Ivan Damgård
Orcid: 0009-0003-6164-0896Affiliations:
- Aarhus University
According to our database1,
Ivan Damgård
authored at least 255 papers
between 1987 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on id.loc.gov
-
on daimi.au.dk
On csauthors.net:
Bibliography
2025
IACR Cryptol. ePrint Arch., 2025
IACR Cryptol. ePrint Arch., 2025
IACR Cryptol. ePrint Arch., 2025
Asynchronous Algorand: Reaching Agreement with Near Linear Communication and Constant Expected Time.
IACR Cryptol. ePrint Arch., 2025
2024
IACR Cryptol. ePrint Arch., 2024
CoRR, 2024
Proceedings of the ACM on Web Conference 2024, 2024
Efficient Secure Communication over Dynamic Incomplete Networks with Minimal Connectivity.
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024
Proceedings of the Security and Cryptography for Networks - 14th International Conference, 2024
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024
2023
Proceedings of the Theory of Cryptography - 21st International Conference, 2023
Proceedings of the Progress in Cryptology - LATINCRYPT 2023, 2023
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023
Proceedings of the 4th Conference on Information-Theoretic Cryptography, 2023
Proceedings of the 4th Conference on Information-Theoretic Cryptography, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the Theory of Cryptography - 20th International Conference, 2022
Proceedings of the Security and Cryptography for Networks - 13th International Conference, 2022
An Algebraic Framework for Silent Preprocessing with Trustless Setup and Active Security.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022
2021
Proceedings of the Theory of Cryptography - 19th International Conference, 2021
Proceedings of the Public-Key Cryptography - PKC 2021, 2021
Proceedings of the Topics in Cryptology - CT-RSA 2021, 2021
Proceedings of the Topics in Cryptology - CT-RSA 2021, 2021
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021
Proceedings of the 2nd Conference on Information-Theoretic Cryptography, 2021
Proceedings of the 2nd Conference on Information-Theoretic Cryptography, 2021
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021
2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Asymptotically Good Multiplicative LSSS over Galois Rings and Applications to MPC over Z/p^k Z.
IACR Cryptol. ePrint Arch., 2020
Proceedings of the Theory of Cryptography - 18th International Conference, 2020
Proceedings of the Security and Cryptography for Networks - 12th International Conference, 2020
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020
Asymptotically Good Multiplicative LSSS over Galois Rings and Applications to MPC over $\mathbb {Z}/p^k\mathbb {Z} $.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020
2019
IACR Cryptol. ePrint Arch., 2019
Efficient Information-Theoretic Secure Multiparty Computation over Z/p<sup>k</sup>Z via Galois Rings.
Proceedings of the Theory of Cryptography - 17th International Conference, 2019
New Primitives for Actively-Secure MPC over Rings with Applications to Private Machine Learning.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Proceedings of the Cryptography and Coding - 17th IMA International Conference, 2019
Communication Lower Bounds for Statistically Secure MPC, With or Without Preprocessing.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019
Stronger Leakage-Resilient and Non-Malleable Secret Sharing Schemes for General Access Structures.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019
2018
Continuous NMC Secure Against Permutations and Overwrites, with Applications to CCA Secure Commitments.
Proceedings of the Theory of Cryptography - 16th International Conference, 2018
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018
Proceedings of the Public-Key Cryptography - PKC 2018, 2018
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018
SPDℤ<sub>2<sup>k</sup></sub>: Efficient MPC mod 2<sup>k</sup> for Dishonest Majority.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018
2017
Proceedings of the Theory of Cryptography - 15th International Conference, 2017
Proceedings of the Information Theoretic Security - 10th International Conference, 2017
Amortized Complexity of Zero-Knowledge Proofs Revisited: Achieving Linear Soundness Slack.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017
The TinyTable Protocol for 2-Party Secure Computation, or: Gate-Scrambling Revisited.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017
2016
Gate-scrambling Revisited - or: The TinyTable protocol for 2-Party Secure Computation.
