Damgård, I., Haagh, H., Mercer, R.
, Nitulescu, A., Orlandi, C. & Yakoubov, S. (2020).
Stronger Security and Constructions of Multi-designated Verifier Signatures. In R. Pass & K. Pietrzak (Eds.),
Theory of Cryptography - 18th International Conference, TCC 2020, Proceedings: Proceedings (Vol. II, pp. 229-260). Springer.
https://doi.org/10.1007/978-3-030-64378-2_9
Damgård, I. B., Orlandi, C., Takahashi, A. & Tibouchi, M. (2021).
Two-round n-out-of-n and Multi-Signatures and Trapdoor Commitment from Lattices. In J. A. Garay (Ed.),
Public-Key Cryptography – PKC 2021 - 24th IACR International Conference on Practice and Theory of Public Key Cryptography, 2021, Proceedings: 24rd IACR International Conference on Practice and Theory of Public-Key Cryptography, proceedings part 1 (pp. 99-130). Springer.
https://doi.org/10.1007/978-3-030-75245-3_5
Damgård, I., Ganesh, C., Khoshakhlagh, H., Orlandi, C. & Siniscalchi, L. (2021).
Balancing Privacy and Accountability in Blockchain Identity Management. In K. G. Paterson (Ed.),
Topics in Cryptology-CT-RSA 2021 - Cryptographers’ Track at the RSA Conference, Proceedings (pp. 552-576). Springer.
https://doi.org/10.1007/978-3-030-75539-3_23
Damgård, I., Jakobsen, T. P.
, Nielsen, J. B., Pagter, J. I. & Østergaard, M. B. (2022).
Fast threshold ECDSA with honest majority.
Journal of Computer Security,
30(1), 167-196.
https://doi.org/10.3233/JCS-200112
Dalskov, A. P. K., Orlandi, C., Keller, M., Shrishak, K. & Shulman, H. (2020).
Securing DNSSEC Keys via Threshold ECDSA from Generic MPC. In L. Chen, S. Schneider, N. Li & K. Liang (Eds.),
European Symposium on Research in Computer Security : Computer Security – ESORICS 2020 (Vol. I, pp. 654-673). Springer.
https://doi.org/10.1007/978-3-030-59013-0_32
Dalskov, A. P. K., Lee, E.
& Soria Vazquez, E. (2020).
Circuit Amortization Friendly Encodings and their Application to Statistically Secure Multiparty Computation. In S. Moriai & H. Wang (Eds.),
Advances in Cryptology – ASIACRYPT 2020: 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings (Vol. III). Springer.
Cramer, R.
, Damgård, I. B. & Fehr, S. (2001).
On the Cost of Reconstructing a Secret or VSS with Optimal Reconstruction. In J. Killian (Ed.),
Advances in Cryptology - CRYPTO 2001: 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001 Proceedings (pp. 503-524). Springer.
https://doi.org/10.1007/3-540-44647-8_30
Cramer, R.
, Damgård, I. B., Dziembowski, S., Hirt, M. & Rabin, T. (1999).
Efficient Multiparty Computations Secure Against an Adaptive Adversary. In J. Stern (Ed.),
Advances in Cryptology - EUROCRYPT '99: International Conference on the Theory and Application of Cryptographic Techniques Prague, Czech Republic, May 2-6, 1999 Proceedings (pp. 311-326). Springer.
https://doi.org/10.1007/3-540-48910-X_22
Cramer, R.
, Damgård, I. B. & MacKenzie, P. (2000).
Efficient Zero-Knowledge Proofs of Knowledge without Intractability Assumptions. In H. Imai & Y. Zheng (Eds.),
Public Key Cryptography: Third International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000. Proceedings (pp. 354-373). Springer.
https://doi.org/10.1007/978-3-540-46588-1_24
Cramer, R.
, Damgård, I. B., Kiltz, E.
, Zakarias, S. N. H. & Zottarel, A. (2012).
DDH-Like Assumptions Based on Extension Rings.
Lecture Notes in Computer Science,
7293, 644-661 .
https://doi.org/10.1007/978-3-642-30057-8_38
Cramer, R.
, Damgård, I. B., Döttling, N. M., Fehr, S. & Spini, G. (2015).
Linear secret sharing schemes from error correcting codes and universal hash functions. In E. Oswald & M. F. Fischlin (Eds.),
Advances in Cryptology - EUROCRYPT 2015: 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II (pp. 313-336). Springer VS.
https://doi.org/10.1007/978-3-662-46803-6_11
Cramer, R.
, Damgård, I., Döttling, N., Giacomelli, I. & Xing, C. (2017).
Linear-Time Non-Malleable Codes in the Bit-Wise Independent Tampering Model. In J. Shikata (Ed.),
Information Theoretic Security - 10th International Conference, ICITS 2017, Proceedings (Vol. 10681, pp. 1-25). Springer VS.
https://doi.org/10.1007/978-3-319-72089-0_1
Cramer, R.
, Damgård, I., Escudero, D., Scholl, P. & Xing, C. (2018).
SPDΖ2k: Efficient MPC mod 2k for Dishonest Majority. In H. Shacham & A. Boldyreva (Eds.),
Advances in Cryptology - CRYPTO 2018 (Vol. 10992, pp. 769-798). Springer VS.
https://doi.org/10.1007/978-3-319-96881-0_26
Coron, J-S.
& Nielsen, J. B. (Eds.) (2017).
Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part I. In J-S. Coron & J. Buus Nielsen (Eds.),
Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part I (Vol. 10210). Springer VS.
https://doi.org/10.1007/978-3-319-56620-7
Coron, J-S.
& Nielsen, J. B. (Eds.) (2017).
Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part II. In J-S. Coron & J. Buus Nielsen (Eds.),
Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part II (Vol. 10211). Springer VS.
https://doi.org/10.1007/978-3-319-56614-6