskel}, title = {Sequential Iteration of Interactive Arguments and an Efficient Zero-Knowledge Argument for {NP}}, booktitle = {Automata, Languages and Programming, 25th International Colloquium, ICALP'98, Aalborg, Denmark, July 13-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1443}, pages = {772--783}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0055101}, doi = {10.1007/BFB0055101}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/DamgardP98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/DamgardPP97, author = {Ivan Damg{\aa}rd and Torben P. Pedersen and Birgit Pfitzmann}, title = {On the Existence of Statistically Hiding Bit Commitment Schemes and Fail-Stop Signatures}, journal = {J. Cryptol.}, volume = {10}, number = {3}, pages = {163--194}, year = {1997}, url = {https://doi.org/10.1007/s001459900026}, doi = {10.1007/S001459900026}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/DamgardPP97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CramerD97, author = {Ronald Cramer and Ivan Damg{\aa}rd}, editor = {Walter Fumy}, title = {Fast and Secure Immunization Against Adaptive Man-in-the-Middle Impersonation}, booktitle = {Advances in Cryptology - {EUROCRYPT} '97, International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11-15, 1997, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1233}, pages = {75--87}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-69053-0\_7}, doi = {10.1007/3-540-69053-0\_7}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CramerD97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/CramerD97, author = {Ronald Cramer and Ivan Damg{\aa}rd}, editor = {Frank Thomson Leighton and Peter W. Shor}, title = {Linear Zero-Knowledge - {A} Note on Efficient Zero-Knowledge Proofs and Arguments}, booktitle = {Proceedings of the Twenty-Ninth Annual {ACM} Symposium on the Theory of Computing, El Paso, Texas, USA, May 4-6, 1997}, pages = {436--445}, publisher = {{ACM}}, year = {1997}, url = {https://doi.org/10.1145/258533.258635}, doi = {10.1145/258533.258635}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/CramerD97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CramesD96, author = {Ronald Cramer and Ivan Damg{\aa}rd}, editor = {Neal Koblitz}, title = {New Generation of Secure and Practical RSA-Based Signatures}, booktitle = {Advances in Cryptology - {CRYPTO} '96, 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1109}, pages = {173--185}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-68697-5\_14}, doi = {10.1007/3-540-68697-5\_14}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CramesD96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DamgardP96, author = {Ivan Damg{\aa}rd and Torben P. Pedersen}, editor = {Ueli M. Maurer}, title = {New Convertible Undeniable Signature Schemes}, booktitle = {Advances in Cryptology - {EUROCRYPT} '96, International Conference on the Theory and Application of Cryptographic Techniques, Saragossa, Spain, May 12-16, 1996, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1070}, pages = {372--386}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-68339-9\_32}, doi = {10.1007/3-540-68339-9\_32}, timestamp = {Fri, 25 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DamgardP96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/CramerDP96, author = {Ronald Cramer and Ivan Damg{\aa}rd and Torben P. Pedersen}, editor = {T. Mark A. Lomas}, title = {Efficient and Provable Security Amplifications}, booktitle = {Security Protocols, International Workshop, Cambridge, United Kingdom, April 10-12, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1189}, pages = {101--109}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-62494-5\_9}, doi = {10.1007/3-540-62494-5\_9}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/CramerDP96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerD96, author = {Ronald Cramer and Ivan Damg{\aa}rd}, title = {On Monotone Function Closure of Statistical Zero-Knowledge}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {3}, year = {1996}, url = {http://eprint.iacr.org/1996/003}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerD96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerD96a, author = {Ronald Cramer and Ivan Damg{\aa}rd}, title = {Linear Zero-Knowledge - {A} note on Efficient Zero-Knowledge Proofs and Arguments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {4}, year = {1996}, url = {http://eprint.iacr.org/1996/004}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerD96a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Damgard95, author = {Ivan Damg{\aa}rd}, title = {Practical and Provably Secure Release of a Secret and Exchange of Signatures}, journal = {J. Cryptol.