Damgård, Ivan B.
-
BRICS Report Series No. 20 (2005): RS-20 Cryptography in the Bounded Quantum Storage Model - Articles
Cryptography in the Bounded Quantum Storage Model
Abstract PDF -
BRICS Report Series No. 8 (2003): RS-8 Efficient Algorithms for gcd and Cubic Residuosity in the Ring of Eisenstein Integers - Articles
Efficient Algorithms for gcd and Cubic Residuosity in the Ring of Eisenstein Integers
Abstract PDF -
BRICS Report Series No. 9 (2003): RS-9 An Extended Quadratic Frobenius Primality Test with Average and Worst Case Error Estimates - Articles
An Extended Quadratic Frobenius Primality Test with Average and Worst Case Error Estimates
Abstract PDF -
BRICS Report Series No. 16 (2003): RS-16 A Length-Flexible Threshold Cryptosystem with Applications - Articles
A Length-Flexible Threshold Cryptosystem with Applications
Abstract PDF -
BRICS Report Series No. 22 (2003): RS-22 Scalable Key-Escrow - Articles
Scalable Key-Escrow
Abstract PDF -
BRICS Report Series No. 36 (2003): RS-36 Unfair Noisy Channels and Oblivious Transfer - Articles
Unfair Noisy Channels and Oblivious Transfer
Abstract PDF -
BRICS Report Series No. 9 (2004): RS-9 Zero-Knowledge Proofs and String Commitments Withstanding Quantum Attacks - Articles
Zero-Knowledge Proofs and String Commitments Withstanding Quantum Attacks
Abstract PDF -
BRICS Report Series No. 17 (2005): RS-17 A Quantum Cipher with Near Optimal Key-Recycling - Articles
A Quantum Cipher with Near Optimal Key-Recycling
Abstract PDF -
BRICS Report Series No. 50 (1997): RS-50 Sequential Iteration of Interactive Arguments and an Efficient Zero-Knowledge Argument for NP - Articles
Sequential Iteration of Interactive Arguments and an Efficient Zero-Knowledge Argument for NP
Abstract PDF -
BRICS Report Series No. 37 (1998): RS-37 On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions - Articles
On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions
Abstract PDF -
BRICS Report Series No. 7 (1996): RS-7 Linear Zero-Knowledgde - A Note on Efficient Zero-Knowledge Proofs and Arguments - Articles
Linear Zero-Knowledgde. A Note on Efficient Zero-Knowledge Proofs and Arguments
Abstract PDF -
BRICS Report Series No. 45 (1996): RS-45 Statistical Secrecy and MultiBit Commitments - Articles
Statistical Secrecy and Multi-Bit Commitments
Abstract PDF -
BRICS Report Series No. 2 (1999): RS-2 An Error in the Mixed Adversary Protocol by Fitzi, Hirt and Maurer - Articles
An Error in the Mixed Adversary Protocol by Fitzi, Hirt and Maurer
Abstract PDF -
BRICS Report Series No. 30 (2000): RS-30 Practical Threshold RSA Signatures Without a Trusted Dealer - Articles
Practical Threshold RSA Signatures Without a Trusted Dealer
Abstract PDF -
BRICS Report Series No. 5 (2000): RS-5 Efficient Protocols based on Probabilistic Encryption using Composite Degree Residue Classes - Articles
Efficient Protocols based on Probabilistic Encryption using Composite Degree Residue Classes
Abstract PDF -
BRICS Report Series No. 6 (2000): RS-6 Improved Non-Committing Encryption Schemes based on a General Complexity Assumption - Articles
Improved Non-Committing Encryption Schemes based on a General Complexity Assumption
Abstract PDF -
BRICS Report Series No. 45 (2000): RS-45 A Generalisation, a Simplification and some Applications of Paillier’s Probabilistic Public-Key System - Articles
A Generalisation, a Simplification and some Applications of Paillier’s Probabilistic Public-Key System
Abstract PDF -
BRICS Report Series No. 39 (1994): 94-39 Hashing Functions can Simplify Zero-Knowledge Protocol Design (too) - Articles
Hashing Functions can Simplify Zero-Knowledge Protocol Design (too)
Abstract PDF -
BRICS Report Series No. 38 (1994): RS-38 Enhancing the Strength of Conventional Cryptosystems - Articles
Enhancing the Strength of Conventional Cryptosystems
Abstract PDF -
BRICS Report Series No. 41 (2001): RS-41 Perfect Hiding and Perfect Binding Universally Composable Commitment Schemes with Constant Expansion Factor - Articles
Perfect Hiding and Perfect Binding Universally Composable Commitment Schemes with Constant Expansion Factor
Abstract PDF -
BRICS Report Series No. 43 (2001): RS-43 From Known-Plaintext Security to Chosen-Plaintext Security - Articles
From Known-Plaintext Security to Chosen-Plaintext Security
Abstract PDF -
BRICS Report Series No. 45 (2001): RS-45 An Extended Quadratic Frobenius Primality Test with Average Case Error Estimates - Articles
An Extended Quadratic Frobenius Primality Test with Average Case Error Estimates
Abstract PDF -
BRICS Report Series No. 27 (1997): RS-27 Zero-Knowledge Proofs for Finite Field Arithmetic or: Can Zero-Knowledge be for Free? - Articles
Zero-Knowledge Proofs for Finite Field Arithmetic or: Can Zero-Knowledge be for Free?
Abstract PDF -
BRICS Report Series No. 28 (1997): RS-28 Span Programs and General Secure Multi-Party Computation - Articles
Span Programs and General Secure Multi-Party Computation
Abstract PDF -
BRICS Report Series No. 14 (2000): RS-14 Multiparty Computation from Threshold Homomorphic Encryption - Articles
Multiparty Computation from Threshold Homomorphic Encryption
Abstract PDF -
BRICS Report Series No. 36 (1998): RS-36 Efficient Multiparty Computations with Dishonest Minority - Articles
Efficient Multiparty Computations with Dishonest Minority
Abstract PDF -
BRICS Report Series No. 32 (1998): RS-32 Verifiable Encryption and Applications to Group Signatures and Signature Sharing - Articles
Verifiable Encryption and Applications to Group Signatures and Signature Sharing
Abstract PDF -
BRICS Report Series No. 18 (2005): RS-18 Secure Computing, Economy, and Trust: A Generic Solution for Secure Auctions with Real-World Applications - Articles
Secure Computing, Economy, and Trust: A Generic Solution for Secure Auctions with Real-World Applications
Abstract PDF -
BRICS Report Series No. 29 (1994): RS-29 Secure Signature Schemes Based on Interactive Protocols - Articles
Secure Signature Schemes Based on Interactive Protocols
Abstract PDF