Aarhus University Seal / Aarhus Universitets segl

Ivan Bjerre Damgård

  1. 2020
  2. Published

    Black-box transformations from passive to covert security with public verifiability. / Damgård, Ivan; Orlandi, Claudio; Simkin, Mark.

    Advances in Cryptology - CRYPTO 2020. ed. / Daniele Micciancio; Thomas Ristenpart. Vol. Cham Springer, 2020. p. 647-676 (Lecture Notes in Computer Science, Vol. 12171).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  3. Published

    Fast threshold ECDSA with honest majority. / Damgård, Ivan; Jakobsen, Thomas Pelle; Nielsen, Jesper Buus; Pagter, Jakob Illeborg; Østergaard, Michael Bæksvang.

    Security and Cryptography for Networks. ed. / Clemente Galdi; Vladimir Kolesnikov. Cham : Springer, 2020. p. 382-400 (Lecture Notes in Computer Science, Vol. 12238).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  4. 2019
  5. Published

    Proofs of Replicated Storage Without Timing Assumptions. / Damgård, Ivan Bjerre; Ganesh, Chaya; Orlandi, Claudio.

    Advances in Cryptology – CRYPTO 2019 . Springer, 2019. p. 355-380 (Lecture Notes in Computer Science, Vol. 11692).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  6. Published

    Commodity-Based 2PC for Arithmetic Circuits. / Damgård, Ivan; Haagh, Helene; Nielsen, Michael; Orlandi, Claudio.

    Cryptography and Coding - 17th IMA International Conference, IMACC 2019, Proceedings. ed. / Martin Albrecht. Springer, 2019. p. 154-177 (Lecture Notes in Computer Science, Vol. 11929).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  7. Published

    Commodity-Based 2PC for Arithmetic Circuits. / Damgård, Ivan Bjerre; Haagh, Helene; Nielsen, Michael; Orlandi, Claudio.

    Cryptology ePrint Archive. 2019.

    Research output: Other contributionNet publication - Internet publicationResearch

  8. Published

    Communication Lower Bounds for Statistically Secure MPC, With or Without Preprocessing. / Damgård, Ivan; Larsen, Kasper Green; Nielsen, Jesper Buus.

    Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Proceedings. ed. / Alexandra Boldyreva; Daniele Micciancio. Vol. II Springer, 2019. p. 61-84 (Lecture Notes in Computer Science, Vol. 11693).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  9. Published

    Efficient Information-Theoretic Secure Multiparty Computation over Z/p^k Z via Galois Rings. / Abspoel, Mark; Cramer, Ronald; Damgård, Ivan Bjerre; Escudero Ospina, Daniel Esteban; Yuan, Chen.

    Theory of Cryptography: Proceedings. ed. / Dennis Hofheinz; Alon Rosen. Vol. Part 1 Cham : Springer, 2019. p. 471-501 (Lecture Notes in Computer Science, Vol. 11891).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  10. Published

    Efficient UC Commitment Extension with Homomorphism for Free (and Applications). / Cascudo, Ignacio; Damgård, Ivan; David, Bernardo; Döttling, Nico; Dowsley, Rafael; Giacomelli, Irene.

    Advances in Cryptology – ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. ed. / Steven D. Galbraith; Shiho Moriai. Springer, 2019. p. 606-635 (Lecture Notes in Computer Science, Vol. 11922).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  11. Published

    New Primitives for Actively-Secure MPC over Rings with Applications to Private Machine Learning. / Damgård, Ivan Bjerre; Escudero Ospina, Daniel Esteban; Frederiksen, Tore Kasper; Keller, Marcel; Scholl, Peter; Volgushev, Nikolaj.

    2019 IEEE Symposium on Security and Privacy (SP). IEEE, 2019.

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  12. Published

    Stronger leakage-resilient and non-malleable secret sharing schemes for general access structures. / Aggarwal, Divesh; Damgård, Ivan; Nielsen, Jesper Buus; Obremski, Maciej; Purwanto, Erick; Ribeiro, João; Simkin, Mark.

    Advances in Cryptology – CRYPTO 2019 : 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings. ed. / Alexandra Boldyreva; Daniele Micciancio. Vol. II Cham : Springer, 2019. p. 510-539 (Lecture Notes in Computer Science, Vol. 11693).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  13. 2018
  14. Published

    Compact Zero-Knowledge Proofs of Small Hamming Weight. / Damgård, Ivan; Luo, Ji; Oechsner, Sabine; Scholl, Peter; Simkin, Mark.

    Public-Key Cryptography - PKC 2018. ed. / Michel Abdalla; Ricardo Dahab. Vol. 10770 Cham : Springer VS, 2018. p. 530-560 (Lecture Notes in Computer Science (LNCS); No. 10770).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  15. Published

    Continuous NMC Secure Against Permutations and Overwrites, with Applications to CCA Secure Commitments. / Damgård, Ivan; Kazana, Tomasz; Obremski, Maciej; Raj, Varun; Siniscalchi, Luisa.

