Damgård, I. B., Keller, M., Keller, E., Miles, C. & Smart, N. P. (2012).
Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocol.
Lecture Notes in Computer Science,
7485, 241-263.
https://doi.org/10.1007/978-3-642-32928-9_14
Damgård, I. B., Keller, M., Larraia , E.
, Pastro, V., Scholl, P. & Smart, N. P. (2013).
Practical Covertly Secure MPC for Dishonest Majority – or: Breaking the SPDZ Limits. I J. Crampton , S. Jajodia & K. Mayes (red.),
Computer Security – ESORICS 2013: 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings (s. 1-18 ). Springer VS.
https://doi.org/10.1007/978-3-642-40203-6_1
Damgård, I. B., Faust, S., Mukherjee, P. & Venturi, D. (2013).
Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier. I K. Sako & P. Sarkar (red.),
Advances in Cryptology - ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II (s. 140-160 ). Springer VS.
https://doi.org/10.1007/978-3-642-42045-0_8
Damgård, I. B., Funder, J., Nielsen, J. B. & Salvail, L. (2014).
Superposition attacks on cryptographic protocols. I C. Padró (red.),
Information Theoretic Security: 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings (s. 142-161). Springer.
https://doi.org/10.1007/978-3-319-04268-8_9
Damgård, I. B., Lauritsen, R. & Toft, T. (2014).
An Empirical Study and some Improvements of the MiniMac Protocol for Secure Computation. I M. Abdalla & R. D. Prisco (red.),
Security and Cryptography for Networks: 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings (s. 398-415 ). Springer.
https://doi.org/10.1007/978-3-319-10879-7_23
Damgård, I. B., David, B. M., Giacomelli, I. & Nielsen, J. B. (2014).
Compact VSS and Efficient Homomorphic UC Commitments. I P. Sarkar & T. Iwata (red.),
Advances in Cryptology – ASIACRYPT 2014: 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part II (s. 213-232 ). Springer VS.
https://doi.org/10.1007/978-3-662-45608-8_12
Damgård, I. B. & Nielsen, J. B. (2014).
Adaptive versus static security in the UC Model. I S. S. M. Chow , J. K. Liu, L. C. K. Hui & S. M. Yiu (red.),
Provable Security: 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings (s. 10-28). Springer VS.
https://doi.org/10.1007/978-3-319-12475-9_2
Damgård, I. B., Faust, S., Mukherjee, P. & Venturi, D. (2015).
The Chaining Lemma and its application. I A. Lehmann & S. Wolf (red.),
Information Theoretic Security: 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings (s. 181-196). Springer VS.
https://doi.org/10.1007/978-3-319-17470-9_11
Damgård, I., Damgård, K., Nielsen, K.
, Nordholt, P. S. & Toft, T. (2017).
Confidential benchmarking based on multiparty computation. I J. Grossklags & B. Preneel (red.),
Financial Cryptography and Data Security - 20th International Conference, FC 2016, Revised Selected Papers (Bind 9603 LNCS, s. 169-187). Springer VS.
https://doi.org/10.1007/978-3-662-54970-4_10
Damgård, I., Nielsen, J. B., Nielsen, M. & Ranellucci, S. (2017).
The tinytable protocol for 2-party secure computation, or: Gate-scrambling revisited. I J. Katz & H. Shacham (red.),
Advances in Cryptology – CRYPTO 2017 - 37th Annual International Cryptology Conference, Proceedings (Bind 10401, s. 167-187). Springer VS.
https://doi.org/10.1007/978-3-319-63688-7_6