![]() | ![]() |
Ivan Bjerre Damgård
List of publications from the DBLP Bibliography Server - FAQ
2009 | ||
---|---|---|
112 | EE | Ivan Damgård, Martin Geisler, Mikkel Krøigaard, Jesper Buus Nielsen: Asynchronous Multiparty Computation: Theory and Implementation. Public Key Cryptography 2009: 160-179 |
111 | EE | Ivan Damgård, Gert Læssøe Mikkelsen: On the Theory and Practice of Personal Digital Signatures. Public Key Cryptography 2009: 277-296 |
110 | EE | Ivan Damgård, Jesper Buus Nielsen, Daniel Wichs: Universally Composable Multiparty Computation with Partially Isolated Parties. TCC 2009: 315-331 |
2008 | ||
109 | Luca Aceto, Ivan Damgård, Leslie Ann Goldberg, Magnús M. Halldórsson, Anna Ingólfsdóttir, Igor Walukiewicz: Automata, Languages and Programming, 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part I: Tack A: Algorithms, Automata, Complexity, and Games Springer 2008 | |
108 | Luca Aceto, Ivan Damgård, Leslie Ann Goldberg, Magnús M. Halldórsson, Anna Ingólfsdóttir, Igor Walukiewicz: Automata, Languages and Programming, 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II - Track B: Logic, Semantics, and Theory of Programming & Track C: Security and Cryptography Foundations Springer 2008 | |
107 | EE | Ivan Damgård, Lars R. Knudsen, Søren S. Thomsen: Dakota- Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography. ACNS 2008: 144-155 |
106 | EE | Ivan Damgård, Yuval Ishai, Mikkel Krøigaard, Jesper Buus Nielsen, Adam Smith: Scalable Multiparty Computation with Nearly Optimal Work and Resilience. CRYPTO 2008: 241-261 |
105 | EE | Ivan Damgård, Dennis Hofheinz, Eike Kiltz, Rune Thorbek: Public-Key Encryption with Non-interactive Opening. CT-RSA 2008: 239-255 |
104 | EE | Ivan Damgård, Michael Østergaard Pedersen: RFID Security: Tradeoffs between Security and Efficiency. CT-RSA 2008: 318-332 |
103 | EE | Ivan Damgård, Jesper Buus Nielsen, Daniel Wichs: Isolated Proofs of Knowledge and Isolated Zero Knowledge. EUROCRYPT 2008: 509-526 |
102 | EE | Ivan Damgård, Jesper Buus Nielsen, Claudio Orlandi: Essentially Optimal Universally Composable Oblivious Transfer. ICISC 2008: 318-335 |
101 | EE | Ivan Damgård, Martin Geisler, Mikkel Krøigaard: Homomorphic encryption and secure comparison. IJACT 1(1): 22-31 (2008) |
100 | EE | Ivan Damgård, Serge Fehr, Louis Salvail, Christian Schaffner: Cryptography in the Bounded-Quantum-Storage Model. SIAM J. Comput. 37(6): 1865-1890 (2008) |
2007 | ||
99 | EE | Ivan Damgård, Martin Geisler, Mikkel Krøigaard: Efficient and Secure Comparison for On-Line Auctions. ACISP 2007: 416-430 |
98 | EE | Ivan Damgård, Yvo Desmedt, Matthias Fitzi, Jesper Buus Nielsen: Secure Protocols with Asymmetric Trust. ASIACRYPT 2007: 357-375 |
97 | EE | Ivan Damgård, Serge Fehr, Louis Salvail, Christian Schaffner: Secure Identification and QKD in the Bounded-Quantum-Storage Model. CRYPTO 2007: 342-359 |
96 | EE | Ivan Damgård, Serge Fehr, Renato Renner, Louis Salvail, Christian Schaffner: A Tight High-Order Entropic Quantum Uncertainty Relation with Applications. CRYPTO 2007: 360-378 |
95 | EE | Ivan Damgård, Jesper Buus Nielsen: Scalable and Unconditionally Secure Multiparty Computation. CRYPTO 2007: 572-590 |
94 | EE | Ronald Cramer, Ivan Damgård, Robbert de Haan: Atomic Secure Multi-party Multiplication with Low Communication. EUROCRYPT 2007: 329-346 |