    Theory of Cryptography. ed. / Amos Beimel; Stefan Dziembowski. Vol. 11240 Cham : Springer VS, 2018. p. 225-254 (Lecture Notes in Computer Science (LNCS); No. 11240).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  16. Published

    More Efficient Commitments from Structured Lattice Assumptions. / Baum, Carsten; Damgård, Ivan; Lyubashevsky, Vadim; Oechsner, Sabine; Peikert, Chris.

    Security and Cryptography for Networks. ed. / Dario Catalano; Roberto De Prisco. Vol. 11035 Cham : Springer VS, 2018. p. 368-385 (Lecture Notes in Computer Science (LNCS); No. 11035).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  17. Published

    SPDΖ2k : Efficient MPC mod 2k for Dishonest Majority. / Cramer, Ronald; Damgård, Ivan; Escudero, Daniel; Scholl, Peter; Xing, Chaoping.

    Advances in Cryptology - CRYPTO 2018. ed. / Hovav Shacham; Alexandra Boldyreva. Vol. 10992 Cham : Springer VS, 2018. p. 769-798 (Lecture Notes in Computer Science (LNCS); No. 10992).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  18. Published

    Yet Another Compiler for Active Security or: Efficient MPC Over Arbitrary Rings. / Damgård, Ivan; Orlandi, Claudio; Simkin, Mark.

    Advances in Cryptology - CRYPTO 2018. ed. / Hovav Shacham; Alexandra Boldyreva. Vol. 10992 Cham : Springer VS, 2018. p. 799-829 (Lecture Notes in Computer Science (LNCS); No. 10992).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  19. 2017
  20. Published

    Resource-Efficient OT Combiners with Active Security. / Cascudo, Ignacio; Damgård, Ivan; Farràs, Oriol; Ranellucci, Samuel.

    Theory of Cryptography - 15th International Conference, TCC 2017, Proceedings. ed. / Yael Kalai; Leonid Reyzin. Vol. 10678 Springer VS, 2017. p. 461-486 (Lecture Notes in Computer Science, Vol. 10678).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  21. Published

    Secure Arithmetic Computation with Constant Computational Overhead. / Applebaum, Benny; Damgård, Ivan; Ishai, Yuval; Nielsen, Michael; Zichron, Lior.

    Advances in Cryptology – CRYPTO 2017 - 37th Annual International Cryptology Conference, Proceedings. ed. / Hovav Shacham; Jonathan Katz. Vol. 10401 Springer VS, 2017. p. 223-254 (Lecture Notes in Computer Science, Vol. 10401).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  22. Published

    Bounded Tamper Resilience : How to Go Beyond the Algebraic Barrier. / Damgård, Ivan; Faust, Sebastian; Mukherjee, Pratyay; Venturi, Daniele.

    In: Journal of Cryptology, Vol. 30, No. 1, 01.2017, p. 152-190.

    Research output: Contribution to journal/Conference contribution in journal/Contribution to newspaperJournal articleResearchpeer-review

  23. Published

    Amortized complexity of zero-knowledge proofs revisited : Achieving linear soundness slack. / Cramer, Ronald; Damgård, Ivan; Xing, Chaoping; Yuan, Chen.

    Advances in Cryptology – EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. ed. / Jean-Sébastien Coron; Jesper Buus Nielsen. Vol. 10210 Springer VS, 2017. p. 479-500 (Lecture Notes in Computer Science, Vol. 10210).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  24. Published

    Confidential benchmarking based on multiparty computation. / Damgård, Ivan; Damgård, Kasper; Nielsen, Kurt; Nordholt, Peter Sebastian; Toft, Tomas.

    Financial Cryptography and Data Security - 20th International Conference, FC 2016, Revised Selected Papers. ed. / Jens Grossklags; Bart Preneel. Vol. 9603 LNCS Springer VS, 2017. p. 169-187 (Lecture Notes in Computer Science, Vol. 9603).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  25. Published

    Linear-Time Non-Malleable Codes in the Bit-Wise Independent Tampering Model. / Cramer, Ronald; Damgård, Ivan; Döttling, Nico; Giacomelli, Irene; Xing, Chaoping.

    Information Theoretic Security - 10th International Conference, ICITS 2017, Proceedings. ed. / Junji Shikata. Vol. 10681 Springer VS, 2017. p. 1-25 (Lecture Notes in Computer Science, Vol. 10681).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  26. Published

    The tinytable protocol for 2-party secure computation, or : Gate-scrambling revisited. / Damgård, Ivan; Nielsen, Jesper Buus; Nielsen, Michael; Ranellucci, Samuel.

