Aarhus University Seal

Publications

List of publications

Sort by: Date | Author | Title

Damgård, I. B. (1999). Commitment Schemes and Zero-Knowledge Protocols. In I. B. Damgård (Ed.), Lectures on Data Security: Modern Cryptology in Theory and Practice (pp. 63-86). Springer. https://doi.org/10.1007/3-540-48969-X_3
Cramer, R., Damgård, I. B., Dziembowski, S., Hirt, M. & Rabin, T. (1999). Efficient Multiparty Computations Secure Against an Adaptive Adversary. In J. Stern (Ed.), Advances in Cryptology - EUROCRYPT '99: International Conference on the Theory and Application of Cryptographic Techniques Prague, Czech Republic, May 2-6, 1999 Proceedings (pp. 311-326). Springer. https://doi.org/10.1007/3-540-48910-X_22
Damgård, I. B., Killian, J. & Salvail, L. (1999). On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions. In J. Stern (Ed.), Advances in Cryptology - EUROCRYPT '99: International Conference on the Theory and Application of Cryptographic Techniques Prague, Czech Republic, May 2-6, 1999 Proceedings (pp. 56-73). Springer. https://doi.org/10.1007/3-540-48910-X_5
Damgård, I. B. & Pfitzmann, B. (1998). Sequential iteration of interactive arguments and an efficient zero-knowledge argument for NP. In K. G. Larsen, S. Skyum & G. Winskel (Eds.), Automata, Languages and Programming: 25th International Colloquium, ICALP'98 Aalborg, Denmark, July 13-17, 1998 Proceedings (pp. 772-783). Springer. https://doi.org/10.1007/BFb0055101
Damgård, I. B., Pedersen, T. P. & Pfitzmann, B. (1998). Statistical secrecy and multibit commitments. I E E E Transactions on Information Theory, 44(3), 1143-1151. https://doi.org/10.1109/18.669255
Damgård, I. B. & Knudsen, L. R. (1998). Two-Key Triple Encryption. Journal of Cryptology, 11(3), 209-218. https://doi.org/10.1007/s001459900044
Damgård, I. B. & Cramer, R. (1998). Zero-knowledge proofs for finite field arithmetic, or: Can zero-knowledge be for free? In H. Krawczyk (Ed.), Advances in Cryptology - CRYPTO '98: 18th Annual International Cryptology Conference Santa Barbara, California, USA August 23-27, 1998 Proceedings (pp. 424-441). Springer. https://doi.org/10.1007/BFb0055745
Cramer, R., Damgård, I. B. & Pedersen, T. P. (1997). Efficient and provable security amplifications. In M. Lomas (Ed.), Security Protocols: International Workshop Cambridge, United Kingdom, April 10-12, 1996 Proceedings (pp. 101-109). Springer. https://doi.org/10.1007/3-540-62494-5_9
Cramer, R. & Damgård, I. B. (1997). Fast and Secure Immunization Against Adaptive Man-in-the-Middle Impersonation. In W. Fumy (Ed.), Advances in Cryptology - EUROCRYPT '97: International Conference on the Theory and Application of Cryptographic Techniques Konstanz, Germany, May 11-15, 1997 Proceedings (pp. 75-87). Springer. https://doi.org/10.1007/3-540-69053-0_7
Cramer, R. & Damgård, I. B. (1997). Linear zero-knowledge-a note on efficient zero-knowledge proofs and arguments. In Proceedings of the twenty-ninth annual ACM symposium on Theory of computing (pp. 436-445). Association for Computing Machinery. https://doi.org/10.1145/258533.258635
Damgård, I. B. & Knudsen, L. R. (1996). Multiple encryption with minimum key. In E. Dawson & J. Golic (Eds.), Cryptography: Policy and Algorithms: International Conference Brisbane, Queensland, Australia, July 3-5, 1995 Proceedings (pp. 156-164). Springer. https://doi.org/10.1007/BFb0032355
Damgård, I. B. & Pedersen, T. P. (1996). New Convertible Undeniable Signature Schemes. In U. Maurer (Ed.), Advances in Cryptology - EUROCRYPT '96: International Conference on the Theory and Application of Cryptographic Techniques Saragossa, Spain, May 12-16, 1996 Proceedings (pp. 372-386). Springer. https://doi.org/10.1007/3-540-68339-9_32
