Follow
Ivan Damgård
Ivan Damgård
Professor of Computer Science, Aarhus University
Verified email at cs.au.dk
Title
Cited by
Cited by
Year
Multiparty unconditionally secure protocols
D Chaum, C Crépeau, I Damgard
Proceedings of the twentieth annual ACM symposium on Theory of computing, 11-19, 1988
21971988
A design principle for hash functions
I Damgård
Crypto 89, 416-427, 1990
16641990
Proofs of partial knowledge and simplified design of witness hiding protocols
R Cramer, I Damgård, B Schoenmakers
Advances in Cryptology—CRYPTO’94: 14th Annual International Cryptology …, 2001
14452001
A generalisation, a simplification and some applications of Paillier's probabilistic public-key system
I Damgård, M Jurik
Public Key Cryptography: 4th International Workshop on Practice and Theory …, 2001
14092001
Multiparty computation from somewhat homomorphic encryption
I Damgård, V Pastro, N Smart, S Zakarias
Advances in Cryptology–CRYPTO 2012: 32nd Annual Cryptology Conference, Santa …, 2012
12902012
Multiparty computation from threshold homomorphic encryption
R Cramer, I Damgård, JB Nielsen
Advances in Cryptology—EUROCRYPT 2001: International Conference on the …, 2001
7512001
General secure multi-party computation from any linear secret-sharing scheme
R Cramer, I Damgård, U Maurer
Advances in Cryptology—EUROCRYPT 2000: International Conference on the …, 2000
6792000
Secure multiparty computation goes live
P Bogetoft, DL Christensen, I Damgård, M Geisler, T Jakobsen, ...
Financial Cryptography and Data Security: 13th International Conference, FC …, 2009
6612009
Secure multiparty computation
R Cramer, IB Damgård
Cambridge University Press, 2015
5992015
Practical covertly secure MPC for dishonest majority–or: breaking the SPDZ limits
I Damgård, M Keller, E Larraia, V Pastro, P Scholl, NP Smart
Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013
5192013
Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation
I Damgård, M Fitzi, E Kiltz, JB Nielsen, T Toft
Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006 …, 2006
5132006
Collision free hash functions and public key signature schemes
IB Damgård
Advances in Cryptology—EUROCRYPT’87: Workshop on the Theory and Application …, 2000
4752000
Towards practical public key systems secure against chosen ciphertext attacks
I Damgård
Advances in Cryptology—CRYPTO’91: Proceedings 11, 445-456, 1992
4491992
Homomorphic encryption and secure comparison
I Damgard, M Geisler, M Kroigard
International Journal of Applied Cryptography 1 (1), 22-31, 2008
446*2008
Efficient concurrent zero-knowledge in the auxiliary string model
I Damgård
Advances in Cryptology—EUROCRYPT 2000: International Conference on the …, 2000
3912000
Semi-homomorphic encryption and multiparty computation
R Bendlin, I Damgård, C Orlandi, S Zakarias
Advances in Cryptology–EUROCRYPT 2011: 30th Annual International Conference …, 2011
3902011
A statistically-hiding integer commitment scheme based on groups with hidden order
I Damgård, E Fujisaki
Advances in Cryptology—ASIACRYPT 2002: 8th International Conference on the …, 2002
3862002
Multiparty computations ensuring privacy of each party’s input and correctness of the result
D Chaum, IB Damgård, J Van de Graaf
Advances in Cryptology—CRYPTO’87: Proceedings 7, 87-119, 1988
3551988
Asynchronous multiparty computation: Theory and implementation
I Damgård, M Geisler, M Krøigaard, JB Nielsen
Public Key Cryptography–PKC 2009: 12th International Conference on Practice …, 2009
3112009
Convertible undeniable signatures
J Boyar, D Chaum, I Damgård, T Pedersen
Advances in Cryptology-CRYPTO’90: Proceedings 10, 189-205, 1991
2911991
The system can't perform the operation now. Try again later.
Articles 1–20