    Advances in Cryptology – CRYPTO 2017 - 37th Annual International Cryptology Conference, Proceedings. ed. / Jonathan Katz; Hovav Shacham. Vol. 10401 Springer VS, 2017. p. 167-187 (Lecture Notes in Computer Science, Vol. 10401).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  27. 2016
  28. Published

    Access Control Encryption: Enforcing Information Flow with Cryptography. / Damgård, Ivan Bjerre; Haagh, Helene Flyvholm; Orlandi, Claudio.

    TCC 2016-B: Fourteenth IACR Theory of Cryptography Conference. ed. / Martin Hirt; Adam Smith. Vol. 9986 Springer VS, 2016. p. 547-576 (Lecture Notes in Computer Science, Vol. 9986).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  29. Published

    Adaptively Secure Multi-Party Computation from LWE (via Equivocal FHE). / Damgård, Ivan Bjerre; Polychroniadou, Antigoni; Rao, Vanishree.

    Practice and Theory of Public-Key Cryptography (PKC) 2016. Vol. 9615 Springer VS, 2016. p. 208-233 (Lecture Notes in Computer Science, Vol. 9615).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  30. Published

    Better Preprocessing for Secure Multiparty Computation. / Baum, Carsten; Damgård, Ivan Bjerre; Toft, Tomas; Zakarias, Rasmus Winther.

    Applied Cryptography and Network Security: 14th International Conference on Applied Cryptography and Network Security. ed. / Mark Manulis; Ahmad-Reza Sadeghi; Steve Schneider . Vol. 9696 Springer VS, 2016. p. 327-345 (Lecture Notes in Computer Science (LNCS), Vol. 9696).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  31. Published

    Entangled cloud storage. / Ateniese, Giuseppe; Dagdelen, Özgür; Damgård, Ivan; Venturi, Daniele.

    In: Future Generation Computer Systems - The International Journal of eScience, Vol. 62, No. 9, 2016, p. 104-118.

    Research output: Contribution to journal/Conference contribution in journal/Contribution to newspaperJournal articleResearchpeer-review

  32. Published

    Fast oblivious AES a dedicated application of the MiniMac protocol. / Damgård, Ivan; Zakarias, Rasmus.

    Progress in Cryptology – AFRICACRYPT 2016 - 8th International Conference on Cryptology in Africa, Proceedings. ed. / David Pointcheval; Abderrahmane Nitaj; Tajjeeddine Rachidi. Vol. 9646 Springer VS, 2016. p. 245-264 (Lecture Notes in Computer Science, Vol. 9646).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  33. Published

    Gate-scrambling Revisited - or: The TinyTable protocol for 2-Party Secure Computation. / Damgård, Ivan Bjerre; Nielsen, Jesper Buus; Nielsen, Michael; Ranellucci, Samuel.

    2016Internet Archive.

    Research output: Other contributionNet publication - Internet publicationResearch

  34. Published

    How to prove knowledge of small secrets. / Baum, Carsten; Damgård, Ivan Bjerre; Larsen, Kasper Green; Nielsen, Michael.

    Annual Cryptology Conference : CRYPTO 2016: Advances in Cryptology – CRYPTO 2016. ed. / Jonathan Katz; Matthew Robshaw. Vol. 9816 Berlin, Heidelberg : Springer VS, 2016. p. 478-498 (Lecture Notes in Computer Science, Vol. 9816).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  35. Published

    Linear-Time Non-Malleable Codes in the Bit-Wise Independent Tampering Model. / Cramer, Ronald; Damgård, Ivan Bjerre; Döttling, Nico; Giacomelli, Irene; Xing, Chaoping.

    Cryptology ePrint Archive, 2016. p. 1-31.

    Research output: Working paperResearch

  36. Published

    Non-Interactive Verifiable Secret Sharing for Monotone Circuits. / Bai, Ge; Damgård, Ivan; Orlandi, Claudio; Xia, Yu.

    Progress in Cryptology - AFRICACRYPT 2016 - 8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedings. ed. / David Pointcheval; Abderrahmane Nitaj; Tajjeeddine Rachidi. Vol. 9646 Springer VS, 2016. p. 225-244 (Lecture Notes in Computer Science (LNCS), Vol. 9646).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  37. Published

    Oblivious transfer from any non-trivial elastic noisy channel via secret key agreement. / Cascudo, Ignacio; Damgård, Ivan; Lacerda, Felipe; Ranellucci, Samuel.

    Theory of Cryptography - 14th International Conference, TCC 2016-B, Proceedings. Vol. 9985 Springer VS, 2016. p. 204-234 (Lecture Notes in Computer Science, Vol. 9985).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  38. Published

    On public key encryption from noisy codewords. / Ben-Sasson, Eli; Ben-Tov, Iddo; Damgård, Ivan; Ishai, Yuval; Ron-Zewi, Noga.

    Public-Key Cryptography – PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings. Vol. 9615 Springer VS, 2016. p. 417-446 (Lecture Notes in Computer Science, Vol. 9615).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  39. Published

    On the Communication Required for Unconditionally Secure Multiplication. / Damgård, Ivan Bjerre; Nielsen, Jesper Buus; Polychroniadou, Antigoni; Raskin, Mikhail.