Cramer, R. & Damgård, I. B. (1996). New Generation of Secure and Practical RSA-Based Signatures. In N. Koblitz (Ed.), Advances in Cryptology - CRYPTO '96: 16th Annual International Cryptology Conference Santa Barbara, California, USA August 18-22, 1996 Proceedings (pp. 173-185). Springer. https://doi.org/10.1007/3-540-68697-5_14
Damgård, I. B., Goldreich, O., Okamoto, T. & Wigderson, A. (1995). Honest Verifier vs Dishonest Verifier in Public Coin Zero-Knowledge Proofs. In D. Coppersmith (Ed.), Advances in Cryptology - CRYPT0' 95: 15th Annual International Cryptology Conference Santa Barbara, California, USA, August 27-31, 1995 Proceedings (pp. 325-338). Springer. https://doi.org/10.1007/3-540-44750-4_26
Chen, L., Damgård, I. B. & Pedersen, T. P. (1995). Parallel divertibility of proofs of knowledge (Extended abstract). In A. De Santis (Ed.), Advances in Cryptology - EUROCRYPT'94: Workshop on the Theory and Application of Cryptographic Techniques Perugia, Italy, May 9-12, 1994 Proceedings (pp. 140-155). Springer. https://doi.org/10.1007/BFb0053431
Cramer, R. & Damgård, I. B. (1995). Secure Signature Schemes based on Interactive Protocols. In D. Coppersmith (Ed.), Advances in Cryptology - CRYPT0' 95: 15th Annual International Cryptology Conference Santa Barbara, California, USA, August 27-31, 1995 Proceedings (pp. 297-310). Springer. https://doi.org/10.1007/3-540-44750-4_24
Damgård, I. B. (1994). Interactive Hashing can Simplify Zero-Knowledge Protocol Design Without Computational Assumptions (Extended Abstract). In D. R. Stinson (Ed.), Advances in Cryptology - CRYPTO' 93: 13th Annual International Cryptology Conference Santa Barbara, California, USA August 22-26, 1993 Proceedings (pp. 100-109). Springer. https://doi.org/10.1007/3-540-48329-2_9
Damgård, I. B., Pedersen, T. P. & Pfitzmann, B. (1994). On the Existence of Statistically Hiding Bit Commitment Schemes and Fail-Stop Signatures. In D. R. Stinson (Ed.), Advances in Cryptology - CRYPTO' 93: 13th Annual International Cryptology Conference Santa Barbara, California, USA August 22-26, 1993 Proceedings (pp. 250-265). Springer. https://doi.org/10.1007/3-540-48329-2_22
Damgård, I. B. (1994). Practical and Provably Secure Release of a Secret and Exchange of Signatures. In T. Helleseth (Ed.), Advances in Cryptology - EUROCRYPT '93: Workshop on the Theory and Application of Cryptographic Techniques Lofthus, Norway, May 23-27, 1993 Proceedings (pp. 200-217). Springer. https://doi.org/10.1007/3-540-48285-7_17
Cramer, R., Damgård, I. B. & Schoenmakers, B. (1994). Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols. In Y. G. Desmedt (Ed.), Advances in Cryptology - CRYPTO '94: 14th Annual International Cryptology Conference Santa Barbara, California, USA August 21-25, 1994 Proceedings (pp. 174-187). Springer. https://doi.org/10.1007/3-540-48658-5_19
Damgård, I. B. & Knudsen, L. R. (1994). The breaking of the AR Hash Function. In T. Helleseth (Ed.), Advances in Cryptology - EUROCRYPT '93: Workshop on the Theory and Application of Cryptographic Techniques Lofthus, Norway, May 23-27, 1993 Proceedings Springer. https://doi.org/10.1007/3-540-48285-7_25
Damgård, I. B. (1993). Non-Interactive Circuit Based Proofs and Non-Interactive Perfect Zero-knowledge with Preprocessing. In R. A. Rueppel (Ed.), Advances in Cryptology - EUROCRYPT' 92: Workshop on the Theory and Application of Cryptographic Techniques Balatonfüred, Hungary, May 24-28, 1992 Proceedings (pp. 341-355). Springer. https://doi.org/10.1007/3-540-47555-9_28
Brandt, J. & Damgård, I. B. (1993). On generation of probable primes by incremental search. In Advances in cryptology - CRYPTO '92 (pp. 358-370). Springer.