IACR Cryptol. ePrint Arch., 2016
Amortized Complexity of Zero-Knowledge Proofs Revisited: Achieving Linear Soundness Slack.
IACR Cryptol. ePrint Arch., 2016
Oblivious Transfer from Any Non-Trivial Elastic Noisy Channels via Secret Key Agreement.
IACR Cryptol. ePrint Arch., 2016
Efficient Commitments and Zero-Knowledge Protocols from Ring-SIS with Applications to Lattice-based Threshold Cryptosystems.
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Theory of Cryptography - 14th International Conference, 2016
Oblivious Transfer from Any Non-trivial Elastic Noisy Channel via Secret Key Agreement.
Proceedings of the Theory of Cryptography - 14th International Conference, 2016
Proceedings of the Public-Key Cryptography - PKC 2016, 2016
Proceedings of the Public-Key Cryptography - PKC 2016, 2016
Proceedings of the Financial Cryptography and Data Security, 2016
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016
Proceedings of the Progress in Cryptology - AFRICACRYPT 2016, 2016
Proceedings of the Progress in Cryptology - AFRICACRYPT 2016, 2016
Proceedings of the Applied Cryptography and Network Security, 2016
2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015
Proceedings of the Information Theoretic Security - 8th International Conference, 2015
On the Orthogonal Vector Problem and the Feasibility of Unconditionally Secure Leakage-Resilient Computation.
Proceedings of the Information Theoretic Security - 8th International Conference, 2015
Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015
Proceedings of the Topics in Cryptology, 2015
Proceedings of the 3rd International Workshop on Security in Cloud Computing, 2015
Cambridge University Press, ISBN: 9781107043053, 2015
2014
Nat. Comput., 2014
IACR Cryptol. ePrint Arch., 2014
An Efficient Pseudo-Random Generator with Applications to Public-Key Encryption and Constant-Round Multiparty Computation.
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
An Empirical Study and Some Improvements of the MiniMac Protocol for Secure Computation.
Proceedings of the Security and Cryptography for Networks - 9th International Conference, 2014
Proceedings of the Security and Cryptography for Networks - 9th International Conference, 2014
Proceedings of the Provable Security - 8th International Conference, 2014
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014
Universally Composable Symbolic Analysis for Two-Party Protocols Based on Homomorphic Encryption.
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014
2013
Electron. Colloquium Comput. Complex., 2013
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013
Proceedings of the Cryptography and Coding - 14th IMA International Conference, 2013
Proceedings of the Information Theoretic Security - 7th International Conference, 2013
Proceedings of the Computer Security - ESORICS 2013, 2013
Efficient Multiparty Protocols via Log-Depth Threshold Formulae - (Extended Abstract).
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013
Unconditionally Secure and Universally Composable Commitments from Physical Assumptions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013
2012
Constant-Overhead Secure Computation for Boolean Circuits in the Preprocessing Model.
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012
Proceedings of the Public Key Cryptography - PKC 2012, 2012
On the Amortized Complexity of Zero Knowledge Protocols for Multiplicative Relations.
Proceedings of the Information Theoretic Security - 6th International Conference, 2012
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012
2011
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011
Proceedings of the Information Theoretic Security - 5th International Conference, 2011
Proceedings of the Advances in Cryptology - EUROCRYPT 2011, 2011
2010
A generalization of Paillier's public-key system with applications to electronic voting.
Int. J. Inf. Sec., 2010
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010
Perfectly Secure Multiparty Computation and the Computational Overhead of Cryptography.
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010
Multiparty Computation for Dishonest Majority: From Passive to Active Security at Low Cost.