}, volume = {8}, number = {4}, pages = {201--222}, year = {1995}, url = {https://doi.org/10.1007/BF00191356}, doi = {10.1007/BF00191356}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Damgard95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cpa/DamgardK95, author = {Ivan Damg{\aa}rd and Lars R. Knudsen}, editor = {Ed Dawson and Jovan Dj. Golic}, title = {Multiple Encryption with Minimum Key}, booktitle = {Cryptography: Policy and Algorithms, International Conference, Brisbane, Queensland, Australia, July 3-5, 1995, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1029}, pages = {156--164}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/BFb0032355}, doi = {10.1007/BFB0032355}, timestamp = {Sat, 19 Oct 2019 20:36:44 +0200}, biburl = {https://dblp.org/rec/conf/cpa/DamgardK95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CramerD95, author = {Ronald Cramer and Ivan Damg{\aa}rd}, editor = {Don Coppersmith}, title = {Secure Signature Schemes based on Interactive Protocols}, booktitle = {Advances in Cryptology - {CRYPTO} '95, 15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {963}, pages = {297--310}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/3-540-44750-4\_24}, doi = {10.1007/3-540-44750-4\_24}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CramerD95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DamgardGOW95, author = {Ivan Damg{\aa}rd and Oded Goldreich and Tatsuaki Okamoto and Avi Wigderson}, editor = {Don Coppersmith}, title = {Honest Verifier vs Dishonest Verifier in Public Coin Zero-Knowledge Proofs}, booktitle = {Advances in Cryptology - {CRYPTO} '95, 15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {963}, pages = {325--338}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/3-540-44750-4\_26}, doi = {10.1007/3-540-44750-4\_26}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/DamgardGOW95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CramerDS94, author = {Ronald Cramer and Ivan Damg{\aa}rd and Berry Schoenmakers}, editor = {Yvo Desmedt}, title = {Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols}, booktitle = {Advances in Cryptology - {CRYPTO} '94, 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {839}, pages = {174--187}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-48658-5\_19}, doi = {10.1007/3-540-48658-5\_19}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CramerDS94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ChenDP94, author = {Lidong Chen and Ivan Damg{\aa}rd and Torben P. Pedersen}, editor = {Alfredo De Santis}, title = {Parallel Divertibility of Proofs of Knowledge (Extended Abstract)}, booktitle = {Advances in Cryptology - {EUROCRYPT} '94, Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, May 9-12, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {950}, pages = {140--155}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/BFb0053431}, doi = {10.1007/BFB0053431}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ChenDP94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Damgard93, author = {Ivan Damg{\aa}rd}, editor = {Douglas R. Stinson}, title = {Interactive Hashing can Simplify Zero-Knowledge Protocol Design Without Computational Assumptions (Extended Abstract)}, booktitle = {Advances in Cryptology - {CRYPTO} '93, 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {773}, pages = {100--109}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48329-2\_9}, doi = {10.1007/3-540-48329-2\_9}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Damgard93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DamgardPP93, author = {Ivan Damg{\aa}rd and Torben P. Pedersen and Birgit Pfitzmann}, editor = {Douglas R. Stinson}, title = {On the Existence of Statistically Hiding Bit Commitment Schemes and Fail-Stop Signatures}, booktitle = {Advances in Cryptology - {CRYPTO} '93, 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {773}, pages = {250--265}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48329-2\_22}, doi = {10.1007/3-540-48329-2\_22}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DamgardPP93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Damgard93, author = {Ivan Damg{\aa}rd}, editor = {Tor Helleseth}, title = {Practical and Provably Secure Release of a Secret and Exchange of Signatures}, booktitle = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {765}, pages = {200--217}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48285-7\_17}, doi = {10.1007/3-540-48285-7\_17}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Damgard93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DamgardK93, author = {Ivan Damg{\aa}rd and Lars R. Knudsen}, editor = {Tor Helleseth}, title = {The Breaking of the {AR} Hash Function}, booktitle = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {765}, pages = {286--292}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48285-7\_25}, doi = {10.1007/3-540-48285-7\_25}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DamgardK93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BrandtD92, author = {J{\o}rgen Brandt and Ivan Damg{\aa}rd}, editor = {Ernest F. Brickell}, title = {On Generation of Probable Primes By Incremental Search}, booktitle = {Advances in Cryptology - {CRYPTO} '92, 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {740}, pages = {358--370}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-48071-4\_26}, doi = {10.1007/3-540-48071-4\_26}, timestamp = {Tue, 01 Jun 2021 15:21:29 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BrandtD92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Damgard92, author = {Ivan Damg{\aa}rd}, editor = {Rainer A. Rueppel}, title = {Non-Interactive Circuit Based Proofs and Non-Interactive Perfect Zero-knowledge with Proprocessing}, booktitle = {Advances in Cryptology - {EUROCRYPT} '92, Workshop on the Theory and Application of of Cryptographic Techniques, Balatonf{\"{u}}red, Hungary, May 24-28, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {658}, pages = {341--355}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-47555-9\_28}, doi = {10.1007/3-540-47555-9\_28}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Damgard92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ChenD92, author = {Lidong Chen and Ivan Damg{\aa}rd}, editor = {Rainer A. Rueppel}, title = {Security Bounds for Parallel Versions of Identification Protocols (Extended Abstract)}, booktitle = {Advances in Cryptology - {EUROCRYPT} '92, Workshop on the Theory and Application of of Cryptographic Techniques, Balatonf{\"{u}}red, Hungary, May 24-28, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {658}, pages = {461--466}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-47555-9\_40}, doi = {10.1007/3-540-47555-9\_40}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ChenD92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BrandtDL91, author = {J{\o}rgen Brandt and Ivan Damg{\aa}rd and Peter Landrock}, editor = {Hideki Imai and Ronald L. Rivest and Tsutomu Matsumoto}, title = {Speeding up Prime Number Generation}, booktitle = {Advances in Cryptology - {ASIACRYPT} '91, International Conference on the Theory and Applications of Cryptology, Fujiyoshida, Japan, November 11-14, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {739}, pages = {440--449}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-57332-1\_37}, doi = {10.1007/3-540-57332-1\_37}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BrandtDL91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Damgard91, author = {Ivan Damg{\aa}rd}, editor = {Joan Feigenbaum}, title = {Towards Practical Public Key Systems Secure Against Chosen Ciphertext Attacks}, booktitle = {Advances in Cryptology - {CRYPTO} '91, 11th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {576}, pages = {445--456}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46766-1\_36}, doi = {10.1007/3-540-46766-1\_36}, timestamp = {Fri, 17 Jul 2020 16:12:45 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Damgard91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/90, editor = {Ivan Damg{\aa}rd}, title = {Advances in Cryptology - {EUROCRYPT} '90, Workshop on the Theory and Application of of Cryptographic Techniques, Aarhus, Denmark, May 21-24, 1990, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {473}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46877-3}, doi = {10.1007/3-540-46877-3}, isbn = {3-540-53587-X}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BoyarCDP90, author = {Joan Boyar and David Chaum and Ivan Damg{\aa}rd and Torben P. Pedersen}, editor = {Alfred Menezes and Scott A. Vanstone}, title = {Convertible Undeniable Signatures}, booktitle = {Advances in Cryptology - {CRYPTO} '90, 10th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {537}, pages = {189--205}, publisher = {Springer}, year = {1990}, url = {https://doi.org/10.1007/3-540-38424-3\_14}, doi = {10.1007/3-540-38424-3\_14}, timestamp = {Fri, 17 Jul 2020 16:12:45 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BoyarCDP90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Damgard89, author = {Ivan Damg{\aa}rd}, editor = {Gilles Brassard}, title = {On the Existence of Bit Commitment Schemes and Zero-Knowledge Proofs}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {17--27}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_3}, doi = {10.1007/0-387-34805-0\_3}, timestamp = {Tue, 01 Jun 2021 15:21:29 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Damgard89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Damgard89a, author = {Ivan Damg{\aa}rd}, editor = {Gilles Brassard}, title = {A Design Principle for Hash Functions}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {416--427}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_39}, doi = {10.1007/0-387-34805-0\_39}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/Damgard89a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Damgard88, author = {Ivan Damg{\aa}rd}, editor = {Shafi Goldwasser}, title = {On the Randomness of Legendre and Jacobi Sequences}, booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {403}, pages = {163--172}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/0-387-34799-2\_13}, doi = {10.1007/0-387-34799-2\_13}, timestamp = {Fri, 17 Jul 2020 16:12:45 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Damgard88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Damgard88a, author = {Ivan