    Advances in Cryptology – CRYPTO 2016. Vol. 9815 Springer VS, 2016. p. 459-488 (Lecture Notes in Computer Science, Vol. 9815).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  40. Published

    On the Communication and Round Complexity of Secure Computation. / Polychroniadou, Antigoni; Damgård, Ivan Bjerre; Garg, Sanjam; Mukherjee, Pratyay; Nielsen, Jesper Buus; Pandey, Omkant.

    Aarhus : Institut for Datalogi, Aarhus Universitet, 2016. 29 p.

    Research output: Book/anthology/dissertation/reportReport

  41. Published

    Rate-1, linear time and additively homomorphic UC commitments. / Cascudo, Ignacio; Damgård, Ivan; David, Bernardo Machado; Döttling, Nico; Nielsen, Jesper Buus.

    Advances in Cryptology - 36th Annual International Cryptology Conference, CRYPTO 2016, Proceedings. ed. / Matthew Robshaw; Jonathan Katz. Vol. 9816 Springer VS, 2016. p. 179-207 (Lecture Notes in Computer Science, Vol. 9816).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  42. Published

    Unconditionally secure computation with reduced interaction. / Damgård, Ivan; Nielsen, Jesper Buus; Ostrovsky, Rafail; Rosén, Adi.

    Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. ed. / Marc Fischlin; Jean-Sébastien Coron . Vol. 9666 Springer VS, 2016. p. 420-447 (Lecture Notes in Computer Science, Vol. 9666).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  43. 2015
  44. Published

    Fast Oblivious AES A Dedicated application of the MiniMac protocol. / Zakarias, Rasmus Winther; Damgård, Ivan Bjerre.

    2015.

    Research output: Contribution to conferencePaperResearchpeer-review

  45. Published

    Additively Homomorphic UC commitments with Optimal Amortized Overhead. / Cascudo Pueyo, Ignacio; Damgård, Ivan Bjerre; David, Bernardo Machado; Giacomelli, Irene; Nielsen, Jesper Buus; Trifiletti, Roberto.

    Public-Key Cryptography, PKC 2015: 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30-April 1, 2015, Proceedings. ed. / Jonathan Katz . Springer, 2015. p. 495–515 (Lecture Notes in Computer Science, Vol. 9020).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  46. Published

    Efficient leakage resilient circuit compilers. / Andrychowicz, Marcin; Damgård, Ivan Bjerre; Dziembowski, Stefan; Faust, Sebastian; Polychroniadou, Antigoni.

    Topics in Cryptology - CT-RSA 2015: The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings. ed. / Kaisa Nyberg. Springer VS, 2015. p. 311-329 (Lecture Notes in Computer Science, Vol. 9048).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  47. Published

    Entangled Encodings and Data Entanglement. / Ateniese, Giuseppe; Dagdelen, Özgür ; Damgård, Ivan Bjerre; Venturi, Daniele.

    SCC '15: Proceedings of the 3rd International Workshop on Security in Cloud Computing. New York, NY, USA : Association for Computing Machinery, 2015. p. 3-12.

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearch

  48. Published

    Linear secret sharing schemes from error correcting codes and universal hash functions. / Cramer, Ronald; Damgård, Ivan Bjerre; Döttling, Nico Marcel; Fehr, Serge; Spini, Gabriele.

    Advances in Cryptology - EUROCRYPT 2015: 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II. ed. / Elisabeth Oswald; Marc F Fischlin . Springer VS, 2015. p. 313-336 (Lecture Notes in Computer Science, Vol. 9057).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  49. Published

    On the Orthogonal Vector Problem and the Feasibility of Unconditionally Secure Leakage-Resilient Computation. / Damgård, Ivan Bjerre; Dupont-Dupuis, Fréderic; Nielsen, Jesper Buus.

    Information Theoretic Security: 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings. Springer VS, 2015. p. 87-104 (Lecture Notes in Computer Science, Vol. 9063).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  50. Published

    Secure Multiparty Computation and Secret Sharing. / Cramer, Ronald; Damgård, Ivan Bjerre; Nielsen, Jesper Buus.

    Cambridge : Cambridge University Press, 2015. 381 p.

    Research output: Book/anthology/dissertation/reportBook

  51. Published

    The Chaining Lemma and its application. / Damgård, Ivan Bjerre; Faust, Sebastian; Mukherjee, Pratyay; Venturi, Daniele.

    Information Theoretic Security: 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings. ed. / Anja Lehmann; Stefan Wolf . Springer VS, 2015. p. 181-196 (Lecture Notes in Computer Science, Vol. 9063).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  52. 2014
  53. Published

    Secure identification and QKD in the bounded-quantum-storage model. / Damgård, Ivan B.; Fehr, Serge; Salvail, Louis; Schaffner, Christian.

