Ivan Damgård
Ivan Damgård
Professor of Computer Science, Aarhus University
Email verificata su cs.au.dk
Titolo
Citata da
Citata da
Anno
Multiparty unconditionally secure protocols
D Chaum, C Crépeau, I Damgard
Proceedings of the twentieth annual ACM symposium on Theory of computing, 11-19, 1988
18791988
A design principle for hash functions
IB Damgård
Conference on the Theory and Application of Cryptology, 416-427, 1989
14801989
Proofs of partial knowledge and simplified design of witness hiding protocols
R Cramer, I Damgård, B Schoenmakers
Annual International Cryptology Conference, 174-187, 1994
12441994
A generalisation, a simpli. cation and some applications of paillier's probabilistic public-key system
I Damgård, M Jurik
International workshop on public key cryptography, 119-136, 2001
11752001
Multiparty computation from somewhat homomorphic encryption
I Damgård, V Pastro, N Smart, S Zakarias
Annual Cryptology Conference, 643-662, 2012
7802012
Multiparty computation from threshold homomorphic encryption
R Cramer, I Damgård, JB Nielsen
International conference on the theory and applications of cryptographic …, 2001
6182001
General secure multi-party computation from any linear secret-sharing scheme
R Cramer, I Damgård, U Maurer
International Conference on the Theory and Applications of Cryptographic …, 2000
5372000
Secure multiparty computation goes live
P Bogetoft, DL Christensen, I Damgård, M Geisler, T Jakobsen, ...
International Conference on Financial Cryptography and Data Security, 325-343, 2009
5042009
Collision free hash functions and public key signature schemes
IB Damgård
Workshop on the Theory and Application of of Cryptographic Techniques, 203-216, 1987
4261987
Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation
I Damgård, M Fitzi, E Kiltz, JB Nielsen, T Toft
Theory of Cryptography Conference, 285-304, 2006
3972006
Towards practical public key systems secure against chosen ciphertext attacks
I Damgård
Annual International Cryptology Conference, 445-456, 1991
3821991
Homomorphic encryption and secure comparison
I Damgard, M Geisler, M Kroigard
International Journal of Applied Cryptography 1 (1), 22-31, 2008
345*2008
Efficient concurrent zero-knowledge in the auxiliary string model
I Damgård
International Conference on the Theory and Applications of Cryptographic …, 2000
3392000
A statistically-hiding integer commitment scheme based on groups with hidden order
I Damgård, E Fujisaki
International Conference on the Theory and Application of Cryptology and …, 2002
3382002
Multiparty computations ensuring privacy of each party’s input and correctness of the result
D Chaum, IB Damgård, J Van de Graaf
Conference on the Theory and Application of Cryptographic Techniques, 87-119, 1987
3221987
Secure multiparty computation
R Cramer, IB Damgård, JB Nielsen
Cambridge University Press, 2015
311*2015
Practical covertly secure MPC for dishonest majority–or: breaking the SPDZ limits
I Damgård, M Keller, E Larraia, V Pastro, P Scholl, NP Smart
European Symposium on Research in Computer Security, 1-18, 2013
3102013
Convertible undeniable signatures
J Boyar, D Chaum, I Damgård, T Pedersen
Conference on the Theory and Application of Cryptography, 189-205, 1990
2781990
Semi-homomorphic encryption and multiparty computation
R Bendlin, I Damgård, C Orlandi, S Zakarias
Annual International Conference on the Theory and Applications of …, 2011
2682011
Asynchronous multiparty computation: Theory and implementation
I Damgård, M Geisler, M Krøigaard, JB Nielsen
International workshop on public key cryptography, 160-179, 2009
2632009
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20