Damg{\aa}rd}, editor = {Shafi Goldwasser}, title = {Payment Systems and Credential Mechanisms with Provable Security Against Abuse by Individuals}, booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {403}, pages = {328--335}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/0-387-34799-2\_26}, doi = {10.1007/0-387-34799-2\_26}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Damgard88a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BrassardD88, author = {Gilles Brassard and Ivan Damg{\aa}rd}, editor = {Shafi Goldwasser}, title = {"Practical IP" {\textless}= {MA}}, booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {403}, pages = {580--582}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/0-387-34799-2\_42}, doi = {10.1007/0-387-34799-2\_42}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BrassardD88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BrandtDLP88, author = {J{\o}rgen Brandt and Ivan Damg{\aa}rd and Peter Landrock and Torben P. Pedersen}, editor = {Shafi Goldwasser}, title = {Zero-Knowledge Authentication Scheme with Secret Key Exchange (Extended Abstract)}, booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {403}, pages = {583--588}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/0-387-34799-2\_43}, doi = {10.1007/0-387-34799-2\_43}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BrandtDLP88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BrandtDL88, author = {J{\o}rgen Brandt and Ivan Damg{\aa}rd and Peter Landrock}, editor = {Christoph G. G{\"{u}}nther}, title = {Anonymous and Verifiable Registration in Databases}, booktitle = {Advances in Cryptology - {EUROCRYPT} '88, Workshop on the Theory and Application of of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {330}, pages = {167--176}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/3-540-45961-8\_14}, doi = {10.1007/3-540-45961-8\_14}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BrandtDL88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/ChaumCD88, author = {David Chaum and Claude Cr{\'{e}}peau and Ivan Damg{\aa}rd}, editor = {Janos Simon}, title = {Multiparty Unconditionally Secure Protocols (Extended Abstract)}, booktitle = {Proceedings of the 20th Annual {ACM} Symposium on Theory of Computing, May 2-4, 1988, Chicago, Illinois, {USA}}, pages = {11--19}, publisher = {{ACM}}, year = {1988}, url = {https://doi.org/10.1145/62212.62214}, doi = {10.1145/62212.62214}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/ChaumCD88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/Damgard87, author = {Ivan Damg{\aa}rd}, title = {Concatenated group codes and their exponents}, journal = {{IEEE} Trans. Inf. Theory}, volume = {33}, number = {6}, pages = {849--854}, year = {1987}, url = {https://doi.org/10.1109/TIT.1987.1057375}, doi = {10.1109/TIT.1987.1057375}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/Damgard87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChaumDG87, author = {David Chaum and Ivan Damg{\aa}rd and Jeroen van de Graaf}, editor = {Carl Pomerance}, title = {Multiparty Computations Ensuring Privacy of Each Party's Input and Correctness of the Result}, booktitle = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {293}, pages = {87--119}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-48184-2\_7}, doi = {10.1007/3-540-48184-2\_7}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChaumDG87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BrickellCDG87, author = {Ernest F. Brickell and David Chaum and Ivan Damg{\aa}rd and Jeroen van de Graaf}, editor = {Carl Pomerance}, title = {Gradual and Verifiable Release of a Secret}, booktitle = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {293}, pages = {156--166}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-48184-2\_11}, doi = {10.1007/3-540-48184-2\_11}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BrickellCDG87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChaumCD87, author = {David Chaum and Claude Cr{\'{e}}peau and Ivan Damg{\aa}rd}, editor = {Carl Pomerance}, title = {Multiparty Unconditionally Secure Protocols (Abstract)}, booktitle = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {293}, pages = {462}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-48184-2\_43}, doi = {10.1007/3-540-48184-2\_43}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChaumCD87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Damgard87, author = {Ivan Damg{\aa}rd}, editor = {David Chaum and Wyn L. Price}, title = {Collision Free Hash Functions and Public Key Signature Schemes}, booktitle = {Advances in Cryptology - {EUROCRYPT} '87, Workshop on the Theory and Application of of Cryptographic Techniques, Amsterdam, The Netherlands, April 13-15, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {304}, pages = {203--216}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-39118-5\_19}, doi = {10.1007/3-540-39118-5\_19}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Damgard87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.