Cryptographers' World
 

Ivan Damgard


Author's Web Page Link

89 papers in database with 5273 citations StarStarStarStar

Editor of 1 conference proceedings book

H-number: 35

Conference Proceedings

 
1. Ivan Damgard, editor, Advances in Cryptology - EUROCRYPT '90, Workshop on the Theory and Application of of Cryptographic Techniques, Aarhus, Denmark, May 21-24, 1990, Proceedings. Springer, 1991. ISBN 3-540-53587-X.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Ivan Damgard,  Gudmund Skovbjerg Frandsen,  An Extended Quadratic Frobenius Primality Test with Average- and Worst-Case Error Estimate, Journal of Cryptology, Volume 19(4), pp. 489 - 520, Springer, 2006.

[Cited 8 times ]

2. Ran Canetti,  Ivan Damgard,  Stefan Dziembowski,  Yuval Ishai,  Tal Malkin,  Adaptive versus Non-Adaptive Security of Multi-Party Protocols, Journal of Cryptology, Volume 17(3), pp. 153 - 207, Springer, 2004.

[Cited 4 times ]

3. Joan Boyar,  Ivan Damgard,  RenĂŠ Peralta,  Short Non-Interactive Cryptographic Proofs, Journal of Cryptology, Volume 13(4), pp. 449 - 472, Springer, 2000.

[Cited 14 times ]

4. Jørgen Brandt,  Ivan Damgard,  Peter Landrock,  Torben P. Pedersen,  Zero-Knowledge Authentication Scheme with Secret Key Exchange, Journal of Cryptology, Volume 11(3), pp. 147 - 159, Springer, 1998.

[Cited 34 times ]

5. Ivan Damgard,  Lars R. Knudsen,  Two-Key Triple Encryption, Journal of Cryptology, Volume 11(3), pp. 209 - 218, Springer, 1998.

[Cited 42 times ]

6. Ivan Damgard,  Torben P. Pedersen,  Birgit Pfitzmann,  On the Existence of Statistically Hiding Bit Commitment Schemes and Fail-Stop Signatures, Journal of Cryptology, Volume 10(3), pp. 163 - 194, Springer, 1997.

[Cited 73 times Red Star]

7. Ivan Damgard,  Practical and Provably Secure Release of a Secret and Exchange of Signatures, Journal of Cryptology, Volume 8(4), pp. 201 - 222, Springer, 1995.

[Cited 103 times Red StarRed Star]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Ivan Damgard,  Carolin Lunemann,  Quantum-Secure Coin-Flipping and Applications, pp. 52 - 69, ASIACRYPT 2009.

[Electronic Edition][Cited 1 times ]

2. Ivan Damgard,  Serge Fehr,  Carolin Lunemann,  Louis Salvail,  Christian Schaffner,  Improving the Security of Quantum Protocols via Commit-and-Open, pp. 408 - 427, CRYPTO 2009.

[Electronic Edition][Cited 7 times ]

3. Ronald Cramer,  Ivan Damgard,  On the Amortized Complexity of Zero-Knowledge Protocols, pp. 177 - 191, CRYPTO 2009.

[Electronic Edition][Cited 5 times ]

4. Ivan Damgard,  Martin Geisler,  Mikkel Krøigaard,  Jesper Buus Nielsen,  Asynchronous Multiparty Computation: Theory and Implementation, pp. 160 - 179, PKC 2009.

[Electronic Edition][Cited 26 times ]

5. Ivan Damgard,  Gert LĂŚssøe Mikkelsen,  On the Theory and Practice of Personal Digital Signatures, pp. 277 - 296, PKC 2009.

[Electronic Edition][Cited 2 times ]

6. Ivan Damgard,  Jesper Buus Nielsen,  Daniel Wichs,  Universally Composable Multiparty Computation with Partially Isolated Parties, pp. 315 - 331, TCC 2009.

[Electronic Edition][Cited 9 times ]

7. Ivan Damgard,  Yuval Ishai,  Mikkel Krøigaard,  Jesper Buus Nielsen,  Adam Smith,  Scalable Multiparty Computation with Nearly Optimal Work and Resilience, pp. 241 - 261, CRYPTO 2008.

[Electronic Edition][Cited 6 times ]

8. Ivan Damgard,  Lars R. Knudsen,  Søren S. Thomsen,  Dakota- Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography, pp. 144 - 155, ACNS 2008.