    In: Theoretical Computer Science, Vol. 560, No. 1, 04.12.2014, p. 12-26.

    Research output: Contribution to journal/Conference contribution in journal/Contribution to newspaperJournal articleResearchpeer-review

  54. Published

    Adaptive versus static security in the UC Model. / Damgård, Ivan Bjerre; Nielsen, Jesper Buus.

    Provable Security: 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings. ed. / Sherman S. M. Chow ; Joseph K. Liu; Lucas C. K. Hui ; Siu Ming Yiu. Springer VS, 2014. p. 10-28 (Lecture Notes in Computer Science, Vol. 8782).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  55. Published

    How to re-use a one-time pad safely and almost optimally even if P = NP. / Damgård, Ivan Bjerre; Pedersen, Thomas Brochmann; Salvail, Louis.

    In: Natural Computing, Vol. 13, No. 4, 01.01.2014, p. 469-486.

    Research output: Contribution to journal/Conference contribution in journal/Contribution to newspaperJournal articleResearchpeer-review

  56. Published

    On the security of distributed multiprime RSA. / Damgård, Ivan; Mikkelsen, Gert Læssøe; Skeltved, Tue.

    Information Security and Cryptology - ICISC 2014 - 17th International Conference, Revised Selected Papers. ed. / Jongsung Kim; Jooyoung Lee. Springer-Verlag, 2014. p. 18-33 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 8949).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  57. Published

    Superposition attacks on cryptographic protocols. / Damgård, Ivan Bjerre; Funder, Jakob; Nielsen, Jesper Buus; Salvail, Louis.

    Information Theoretic Security: 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings. ed. / Carles Padró . Springer, 2014. p. 142-161 (Lecture Notes in Computer Science, Vol. 8317).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  58. Published

    Universally composable symbolic analysis for two-party protocols based on homomorphic encryption. / Dahl, Morten; Damgård, Ivan Bjerre.

    Advances in Cryptology – EUROCRYPT 2014: 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings. ed. / Phong Q. Nguyen; Elisabeth Oswald. Springer VS, 2014. p. 695-712 (Lecture Notes in Computer Science, Vol. 8441 ).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  59. Published

    An Empirical Study and some Improvements of the MiniMac Protocol for Secure Computation. / Damgård, Ivan Bjerre; Lauritsen, Rasmus ; Toft, Tomas.

    Security and Cryptography for Networks: 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings. ed. / Michel Abdalla; Roberto De Prisco . Springer, 2014. p. 398-415 (Lecture Notes in Computer Science, Vol. 8642).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  60. Published

    Compact VSS and Efficient Homomorphic UC Commitments. / Damgård, Ivan Bjerre; David, Bernardo Machado; Giacomelli, Irene; Nielsen, Jesper Buus.

    Advances in Cryptology – ASIACRYPT 2014: 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part II. ed. / Palash Sarkar; Tetsu Iwata. Springer VS, 2014. p. 213-232 (Lecture Notes in Computer Science, Vol. 8874).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  61. Published

    On the Amortized Complexity of Zero-Knowledge Protocols. / Cramer, R.; Damgård, Ivan Bjerre; Keller, Marcel.

    In: Journal of Cryptology, Vol. 27, No. 2, 2014, p. 284-316.

    Research output: Contribution to journal/Conference contribution in journal/Contribution to newspaperJournal articleResearchpeer-review

  62. Published

    Publicly Auditable Secure Multi-Party Computation. / Baum, Carsten; Damgård, Ivan Bjerre; Orlandi, Claudio.

    Security and Cryptography for Networks: 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings. ed. / Michel Abdalla ; Roberto De Prisco . Springer VS, 2014. p. 175-196 (Lecture Notes in Computer Science, Vol. 8642).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  63. Published

    Server-Aided Two-Party Computation with Simultaneous Corruption. / Cascudo Pueyo, Ignacio; Damgård, Ivan Bjerre; Ranellucci, Samuel.

    Cryptology ePrint Archive, 2014. p. 18.

    Research output: Working paperResearch

  64. 2013
  65. Published

    Constant-overhead secure computation of Boolean circuits using preprocessing. / Damgård, Ivan Bjerre; Zakarias, S.

    Theory of Cryptography: 10th TCC 2013. Proceedings. ed. / Amit Sahai. Springer VS, 2013. p. 621-641 (Lecture Notes in Computer Science, Vol. 7785 ).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  66. Published

    Efficient multiparty protocols via log-depth threshold formulae. / Cohen, Gil; Damgård, Ivan Bjerre; Ishai, Yuval; Kölker, Jonas; Miltersen, P.B.; Raz, Ran; Rothblum, R.D.

    Advances in Cryptology – CRYPTO 2013: 33rd Annual Conference. Proceedings, Part II. ed. / Ran Canetti; Juan A. Garay . Springer VS, 2013. p. 185-202 (Lecture Notes in Computer Science, Vol. 8043 ).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  67. Published

    Bounded Tamper Resilience : How to Go beyond the Algebraic Barrier. / Damgård, Ivan Bjerre; Faust, Sebastian; Mukherjee, Pratyay; Venturi, Daniele.

