Cryptographers' World
 

Ronald Cramer


Author's Web Page Link

33 papers in database with 3597 citations StarStarStar

Editor of 2 conference proceedings books

H-number: 21

Conference Proceedings

 
1. Ronald Cramer, editor, Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings. Springer, 2008. ISBN 978-3-540-78439-5.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

2. Ronald Cramer, editor, Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings. Springer, 2005. ISBN 3-540-25910-4.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Ignacio Cascudo Pueyo,  Hao Chen,  Ronald Cramer,  Chaoping Xing,  Asymptotically Good Ideal Linear Secret Sharing with Strong Multiplication over , pp. 466 - 486, CRYPTO 2009.

[Electronic Edition][Cited 2 times ]

2. Ronald Cramer,  Ivan Damgard,  On the Amortized Complexity of Zero-Knowledge Protocols, pp. 177 - 191, CRYPTO 2009.

[Electronic Edition][Cited 5 times ]

3. Hao Chen,  Ronald Cramer,  Robbert de Haan,  Ignacio Cascudo Pueyo,  Strongly Multiplicative Ramp Schemes from High Degree Rational Points on Curves, pp. 451 - 470, EUROCRYPT 2008.

[Electronic Edition][Cited 5 times ]

4. Ronald Cramer,  Yevgeniy Dodis,  Serge Fehr,  Carles Padró,  Daniel Wichs,  Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors, pp. 471 - 488, EUROCRYPT 2008.

[Electronic Edition][Cited 27 times ]

5. Ronald Cramer,  Ivan Damgard,  Robbert de Haan,  Atomic Secure Multi-party Multiplication with Low Communication, pp. 329 - 346, EUROCRYPT 2007.

[Electronic Edition][Cited 5 times ]

6. Hao Chen,  Ronald Cramer,  Shafi Goldwasser,  Robbert de Haan,  Vinod Vaikuntanathan,  Secure Computation from Random Error Correcting Codes, pp. 291 - 310, EUROCRYPT 2007.

[Electronic Edition][Cited 14 times ]

7. Ronald Cramer,  Goichiro Hanaoka,  Dennis Hofheinz,  Hideki Imai,  Eike Kiltz,  Rafael Pass,  Abhi Shelat,  Vinod Vaikuntanathan,  Bounded CCA2-Secure Encryption, pp. 502 - 518, ASIACRYPT 2007.

[Electronic Edition][Cited 16 times ]

8. Ronald Cramer,  Eike Kiltz,  Carles Padró,  A Note on Secure Computation of the Moore-Penrose Pseudoinverse and Its Application to Secure Linear Algebra, pp. 613 - 630, CRYPTO 2007.

[Electronic Edition][Cited 10 times ]

9. Hao Chen,  Ronald Cramer,  Algebraic Geometric Secret Sharing Schemes and Secure Multi-Party Computations over Small Fields, pp. 521 - 536, CRYPTO 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 27 times ]

10. Saurabh Agarwal,  Ronald Cramer,  Robbert de Haan,  Asymptotically Optimal Two-Round Perfectly Secure Message Transmission, pp. 394 - 408, CRYPTO 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 32 times ]

11. Ronald Cramer,  Serge Fehr,  Martijn Stam,  Black-Box Secret Sharing from Primitive Sets in Algebraic Number Fields, pp. 344 - 360, CRYPTO 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 5 times ]

12. Ronald Cramer,  Vanesa Daza,  Ignacio Gracia,  Jorge Jiménez Urroz,  Gregor Leander,  Jaume Martí-Farré,  Carles Padró,  On Codes, Matroids and Secure Multi-party Computation from Linear Secret Sharing Schemes, pp. 327 - 343, CRYPTO 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 27 times ]

13. Ronald Cramer,  Ivan Damgard,  Yuval Ishai,  Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation, pp. 342 - 362, TCC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 33 times ]

14. Ronald Cramer,  Ivan Damgard,  Secret-Key Zero-Knowlegde and Non-interactive Verifiable Exponentiation, pp. 223 - 237, TCC 2004.