[Electronic Edition][Cited 2 times ]

9. Ivan Damgard,  Jesper Buus Nielsen,  Daniel Wichs,  Isolated Proofs of Knowledge and Isolated Zero Knowledge, pp. 509 - 526, EUROCRYPT 2008.

[Electronic Edition][Cited 10 times ]

10. Ivan Damgard,  Dennis Hofheinz,  Eike Kiltz,  Rune Thorbek,  Public-Key Encryption with Non-interactive Opening, pp. 239 - 255, CT-RSA 2008.

[Electronic Edition][Cited 6 times ]

11. Ivan Damgard,  Michael Østergaard Pedersen,  RFID Security: Tradeoffs between Security and Efficiency, pp. 318 - 332, CT-RSA 2008.

[Electronic Edition][Cited 35 times ]

12. Ivan Damgard,  Serge Fehr,  Renato Renner,  Louis Salvail,  Christian Schaffner,  A Tight High-Order Entropic Quantum Uncertainty Relation with Applications, pp. 360 - 378, CRYPTO 2007.

[Electronic Edition][Cited 22 times ]

13. Ivan Damgard,  Serge Fehr,  Louis Salvail,  Christian Schaffner,  Secure Identification and QKD in the Bounded-Quantum-Storage Model, pp. 342 - 359, CRYPTO 2007.

[Electronic Edition][Cited 17 times ]

14. Ronald Cramer,  Ivan Damgard,  Robbert de Haan,  Atomic Secure Multi-party Multiplication with Low Communication, pp. 329 - 346, EUROCRYPT 2007.

[Electronic Edition][Cited 5 times ]

15. Ivan Damgard,  Rune Thorbek,  Non-interactive Proofs for Integer Multiplication, pp. 412 - 429, EUROCRYPT 2007.

[Electronic Edition][Cited 13 times ]

16. Ivan Damgard,  Yvo Desmedt,  Matthias Fitzi,  Jesper Buus Nielsen,  Secure Protocols with Asymmetric Trust, pp. 357 - 375, ASIACRYPT 2007.

[Electronic Edition][Cited 5 times ]

17. Ivan Damgard,  Jesper Buus Nielsen,  Scalable and Unconditionally Secure Multiparty Computation, pp. 572 - 590, CRYPTO 2007.

[Electronic Edition][Cited 19 times ]

18. JesĂşs F. Almansa,  Ivan Damgard,  Jesper Buus Nielsen,  Simplified Threshold RSA with Adaptive and Proactive Security, pp. 593 - 611, EUROCRYPT 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 9 times ]

19. Ivan Damgard,  Kasper Dupont,  Michael Østergaard Pedersen,  Unclonable Group Identification, pp. 555 - 572, EUROCRYPT 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 27 times ]

20. Ivan Damgard,  Rune Thorbek,  Linear Integer Secret Sharing and Distributed Exponentiation, pp. 75 - 90, PKC 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 8 times ]

21. Ivan Damgard,  Matthias Fitzi,  Eike Kiltz,  Jesper Buus Nielsen,  Tomas Toft,  Unconditionally Secure Constant-Rounds Multi-party Computation for Equality, Comparison, Bits and Exponentiation, pp. 285 - 304, TCC 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 85 times Red Star]

22. Ivan Damgard,  Nelly Fazio,  Antonio Nicolosi,  Non-interactive Zero-Knowledge from Homomorphic Encryption, pp. 41 - 59, TCC 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 23 times ]

23. Peter Bogetoft,  Ivan Damgard,  Thomas Jakobsen,  Kurt Nielsen,  Jakob Illeborg Pagter,  Tomas Toft,  A Practical Implementation of Secure Auctions Based on Multiparty Integer Computation, pp. 142 - 147, FC 2006.

[Electronic Edition][Cited 42 times ]

24. Ivan Damgard,  Yuval Ishai,  Scalable Secure Multiparty Computation, pp. 501 - 520, CRYPTO 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 15 times ]

25. Ivan Damgard,  Serge Fehr,  Louis Salvail,  Christian Schaffner,  Oblivious Transfer and Linear Functions, pp. 427 - 444, CRYPTO 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 10 times ]

26. Ivan Damgard,  Serge Fehr,  Louis Salvail,  Christian Schaffner,  Cryptography In the Bounded Quantum-Storage Model, pp. 449 - 458, FOCS 2005.