    Advances in Cryptology - ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II. ed. / Kazue Sako; Palash Sarkar. Springer VS, 2013. p. 140-160 (Lecture Notes in Computer Science, Vol. 8270).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  68. Published

    Efficient Multiparty Protocols via Log-Depth Threshold Formulae Contact Add Comment RSS-Feed. / Cohen, Gil ; Damgård, Ivan Bjerre; Ishai, Yuval; Kölker, Jonas; Miltersen, Peter Bro; Raz, Ran; Rothblum, Ron .

    In: Electronic Colloquium on Computational Complexity, No. TR13-107, 2013.

    Research output: Contribution to journal/Conference contribution in journal/Contribution to newspaperJournal articleResearchpeer-review

  69. Published

    Practical Covertly Secure MPC for Dishonest Majority – or: Breaking the SPDZ Limits. / Damgård, Ivan Bjerre; Keller, Marcel; Larraia , Enrique ; Pastro, Valerio; Scholl, Peter ; Smart, Nigel P. .

    Computer Security – ESORICS 2013: 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings. ed. / Jason Crampton ; Sushil Jajodia; Keith Mayes. Springer VS, 2013. p. 1-18 (Lecture Notes in Computer Science, Vol. 8134).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  70. Published

    Secure Key Management in the Cloud. / Damgård, Ivan Bjerre; Jakobsen, Thomas Pelle; Nielsen, Jesper Buus; Pagter, Jakob Illeborg.

    Cryptography and Coding: 14th IMA International Conference, IMACC 2013, Oxford, UK, December 17-19, 2013. Proceedings. ed. / Martijn Stam. Springer VS, 2013. p. 270-289 (Lecture Notes in Computer Science, Vol. 8308).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  71. Published

    Tamper Resilient Cryptography Without Self-Destruct. / Damgård, Ivan Bjerre; Faust, Sebastian; Mukherjee, Pratyay; Venturi, Daniele.

    In: IACR Cryptology ePrint Archive, No. 2013, 2013.

    Research output: Contribution to journal/Conference contribution in journal/Contribution to newspaperJournal articleResearch

  72. Published

    Unconditionally Secure and Universally Composable Commitments from Physical Assumptions. / Damgård, Ivan Bjerre; Scafuro, Alessandra .

    Advances in Cryptology - ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II. ed. / Kazue Sako; Palash Sarkar. Springer VS, 2013. p. 100-119 (Lecture Notes in Computer Science, Vol. 8270).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  73. Published

    Universally Composable Symbolic Analysis for Two-Party Protocols based on Homomorphic Encryption. / Dahl, Morten; Damgård, Ivan Bjerre.

    Cryptology ePrint Archive, 2013.

    Research output: Working paperResearch

  74. 2012
  75. Published

    Constant-Overhead Secure Computation of Boolean Circuits using Preprocessing. / Damgård, Ivan Bjerre; Zakarias, Sarah Nouhad Haddad.

    Cryptology ePrint Archive, 2012.

    Research output: Working paperResearch

  76. Published

    DDH-Like Assumptions Based on Extension Rings. / Cramer, Ronald; Damgård, Ivan Bjerre; Kiltz, Eike ; Zakarias, Sarah Nouhad Haddad; Zottarel, Angela.

    In: Lecture Notes in Computer Science, Vol. 7293, 2012, p. 644-661 .

    Research output: Contribution to journal/Conference contribution in journal/Contribution to newspaperConference articleResearchpeer-review

  77. Published

    Entangled Cloud Storage. / Ateniese, Giuseppe ; Dagdelen, Özgür; Damgård, Ivan Bjerre; Venturi, Daniele.

    2012.

    Research output: Working paperResearch

  78. Published

    Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocol. / Damgård, Ivan Bjerre; Keller, Marcel; Keller, Enrique; Miles, Christian; Smart, Nigel P.

    In: Lecture Notes in Computer Science, Vol. 7485, 2012, p. 241-263.

    Research output: Contribution to journal/Conference contribution in journal/Contribution to newspaperConference articleResearchpeer-review

  79. Published

    Is Public-Key Encryption Based on LPN Practical? / Damgård, Ivan Bjerre; Park, Sunoo .

    2012.

    Research output: Working paperResearch

  80. Published
  81. Published

    Multiparty computation from somewhat homomorphic encryption. / Damgård, Ivan Bjerre; Pastro, Valerio; Smart, Nigel; Zakarias, Sarah Nouhad Haddad.

    In: Lecture Notes in Computer Science, Vol. 7417, 2012, p. 643-662.