93 | EE | Ivan Damgård, Rune Thorbek: Non-interactive Proofs for Integer Multiplication. EUROCRYPT 2007: 412-429 |
92 | EE | Ivan Damgård: A "proof-reading" of Some Issues in Cryptography. ICALP 2007: 2-11 |
2006 | ||
91 | EE | Ivan Damgård, Serge Fehr, Louis Salvail, Christian Schaffner: Oblivious Transfer and Linear Functions. CRYPTO 2006: 427-444 |
90 | EE | Ivan Damgård, Yuval Ishai: Scalable Secure Multiparty Computation. CRYPTO 2006: 501-520 |
89 | EE | Ivan Damgård, Kasper Dupont, Michael Østergaard Pedersen: Unclonable Group Identification. EUROCRYPT 2006: 555-572 |
88 | EE | Jesús F. Almansa, Ivan Damgård, Jesper Buus Nielsen: Simplified Threshold RSA with Adaptive and Proactive Security. EUROCRYPT 2006: 593-611 |
87 | EE | Peter Bogetoft, Ivan Damgård, Thomas Jakobsen, Kurt Nielsen, Jakob Pagter, Tomas Toft: A Practical Implementation of Secure Auctions Based on Multiparty Integer Computation. Financial Cryptography 2006: 142-147 |
86 | EE | Ivan Damgård, Rune Thorbek: Linear Integer Secret Sharing and Distributed Exponentiation. Public Key Cryptography 2006: 75-90 |
85 | EE | Ivan Damgård: Theory and Practice of Multiparty Computation. SCN 2006: 360-364 |
84 | EE | Ivan Damgård, Matthias Fitzi, Eike Kiltz, Jesper Buus Nielsen, Tomas Toft: Unconditionally Secure Constant-Rounds Multi-party Computation for Equality, Comparison, Bits and Exponentiation. TCC 2006: 285-304 |
83 | EE | Ivan Damgård, Nelly Fazio, Antonio Nicolosi: Non-interactive Zero-Knowledge from Homomorphic Encryption. TCC 2006: 41-59 |
82 | EE | Ivan Damgård, Serge Fehr, Renato Renner, Louis Salvail, Christian Schaffner: A Tight High-Order Entropic Quantum Uncertainty Relation With Applications CoRR abs/quant-ph/0612014: (2006) |
81 | EE | Ivan Damgård, Gudmund Skovbjerg Frandsen: An Extended Quadratic Frobenius Primality Test with Average- and Worst-Case Error Estimate. J. Cryptology 19(4): 489-520 (2006) |
2005 | ||
80 | EE | Ivan Damgård, Yuval Ishai: Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator. CRYPTO 2005: 378-394 |
79 | EE | Ivan Damgård, Thomas Brochmann Pedersen, Louis Salvail: A Quantum Cipher with Near Optimal Key-Recycling. CRYPTO 2005: 494-510 |
78 | EE | Ivan Damgård, Serge Fehr, Louis Salvail, Christian Schaffner: Cryptography In the Bounded Quantum-Storage Model. FOCS 2005: 449-458 |
77 | EE | Ivan Damgård, Kasper Dupont: Efficient Threshold RSA Signatures with General Moduli and No Extra Assumptions. Public Key Cryptography 2005: 346-361 |
76 | EE | Ronald Cramer, Ivan Damgård, Yuval Ishai: Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation. TCC 2005: 342-362 |
75 | EE | Ivan Damgård, Serge Fehr, Louis Salvail, Christian Schaffner: Cryptography In the Bounded Quantum-Storage Model CoRR abs/quant-ph/0508222: (2005) |
74 | EE | Ivan Damgård, Gudmund Skovbjerg Frandsen: Efficient algorithms for the gcd and cubic residuosity in the ring of Eisenstein integers. J. Symb. Comput. 39(6): 643-652 (2005) |
2004 | ||
73 | EE | Ivan Damgård, Serge Fehr, Louis Salvail: Zero-Knowledge Proofs and String Commitments Withstanding Quantum Attacks. CRYPTO 2004: 254-272 |
72 | EE | Ivan Damgård, Thomas Pedersen, Louis Salvail: On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-Way Quantum Transmission. EUROCRYPT 2004: 91-108 |
71 | EE | Ronald Cramer, Ivan Damgård: Secret-Key Zero-Knowlegde and Non-interactive Verifiable Exponentiation. TCC 2004: 223-237 |