[Electronic Edition][Cited 50 times Red Star]

27. Ivan Damgard,  Thomas Brochmann Pedersen,  Louis Salvail,  A Quantum Cipher with Near Optimal Key-Recycling, pp. 494 - 510, CRYPTO 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 1 times ]

28. Ivan Damgard,  Yuval Ishai,  Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator, pp. 378 - 394, CRYPTO 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 44 times ]

29. Ronald Cramer,  Ivan Damgard,  Yuval Ishai,  Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation, pp. 342 - 362, TCC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 33 times ]

30. Ivan Damgard,  Kasper Dupont,  Efficient Threshold RSA Signatures with General Moduli and No Extra Assumptions, pp. 346 - 361, PKC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 18 times ]

31. Ivan Damgard,  Serge Fehr,  Louis Salvail,  Zero-Knowledge Proofs and String Commitments Withstanding Quantum Attacks, pp. 254 - 272, CRYPTO 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 16 times ]

32. Ivan Damgard,  Thomas Pedersen,  Louis Salvail,  On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-Way Quantum Transmission, pp. 91 - 108, EUROCRYPT 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 9 times ]

33. Ronald Cramer,  Ivan Damgard,  Secret-Key Zero-Knowlegde and Non-interactive Verifiable Exponentiation, pp. 223 - 237, TCC 2004.

[Electronic Edition][Cited 14 times ]

34. Ivan Damgard,  Serge Fehr,  Kirill Morozov,  Louis Salvail,  Unfair Noisy Channels and Oblivious Transfer, pp. 355 - 373, TCC 2004.

[Electronic Edition][Cited 29 times ]

35. Ivan Damgard,  Jesper Buus Nielsen,  Universally Composable Efficient Multiparty Computation from Threshold Homomorphic Encryption, pp. 247 - 264, CRYPTO 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 228 times Red StarRed Star]

36. Ivan Damgard,  Eiichiro Fujisaki,  A Statistically-Hiding Integer Commitment Scheme Based on Groups with Hidden Order, pp. 125 - 142, ASIACRYPT 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 177 times Red StarRed Star]

37. Ivan Damgard,  Jesper Buus Nielsen,  Expanding Pseudorandom Functions; or: From Known-Plaintext Security to Chosen-Plaintext Security, pp. 449 - 464, CRYPTO 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 16 times ]

38. Ivan Damgard,  Jesper Buus Nielsen,  Perfect Hiding and Perfect Binding Universally Composable Commitment Schemes with Constant Expansion Factor, pp. 581 - 596, CRYPTO 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 93 times Red Star]

39. Ivan Damgard,  Maciej Koprowski,  Generic Lower Bounds for Root Extraction and Signature Schemes in General Groups, pp. 256 - 271, EUROCRYPT 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 27 times ]

40. Ivan Damgard,  Mads Jurik,  Client/Server Tradeoffs for Online Elections, pp. 125 - 140, PKC 2002.

[Electronic Edition][Cited 33 times ]

41. Ronald Cramer,  Ivan Damgard,  Secure Distributed Linear Algebra in a Constant Number of Rounds, pp. 119 - 136, CRYPTO 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 46 times ]

42. Ronald Cramer,  Ivan Damgard,  Serge Fehr,  On the Cost of Reconstructing a Secret, or VSS with Optimal Reconstruction Phase, pp. 503 - 523, CRYPTO 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 14 times ]

43. Ivan Damgard,  Maciej Koprowski,  Practical Threshold RSA Signatures without a Trusted Dealer, pp. 152 - 165, EUROCRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 101 times Red StarRed Star]

44. Ronald Cramer,  Ivan Damgard,  Jesper Buus Nielsen,  Multiparty Computation from Threshold Homomorphic Encryption, pp. 280 - 299, EUROCRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 236 times Red StarRed Star]

45. Ran Canetti,  Ivan Damgard,  Stefan Dziembowski,  Yuval Ishai,  Tal Malkin,  On Adaptive vs. Non-adaptive Security of Multiparty Protocols, pp. 262 - 279, EUROCRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 17 times ]

46. Ivan Damgard,  Mads Jurik,  A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System, pp. 119 - 136, PKC 2001.

[Electronic Edition][Cited 2 times ]

47. Jan Camenisch,  Ivan Damgard,  Verifiable Encryption, Group Encryption, and Their Applications to Separable Group Signatures and Signature Sharing Schemes, pp. 331 - 345, ASIACRYPT 2000.