Proceedings of the Advances in Cryptology, 2010
2009
Int. J. Appl. Cryptogr., 2009
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009
Proceedings of the Public Key Cryptography, 2009
Proceedings of the Public Key Cryptography, 2009
Proceedings of the ISSE 2009, 2009
Proceedings of the Financial Cryptography and Data Security, 2009
Proceedings of the Advances in Cryptology, 2009
Proceedings of the Advances in Cryptology, 2009
Proceedings of the Advances in Cryptology, 2009
2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
ERCIM News, 2008
Proceedings of the Information Security and Cryptology, 2008
Proceedings of the Advances in Cryptology, 2008
Proceedings of the Topics in Cryptology, 2008
Proceedings of the Topics in Cryptology, 2008
Proceedings of the Advances in Cryptology, 2008
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008
2007
Proceedings of the Automata, Languages and Programming, 34th International Colloquium, 2007
Proceedings of the Advances in Cryptology, 2007
Proceedings of the Advances in Cryptology, 2007
Proceedings of the Advances in Cryptology, 2007
Proceedings of the Advances in Cryptology, 2007
Proceedings of the Advances in Cryptology, 2007
Proceedings of the Advances in Cryptology, 2007
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007
2006
An Extended Quadratic Frobenius Primality Test with Average- and Worst-Case Error Estimate.
J. Cryptol., 2006
Proceedings of the Theory of Cryptography, Third Theory of Cryptography Conference, 2006
Unconditionally Secure Constant-Rounds Multi-party Computation for Equality, Comparison, Bits and Exponentiation.
Proceedings of the Theory of Cryptography, Third Theory of Cryptography Conference, 2006
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006
Proceedings of the Public Key Cryptography, 2006
A Practical Implementation of Secure Auctions Based on Multiparty Integer Computation.
Proceedings of the Financial Cryptography and Data Security, 2006
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006
Proceedings of the Advances in Cryptology, 2006
Proceedings of the Advances in Cryptology, 2006
2005
IACR Cryptol. ePrint Arch., 2005
Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation.
Proceedings of the Theory of Cryptography, Second Theory of Cryptography Conference, 2005
Proceedings of the Public Key Cryptography, 2005
Proceedings of the IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 2005
Proceedings of the Advances in Cryptology, 2005
Proceedings of the Advances in Cryptology, 2005
Contemporary cryptology.
Advanced courses in mathematics : CRM Barcelona, Birkhäuser, ISBN: 978-3-7643-7294-1, 2005
2004
Proceedings of the Theory of Cryptography, First Theory of Cryptography Conference, 2004
Proceedings of the Theory of Cryptography, First Theory of Cryptography Conference, 2004
On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-Way Quantum Transmission.
Proceedings of the Advances in Cryptology, 2004
Proceedings of the Advances in Cryptology, 2004
2003
Proceedings of the Secure Electronic Voting, 2003
Proceedings of the 35th Annual ACM Symposium on Theory of Computing, 2003
An Extended Quadratic Frobenius Primality Test with Average and Worst Case Error Estimates.
Proceedings of the Fundamentals of Computation Theory, 14th International Symposium, 2003
Efficient Algorithms for GCD and Cubic Residuosity in the Ring of Eisenstein Integers.
Proceedings of the Fundamentals of Computation Theory, 14th International Symposium, 2003
Universally Composable Efficient Multiparty Computation from Threshold Homomorphic Encryption.
Proceedings of the Advances in Cryptology, 2003
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003
2002
Proceedings of the Public Key Cryptography, 2002
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002
Perfect Hiding and Perfect Binding Universally Composable Commitment Schemes with Constant Expansion Factor.
Proceedings of the Advances in Cryptology, 2002
Expanding Pseudorandom Functions; or: From Known-Plaintext Security to Chosen-Plaintext Security.
Proceedings of the Advances in Cryptology, 2002
Proceedings of the Advances in Cryptology, 2002
2001
IACR Cryptol. ePrint Arch., 2001
IACR Cryptol. ePrint Arch., 2001
A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System.