70 | EE | Ivan Damgård, Serge Fehr, Kirill Morozov, Louis Salvail: Unfair Noisy Channels and Oblivious Transfer. TCC 2004: 355-373 |
69 | EE | Ran Canetti, Ivan Damgård, Stefan Dziembowski, Yuval Ishai, Tal Malkin: Adaptive versus Non-Adaptive Security of Multi-Party Protocols. J. Cryptology 17(3): 153-207 (2004) |
2003 | ||
68 | EE | Ivan Damgård, Mads Jurik: A Length-Flexible Threshold Cryptosystem with Applications. ACISP 2003: 350-364 |
67 | EE | Ivan Damgård, Jesper Buus Nielsen: Universally Composable Efficient Multiparty Computation from Threshold Homomorphic Encryption. CRYPTO 2003: 247-264 |
66 | EE | Ivan Damgård, Gudmund Skovbjerg Frandsen: Efficient Algorithms for GCD and Cubic Residuosity in the Ring of Eisenstein Integers. FCT 2003: 109-117 |
65 | EE | Ivan Damgård, Gudmund Skovbjerg Frandsen: An Extended Quadratic Frobenius Primality Test with Average and Worst Case Error Estimates. FCT 2003: 118-131 |
64 | EE | Ivan Damgård, Jens Groth: Non-interactive and reusable non-malleable commitment schemes. STOC 2003: 426-437 |
2002 | ||
63 | EE | Ivan Damgård, Eiichiro Fujisaki: A Statistically-Hiding Integer Commitment Scheme Based on Groups with Hidden Order. ASIACRYPT 2002: 125-142 |
62 | EE | Ivan Damgård, Jesper Buus Nielsen: Expanding Pseudorandom Functions; or: From Known-Plaintext Security to Chosen-Plaintext Security. CRYPTO 2002: 449-464 |
61 | EE | Ivan Damgård, Jesper Buus Nielsen: Perfect Hiding and Perfect Binding Universally Composable Commitment Schemes with Constant Expansion Factor. CRYPTO 2002: 581-596 |
60 | EE | Ivan Damgård, Maciej Koprowski: Generic Lower Bounds for Root Extraction and Signature Schemes in General Groups. EUROCRYPT 2002: 256-271 |
59 | EE | Ivan Damgård, Mads Jurik: Client/Server Tradeoffs for Online Elections. Public Key Cryptography 2002: 125-140 |
2001 | ||
58 | EE | Ronald Cramer, Ivan Damgård: Secure Distributed Linear Algebra in a Constant Number of Rounds. CRYPTO 2001: 119-136 |
57 | EE | Ronald Cramer, Ivan Damgård, Serge Fehr: On the Cost of Reconstructing a Secret, or VSS with Optimal Reconstruction Phase. CRYPTO 2001: 503-523 |
56 | EE | Ivan Damgård, Maciej Koprowski: Practical Threshold RSA Signatures without a Trusted Dealer. EUROCRYPT 2001: 152-165 |
55 | EE | Ran Canetti, Ivan Damgård, Stefan Dziembowski, Yuval Ishai, Tal Malkin: On Adaptive vs. Non-adaptive Security of Multiparty Protocols. EUROCRYPT 2001: 262-279 |
54 | EE | Ronald Cramer, Ivan Damgård, Jesper Buus Nielsen: Multiparty Computation from Threshold Homomorphic Encryption. EUROCRYPT 2001: 280-299 |
53 | EE | Ivan Damgård, Mads Jurik: A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System. Public Key Cryptography 2001: 119-136 |
2000 | ||
52 | EE | Jan Camenisch, Ivan Damgård: Verifiable Encryption, Group Encryption, and Their Applications to Separable Group Signatures and Signature Sharing Schemes. ASIACRYPT 2000: 331-345 |
51 | EE | Ivan Damgård, Jesper Buus Nielsen: Improved Non-committing Encryption Schemes Based on a General Complexity Assumption. CRYPTO 2000: 432-450 |
50 | EE | Ronald Cramer, Ivan Damgård, Ueli M. Maurer: General Secure Multi-party Computation from any Linear Secret-Sharing Scheme. EUROCRYPT 2000: 316-334 |
49 | EE | Ivan Damgård: Efficient Concurrent Zero-Knowledge in the Auxiliary String Model. EUROCRYPT 2000: 418-430 |