[Electronic Edition][Cited 118 times Red StarRed Star]

48. Ivan Damgard,  Jesper Buus Nielsen,  Improved Non-committing Encryption Schemes Based on a General Complexity Assumption, pp. 432 - 450, CRYPTO 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 54 times Red Star]

49. Ronald Cramer,  Ivan Damgard,  Ueli M. Maurer,  General Secure Multi-party Computation from any Linear Secret-Sharing Scheme, pp. 316 - 334, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 190 times Red StarRed Star]

50. Ivan Damgard,  Efficient Concurrent Zero-Knowledge in the Auxiliary String Model, pp. 418 - 430, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 178 times Red StarRed Star]

51. Ronald Cramer,  Ivan Damgard,  Philip D. MacKenzie,  Efficient Zero-Knowledge Proofs of Knowledge Without Intractability Assumptions, pp. 354 - 372, PKC 2000.

[Electronic Edition][Cited 57 times Red Star]

52. Ronald Cramer,  Ivan Damgard,  Stefan Dziembowski,  Martin Hirt,  Tal Rabin,  Efficient Multiparty Computations Secure Against an Adaptive Adversary, pp. 311 - 326, EUROCRYPT 1999.

[Electronic Edition][Cited 108 times Red StarRed Star]

53. Ivan Damgard,  Joe Kilian,  Louis Salvail,  On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions, pp. 56 - 73, EUROCRYPT 1999.

[Electronic Edition][Cited 69 times Red Star]

54. Ronald Cramer,  Ivan Damgard,  Zero-Knowledge Proofs for Finite Field Arithmetic; or: Can Zero-Knowledge be for Free?, pp. 424 - 441, CRYPTO 1998.

[Electronic Edition][Cited 76 times Red Star]

55. Ronald Cramer,  Ivan Damgard,  Fast and Secure Immunization Against Adaptive Man-in-the-Middle Impersonation, pp. 75 - 87, EUROCRYPT 1997.

[Electronic Edition][Cited 10 times ]

56. Ronald Cramer,  Ivan Damgard,  New Generation of Secure and Practical RSA-Based Signatures, pp. 173 - 185, CRYPTO 1996.

[Electronic Edition][Cited 65 times Red Star]

57. Ivan Damgard,  Torben P. Pedersen,  New Convertible Undeniable Signature Schemes, pp. 372 - 386, EUROCRYPT 1996.

[Electronic Edition][Cited 71 times Red Star]

58. Ronald Cramer,  Ivan Damgard,  Secure Signature Schemes based on Interactive Protocols, pp. 297 - 310, CRYPTO 1995.

[Electronic Edition][Cited 36 times ]

59. Ivan Damgard,  Oded Goldreich,  Tatsuaki Okamoto,  Avi Wigderson,  Honest Verifier vs Dishonest Verifier in Public Coin Zero-Knowledge Proofs, pp. 325 - 338, CRYPTO 1995.

[Electronic Edition][Cited 30 times ]

60. Ronald Cramer,  Ivan Damgard,  Berry Schoenmakers,  Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols, pp. 174 - 187, CRYPTO 1994.

[Electronic Edition][Cited 615 times Red StarRed StarRed StarRed Star]

61. Lidong Chen,  Ivan Damgard,  Torben P. Pedersen,  Parallel Divertibility of Proofs of Knowledge (Extended Abstract), pp. 140 - 155, EUROCRYPT 1994.

[Electronic Edition][Cited 11 times ]

62. Ivan Damgard,  Interactive Hashing can Simplify Zero-Knowledge Protocol Design Without Computational Assumptions (Extended Abstract), pp. 100 - 109, CRYPTO 1993.

[Electronic Edition][No citation]

63. Ivan Damgard,  Torben P. Pedersen,  Birgit Pfitzmann,  On the Existence of Statistically Hiding Bit Commitment Schemes and Fail-Stop Signatures, pp. 250 - 265, CRYPTO 1993.