Proceedings of the Public Key Cryptography, 2001
Proceedings of the Advances in Cryptology, 2001
Proceedings of the Advances in Cryptology, 2001
Proceedings of the Advances in Cryptology, 2001
Proceedings of the Advances in Cryptology, 2001
Proceedings of the Advances in Cryptology, 2001
2000
Efficient Protocols based on Probabilistic Encryption using Composite Degree Residue Classes.
IACR Cryptol. ePrint Arch., 2000
IACR Cryptol. ePrint Arch., 2000
Proceedings of the Thirty-Second Annual ACM Symposium on Theory of Computing, 2000
Proceedings of the Public Key Cryptography, 2000
Proceedings of the Advances in Cryptology, 2000
Proceedings of the Advances in Cryptology, 2000
Proceedings of the Advances in Cryptology, 2000
Verifiable Encryption, Group Encryption, and Their Applications to Separable Group Signatures and Signature Sharing Schemes.
Proceedings of the Advances in Cryptology, 2000
1999
IACR Cryptol. ePrint Arch., 1999
IACR Cryptol. ePrint Arch., 1999
On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions.
Proceedings of the Advances in Cryptology, 1999
Proceedings of the Advances in Cryptology, 1999
1998
Sequential Iteration of Interactive Arguments and an Efficient Zero-Knowledge Argument for NP.
Proceedings of the Automata, Languages and Programming, 25th International Colloquium, 1998
Zero-Knowledge Proofs for Finite Field Arithmetic; or: Can Zero-Knowledge be for Free?
Proceedings of the Advances in Cryptology, 1998
Proceedings of the Lectures on Data Security, 1998
1997
Proceedings of the Twenty-Ninth Annual ACM Symposium on the Theory of Computing, 1997
Proceedings of the Advances in Cryptology, 1997
1996
IACR Cryptol. ePrint Arch., 1996
Proceedings of the Security Protocols, 1996
Proceedings of the Advances in Cryptology, 1996
Proceedings of the Advances in Cryptology, 1996
1995
Proceedings of the Advances in Cryptology, 1995
Proceedings of the Advances in Cryptology, 1995
Proceedings of the Cryptography: Policy and Algorithms, 1995
1994
Proceedings of the Advances in Cryptology, 1994
Proceedings of the Advances in Cryptology, 1994
1993
Proceedings of the Advances in Cryptology, 1993
Proceedings of the Advances in Cryptology, 1993
On the Existence of Statistically Hiding Bit Commitment Schemes and Fail-Stop Signatures.
Proceedings of the Advances in Cryptology, 1993
Interactive Hashing can Simplify Zero-Knowledge Protocol Design Without Computational Assumptions (Extended Abstract).
Proceedings of the Advances in Cryptology, 1993
1992
Non-Interactive Circuit Based Proofs and Non-Interactive Perfect Zero-knowledge with Proprocessing.
Proceedings of the Advances in Cryptology, 1992
Security Bounds for Parallel Versions of Identification Protocols (Extended Abstract).
Proceedings of the Advances in Cryptology, 1992
Proceedings of the Advances in Cryptology, 1992
1991
Proceedings of the Advances in Cryptology, 1991
1990
1989
Proceedings of the Advances in Cryptology, 1989
Proceedings of the Advances in Cryptology, 1989
1988
Proceedings of the 20th Annual ACM Symposium on Theory of Computing, 1988
Proceedings of the Advances in Cryptology, 1988
Payment Systems and Credential Mechanisms with Provable Security Against Abuse by Individuals.
Proceedings of the Advances in Cryptology, 1988
Proceedings of the Advances in Cryptology, 1988
Proceedings of the Advances in Cryptology, 1988
1987
Proceedings of the Advances in Cryptology, 1987
Multiparty Computations Ensuring Privacy of Each Party's Input and Correctness of the Result.
Proceedings of the Advances in Cryptology, 1987
Proceedings of the Advances in Cryptology, 1987
Proceedings of the Advances in Cryptology, 1987