Damgård, I. B., Keller, M., Keller, E., Miles, C. & Smart, N. P. (2012).
Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocol.
Lecture Notes in Computer Science,
7485, 241-263.
https://doi.org/10.1007/978-3-642-32928-9_14
Damgård, I. B., Keller, M., Larraia , E.
, Pastro, V., Scholl, P. & Smart, N. P. (2013).
Practical Covertly Secure MPC for Dishonest Majority – or: Breaking the SPDZ Limits. In J. Crampton , S. Jajodia & K. Mayes (Eds.),
Computer Security – ESORICS 2013: 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings (pp. 1-18 ). Springer VS.
https://doi.org/10.1007/978-3-642-40203-6_1
Damgård, I. B., Faust, S., Mukherjee, P. & Venturi, D. (2013).
Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier. In K. Sako & P. Sarkar (Eds.),
Advances in Cryptology - ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II (pp. 140-160 ). Springer VS.
https://doi.org/10.1007/978-3-642-42045-0_8
Damgård, I. B., Funder, J., Nielsen, J. B. & Salvail, L. (2014).
Superposition attacks on cryptographic protocols. In C. Padró (Ed.),
Information Theoretic Security: 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings (pp. 142-161). Springer.
https://doi.org/10.1007/978-3-319-04268-8_9
Damgård, I. B., Lauritsen, R. & Toft, T. (2014).
An Empirical Study and some Improvements of the MiniMac Protocol for Secure Computation. In M. Abdalla & R. D. Prisco (Eds.),
Security and Cryptography for Networks: 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings (pp. 398-415 ). Springer.
https://doi.org/10.1007/978-3-319-10879-7_23
Damgård, I. B., David, B. M., Giacomelli, I. & Nielsen, J. B. (2014).
Compact VSS and Efficient Homomorphic UC Commitments. In P. Sarkar & T. Iwata (Eds.),
Advances in Cryptology – ASIACRYPT 2014: 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part II (pp. 213-232 ). Springer VS.
https://doi.org/10.1007/978-3-662-45608-8_12
Damgård, I. B. & Nielsen, J. B. (2014).
Adaptive versus static security in the UC Model. In S. S. M. Chow , J. K. Liu, L. C. K. Hui & S. M. Yiu (Eds.),
Provable Security: 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings (pp. 10-28). Springer VS.
https://doi.org/10.1007/978-3-319-12475-9_2
Damgård, I. B., Faust, S., Mukherjee, P. & Venturi, D. (2015).
The Chaining Lemma and its application. In A. Lehmann & S. Wolf (Eds.),
Information Theoretic Security: 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings (pp. 181-196). Springer VS.
https://doi.org/10.1007/978-3-319-17470-9_11
Damgård, I., Damgård, K., Nielsen, K.
, Nordholt, P. S. & Toft, T. (2017).
Confidential benchmarking based on multiparty computation. In J. Grossklags & B. Preneel (Eds.),
Financial Cryptography and Data Security - 20th International Conference, FC 2016, Revised Selected Papers (Vol. 9603 LNCS, pp. 169-187). Springer VS.
https://doi.org/10.1007/978-3-662-54970-4_10
Damgård, I., Nielsen, J. B., Nielsen, M. & Ranellucci, S. (2017).
The tinytable protocol for 2-party secure computation, or: Gate-scrambling revisited. In J. Katz & H. Shacham (Eds.),
Advances in Cryptology – CRYPTO 2017 - 37th Annual International Cryptology Conference, Proceedings (Vol. 10401, pp. 167-187). Springer VS.
https://doi.org/10.1007/978-3-319-63688-7_6
Damgård, I., Luo, J.
, Oechsner, S., Scholl, P. & Simkin, M. (2018).
Compact Zero-Knowledge Proofs of Small Hamming Weight. In M. Abdalla & R. Dahab (Eds.),
Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings (Vol. 10770, pp. 530-560). Springer VS.
https://doi.org/10.1007/978-3-319-76581-5_18
Damgård, I., Kazana, T.
, Obremski, M., Raj, V. & Siniscalchi, L. (2018).
Continuous NMC Secure Against Permutations and Overwrites, with Applications to CCA Secure Commitments. In A. Beimel & S. Dziembowski (Eds.),
Theory of Cryptography - 16th International Conference, TCC 2018, Proceedings (Vol. 11240, pp. 225-254). Springer VS.
https://doi.org/10.1007/978-3-030-03810-6_9
Damgård, I. B., Escudero Ospina, D. E., Frederiksen, T. K., Keller, M.
, Scholl, P. & Volgushev, N. (2019).
New Primitives for Actively-Secure MPC over Rings with Applications to Private Machine Learning. In
Proceedings - 2019 IEEE Symposium on Security and Privacy, SP 2019 (pp. 1102-1120). Article 8835310 IEEE.
https://doi.org/10.1109/SP.2019.00078
Damgård, I., Haagh, H., Mercer, R.
, Nitulescu, A., Orlandi, C. & Yakoubov, S. (2020).
Stronger Security and Constructions of Multi-designated Verifier Signatures. In R. Pass & K. Pietrzak (Eds.),
Theory of Cryptography - 18th International Conference, TCC 2020, Proceedings: Proceedings (Vol. II, pp. 229-260). Springer.
https://doi.org/10.1007/978-3-030-64378-2_9
Damgård, I. B., Orlandi, C., Takahashi, A. & Tibouchi, M. (2021).
Two-round n-out-of-n and Multi-Signatures and Trapdoor Commitment from Lattices. In J. A. Garay (Ed.),
Public-Key Cryptography – PKC 2021 - 24th IACR International Conference on Practice and Theory of Public Key Cryptography, 2021, Proceedings: 24rd IACR International Conference on Practice and Theory of Public-Key Cryptography, proceedings part 1 (pp. 99-130). Springer.
https://doi.org/10.1007/978-3-030-75245-3_5