[Electronic Edition][Cited 70 times Red Star]

64. Ivan Damgard,  Lars R. Knudsen,  The Breaking of the AR Hash Function, pp. 286 - 292, EUROCRYPT 1993.

[Electronic Edition][Cited 9 times ]

65. Ivan Damgard,  Practical and Provably Secure Release of a Secret and Exchange of Signatures, pp. 200 - 217, EUROCRYPT 1993.

[Electronic Edition][Cited 73 times Red Star]

66. Lidong Chen,  Ivan Damgard,  Security Bounds for Parallel Versions of Identification Protocols (Extended Abstract), pp. 461 - 466, EUROCRYPT 1992.

[Electronic Edition][Cited 6 times ]

67. Ivan Damgard,  Non-Interactive Circuit Based Proofs and Non-Interactive Perfect Zero-knowledge with Proprocessing, pp. 341 - 355, EUROCRYPT 1992.

[Electronic Edition][Cited 29 times ]

68. Jørgen Brandt,  Ivan Damgard,  On Generation of Probable Primes By Incremental Search, pp. 358 - 370, CRYPTO 1992.

[Electronic Edition][Cited 21 times ]

69. Jørgen Brandt,  Ivan Damgard,  Peter Landrock,  Speeding up Prime Number Generation, pp. 440 - 449, ASIACRYPT 1991.

[Electronic Edition][Cited 15 times ]

70. Ivan Damgard,  Towards Practical Public Key Systems Secure Against Chosen Ciphertext Attacks, pp. 445 - 456, CRYPTO 1991.

[Electronic Edition][Cited 117 times Red StarRed Star]

71. Joan Boyar,  David Chaum,  Ivan Damgard,  Torben P. Pedersen,  Convertible Undeniable Signatures, pp. 189 - 205, CRYPTO 1990.

[Electronic Edition][Cited 175 times Red StarRed Star]

72. Ivan Damgard,  On the Existence of Bit Commitment Schemes and Zero-Knowledge Proofs, pp. 17 - 27, CRYPTO 1989.

[Electronic Edition][Cited 41 times ]

73. Ivan Damgard,  A Design Principle for Hash Functions, pp. 416 - 427, CRYPTO 1989.

[Electronic Edition][Cited 669 times Red StarRed StarRed StarRed Star]

74. Ivan Damgard,  Payment Systems and Credential Mechanisms with Provable Security Against Abuse by Individuals, pp. 328 - 335, CRYPTO 1988.

[Electronic Edition][Cited 101 times Red StarRed Star]

75. Jørgen Brandt,  Ivan Damgard,  Peter Landrock,  Torben P. Pedersen,  Zero-Knowledge Authentication Scheme with Secret Key Exchange (Extended Abstract), pp. 583 - 588, CRYPTO 1988.

[Electronic Edition][No citation]

76. Gilles Brassard,  Ivan Damgard,  "Practical IP" <= MA, pp. 580 - 582, CRYPTO 1988.

[Electronic Edition][Cited 2 times ]

77. Ivan Damgard,  On the Randomness of Legendre and Jacobi Sequences, pp. 163 - 172, CRYPTO 1988.

[Electronic Edition][Cited 40 times ]

78. Jørgen Brandt,  Ivan Damgard,  Peter Landrock,  Anonymous and Verifiable Registration in Databases, pp. 167 - 176, EUROCRYPT 1988.

[Electronic Edition][Cited 8 times ]

79. David Chaum,  Claude CrĂŠpeau,  Ivan Damgard,  Multiparty Unconditionally Secure Protocols (Abstract), pp. 462 - 462, CRYPTO 1987.

[Electronic Edition][No citation]

80. Ernest F. Brickell,  David Chaum,  Ivan Damgard,  Jeroen van de Graaf,  Gradual and Verifiable Release of a Secret, pp. 156 - 166, CRYPTO 1987.

[Electronic Edition][Cited 104 times Red StarRed Star]

81. David Chaum,  Ivan Damgard,  Jeroen van de Graaf,  Multiparty Computations Ensuring Privacy of Each Party's Input and Correctness of the Result, pp. 87 - 119, CRYPTO 1987.

[Electronic Edition][Cited 161 times Red StarRed Star]

82. Ivan Damgard,  Collision Free Hash Functions and Public Key Signature Schemes, pp. 203 - 216, EUROCRYPT 1987.

[Electronic Edition][Cited 229 times Red StarRed Star]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...