    Research output: Contribution to journal/Conference contribution in journal/Contribution to newspaperConference articleResearchpeer-review

  82. Published

    On the Amortized Complexity of Zero Knowledge Protocols for Multiplicative Relations. / Cramer, Ronald; Damgård, Ivan Bjerre; Pastro, Valerio.

    In: Lecture Notes in Computer Science, Vol. 7412, 2012, p. 62-79 .

    Research output: Contribution to journal/Conference contribution in journal/Contribution to newspaperConference articleResearchpeer-review

  83. Published

    Secret Sharing and Secure Computing from Monotone Formulae. / Damgård, Ivan Bjerre; Kölker, Jonas; Miltersen, Peter Bro.

    2012.

    Research output: Working paperResearch

  84. Published

    Secure Computation, I/O-Efficient Algorithms and Distributed Signatures. / Damgård, Ivan Bjerre; Kölker, Jonas; Toft, Tomas.

    In: Lecture Notes in Computer Science, Vol. 7178, 2012, p. 278-295 .

    Research output: Contribution to journal/Conference contribution in journal/Contribution to newspaperConference articleResearchpeer-review

  85. Published

    Secure Two-Party Computation with Low Communication. / Damgård, Ivan Bjerre; Kölker, Jonas; Faust, Sebastian; Hazay, Carmit.

    In: Lecture Notes in Computer Science, Vol. 7194, 2012, p. 54-74 .

    Research output: Contribution to journal/Conference contribution in journal/Contribution to newspaperConference articleResearchpeer-review

  86. Published

    Zero-Knowledge Proofs with Low Amortized Communication from Lattice Assumptions. / Damgård, Ivan Bjerre; López-Alt, Adriana .

    In: Lecture Notes in Computer Science, Vol. 7485, 2012, p. 38-56 .

    Research output: Contribution to journal/Conference contribution in journal/Contribution to newspaperConference articleResearchpeer-review

  87. 2011
  88. Published

    DDH-like Assumptions Based on Extension Rings. / Cramer, Ronald; Damgård, Ivan Bjerre; Kiltz, Eike; Zakarias, Sarah Nouhad Haddad; Zottarel, Angela.

    2011.

    Research output: Working paperResearch

  89. Published

    Multiparty Computation from Somewhat Homomorphic Encryption. / Damgård, Ivan Bjerre; Pastro, Valerio; Smart, Nigel; Zakarias, Sarah Nouhad Haddad.

    2011.

    Research output: Working paperResearch

  90. Published

    On the Amortized Complexity of Zero Knowledge Protocols for Multiplicative Relations. / Cramer, Ronald; Damgård, Ivan Bjerre; Pastro, Valerio.

    2011.

    Research output: Working paperResearch

  91. Published

    Perfectly Secure Oblivious RAM without Random Oracles. / Damgård, Ivan Bjerre; Meldgaard, Sigurd Torkel; Nielsen, Jesper Buus.

    In: Lecture Notes in Computer Science, Vol. 6597, 2011, p. 144-163.

    Research output: Contribution to journal/Conference contribution in journal/Contribution to newspaperConference articleResearchpeer-review

  92. Published

    Quantum Communication Attacks on Classical Cryptographic Protocols. / Damgård, Ivan Bjerre.

    2011. Abstract from 5th International Conference on Information Theoretic Security, Amsterdam, Netherlands.

    Research output: Contribution to conferenceConference abstract for conferenceResearchpeer-review

  93. Published

    Secure Two-Party Computation with Low Communication. / Damgård, Ivan Bjerre; Faust, Sebastian; Hazay, Carmit.

    2011.

    Research output: Working paperResearch

  94. Published

    Semi-Homomorphic Encryption and Multiparty Computation. / Bendlin, Rikke; Damgård, Ivan Bjerre; Orlandi, Claudio; Zakarias, Sarah Nouhad Haddad.

    In: Lecture Notes in Computer Science, Vol. 6632, 2011, p. 169-188.

    Research output: Contribution to journal/Conference contribution in journal/Contribution to newspaperConference articleResearchpeer-review

  95. Published

    Superposition Attacks on Cryptographic Protocols. / Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus; Salvail, Louis.

    2011.

    Research output: Working paperResearch

  96. 2010
  97. Published

    A generalization of Paillier's public-key system with applications to electronic voting. / Damgård, Ivan Bjerre; Jurik, Mads Johan; Nielsen, Jesper Buus.

    In: International Journal of Information Security, Vol. 9, No. 6, 2010, p. 371-385.

    Research output: Contribution to journal/Conference contribution in journal/Contribution to newspaperJournal articleResearchpeer-review

  98. Published

    Efficient, Robust and Constant-Round Distributed RSA Key Generation. / Damgård, Ivan Bjerre; Mikkelsen, Gert Læssøe.

    In: Lecture Notes in Computer Science, Vol. 5978, 2010, p. 183-200.

