Nielsen, J. B. (Ed.), Alwen, J., Cachin, C., Pereira, O., Sadeghi, A.-R., Schoenmakers, B., Shelat, A. & Visconti, I. (2007).
Summary Report on Rational Cryptographic Protocols. ECRYPT - European Network of Excellence in Cryptology.
Oliveira, L. B.
, Aranha, D. F., Morais, E., Daguano, F., Lopez, J. & Dahab, R. (2007).
TinyTate: Computing the Tate Pairing in Resource-Constrained Sensor Nodes. In
Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007)(NCA) (pp. 318-323). IEEE.
https://doi.org/10.1109/NCA.2007.48
Damgård, I. B., Toft, T., Pagter, J. I., Jakobsen, T., Bogetoft, P. & Nielsen, K. (2006).
A Practical Implementation of Secure Auctions Based on Multiparty Integer Computation. In G. Di Crescenzo & A. Rubin (Eds.),
Financial Cryptography and Data Security: 10th International Conference, FC 2006 Anguilla, British West Indies, February 27-March 2, 2006 Revised Selected Papers (pp. 142-147). Springer.
https://doi.org/10.1007/11889663_10
Damgård, I. B. & Thorbek, R. (2006).
Linear Integer Secret Sharing and Distributed Exponentiation. In M. Yung, Y. Dodis, A. Kiayias & T. Malkin (Eds.),
Public Key Cryptography - PKC 2006: 9th International Conference on Theory and Practice in Public-Key Cryptography, New York, NY, USA, April 24-26, 2006. Proceedings (pp. 75-90). Springer.
https://doi.org/10.1007/11745853_6
Damgård, I. B., Nicolosi, A. & Fazio, N. (2006).
Non-interactive Zero-Knowledge from Homomorphic Encryption. In S. Halevi & T. Rabin (Eds.),
Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006. Proceedings (pp. 41-59). Springer.
https://doi.org/10.1007/11681878_3
Damgård, I. B., Fehr, S.
, Salvail, L. & Schaffner, C. (2006).
Oblivious Transfer and Linear Functions. In C. Dwork (Ed.),
Advances in Cryptology - CRYPTO 2006: 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006. Proceedings (pp. 427-444). Springer.
https://doi.org/10.1007/11818175_26
Damgård, I. B., Nielsen, J. B., Toft, T., Kiltz, E.
& Fitzi, M. (2006).
Unconditionally Secure Constant-Rounds Multi-party Computation for Equality, Comparison, Bits and Exponentiation. In S. Halevi & T. Rabin (Eds.),
Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006. Proceedings (pp. 285-304). Springer.
https://doi.org/10.1007/11681878_15
Damgård, I. B., Salvail, L. & Pedersen, T. B. (2005).
A Quantum Cipher with Near Optimal Key-Recycling. In V. Shoup (Ed.),
Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005. Proceedings (pp. 494-510). Springer.
https://doi.org/10.1007/11535218_30
Hansen, K. M., Antolin Rafael, P., Camara, J., Carro, S., Metha, G., Rosengren, P.
, Pagter, J. I. & Pedersen, M. Ø. (2005).
eu-DOMAIN D3.1 + D4.1 Software Architecture Specification.
Pagter, J. I., Toft, T., Damgård, I. B., Bogetoft, P., Nielsen, K. & Jakobsen, T. (2005).
Secure Computing, Economy, and Trust - A Generic Solution for Secure Auctions with Real-World Applications.
B R I C S Report Series, (RS-05-18), 1-35.
Damgård, I. B., Cramer, R. & Ishai, Y. (2005).
Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation. In J. Killian (Ed.),
Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005. Proceedings (pp. 342-362). Springer.
https://doi.org/10.1007/978-3-540-30576-7_19
Canetti, R.
, Damgård, I. B., Dziembowski, S., Ishai, Y. & Malkin, T. (2004).
Adaptive versus Non-Adaptive Security of Multi-Party Protocols.
Journal of Cryptology,
17(3), 153-207.
https://doi.org/10.1007/s00145-004-0135-x
Hansen, K. M., Larsen, S. B., Pagter, J. I., Pedersen, M. Ø. & Thomsen, J. (2004).
An Evaluation of an OSGi-based Residential Pervasive Computing Platform. In N. Guimarães & P. Isaías (Eds.),
Proceedings of the IADIS Applied Computing Conference (pp. 246-253). International Association for Development, IADIS.
http://www.iadis.net/dl/Search_list_open.asp?code=602
Damgård, I. B., Fehr, S., Morozov, K.
& Salvail, L. (2004).
Unfair Noisy Channels and Oblivious Transfer. In M. Naor (Ed.),
Theory of Cryptography: First Theory of Cryptography Conference, TCC 2004, Cambridge, MA, USA, February 19-21, 2004. Proceedings (pp. 355-373). Springer.
https://doi.org/10.1007/978-3-540-24638-1_20
Damgård, I. B., Fehr, S.
& Salvail, L. (2004).
Zero-Knowledge Proofs and String Commitments Withstanding Quantum Attacks. In M. Franklin (Ed.),
Advances in Cryptology - CRYPTO 2004: 24th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 2004. Proceedings (pp. 254-272). Springer.
https://doi.org/10.1007/978-3-540-28628-8_16
Canetti, R., Krawczyk, H.
& Nielsen, J. B. (2003).
Relaxing Chosen-Ciphertext Security. In D. Boneh (Ed.),
Advances in Cryptology - CRYPTO 2003: 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003. Proceedings (pp. 565-582). Springer.
https://doi.org/10.1007/978-3-540-45146-4_33