Chen, L. & Damgård, I. B. (1993). Security Bounds for Parallel Versions of Identification Protocols (extended abstract). In R. A. Rueppel (Ed.), Advances in Cryptology - EUROCRYPT' 92: Workshop on the Theory and Application of Cryptographic Techniques Balatonfüred, Hungary, May 24-28, 1992 Proceedings (pp. 461-466). Springer. https://doi.org/10.1007/3-540-47555-9_40
Brandt, J., Damgård, I. B. & Landrock, P. (1993). Speeding up prime number generation. In Advances in cryptology - ASIACRYPT '91 (pp. 440-449). Springer. https://doi.org/10.1007/3-540-57332-1
Damgård, I. B. (1991). Towards Practical Public Key Systems Secure Against Chosen Ciphertext attacks. In J. Feigenbaum (Ed.), Advances in Cryptology - CRYPTO '91: Proceedings (pp. 445-456). Springer. https://doi.org/10.1007/3-540-46766-1_36
Boyar, J., Chaum, D., Damgård, I. B. & Pedersen, T. (1990). Convertible Undeniable Signatures. In A. J. Menezez & S. A. Vanstone (Eds.), Advances in Cryptology - CRYPT0' 90: Proceedings (pp. 189-205). Springer. https://doi.org/10.1007/3-540-38424-3_14
Brassard, G. & Damgård, I. B. (1990). "Practical IP" <- MA. In S. Goldwasser (Ed.), Advances in Cryptology - CRYPTO' 88: Proceedings (pp. 580-582). Springer. https://doi.org/10.1007/0-387-34799-2_42
Damgård, I. B. (1989). A Design Principle for Hash Functions. In G. Brassard (Ed.), Advances in Cryptology - CRYPTO' 89 Proceedings (pp. 416-427). Springer. https://doi.org/10.1007/0-387-34805-0_39
Damgård, I. B. (1989). On the Existence of Bit Commitment Schemes and Zero-Knowledge Proofs. In G. Brassard (Ed.), Advances in Cryptology - CRYPTO' 89 Proceedings (pp. 17-27). Springer. https://doi.org/10.1007/0-387-34805-0_3
Brandt, J., Damgård, I. B. & Landrock, P. (1988). Anonymous and verifiable registration in databases. In Advances in cryptology - EUROCRYPT '88 (pp. 167-176). Springer. https://doi.org/10.1007/3-540-45961-8_14
Chaum, D., Crépeau, C. & Damgård, I. B. (1988). Multiparty unconditionally secure protocols. In Proceedings of the twentieth annual ACM symposium on Theory of computing (pp. 11-19). Association for Computing Machinery. https://doi.org/10.1145/62212.62214
Damgård, I. B. (1988). On The Randomness of Legendre and Jacobi Sequences. In S. Goldwasser (Ed.), Advances in Cryptology - CRYPTO' 88: Proceedings (pp. 163-172). Springer. https://doi.org/10.1007/0-387-34799-2_13
Damgård, I. B. (1988). Payment Systems and Credential Mechanisms with Provable Security Against Abuse by Individuals. In S. Goldwasser (Ed.), Advances in Cryptology - CRYPTO' 88: Proceedings (pp. 328-335). Springer. https://doi.org/10.1007/0-387-34799-2_26
Brandt, J., Damgård, I. B., Landrock, P. & Pedersen, T. P. (1988). Zero-Knowledge Authentication Scheme with Secret Key Exchange (extended abstract). In S. Goldwasser (Ed.), Advances in Cryptology - CRYPTO' 88: Proceedings (pp. 583-588). Springer. https://doi.org/10.1007/0-387-34799-2_43
Damgård, I. B. (1987). Collision Free Hash Functions and Public Key Signature Schemes. In D. Chaum & W. L. Price (Eds.), Advances in Cryptology - EUROCRYPT' 87: Workshop on the Theory and Application of Cryptographic Techniques Amsterdam, The Netherlands, April 13-15, 1987 Proceedings (pp. 203-216). Springer. https://doi.org/10.1007/3-540-39118-5_19
Damgård, I. B. (1987). Concatenated Group Codes and Their Exponents. I E E E Transactions on Information Theory, Vol. 33, Issue 6.
Brickell, E. F., Chaum, D., Damgård, I. B. & van der Graaf, J. (1987). Gradual and Verifiable Release of a Secret (Extended Abstract). In C. Pomerance (Ed.), Advances in Cryptology - CRYPTO '87: Proceedings (pp. 156-166). Springer. https://doi.org/10.1007/3-540-48184-2_11
Chaum, D., Damgård, I. B. & van der Graaf, J. (1987). Multiparty Computations Ensuring Privacy of Each Party's Input and Correctness of the Result. In C. Pomerance (Ed.), Advances in Cryptology - CRYPTO '87: Proceedings (pp. 87-119). Springer. https://doi.org/10.1007/3-540-48184-2_7
Chaum, D., Crépeau, C. & Damgård, I. B. (1987). Multiparty Unconditionally Secure Protocols (Abstract). In C. Pomerance (Ed.), Advances in Cryptology - CRYPTO '87: Proceedings (pp. 462). Springer. https://doi.org/10.1007/3-540-48184-2_43