[Electronic Edition][Cited 14 times ]

15. Ronald Cramer,  Serge Fehr,  Yuval Ishai,  Eyal Kushilevitz,  Efficient Multi-party Computation over Rings, pp. 596 - 613, EUROCRYPT 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 35 times ]

16. Masayuki Abe,  Ronald Cramer,  Serge Fehr,  Non-interactive Distributed-Verifier Proofs and Proving Relations among Commitments, pp. 206 - 223, ASIACRYPT 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 8 times ]

17. Ronald Cramer,  Serge Fehr,  Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups, pp. 272 - 287, CRYPTO 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 47 times ]

18. Ronald Cramer,  Victor Shoup,  Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption, pp. 45 - 64, EUROCRYPT 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 236 times Red StarRed Star]

19. Ronald Cramer,  Ivan Damgard,  Serge Fehr,  On the Cost of Reconstructing a Secret, or VSS with Optimal Reconstruction Phase, pp. 503 - 523, CRYPTO 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 14 times ]

20. Ronald Cramer,  Ivan Damgard,  Secure Distributed Linear Algebra in a Constant Number of Rounds, pp. 119 - 136, CRYPTO 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 46 times ]

21. Ronald Cramer,  Ivan Damgard,  Jesper Buus Nielsen,  Multiparty Computation from Threshold Homomorphic Encryption, pp. 280 - 299, EUROCRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 236 times Red StarRed Star]

22. Ronald Cramer,  Ivan Damgard,  Ueli M. Maurer,  General Secure Multi-party Computation from any Linear Secret-Sharing Scheme, pp. 316 - 334, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 190 times Red StarRed Star]

23. Ronald Cramer,  Ivan Damgard,  Philip D. MacKenzie,  Efficient Zero-Knowledge Proofs of Knowledge Without Intractability Assumptions, pp. 354 - 372, PKC 2000.

[Electronic Edition][Cited 57 times Red Star]

24. Ronald Cramer,  Ivan Damgard,  Stefan Dziembowski,  Martin Hirt,  Tal Rabin,  Efficient Multiparty Computations Secure Against an Adaptive Adversary, pp. 311 - 326, EUROCRYPT 1999.

[Electronic Edition][Cited 108 times Red StarRed Star]

25. Ronald Cramer,  Ivan Damgard,  Zero-Knowledge Proofs for Finite Field Arithmetic; or: Can Zero-Knowledge be for Free?, pp. 424 - 441, CRYPTO 1998.

[Electronic Edition][Cited 76 times Red Star]

26. Ronald Cramer,  Victor Shoup,  A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack, pp. 13 - 25, CRYPTO 1998.

[Electronic Edition][Cited 792 times Red StarRed StarRed StarRed Star]

27. Ronald Cramer,  Rosario Gennaro,  Berry Schoenmakers,  A Secure and Optimally Efficient Multi-Authority Election Scheme, pp. 103 - 118, EUROCRYPT 1997.

[Electronic Edition][Cited 474 times Red StarRed StarRed Star]

28. Ronald Cramer,  Ivan Damgard,  Fast and Secure Immunization Against Adaptive Man-in-the-Middle Impersonation, pp. 75 - 87, EUROCRYPT 1997.

[Electronic Edition][Cited 10 times ]

29. Ronald Cramer,  Ivan Damgard,  New Generation of Secure and Practical RSA-Based Signatures, pp. 173 - 185, CRYPTO 1996.

[Electronic Edition][Cited 65 times Red Star]

30. Ronald Cramer,  Matthew K. Franklin,  Berry Schoenmakers,  Moti Yung,  Multi-Authority Secret-Ballot Elections with Linear Work, pp. 72 - 83, EUROCRYPT 1996.

[Electronic Edition][Cited 256 times Red StarRed StarRed Star]

31. Ronald Cramer,  Ivan Damgard,  Secure Signature Schemes based on Interactive Protocols, pp. 297 - 310, CRYPTO 1995.

[Electronic Edition][Cited 36 times ]

32. Ronald Cramer,  Ivan Damgard,  Berry Schoenmakers,  Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols, pp. 174 - 187, CRYPTO 1994.

[Electronic Edition][Cited 615 times Red StarRed StarRed StarRed Star]

33. Ronald Cramer,  Torben P. Pedersen,  Improved Privacy in Wallets with Observers (Extended Abstract), pp. 329 - 343, EUROCRYPT 1993.

[Electronic Edition][Cited 74 times Red Star]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...