    Research output: Contribution to journal/Conference contribution in journal/Contribution to newspaperConference articleResearchpeer-review

  99. Published

    From Passive to Covert Security at Low Cost. / Damgård, Ivan Bjerre; Geisler, Martin; Nielsen, Jesper Buus.

    In: Lecture Notes in Computer Science, Vol. 5978, 2010, p. 128-145.

    Research output: Contribution to journal/Conference contribution in journal/Contribution to newspaperConference articleResearchpeer-review

  100. Published

    Multiparty Computation for Dishonest Majority : From Passive to Active Security at Low Cost. / Damgård, Ivan Bjerre; Orlandi, Claudio.

    In: Lecture Notes in Computer Science, Vol. 6223, 2010, p. 558-576.

    Research output: Contribution to journal/Conference contribution in journal/Contribution to newspaperConference articleResearchpeer-review

  101. Published

    On the Necessary and Sufficient Assumptions for UC Computation. / Damgård, Ivan Bjerre; Nielsen, Jesper Buus; Orlandi, Claudio.

    In: Lecture Notes in Computer Science, Vol. 5978, 2010, p. 109-127.

    Research output: Contribution to journal/Conference contribution in journal/Contribution to newspaperConference articleResearchpeer-review

  102. Published

    Perfectly Secure Multiparty Computation and the Computational Overhead of Cryptography. / Damgård, Ivan Bjerre; Ishai, Yuval; Krøigaard, Mikkel.

    In: Lecture Notes in Computer Science, Vol. 6110, 2010, p. 445-465.

    Research output: Contribution to journal/Conference contribution in journal/Contribution to newspaperConference articleResearchpeer-review

  103. Published

    Secure Multiparty AES. / Damgård, Ivan Bjerre; Keller, Marcel.

    In: Lecture Notes in Computer Science, Vol. 6052, 2010, p. 367-374.

    Research output: Contribution to journal/Conference contribution in journal/Contribution to newspaperConference articleResearchpeer-review

  104. Published

    Threshold Decryption and Zero-Knowledge Proofs for Lattice-Based Cryptosystems. / Bendlin, Rikke; Damgård, Ivan Bjerre.

    In: Lecture Notes in Computer Science, Vol. 5978, 2010, p. 201-218.

    Research output: Contribution to journal/Conference contribution in journal/Contribution to newspaperConference articleResearchpeer-review

  105. 2009
  106. Published

    A correction to 'efficient and secure comparison for on-line auctions'. / Damgård, Ivan Bjerre; Krøigaard, Mikkel; Geisler, Martin.

    In: International Journal of Applied Cryptography, Vol. 1, No. 4, 2009, p. 323-324.

    Research output: Contribution to journal/Conference contribution in journal/Contribution to newspaperJournal articleResearchpeer-review

  107. Published

    Asynchronous Multiparty Computation : Theory and Implementation. / Damgård, Ivan Bjerre; Geisler, Martin; Krøigaard, Mikkel; Nielsen, Jesper Buus.

    In: Lecture Notes in Computer Science, Vol. 5443, 2009, p. 160-179.

    Research output: Contribution to journal/Conference contribution in journal/Contribution to newspaperConference articleResearchpeer-review

  108. Published

    Essentially Optimal Universally Composable Oblivious Transfer. / Damgård, Ivan Bjerre; Nielsen, Jesper Buus; Orlandi, Claudio.

    In: Lecture Notes in Computer Science, Vol. 5461, 2009, p. 1-14.

    Research output: Contribution to journal/Conference contribution in journal/Contribution to newspaperConference articleResearchpeer-review

  109. Published

    Improving the Security of Quantum Protocols via Commit-and-Open. / Damgård, Ivan Bjerre; Fehr, Serge; Lunemann, Carolin; Salvail, Louis; Schaffner, Christian.

    In: Lecture Notes in Computer Science, 2009, p. 408-427.

    Research output: Contribution to journal/Conference contribution in journal/Contribution to newspaperConference articleResearchpeer-review

  110. Published

    On the Amortized Complexity of Zero-Knowledge Protocols. / Damgård, Ivan Bjerre; Cramer, Ronald.

    In: Lecture Notes in Computer Science, Vol. 5677, 2009, p. 177-191.

    Research output: Contribution to journal/Conference contribution in journal/Contribution to newspaperConference articleResearchpeer-review

  111. Published

    On the Theory and Practice of Personal Digital Signatures. / Damgård, Ivan Bjerre; Mikkelsen, Gert Læssøe.

    In: Lecture Notes in Computer Science, 2009, p. 277-296.

    Research output: Contribution to journal/Conference contribution in journal/Contribution to newspaperConference articleResearchpeer-review

  112. Published

    Quantum-Secure Coin-Flipping and Applications. / Damgård, Ivan Bjerre; Lunemann, Carolin.

    In: Lecture Notes in Computer Science, 2009, p. 52-69.

    Research output: Contribution to journal/Conference contribution in journal/Contribution to newspaperConference articleResearchpeer-review

Previous 1 2 3 Next