48 | Ronald Cramer, Ivan Damgård, Philip D. MacKenzie: Efficient Zero-Knowledge Proofs of Knowledge Without Intractability Assumptions. Public Key Cryptography 2000: 354-373 | |
47 | EE | Ronald Cramer, Ivan Damgård, Stefan Dziembowski: On the complexity of verifiable secret sharing and multiparty computation. STOC 2000: 325-334 |
46 | EE | Joan Boyar, Ivan Damgård, René Peralta: Short Non-Interactive Cryptographic Proofs. J. Cryptology 13(4): 449-472 (2000) |
1999 | ||
45 | Ivan Damgård: Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998 Springer 1999 | |
44 | EE | Ronald Cramer, Ivan Damgård, Stefan Dziembowski, Martin Hirt, Tal Rabin: Efficient Multiparty Computations Secure Against an Adaptive Adversary. EUROCRYPT 1999: 311-326 |
43 | EE | Ivan Damgård, Joe Kilian, Louis Salvail: On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions. EUROCRYPT 1999: 56-73 |
1998 | ||
42 | EE | Ronald Cramer, Ivan Damgård: Zero-Knowledge Proofs for Finite Field Arithmetic; or: Can Zero-Knowledge be for Free? CRYPTO 1998: 424-441 |
41 | EE | Ivan Damgård, Birgit Pfitzmann: Sequential Iteration of Interactive Arguments and an Efficient Zero-Knowledge Argument for NP. ICALP 1998: 772-783 |
40 | EE | Ivan Damgård: Commitment Schemes and Zero-Knowledge Protocols. Lectures on Data Security 1998: 63-86 |
39 | Ivan Damgård, Torben P. Pedersen, Birgit Pfitzmann: Statistical Secrecy and Multibit Commitments. IEEE Transactions on Information Theory 44(3): 1143-1151 (1998) | |
38 | EE | Jørgen Brandt, Ivan Damgård, Peter Landrock, Torben P. Pedersen: Zero-Knowledge Authentication Scheme with Secret Key Exchange. J. Cryptology 11(3): 147-159 (1998) |
37 | EE | Ivan Damgård, Lars R. Knudsen: Two-Key Triple Encryption. J. Cryptology 11(3): 209-218 (1998) |
1997 | ||
36 | EE | Ronald Cramer, Ivan Damgård: Fast and Secure Immunization Against Adaptive Man-in-the-Middle Impersonation. EUROCRYPT 1997: 75-87 |
35 | EE | Ronald Cramer, Ivan Damgård: Linear Zero-Knowledge - A Note on Efficient Zero-Knowledge Proofs and Arguments. STOC 1997: 436-445 |
34 | Ivan Damgård, Torben P. Pedersen, Birgit Pfitzmann: On the Existence of Statistically Hiding Bit Commitment Schemes and Fail-Stop Signatures. J. Cryptology 10(3): 163-194 (1997) | |
1996 | ||
33 | EE | Ronald Cramer, Ivan Damgård: New Generation of Secure and Practical RSA-Based Signatures. CRYPTO 1996: 173-185 |
32 | EE | Ivan Damgård, Torben P. Pedersen: New Convertible Undeniable Signature Schemes. EUROCRYPT 1996: 372-386 |
31 | Ronald Cramer, Ivan Damgård, Torben P. Pedersen: Efficient and Provable Security Amplifications. Security Protocols Workshop 1996: 101-109 | |
1995 | ||
30 | EE | Ronald Cramer, Ivan Damgård: Escure Signature Schemes based on Interactive Protocols. CRYPTO 1995: 297-310 |
29 | EE | Ivan Damgård, Oded Goldreich, Tatsuaki Okamoto, Avi Wigderson: Honest Verifier vs Dishonest Verifier in Public Cain Zero-Knowledge Proofs. CRYPTO 1995: 325-338 |
28 | Ivan Damgård, Lars R. Knudsen: Multiple Encryption with Minimum Key. Cryptography: Policy and Algorithms 1995: 156-164 | |
27 | Ivan Damgård: Practical and Provably Secure Release of a Secret and Exchange of Signatures. J. Cryptology 8(4): 201-222 (1995) | |
1994 | ||
26 | EE | Ronald Cramer, Ivan Damgård, Berry Schoenmakers: Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols. CRYPTO 1994: 174-187 |
