Davi Resende, A. C., Railsback, D., Dowsley, R., Nascimento, A. C. A.
& Aranha, D. F. (2022).
Fast Privacy-Preserving Text Classification based on Secure Multiparty Computation.
IEEE Transactions on Information Forensics and Security,
17, 428-442.
https://doi.org/10.1109/TIFS.2022.3144007
Damgård, I. B., Fehr, S., Morozov, K.
& Salvail, L. (2004).
Unfair Noisy Channels and Oblivious Transfer. In M. Naor (Ed.),
Theory of Cryptography: First Theory of Cryptography Conference, TCC 2004, Cambridge, MA, USA, February 19-21, 2004. Proceedings (pp. 355-373). Springer.
https://doi.org/10.1007/978-3-540-24638-1_20
Damgård, I. B., Fehr, S.
& Salvail, L. (2004).
Zero-Knowledge Proofs and String Commitments Withstanding Quantum Attacks. In M. Franklin (Ed.),
Advances in Cryptology - CRYPTO 2004: 24th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 2004. Proceedings (pp. 254-272). Springer.
https://doi.org/10.1007/978-3-540-28628-8_16
Damgård, I. B., Cramer, R. & Ishai, Y. (2005).
Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation. In J. Killian (Ed.),
Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005. Proceedings (pp. 342-362). Springer.
https://doi.org/10.1007/978-3-540-30576-7_19
Damgård, I. B., Salvail, L. & Pedersen, T. B. (2005).
A Quantum Cipher with Near Optimal Key-Recycling. In V. Shoup (Ed.),
Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005. Proceedings (pp. 494-510). Springer.
https://doi.org/10.1007/11535218_30
Damgård, I. B., Nicolosi, A. & Fazio, N. (2006).
Non-interactive Zero-Knowledge from Homomorphic Encryption. In S. Halevi & T. Rabin (Eds.),
Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006. Proceedings (pp. 41-59). Springer.
https://doi.org/10.1007/11681878_3
Damgård, I. B., Nielsen, J. B., Toft, T., Kiltz, E.
& Fitzi, M. (2006).
Unconditionally Secure Constant-Rounds Multi-party Computation for Equality, Comparison, Bits and Exponentiation. In S. Halevi & T. Rabin (Eds.),
Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006. Proceedings (pp. 285-304). Springer.
https://doi.org/10.1007/11681878_15
Damgård, I. B. & Thorbek, R. (2006).
Linear Integer Secret Sharing and Distributed Exponentiation. In M. Yung, Y. Dodis, A. Kiayias & T. Malkin (Eds.),
Public Key Cryptography - PKC 2006: 9th International Conference on Theory and Practice in Public-Key Cryptography, New York, NY, USA, April 24-26, 2006. Proceedings (pp. 75-90). Springer.
https://doi.org/10.1007/11745853_6
Damgård, I. B., Toft, T., Pagter, J. I., Jakobsen, T., Bogetoft, P. & Nielsen, K. (2006).
A Practical Implementation of Secure Auctions Based on Multiparty Integer Computation. In G. Di Crescenzo & A. Rubin (Eds.),
Financial Cryptography and Data Security: 10th International Conference, FC 2006 Anguilla, British West Indies, February 27-March 2, 2006 Revised Selected Papers (pp. 142-147). Springer.
https://doi.org/10.1007/11889663_10
Damgård, I. B., Fehr, S.
, Salvail, L. & Schaffner, C. (2006).
Oblivious Transfer and Linear Functions. In C. Dwork (Ed.),
Advances in Cryptology - CRYPTO 2006: 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006. Proceedings (pp. 427-444). Springer.
https://doi.org/10.1007/11818175_26
Damgård, I. B., Salvail, L., Fehr, S., Schaffner, C. & Renner, R. (2007).
A Tight High-Order Entropic Quantum Uncertainty Relation with Applications. In A. Menezes (Ed.),
Advances in Cryptology - CRYPTO 2007: 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007. Proceedings (pp. 360-378). Springer.
https://doi.org/10.1007/978-3-540-74143-5_20
Damgård, I. B., Salvail, L., Schaffner, C. & Fehr, S. (2007).
Secure Identification and QKD in the Bounded-Quantum-Storage Model. In A. Menezes (Ed.),
Advances in Cryptology - CRYPTO 2007: 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007. Proceedings (pp. 342-359). Springer.
https://doi.org/10.1007/978-3-540-74143-5_19
Damgård, I. B., Nielsen, J. B., Fitzi, M. & Desmedt, Y. (2007).
Secure Protocols with Asymmetric Trust. In
Advances in Cryptology - ASIACRYPT 2007: 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007. Proceedings (pp. 357-375). Springer.
https://doi.org/10.1007/978-3-540-76900-2_22
Damgård, I. B., Krøigaard, M. & Geisler, M. J. (2007).
Efficient and Secure Comparison for On-Line Auctions. In J. Pieprzyk, H. Ghodosi & E. Dawson (Eds.),
Information Security and Privacy: 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007. Proceedings (Vol. 4586, pp. 416-430). Springer.
https://doi.org/10.1007/978-3-540-73458-1_30