25 | EE | Lidong Chen, Ivan Damgård, Torben P. Pedersen: Parallel Divertibility of Proofs of Knowledge (Extended Abstract). EUROCRYPT 1994: 140-155 |
1993 | ||
24 | EE | Ivan Damgård: Interactive Hashing can Simplify Zero-Knowledge Protocol Design Without Computational Assumptions (Extended Abstract). CRYPTO 1993: 100-109 |
23 | EE | Ivan Damgård, Torben P. Pedersen, Birgit Pfitzmann: On the Existence of Statistically Hiding Bit Commitment Schemes and Fail-Stop Signatures. CRYPTO 1993: 250-265 |
22 | EE | Ivan Damgård: Practical and Provably Secure Release of a Secret and Exchange of Signatures. EUROCRYPT 1993: 200-217 |
21 | EE | Ivan Damgård, Lars R. Knudsen: The Breaking of the AR Hash Function. EUROCRYPT 1993: 286-292 |
1992 | ||
20 | EE | Jørgen Brandt, Ivan Damgård: On Generation of Probable Primes By Incremental Search. CRYPTO 1992: 358-370 |
19 | EE | Ivan Damgård: Non-Interactive Circuit Based Proofs and Non-Interactive Perfect Zero-knowledge with Proprocessing. EUROCRYPT 1992: 341-355 |
18 | EE | Lidong Chen, Ivan Damgård: Security Bounds for Parallel Versions of Identification Protocols (Extended Abstract). EUROCRYPT 1992: 461-466 |
1991 | ||
17 | Ivan Damgård: Advances in Cryptology - EUROCRYPT '90, Workshop on the Theory and Application of of Cryptographic Techniques, Aarhus, Denmark, May 21-24, 1990, Proceedings Springer 1991 | |
16 | Jørgen Brandt, Ivan Damgård, Peter Landrock: Speeding up Prime Number Generation. ASIACRYPT 1991: 440-449 | |
15 | EE | Ivan Damgård: Towards Practical Public Key Systems Secure Against Chosen Ciphertext Attacks. CRYPTO 1991: 445-456 |
1990 | ||
14 | EE | Joan Boyar, David Chaum, Ivan Damgård, Torben P. Pedersen: Convertible Undeniable Signatures. CRYPTO 1990: 189-205 |
1989 | ||
13 | EE | Ivan Damgård: On the Existence of Bit Commitment Schemes and Zero-Knowledge Proofs. CRYPTO 1989: 17-27 |
12 | EE | Ivan Damgård: A Design Principle for Hash Functions. CRYPTO 1989: 416-427 |
1988 | ||
11 | EE | Ivan Damgård: On the Randomness of Legendre and Jacobi Sequences. CRYPTO 1988: 163-172 |
10 | EE | Ivan Damgård: Payment Systems and Credential Mechanisms with Provable Security Against Abuse by Individuals. CRYPTO 1988: 328-335 |
9 | EE | Gilles Brassard, Ivan Damgård: "Practical IP" <= MA. CRYPTO 1988: 580-582 |
8 | EE | Jørgen Brandt, Ivan Damgård, Peter Landrock, Torben P. Pedersen: Zero-Knowledge Authentication Scheme with Secret Key Exchange (Extended Abstract). CRYPTO 1988: 583-588 |
7 | EE | Jørgen Brandt, Ivan Damgård, Peter Landrock: Anonymous and Verifiable Registration in Databases. EUROCRYPT 1988: 167-176 |
6 | David Chaum, Claude Crépeau, Ivan Damgård: Multiparty Unconditionally Secure Protocols (Extended Abstract) STOC 1988: 11-19 | |
1987 | ||
5 | EE | Ernest F. Brickell, David Chaum, Ivan Damgård, Jeroen van de Graaf: Gradual and Verifiable Release of a Secret. CRYPTO 1987: 156-166 |
4 | EE | David Chaum, Claude Crépeau, Ivan Damgård: Multiparty Unconditionally Secure Protocols (Abstract). CRYPTO 1987: 462 |
3 | EE | David Chaum, Ivan Damgård, Jeroen van de Graaf: Multiparty Computations Ensuring Privacy of Each Party's Input and Correctness of the Result. CRYPTO 1987: 87-119 |
2 | EE | Ivan Damgård: Collision Free Hash Functions and Public Key Signature Schemes. EUROCRYPT 1987: 203-216 |
1 | Ivan Damgård: Concatenated group codes and their exponents. IEEE Transactions on Information Theory 33(6): 849-854 (1987) |